Dirk LabuddeHochschule Mittweida | HSMW · Department of Informatics
Dirk Labudde
Professor
About
236
Publications
55,499
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,490
Citations
Publications
Publications (236)
This study addresses the limits of human and artificial intelligence (AI) in face recognition using a specially designed test, which consists of tasks regarding person identification and lookalike discrimination. It was devided into nine sets of four or five queries each. The assignments, presented in the study, were performed by ten super-recogniz...
Recently, mobile forensics has received considerable attention from researchers and practitioners due to its significant role in our society. With the advent of mobile devices and the breakthroughs in new communication technologies, various devices have risen to prominence in daily communication, where the intermingling of text, images, videos, aud...
In the realm of forensic science, the analysis and visualization of data and traces rely heavily on the interpretation of colors. This chapter delves into the multifaceted role colors play in forensic investigations, exploring their significance in various domains, such as bloodstain analysis, fingerprint examination, image forensics, and the study...
As part of a comprehensive analysis, this case report presents a possible case of child maltreatment that can serve as a basis for forensic and medical examiner investigations. This case concerns the death of an infant who was approximately two months old. During a routine examination by the pediatrician at the end of May 2021, the child was found...
The article discusses the development of facial soft tissue reconstruction (FSTR) from analog to digital methods. Recently, digital methods have increasingly incorporated Artificial Intelligence (AI) techniques, which are highlighted as a promising approach to enhancing accuracy and efficiency. The integration of machine learning, combined with an...
Bei Fund einer Leiche unbekannter Identität, welche sich bereits im Stadium der Skelettierung befindet, stellt die Gesichtsweichteilrekonstruktion (GWR) häufig eine letzte Alternative zur Identifikation von unbekannten Verstorbenen dar, wenn andere Methoden, wie die Daktyloskopie oder die DNA-Analyse, versagen oder nicht anwendbar sind. Im Kontrast...
The idea of using measurements of the human body for identity matching is deeply associated with Bertillonage, a historic biometric system that was briefly applied until it was superseded by fingerprinting in the early 20th century. The apparent failure then commonly causes doubt with regard to the suitability of a set of measurements as a biometri...
This book chapter delves into the field of colorimetric analysis of bloodstains in forensic science, focusing on its application in crime scene investigation. Therefore it provides a comprehensive overview of the biological background of age-induced color changes. The chapter begins with an introduction to the significance of blood evidence in solv...
Short messages stored on mobile devices have become a crucial source of evidence in criminal investigations. However, the high volume of chat messages poses a challenge to the investigator. Topic modelling offers the potential to summarise the short messages compactly, thus effectively supporting the investigator in exploring the vast number of cha...
This paper explores the application of facial recognition algorithms in the context of criminal investigations concerning child pornography (KiPo). As the number of KiPo cases continues to rise, the volume of digital material requiring analysis has grown exponentially, making manual evaluation by law enforcement impractical. This research introduce...
Fanfiction platforms become very popular. However, since fan fiction stories can also contain content that can be disturbing to readers, it is important to assign appropriate warnings to them. The automatic assignment of 32 trigger labels to fanfiction works is addressed by the Trigger Detection task of PAN’23 in terms of a multi-label document cla...
Digital anthropometric pattern matching encompasses biometric identification on the basis of a combination of anthropometric measurements depicting the proportions of the human body from image or video material. In a previous publication, maximum likelihood density estimation of distributions of anthropometric measurement distances allowed for esti...
Zusammenfassung
Der Umgang mit Hatespeech ist bereits seit mehreren Jahren ein Problem im Internet, insbesondere in sozialen Netzwerken. Da die enorme Menge an Kommentaren nicht mehr manuell moderiert werden kann, ist es essenziell, automatische Methoden zur Detektion offensiver Kommentare unterstützend einzusetzen. Doch speziell in Bezug auf die d...
Digitale Spuren müssen von gut ausgebildeten Polizistinnen und Polizisten erkannt, vor Veränderung geschützt sowie gesichert und ausgewertet werden. Sie sollten also wissen, in welchen Zusammenhängen welche Spuren entstehen, wie diese zu finden sind und wie diese beweiskräftig gesichert werden können. In diesem Kapitel wird anhand von Basiskompeten...
Hass und aggressives Verhalten im Netz werden immer größere Probleme. Der bisher etablierte Versuch zur Lösung des Problems ist das Löschen von Kommentaren, doch um dem grundlegenden Problem entgegenzuwirken, müssen Ursachen für die Entstehung von Hass im Netz bekämpft werden. In diesem Kapitel wird daher neben Grundlagen der Hatespeechanalyse insb...
Die Planungen für die erste Fachtagung zur Polizei-Informatik begannen
Mitte 2015, als festgestellt wurde, dass ein Austausch zwischen
Wissenschaftlerinnen und Wissenschaftlern auf den Gebieten der polizeilichen
Informatik und Informationstechnik nicht stattfand. Darüber
hinaus galt die Frage zu diskutieren, ob und wenn ja, wie sich die o. g.
Theme...
Video and image material is becoming increasingly ubiquitous thus its potential as evidence in forensic investigations is growing. Once faces are hidden however, the value of surveillance footage is restricted unless there is another biometric trait that can be observed by camera such as linear body measurements. There is much biological evidence f...
Shows like CSI seem to convey a certain view on the capabilities of forensic science based on the vast progress of digitalisation and the new technology, that goes along with it. But those depictions can be misleading and hardly represent a realistic reflection of reality. Nevertheless, this representation influences the public view on digital fore...
Nowadays, a huge amount of information and news articles are available every day. The events of recent years have shown that Fake News can severely shake trust in politics and science. Unfortunately, a decision can only be made about the truthfulness of a fraction of all news and posts. In this respect, the CLEF2022-CheckThat! shared task 3a adress...
Textual social media content and short messages have gained in importance as evidence in criminal investigations. Yet, the large number of textual data poses a great challenge for investigators. Even though text retrieval systems can assist in finding evidential messages, the success of the search still depends on entering appropriate search terms....
In this work, we present a new publicly available offensive language dataset of 10.278 German social media comments collected in the first half of 2021 that were annotated by in total six annotators. With twelve different annotation categories, it is far more comprehensive than other datasets, and goes beyond just hate speech detection. The labels...
During the prosecution process the primary objective is to prove criminal offences to the correct perpetrator to convict them with legal effect. However, in reality this may often be difficult to achieve. Suppose a suspect has been identified and is accused of a bank robbery. Due to the location of the crime, it can be assumed that there is suffici...
Mobile communication devices are a popular means of planning, commissioning and carrying out criminal offenses. In particular, data from messengers such as WhatsApp or Telegram often contain conclusive information. Organized crime also usually involves many devices, but not all of them contain the full history of communication. Rather, it is heavil...
The classification of detected bloodstains into predetermined categories is a crucial component of the so-called bloodstain pattern analysis. As in other forensic disciplines, deep learning methods may help to reduce human subjectivity within this process, may increase the classification accuracy, shorten the calculation time and thus, enable high-...
The response of cells to their environment is driven by a variety of proteins and messenger molecules. In eukaryotes, their distribution and location in the cell are regulated by the vesicular transport system. The transport of aquaporin 2 between membrane and storage region is a crucial part of the water reabsorption in renal principal cells, and...
Untersuchung der Eignung von Photogrammetrie und Laserscan zur Digitalisierung in der forensischen Blutspurenmusteranalyse
Tommy Bergmann - Sven Becker - Dirk Labudde
Die Blutspurenmusteranalyse ist in der forensischen Tatortarbeit nicht mehr wegzudenken. Dabei werden Informationen zu Form und Lage von Blutflecken manuell ermittelt und interpretie...
The term mobility has different meanings in the following science disciplines. In economics, mobility is the ability of an individual or a group to improve their economic status in relation to income and wealth within their lifetime or between generations. In information systems and computer science, mobility is used for the concept of mobile compu...
Named entity recognition (NER) constitutes an important step in the processing of unstructured text content for the extraction of information as well as for the computer-supported analysis of large amounts of digital data via machine learning methods. However, NER often relies on domain-specific knowledge, being conducted manually in a time- and hu...
Nowadays, mobile devices play a crucial role in our daily life. In practice, criminals also use mobile devices to communicate. Therefore, they have been becoming an important resource for evidence for law enforcement agencies. Especially, the communication between criminals may provide information that could be important for a criminal investigatio...
In social networks such as Twitter, author profiling plays a big role. It is especially interesting to differentiate between accounts from humans and bots and to make a prediction about the age and the gender of human users. The information can be helpful to analyze possible manipulations, networks and crimes. This paper presents an approach to dif...
Zusammenfassung
Die seit Jahrhunderten verwendeten Methoden in der Forensik basieren auf der Annahme eines Austausches von Materie und Mustern. Durch die Digitalisierung sind diese Annahmen nur noch eingeschränkt gültig und werden hier erweitert und diskutiert. In dem Zusammenhang ist es erforderlich, den Spurenbegriff grundlegend zu überdenken. Gl...
With the increasing importance of social media in everyone's life, the risk of its misuse by criminals is also increasing. In particular children are at risk of becoming victims of on-line related crime, especially sexual abuse. For example, sexual predators use online grooming to gain the trust of children and young adults. In this paper, a two-st...
The response of cells to their environment is driven by a variety of proteins and messenger molecules. In eukaryotes their distribution, which is regulated by a vesicular transport system, is important for a tight cellular response. The recycling of aquaporin 2 between membrane and storage region is a crucial part of the body water homeostasis and...
The age estimation of blood traces provides important leads for the chronological assessment of criminal events and their reconstruction. To determine bloodstain age, experimental comparative data from a laboratory environment are used. Under these conditions the utilization of anticoagulants such as EDTA helps to suppress the blood clotting mechan...
Der Charakter der Sammlungs- und Objektforschung lässt sich unter anderem mit dem Begriff „Spurenlesen“ fassen. „Spur“, der erste Bestandteil des Wortes, verankert die Sammlungs- und Objektforschung fest im materiellen Bereich. Ohne materiellen Träger keine Spur. Doch wird die Spur erst durch den Akt des ‚Lesens‘ zur Spur. Die interessegeleitete In...
Durch viele Einzelheiten, die Anthropologen durch logisches Aneinanderreihen einem Knochenpuzzle gleich Stück für Stück zusammensetzen, wird es möglich, aussagekräftige Rückschlüsse zu ziehen. Diese sind dabei behilflich, verstorbene Individuen oder Bevölkerungsgruppen und deren Lebensumstände zu rekonstruieren. Eine umfassende und nachhaltige Fors...
Künstliche Intelligenz (KI) ist eine Dual-Use-Technologie: Einerseits kann sie zur Erhöhung der Cybersicherheit eingesetzt werden, andererseits können feindliche Angriffe mittels KI effektiver durchgeführt werden. KI-Systeme und Roboter können darüber hinaus Gegenstand neuartiger Angriffe werden.
Dies wirft eine Reihe neuer Rechtsfragen auf, die da...
Interpreting the evidence found at a crime scene is essential in reconstructing the circumstances of a crime and, hence, solving it. In this paper a classical hypothesis-driven approach is combined with computer-aided modeling. Hereby, the paper focuses on the advantages of 3D models and their added value in the reconstruction of a case by visually...
In der Anthropologie werden körperliche Überreste von Menschen historischer und rezenter Zeiträume mit dem Ziel der Aufdeckung ihrer Lebensumstände untersucht. Das Projekt AnthroWorks3D der Hochschule Mittweida verbindet Methoden der Videospielentwicklung und Osteologie, um das Knochenmaterial schonend und hoch-auflösend durch eine 3D-Scanpipeline...
A fingerprint is probably the most important biometric feature when trying to link a suspect to a crime scene. So far, without a hit in a fingerprint database, it was impossible to use a collected fingerprint to narrow down the group of suspects. Moreover, in the existing studies about deriving phenotypic characteristics from fingerprints the analy...
In recent years, the automated, efficient and sensitive monitoring of social networks has become increasingly important for the criminal investigation process and crime prevention. Previously, we have shown that the detection of opinion leaders is of great interest in forensic applications to gather important information. In the current work, it is...
Das Handbuch gibt einen Überblick über die Themen Cybercrime und Cybersecurity bezogen auf die öffentliche Verwaltung.
Dabei werden sowohl Hintergrundwissen dargestellt als auch Handlungsmöglichkeiten aufgezeigt.
Das Handbuch gliedert sich inhaltlich in vier Teile. Im ersten Teil wird erläutert, welche Angriffsarten von "Cyberkriminalität" umfasst...
While technological advances and improved algorithms enhance most scientific fields, there remains a simple problem in many domains. If a decision has to be made we resort to simple majority votes or utilize agreement measures to determine how unanimous a decision is. Especially in text classification, a text is usually sorted into a specific categ...
Fingerprint analysis played a major role in the investigation of criminal offences for the past 100
years and is often the sole means of criminal identification [YA04]. Electrochemical analysis can
yield important additional evidence like fingerprint age, biological age and gender of its creator
as well as chemical adhesives [GRW12]. Additional gai...
Mithilfe der so genannten Blutmusteranalyse (engl. BPA – blood pattern analysis) können seit über 100 Jahren forensisch relevante Informationen zur Rekonstruktion eines Tatablaufs am Tatort ermittelt werden. Durch den technischen Fortschritt lässt sich auch auf diesem Gebiet mittlerweile der zeitliche Aufwand und die Präzision der Analysen verbesse...
Announcements of events are regularly spread using the Internet, e.g., via online newspapers or social media. Often, these events involve playing music publicly that is protected by international copyright laws. Authorities entrusted with the protection of the artists' interests have to find unregistered music events in order to fully exercise thei...
Storage and directed transfer of information is the key requirement for the development of life. Yet any information stored on our genes is useless without its correct interpretation. The genetic code defines the rule set to decode this information. Aminoacyl-tRNA synthetases are at the heart of this process. We extensively characterize how these e...
Die globale Vernetzung und die damit verbundene Veränderung des Kommunikationsverhaltens in der modernen Informationsgesellschaft ermöglicht die Kommunikation prinzipiell aller Menschen untereinander, unabhängig von Ort und Zeit. Auch (Cyber)Kriminelle nutzen diese Möglichkeiten, um potentielle Opfer auszuspähen oder sich mit anderen Gleichgesinnte...
Introduction
During the last 20 years forensic imaging became increasingly more important due to the wider distribution and advancements of radiological techniques, such as computed tomography and magnetic resonance imaging. The databank on a knowledge-based case collection (WiFas) was developed to make the results and knowledge gained from these n...
Protein folding and structure prediction are two sides of the same coin. Contact maps and the related techniques of constraint-based structure reconstruction can be considered as unifying aspects of both processes. We present the Structural Relevance (SR) score which quantifies the information content of individual contacts and residues in the cont...
Due to the increasing digitalisation multi-label classification gains in importance in many areas. In this paper we propose a method to classify blurbs into eight basic book genre using an ensemble of classifier chains composed of radial support vector machines using word em-beddings and author information as features. Five models were tested using...
In this paper an approach for the automatic detection of offensive language in German twitter posts, so called tweets, based on a data set provided by the organizers from the GermEval2019 contest is presented. Two different approaches were used. The first one is based on a document-term-matrix and the second one uses fastText to represent tweets as...
Protein folding and structure prediction are two sides of the same coin. We propose contact maps and the related techniques of constraint-based structure reconstruction as unifying aspect of both processes. The presented Structural Relevance (SR) score quantifies the contribution of individual contacts and residues to structural integrity.
It is de...
The lantibiotic nisin is used as a food additive to effectively inactivate a broad spectrum of Gram-positive bacteria such as Listeria monocytogenes. In total, 282 L. monocytogenes field isolates from German ready-to-eat food products, food-processing environments and patient samples and 39 Listeria reference strains were evaluated for their suscep...
With the rapid growth of public protein structure databases, computational techniques for storing as well as comparing proteins in an efficient manner are still in demand. Proteins play a major role in virtually all processes in life, and comparing their three-dimensional structures is essential to understanding the functional and evolutionary rela...
Genetic code and translation are key to all life. As a consequence, all kingdoms and species share the enzymes known as aminoacyl-tRNA synthetases, which link amino acids to their codons. For life to flourish, it is vital that these enzymes correctly implement the genetic code and hence correctly recognize amino acids. There are many theories on th...
Background: Machine learning strategies are prominent tools for data analysis. Especially in life sciences, they have become increasingly important to handle the growing datasets collected by the scientific community. Meanwhile, algorithms improve in performance, but also gain complexity, and tend to neglect interpretability and comprehensiveness o...
p-Hydroxybenzoate hydroxylase (PHBH; EC 1.14.13.2) is a microbial group A flavoprotein monooxygenase that catalyzes the ortho-hydroxylation of 4-hydroxybenzoate to 3,4-dihydroxybenzoate with the stoichiometric consumption of NAD(P)H and oxygen. PHBH and related enzymes lack a canonical NAD(P)H-binding domain and the way they interact with the pyrid...
Dieses Lehrbuch soll Studierenden den Einstieg in die Gebiete der Forensik und Bioinformatik gleichermaßen erleichtern. Anhand eines fiktiven Falls, der sich durch das gesamte Buch zieht, wird die Bioinformatik und deren Grundlagen in das Gebiet der Forensik übertragen. Der Fall deckt eine Vielzahl an biologischen Spuren, sowie deren klassische Ana...
Announcements of events are regularly spread using the Internet, e.g., via online newspapers or social media. Often, these events involve playing music publicly that is protected by international copyright laws. Authorities entrusted with the protection of the artists’ interests have to find unregistered music events in order to fully exercise thei...
Im Zusammenhang mit körperlicher Gewalt und deren Klassifizierung im rechtsmedizinischen Umfeld kommt der Begutachtung der Haut und deren Schädigung eine Schlüsselposition zu. So sollte die rechtsmedizinische Begutachtung von Spuren von Gewalteinwirkungen auf den menschlichen Körper hierarchisch von der Makro- zur Detailspur erfolgen. Grundsätzlich...
Das Blut gilt als Lebenselixier – ein Symbol der fortdauernden Vitalität des menschlichen Körpers. Mephisto, eine der Hauptfiguren von Goethes Faust, erkannte: „Blut ist ein ganz besonderer Saft.“ In der Umgangssprache stehen Wörter wie heißblütig oder blutjung für besonders kraft- und temperamentvolle Menschentypen, während blutarm und ausgeblutet...
Proteins are chains of amino acids which adopt a three-dimensional structure and are then able to catalyze chemical reactions or propagate signals in organisms. Without external influence, many proteins fold into their native structure, and a small number of Early Folding Residues (EFR) have previously been shown to initiate the formation of second...
Statistical characterization of EFR.
For each presented feature the mean (μ) and standard deviation (σ) of both the EFR and LFR category is reported. It was tested whether the differences of a feature between EFR and LFR state is significant. pburied refers to the p-value of the test on residues buried according their RASA value, this was done beca...
Comparison of EFR and functional residues.
For each presented feature the distribution of values is compared between functional and non-functional residues as well as EFR and functional residues. The corresponding p-values and significance level are stated for buried residues. Mean values are shown for EFR (μearly) and functional residues (μfunc)....
Start2Fold dataset as JSON file.
Machine-readable JSON version of the dataset. Provides protein name, Start2Fold identifier, PDB identifier, UniProt identifier, number of EFR, range of residues numbers, and the secondary structure element composition for each dataset entry.
(JSON)
Correlation matrix of computed features.
Depicts correlations of analyzed correlation. The bigger the circle, the higher the association of both variables. Blue refers to positive correlation, whereas red represents a negative correlation.
(TIF)
Network descriptors.
Depiction of the used network descriptors: betweenness, closeness, clustering coefficient, and distinct neighborhood count.
(TIF)
Summary of the aaRS dataset.
Sequence conservation [93, 94] and EFoldMine [9] predictions for the aaRS protozyme regions [46–48] are presented. Encompassed are the average values for all residues, residues in the protozyme region, for positions predicted to be EFR, functional residues, ATP binding residues, and amino acid binding sites.
(XLSX)
Detailed description of aaRS class I structures.
For each renumbered position, it is stated whether it is functional [48] or an EFR. Furthermore given are the sequence conservation [93, 94], the number of backing sequences [48], and the average EFoldMine score [9].
(CSV)
Detailed description of aaRS class II structures.
For each renumbered position, it is stated whether it is functional [48] or an EFR. Furthermore given are the sequence conservation [93, 94], the number of backing sequences [48], and the average EFoldMine score [9].
(CSV)
Table of computed features for the Start2Fold dataset.
Contains for all residues the set of computed features as well as the annotation of Early Folding and functional residues.
(CSV)