https://www.aseestant.ceon.rs/index.php/jcfs/issue/feed Journal of Computer and Forensic Sciences 2026-04-30T16:38:00+02:00 Nemanja Vučković comput.forensic.sci@kpu.edu.rs SCIndeks Assistant <p class="MsoNormal" style="margin-bottom: 4.3pt; text-align: justify;"><span style="font-size: 11.0pt; font-family: 'Times New Roman','serif';">The Journal of Computer and Forensic Sciences is an open access, peer-reviewed scientific journal published by the University of Criminal Investigation and Police Studies in Belgrade, covering advanced and innovative research across the fields of computer and forensic sciences. The aim of the journal is to provide a platform through which authors can communicate their viewpoints on diverse but often related aspects of computer and forensic sciences and a source of information to support advancing research, education, and practice in these fields.</span></p> <p>&nbsp;</p> <p>&nbsp;</p> https://www.aseestant.ceon.rs/index.php/jcfs/article/view/58032 Comparative Analysis of Machine Learning Models for Real-Time Object Detection 2026-04-30T16:34:16+02:00 Merlin Wittenhagen merlinwittenhagen@icloud.com <p><strong><span lang="EN-US" style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Noto Serif CJK SC'; mso-bidi-font-family: 'Lohit Devanagari'; mso-font-kerning: 1.5pt; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: HI;">: </span></strong><span lang="EN-US" style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Noto Serif CJK SC'; mso-bidi-font-family: 'Lohit Devanagari'; mso-font-kerning: 1.5pt; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: HI;">Object detection is a fundamental task in computer vision with applications ranging from autonomous driving, industrial automation and medical imaging. This report presents a comparative analysis of six well-known object detection models, precisely three small models for edge computing and three large models likely more suited for usage on high-performance systems. The models YOLOv10-Nano, MobileNetV3-SSDLite, EfficientDet-D0, Faster R-CNN, YOLOv10-Large and DETR were evaluated and compared based on their performance in terms of inference speed, accuracy and computational efficiency. The evaluation is conducted through both literature-based benchmarks and empirical tests on two different systems: an Apple Silicon M1 Pro-based system and an NVIDIA RTX 3080Ti-powered computer. Results show that YOLOv10 models consistently outperform the other models in real-time object detection as well as achieving superior accuracy in general while maintaining significantly lower inference times. The analysis further highlights compatibility issues with certain hardware, particularly focusing on PyTorch's MPS backend on Apple Silicon, which leads to serious performance drops in some models. The findings highlight the importance of choosing the right model and appropriate hardware for specific application scenarios.</span></p> 2025-05-27T15:42:50+02:00 Copyright (c) 2025 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://www.aseestant.ceon.rs/index.php/jcfs/article/view/58752 Heart_Rate_Estimation_Using_Wearable_Sensors_and_MachineLearning 2026-04-30T16:36:08+02:00 Nikhil Kumar nikhilkrishnakumar98@gmail.com Darshan Kumar darshankumar38@gmail.com <p class="MDPI17abstract" style="margin-left: 0in;"><span lang="EN-US" style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-bidi-font-family: 'Lohit Devanagari';">This research explores the development of a heart rate estimation system that integrates wearable sensors with machine learning techniques to achieve accuracy, low cost, and real-time performance. The project aims to build two-stage phases: a software pipeline for model training and a hardware framework for real-world testing. In the first phase, various machine learning algorithms are trained and fine-tuned using the publicly available PPG DaLiA dataset, which contains physiological data collected during everyday activities. The training process focuses on optimizing performance across different model architectures and configurations. The second phase involves implementing the trained model on a real-time embedded system. An ESP32 microcontroller serves as the central unit to collect data from multiple sensors, including electrocardiography (ECG), </span><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-bidi-font-family: 'Lohit Devanagari'; mso-ansi-language: #2000;">photoplethysmography (</span><span lang="EN-US" style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-bidi-font-family: 'Lohit Devanagari';">PPG), </span><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-bidi-font-family: 'Lohit Devanagari'; mso-ansi-language: #2000;">galvanic skin response (</span><span lang="EN-US" style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-bidi-font-family: 'Lohit Devanagari';">GSR), temperature, and a 3-axis accelerometer. This data is transmitted wirelessly for preprocessing and inference. </span><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-bidi-font-family: 'Lohit Devanagari'; mso-ansi-language: #2000;">The user will see their final predicted heart rate on both an OLED display and a user interface (UI) dashboard.</span></p> 2025-06-19T14:06:38+02:00 Copyright (c) 2025 University of Criminal Investigation and Police Studies, Belgrade, Serbia https://www.aseestant.ceon.rs/index.php/jcfs/article/view/59602 Application of Time Series Algorithms in Cybersecurity 2026-04-30T16:38:00+02:00 Марко Живановић marko.zivanovic@metropolitan.ac.rs <p>&nbsp;</p> <p lang="en-US" style="line-height: 0.46cm; margin-top: 0.42cm; margin-bottom: 0cm;" align="justify"><span style="font-family: Palatino Linotype, serif;"><span style="font-size: small;"><span style="font-family: Times New Roman, serif;"><span style="font-size: small;"><strong>Abstract: </strong></span></span><span style="font-family: Times New Roman, serif;"><span style="font-size: small;">This paper explores the application of time series algorithms to enhance anomaly detection in cybersecurity. Windows log files such as PowerShell Operational, Windows Defender, Firewall, System, and others were analyzed, focusing on those with the highest informational potential and data volume. Various models were used: exponential smoothing (Holt-Winters), Prophet, Fourier analysis, and Kalman filter for modeling seasonal, periodic, and linear patterns in system events. Advanced methods include LSTM and GRU neural networks, as well as ensemble algorithms like Random Forest and XGBoost, which demonstrated high accuracy in detecting unusual behavior. Special emphasis was placed on dynamic models such as Bayesian Structural Time Series to understand system states over time. Experiments show that applying multiple models enables a robust and adaptive approach to log analysis, especially for early detection of attacks and deviations from norms. The proposed framework highlights the importance of predictive analytics in preventive cybersecurity and provides a foundation for developing intelligent systems for real-time monitoring and response.</span></span></span></span></p> <p></p> 2025-08-29T11:14:33+02:00 Copyright (c) 2025 University of Criminal Investigation and Police Studies, Belgrade, Serbia