1
|
Liang S, Gao SH. Development research of latent fingermarks based on aggregation-induced emission technique. J Forensic Sci 2024; 69:856-868. [PMID: 38491780 DOI: 10.1111/1556-4029.15506] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/12/2023] [Revised: 02/20/2024] [Accepted: 03/05/2024] [Indexed: 03/18/2024]
Abstract
Fingerprints hold evidential value for individual identification; a sensitive, efficient, and convenient method for visualizing latent fingermarks (LFMs) is of great importance in the field of crime scene investigation. In this study, we proposed an aggregation-induced emission atomization technique (AIE-AT) to obtain high-quality fingermark images. Six volunteers made over 1566 fingerprint samples on 17 different objects. The quality of fingermark development was evaluated using grayscale analysis for quantitative assessment, combining the fluency of fingermark ridges and the degree of level 2 and level 3 features. Both qualitative and quantitative methods were employed to explore the effectiveness of AIE molecule C27H19N3SO in developing fingermarks, its applicability to objects, and its individual selectivity. Additionally, the stability of the AIE molecule was examined. Comparative experimental results demonstrated the high stability of the AIE molecule, making it suitable for long-term preservation. The grayscale ratio of the ridges and furrows was at least 2, with high brightness contrast, the level 2 and level 3 features were clearly observable. The AIE-AT proved to be effective for developing fingermarks on nonporous, porous, and semiporous objects. It exhibited low selectivity on suspects who leave fingermarks and showed better development effects on challenging objects, as well as efficient extraction capability for in situ fingermarks. In summary, AIE-AT can efficiently develop latent fingermarks on common objects and even challenging ones. It locates the latent fingermarks for further accurate extraction of touch exfoliated cells in situ, providing technical support for the visualization of fingermarks and the localization for extraction of touch DNA.
Collapse
Affiliation(s)
- Shuai Liang
- School of Investigation, People's Public Security University of China, Beijing, China
| | - Shu-Hui Gao
- School of Investigation, People's Public Security University of China, Beijing, China
| |
Collapse
|
2
|
Qi XT, Bu F. A system dynamics-based model for the evolution of environmental group events. Sci Rep 2024; 14:9711. [PMID: 38678041 PMCID: PMC11055907 DOI: 10.1038/s41598-024-59283-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/16/2023] [Accepted: 04/09/2024] [Indexed: 04/29/2024] Open
Abstract
Based on the system dynamics theory, this paper establishes an environmental mass event evolution model and explores the evolution law of mass events caused by environmental problems. From a methodological point of view, the mixed-strategy evolutionary game principle and dynamic punishment measures are combined, and simulation analysis is carried out by Anylogic software, and the results show that there is no stable evolutionary equilibrium solution for the two sides of the game in the traditional asymmetric mixed-strategy game model, and after adjusting the game payoff matrix and incorporating the dynamic punishment strategy, stable evolutionary equilibrium solutions appear in the evolutionary game model, and the system begins to tend to be stabilized. The process and conclusions of the simulation experiment provide methodological reference and theoretical support for the analysis of the evolution of environmental mass events.
Collapse
Affiliation(s)
- Xue-Ting Qi
- People's Public Security University of China, Beijing, China
| | - Fanliang Bu
- People's Public Security University of China, Beijing, China.
| |
Collapse
|
3
|
Tian S, Wang Y, Liu S, Liu Z, Zhao YB. Toward multidimensional information: A derivatization-free UHPLC-QqQ MS/MS method for amino acid components of fingerprint. J Forensic Sci 2024; 69:448-460. [PMID: 38263851 DOI: 10.1111/1556-4029.15464] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/02/2023] [Revised: 01/09/2024] [Accepted: 01/12/2024] [Indexed: 01/25/2024]
Abstract
The analysis of fingerprint chemical composition is a meaningful way to excavate the multidimensional information of fingerprint, including the donor profiling information and the age of a fingerprint, which broadens the evidential values of fingerprint, especially for the partial and distorted fingerprint. But the research remains still in the pilot phases or is ongoing. Amino acids are the dominant organic substances in latent sweat fingerprint and influenced by many donor factors. Hence, their content reflects personal information of donors. Forensic science will be revolutionized if suspects can be individualized by their amino acid content. The diverse nature, distinct physicochemical properties, and ultra-micro levels of amino acids present in fingerprints make it hard to detect. A high sensitivity method for detecting and quantifying multiple amino acid components is required. UHPLC-QqQ MS/MS offers high sensitivity, high separation, simultaneous multicomponents detection, and no derivatization, making it an ideal method for detecting and analyzing amino acids in fingerprints. Therefore, in this study, we propose and validate an efficient UHPLC-QqQ MS/MS method for the extraction and analysis of 13 amino acids from fingerprint. We compared the results of amino acids of 10 different substrates and found that the inherent amino acids in most porous substrates would have been extracted along with the fingerprint amino acids, making them unsuitable for quantitative amino acid analysis. Instead, plastic sheets are ideal substrates for laboratory studies. Then, extensive experiments were conducted among 30 donors for multidimensional information analysis. The type of samples analyzed were eccrine-rich fingerprints. A Binary Logistic Regression (BLR) model was developed, and the female and male donors were successfully differentiated by amino acids in fingerprints. Two other mathematical models were also developed to verify the accuracy, and all three different mathematical models were able to identify donors of different genders with over 90% accuracy. This demonstrates that amino acids have the potential to provide more information for donors as metabolic markers. In the future, we will conduct a series of experiments to analyze more multidimensional information for individual identification by amino acid content in the fingerprint.
Collapse
Affiliation(s)
- Shisi Tian
- Department of Forensic Science, People's Public Security University of China, Beijing, China
| | - Yanyan Wang
- Department of Forensic Science, People's Public Security University of China, Beijing, China
- Public Security Behavioral Science Laboratory, People's Public Security University of China, Beijing, China
| | - Shuo Liu
- Department of Forensic Science, People's Public Security University of China, Beijing, China
| | - Zhaolun Liu
- Department of Forensic Science, People's Public Security University of China, Beijing, China
| | - Ya-Bin Zhao
- Department of Forensic Science, People's Public Security University of China, Beijing, China
- Public Security Behavioral Science Laboratory, People's Public Security University of China, Beijing, China
| |
Collapse
|
4
|
Yan R, Gu Y, Zhang Z, Jiao S. Vehicle Trajectory Prediction Method for Task Offloading in Vehicular Edge Computing. Sensors (Basel) 2023; 23:7954. [PMID: 37766013 PMCID: PMC10536581 DOI: 10.3390/s23187954] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/03/2023] [Revised: 09/15/2023] [Accepted: 09/16/2023] [Indexed: 09/29/2023]
Abstract
Real-time computation tasks in vehicular edge computing (VEC) provide convenience for vehicle users. However, the efficiency of task offloading seriously affects the quality of service (QoS). The predictive-mode task offloading is limited by computation resources, storage resources and the timeliness of vehicle trajectory data. Meanwhile, machine learning is difficult to deploy on edge servers. In this paper, we propose a vehicle trajectory prediction method based on the vehicle frequent pattern for task offloading in VEC. First, in the initialization stage, a T-pattern prediction tree (TPPT) is constructed based on the historical vehicle trajectory data. Secondly, when predicting the vehicle trajectory, the vehicle frequent itemset with the largest vehicle trajectory support is found in the vehicle frequent itemset of the TPPT. Finally, in the update stage, the TPPT is updated in real time with the predicted vehicle trajectory results. Meanwhile, based on the proposed prediction method, the strategies of task offloading and optimization algorithm are designed to minimize energy consumption with time constraints. The experiments are carried out on real-vehicle datasets and the Capital Bikeshare datasets. The results show that compared with the baseline T-pattern method, the accuracy of the prediction method is improved by more than 10% and the prediction efficiency is improved by more than 6.5 times. The vehicle trajectory prediction method based on the vehicle frequent pattern has high accuracy and prediction efficiency, which can solve the problem of vehicle trajectory prediction for task offloading.
Collapse
Affiliation(s)
- Ruibin Yan
- College of Information and Cyber Security, People's Public Security University of China, Beijing 102600, China
| | - Yijun Gu
- College of Information and Cyber Security, People's Public Security University of China, Beijing 102600, China
| | - Zeyu Zhang
- College of Information and Cyber Security, People's Public Security University of China, Beijing 102600, China
| | - Shouzhong Jiao
- College of Information and Cyber Security, People's Public Security University of China, Beijing 102600, China
| |
Collapse
|
5
|
Lv H, Du Y, Zhou X, Ni W, Ma X. A Data Enhancement Algorithm for DDoS Attacks Using IoT. Sensors (Basel) 2023; 23:7496. [PMID: 37687952 PMCID: PMC10490689 DOI: 10.3390/s23177496] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/11/2023] [Revised: 08/23/2023] [Accepted: 08/26/2023] [Indexed: 09/10/2023]
Abstract
With the rapid development of the Internet of Things (IoT), the frequency of attackers using botnets to control IoT devices in order to perform distributed denial-of-service attacks (DDoS) and other cyber attacks on the internet has significantly increased. In the actual attack process, the small percentage of attack packets in IoT leads to low accuracy of intrusion detection. Based on this problem, the paper proposes an oversampling algorithm, KG-SMOTE, based on Gaussian distribution and K-means clustering, which inserts synthetic samples through Gaussian probability distribution, extends the clustering nodes in minority class samples in the same proportion, increases the density of minority class samples, and improves the amount of minority class sample data in order to provide data support for IoT-based DDoS attack detection. Experiments show that the balanced dataset generated by this method effectively improves the intrusion detection accuracy in each category and effectively solves the data imbalance problem.
Collapse
Affiliation(s)
- Haibin Lv
- College of Information and Cyber Security, People's Public Security University of China, Beijing 100038, China
| | - Yanhui Du
- College of Information and Cyber Security, People's Public Security University of China, Beijing 100038, China
| | - Xing Zhou
- College of Information and Cyber Security, People's Public Security University of China, Beijing 100038, China
| | - Wenkai Ni
- College of Information and Cyber Security, People's Public Security University of China, Beijing 100038, China
| | - Xingbang Ma
- College of Information and Cyber Security, People's Public Security University of China, Beijing 100038, China
| |
Collapse
|
6
|
Lin R, Wang R, Zhang W, Wu A, Sun Y, Bi Y. Person Re-Identification Method Based on Dual Descriptor Feature Enhancement. Entropy (Basel) 2023; 25:1154. [PMID: 37628184 PMCID: PMC10453489 DOI: 10.3390/e25081154] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/06/2023] [Revised: 07/13/2023] [Accepted: 07/21/2023] [Indexed: 08/27/2023]
Abstract
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching. However, these features often provide a biased description of the person. To address this limitation, this paper introduces a new method called the Dual Descriptor Feature Enhancement (DDFE) network, which aims to emulate the multi-perspective observation abilities of humans. The DDFE network uses two independent sub-networks to extract descriptors from the same person image. These descriptors are subsequently combined to create a comprehensive multi-view representation, resulting in a significant improvement in recognition performance. To further enhance the discriminative capability of the DDFE network, a carefully designed training strategy is employed. Firstly, the CurricularFace loss is introduced to enhance the recognition accuracy of each sub-network. Secondly, the DropPath operation is incorporated to introduce randomness during sub-network training, promoting difference between the descriptors. Additionally, an Integration Training Module (ITM) is devised to enhance the discriminability of the integrated features. Extensive experiments are conducted on the Market1501 and MSMT17 datasets. On the Market1501 dataset, the DDFE network achieves an mAP of 91.6% and a Rank1 of 96.1%; on the MSMT17 dataset, the network achieves an mAP of 69.9% and a Rank1 of 87.5%. These outcomes outperform most SOTA methods, highlighting the significant advancement and effectiveness of the DDFE network.
Collapse
Affiliation(s)
- Ronghui Lin
- School of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China; (R.L.); (W.Z.)
| | - Rong Wang
- School of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China; (R.L.); (W.Z.)
- Key Laboratory of Security Prevention Technology and Risk Assessment of Ministry of Public Security, Beijing 100038, China
| | - Wenjing Zhang
- School of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China; (R.L.); (W.Z.)
| | - Ao Wu
- School of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China; (R.L.); (W.Z.)
| | - Yang Sun
- School of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China; (R.L.); (W.Z.)
| | - Yihan Bi
- School of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China; (R.L.); (W.Z.)
| |
Collapse
|