Improved image analysis methodology for detecting changes in evidence positioning at crime scenes
- Authors: Petty, Mark , Teng, Shyh , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2019
- Full Text:
- Reviewed:
- Description: This paper proposed an improved methodology to assist forensic investigators in detecting positional change of objects due to crime scene contamination. Either intentionally or by accident, crime scene contamination can occur during the investigation and documentation process. This new proposed methodology utilises an ASIFT-based feature detection algorithm that compares pre- and post-contaminated images of the same scene, taken from different viewpoints. The contention is that the ASIFT registration technique is better suited to real world crime scene photography, being more robust to affine distortion that occurs when capturing images from different viewpoints. The proposed methodology was tested with both the SIFT and ASIFT registration techniques to show that (1) it could identify missing, planted and displaced objects using both SIFT and ASIFT and (2) ASIFT is superior to SIFT in terms of error in displacement estimation, especially for larger viewpoint discrepancies between the pre- and post-contamination images. This supports the contention that our proposed methodology in combination with ASIFT is better suited to handle real world crime scene photography. © 2019 IEEE.
- Description: E1
E-Learning challenges for electronics and mechatronics education during lockdowns
- Authors: Jayawardena, Amal , Kahandawa, Gayan , Petty, Mark
- Date: 2021
- Type: Text , Conference paper
- Relation: 8th IEEE International Conference on e-Learning in Industrial Electronics, ICELIE 2021, Virtual, Toronto, 13-16 October 2021, Proceedings - 2021 8th IEEE International Conference on e-Learning in Industrial Electronics, ICELIE 2021
- Full Text: false
- Reviewed:
- Description: This paper explains methods used to deliver online electronics and mechatronics courses and clarifies the results obtained by an online survey to understand students' e-learning experience. The purpose of this paper is to outline the challenges of online learning and to explain effective content delivery methods used to overcome those challenges. This study gives detailed descriptions for each content delivery technique, for each online lab delivery method, and for all the online assessment types used while analyzing the effectiveness of those procedures. A case study on the delivery of an online mechatronics project has also been presented. In addition, the paper presents the analyzed results obtained from the survey to improve the future delivery of online electronics and mechatronics courses in a pandemic. © 2021 IEEE.
Security of Internet of Things devices : ethical hacking a drone and its mitigation strategies
- Authors: Karmakar, Gour , Petty, Mark , Ahmed, Hassan , Das, Rajkumar , Kamruzzaman, Joarder
- Date: 2022
- Type: Text , Conference paper
- Relation: 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2022, Gold Coast, Australia, 18-20 December 2022, Proceedings of IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2022
- Full Text: false
- Reviewed:
- Description: Internet of Things (IoT) is enabling us to introduce cost-effective, innovative and intelligent services in business, industrial, and government application domains. Despite these huge potential benefits of IoT applications, since the backbone of IoT is Internet and IoT connects numerous heterogeneous devices, IoT is vulnerable to many different attacks and thus has been a honey pot to the cybercriminals and hackers. For this reason, the attacks against IoT devices are increasing sharply in recent years. To prevent and detect these attacks, ethical hacking of different IoT devices are of paramount importance. This is because the lesson learnt from these ethical hackings can be exploited to develop effective and robust strategies and mitigation approaches to protect IoT devices from these attacks. There exist a few ethical hacking techniques reported in the literature such as hacking Android phones, Windows XP virtual machine and a DNS rebinding attack on IoT devices. In this paper, we implement an approach for the ethical hacking of a Drone and then hijack it. As an outcome of lesson learnt, the mitigation approaches on how to reduce the hacking on a drone is presented in this paper. © 2022 IEEE.