Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
Pengenalpastian manusia melalui Craniofacial Superimposition (CS) atau Penindihan Kraniofasial adalah salah satu penyelidikan yang utama dalam sains forensik. Secara asasnya, CS adalah satu teknik pengimbasan forensik yang digunakan untuk mengenal pasti identiti tengkorak yang tidak diketahui melalu...
| Main Author: | Tan, Joi San |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/39045/ |
| Abstract | Abstract here |
Similar Items
Automatic B-Spline Parameterisation And Scaling Estimation For Rigid Super-Curves Based Skull Registration.
by: Tan, Joi San
Published: (2010)
by: Tan, Joi San
Published: (2010)
Adaptive Pca-Based Models To
Reconstruct 3d Faces From Single 2d
Images
by: Maghari, Ashraf Y. A.
Published: (2014)
by: Maghari, Ashraf Y. A.
Published: (2014)
3d Morphing And Shape Transformation
Using Slices
by: Yasmin, Shamima
Published: (2009)
by: Yasmin, Shamima
Published: (2009)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Penggunaan Kaedah Pengimejan Resistiviti 2-D Dan Seismik Biasan Dalam Kajian Subpermukaan Untuk Kejuruteraan Awam.
by: Jusoh, Zuriati
Published: (2010)
by: Jusoh, Zuriati
Published: (2010)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
A Context-Aware Based Authorization
System For Pervasive Grid Computing
by: Lim , Marilyn Chien Hui
Published: (2015)
by: Lim , Marilyn Chien Hui
Published: (2015)
Compute Language Interface: A Transparent Wrapper Library For Multi Cpu-Gpu
by: Ooi, Keng Siang
Published: (2013)
by: Ooi, Keng Siang
Published: (2013)
Examining The Impact Of Computer-Based Assessment On Higher Education Student Performance In Kano, Nigeria
by: Bello, Hassan
Published: (2024)
by: Bello, Hassan
Published: (2024)
Classification Of P300 Signals In Brain-Computer Interface Using Neural Networks With Adjustable Activation Functions
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
Skull-photo superimposition: The state of the art in Malaysia and its legal significance / Hetty Susilawati Asmuni
by: Hetty Susilawati, Asmuni
Published: (2008)
by: Hetty Susilawati, Asmuni
Published: (2008)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
by: Alsalibi, Ahmed I N
Published: (2017)
by: Alsalibi, Ahmed I N
Published: (2017)
Effects Of Problem-Solving Strategies On Achievement And Motivation In Learning Chemistry In A Social Network Environment
by: Tan, Hong Looi
Published: (2016)
by: Tan, Hong Looi
Published: (2016)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
by: Tan, Choo Jun
Published: (2014)
by: Tan, Choo Jun
Published: (2014)
A Grid Meta-Scheduler Using Community Scheduler
Framework (Csf) With Different Plug-In Policies
Performance Evaluation
by: Tan , Zhen Ling
Published: (2008)
by: Tan , Zhen Ling
Published: (2008)
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012)
by: Tan , Aik Theng
Published: (2012)
Impact Of Enterprise Resource Planning (ERP) System Misfit On Information Quality : A Moderated Model Of Alignment Strategies
by: Tan, Shiang Yen
Published: (2012)
by: Tan, Shiang Yen
Published: (2012)
Gender classification framework in forensic anthropology
by: Nurul Liyana Hairuddin
Published: (2025)
by: Nurul Liyana Hairuddin
Published: (2025)
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015)
by: Wong, Kai Sin
Published: (2015)
Optimized feature construction methods for data summarizations of relational data
by: Sze, Florence Sia Fui
Published: (2014)
by: Sze, Florence Sia Fui
Published: (2014)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Personalizable Models For Business-To-Business Information Interchange In Communication Layers
by: Ting, Tin Tin
Published: (2011)
by: Ting, Tin Tin
Published: (2011)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Harmony search algorithms for ab initio protein tertiary structure prediction.
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Soccer Video Event Detection Via Collaborative Textual, Aural And Visual Analysis
by: Halin, Alfian Abdul
Published: (2011)
by: Halin, Alfian Abdul
Published: (2011)
Enhanced Network Connectivity And Node Lifetime Techniques In Wireless Sensor Networks
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
by: Al-Saidi, Ali Shanon Aiyal
Published: (2013)
Segmentation Assisted Object Distinction For Direct
Volume Rendering
by: Irani, Arash Azim Zadeh
Published: (2013)
by: Irani, Arash Azim Zadeh
Published: (2013)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Similar Items
-
Automatic B-Spline Parameterisation And Scaling Estimation For Rigid Super-Curves Based Skull Registration.
by: Tan, Joi San
Published: (2010) -
Adaptive Pca-Based Models To
Reconstruct 3d Faces From Single 2d
Images
by: Maghari, Ashraf Y. A.
Published: (2014) -
3d Morphing And Shape Transformation
Using Slices
by: Yasmin, Shamima
Published: (2009) -
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013) -
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
