• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 61
  • 3
  • 2
  • Tagged with
  • 71
  • 71
  • 45
  • 44
  • 44
  • 35
  • 26
  • 24
  • 19
  • 18
  • 15
  • 14
  • 13
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

An evaluation of the techniques used to collect latent prints from documents : a case study in Addis Ababa

Senbeta, habtamu Bekele 10 1900 (has links)
The aim of this research paper is to evaluate the techniques used to collect latent prints from documents in Addis Ababa Police Commission and give some recommendations on how to cope with the problem. The researcher started off by looking at the general orientation of the research and how the research has been done. Then in the next chapter, the meaning and objective of Forensic Investigation, right or mandate to investigate, the meaning of physical evidence and the prints and techniques used internationally to collect latent prints are discussed. In the third chapter, the best method of collecting latent prints from documents and the method and practice of collecting latent prints from documents at Addis Ababa Police Commission Forensic Evidence Collection Department were discussed. Finally, the finding of the research and some critical recommendations were given. Latent prints from documents are very crucial to identifying the suspects and for legal proceedings or the court process. Even if it is known by the police officers, the techniques and the materials they are using to collect latent prints are with powders which are less effective. According to the research, the Ninhydrin chemical is the best technique recommended to collect latent prints from documents This research paper gives a truly unique perspective on how latent prints should be collected from documents.
2

An evaluation of the techniques used to collect latent prints from documents : a case study in Addis Ababa

Senbeta, habtamu Bekele 10 1900 (has links)
The aim of this research paper is to evaluate the techniques used to collect latent prints from documents in Addis Ababa Police Commission and give some recommendations on how to cope with the problem. The researcher started off by looking at the general orientation of the research and how the research has been done. Then in the next chapter, the meaning and objective of Forensic Investigation, right or mandate to investigate, the meaning of physical evidence and the prints and techniques used internationally to collect latent prints are discussed. In the third chapter, the best method of collecting latent prints from documents and the method and practice of collecting latent prints from documents at Addis Ababa Police Commission Forensic Evidence Collection Department were discussed. Finally, the finding of the research and some critical recommendations were given. Latent prints from documents are very crucial to identifying the suspects and for legal proceedings or the court process. Even if it is known by the police officers, the techniques and the materials they are using to collect latent prints are with powders which are less effective. According to the research, the Ninhydrin chemical is the best technique recommended to collect latent prints from documents This research paper gives a truly unique perspective on how latent prints should be collected from documents.
3

Examination of the forensic engineering techniques employed on fire-damaged concrete structures

Alqassim, Mohammad Ali Mohammad Abdulla January 2016 (has links)
Portland cement (PC) concrete has historically been the most commonly used construction material within the United Arab Emirates (UAE), however, as the demand increases to reduce CO2 emissions most of newly-built facilities make use of modern concrete formulations adopting various PC substitutes, and these ‘blended cements’ typically involve mineral admixtures such as ground granulated blast-furnace slag (GGBS), fly ash (FA) and silica fume (SF). The percentage of PC replaced in these concrete mixtures varies depending on the type of cement and design criteria as well as other related issues such as fire resistance. The use of PC replacements in ready-mixed concrete has been made obligatory in Dubai from 1st April 2015. This recent move towards using greener concretes has been implemented with little research on their heat resistant properties and as such an understanding of their behaviour on exposure to high temperatures in structural fires is limited. Furthermore, the applicability of forensic engineering techniques for the assessment of any deterioration in these concrete formulations is largely untested. For this reason, a range of analytical techniques have been investigated as part of this research in order to establish the chemical and physical changes taking place as well as the practical applicability of the techniques used. Three key areas were addressed as part of this research. Firstly, a review of urban fires in Dubai and a survey of fire investigation related issues within the region was undertaken. This formed a base from which the research questions could be refined. Secondly, nine concrete mixtures were assessed using 15 analytical techniques. The concrete mixtures were exposed to 4 temperatures (150°C, 300°C, 600°C, and 900°C) within a muffle furnace and the chemical, mineralogical, physical and mechanical changes were investigated using TGA, DSC, FTIR, XRD, SEM, EDX, BET surface area, residual compressive strength, density loss, carbonation depth, visual colour change, rebound hammer, UPV, portable 3D laser scanning and micro CT scanning. Finally, a set of test concrete mixtures most closely linked to those used in construction in the UAE were exposed to a real fire and were analysed post fire using a reduced set of the analytical techniques. The techniques were assessed as to how well they could define the temperature range to which the concrete had been exposed as well as ascertaining the degree of concrete degradation based on the confirmation of the chemical, mineralogical, physical and mechanical changes which had occurred. Findings indicate that the use of blended cement concrete improves the thermal resistance of the material when compared with PC concrete up to a certain temperature, usually below 600°C. Discolouration in heated concrete sections were visualised using simple digital photography. Changing the cement composition influenced the rate of carbon ingress into the concrete matrix, however this did not result in any significant colour change in heated mortar surfaces. By contrast, colour changes within the aggregates was observed at temperatures > 300°C and was strongly determined by the mineralogy of the material. The analytical data demonstrated that there were three temperature regions that provide measurable data and information to inform fire investigators of the thermal history experienced by the concrete matrix. Between 70°C-200°C the evaporation of non-chemically bound water and dissociation of ettringite, gypsum and gel-like calcium silicate hydrate (CSH) occur, and can be detected using a range of the techniques used. The heat flux required for these reactions to occur was greater in all mixtures containing GGBS. Observed chemical and physical transformations between 300°C and 500°C were mainly due to the oxidation of iron hydroxide and the dehydroxylation of portlandite. Further chemical changes at 650°C and above were identified as a direct result of the decarbonation of CaCO3. At elevated temperatures, the absence of certain minerals within the concrete formulations provided an indication of the temperature which would have been reached by the concrete matrix. It was also revealed that in some cases the minerals present rehydrated during cooling of the concrete and this was also detectable using a number of the analytical methods employed. For the test samples exposed to real fire conditions, the rebound hammer, UPV and compressive strength measurements all provided good indications of physical losses experienced by the concrete, however these methods were not good estimators of the exposure temperature. The results from TGA, DSC and FTIR in particular were more reliable but differed from the reference models in that water used in suppression and absorbed by the concrete affected some of the predicted features. XRD also revealed peaks which could be related to various phases of change within the concrete, which was helpful in revealing the thermal history of concrete. Discolouration of cross-sections of the concrete samples produced trends similar to the lab-heated specimens however this was hard to visualise on the surface of the concrete due to the soot layer resulting from the fire. The results characterised, for the first time, chemical and physical changes occurring within a range of concrete mixtures used in the UAE and linked these to specific temperature ranges to which the concrete were exposed. Furthermore, this work has demonstrated that a number of the analytical techniques used can be helpful in the determination of the thermal history of concrete which has been exposed to fire conditions.
4

Forensic Investigation of Prestressed Concrete Box Beams from LIC-310 Bridge

Gulistani, Aziz A. 16 April 2010 (has links)
No description available.
5

The use of electronic evidence in forensic investigation

Ngomane, Amanda Refiloe 06 1900 (has links)
For millions of people worldwide the use of computers has become a central part of life. Criminals are exploiting these technological advances for illegal activities. This growth of technology has therefore produced a completely new source of evidence referred to as ‘electronic evidence’. In light of this the researcher focused on the collection of electronic evidence and its admissibility at trial. The study intends to assist and give guidance to investigators to collect electronic evidence properly and legally and ensure that it is admitted as evidence in court. Electronic evidence is fragile and volatile by nature and therefore requires the investigator always to exercise reasonable care during its collection, preservation and analysis to protect its identity and integrity. The legal requirements that the collected electronic evidence must satisfy for it to be admissible in court are relevance, reliability, and authenticity. When presenting the evidence in court the investigator should always keep in mind that the judges are not specialists in the computing environment and that therefore the investigator must be able to explain how the chain of custody was maintained during the collection, preservation and analysis of electronic evidence. The complex technology behind electronic evidence must be clearly explained so that the court is able to understand the evidence in a way that an ordinary person or those who have never used a computer before can. This is because the court always relies on the expertise of the investigator to understand electronic evidence and make a ruling on matters related to it. / Police Practice / M. Tech. (Forensic Investigation)
6

The Comprehensive Digital Forensic Investigation Process Model (CDFIPM) for digital forensic practice

Montasari, Reza January 2016 (has links)
No description available.
7

Using eye-tracking, head-mounted camera technology and verbal protocol analysis as a methodology to better understand Volume Crime Scene Investigator practice

Butler, Mark January 2014 (has links)
Literature Review: Expertise, decision making and situation awareness literature have allowed a better understanding of practitioner performance in Engineering, Healthcare and Sport. Discourse is thin in the domain of Crime Scene Examination, although Hierarchical Tasks Analysis, Distributed Cognition, Team Working and Perception have all received attention in recent years. The use of camera technology to uncover performance has also found footing in diverse professions, notably Firefighting and Social Work. Crime Scene Investigator practice is proposed as being a fertile area of study, to make apparent aspects of the work that are tacit, as well as to ascertain if performance metrics in the sector connect with the tacit knowledge expressed in the role. Methodology: This study explored the differences in searching strategies between expert and novice Crime Scene Examiners (n=12) in a simulated environment, before discussing a longitudinal ethnographic examination of how Volume Crime Scene Investigators (n=4) make sense of their practice. Eye-tracker and head-mounted camera technology was used to capture performance from an own point of view perceptive. Nvivo 9 was utilised to collate and code video data, field notes and interview transcriptions. Results & Discussion: Results from verbal protocol analysis and eye-tracker recordings indicate that expert examiners target fewer objects within the crime scene space however spend longer on the objects being viewed. Field study results report that Volume Crime Scene Investigators engage in sharing tacit knowledge, this impacted on their strategies or perception of obtaining forensic evidence. In addition the analysis of coded data from video and verbal protocol reports found that specific physical aspects of examination practice such as fingerprint powdering were aligned to decision making or analysis processes. For example, commenting on the morphology of the surface being examined. Furthermore examiners engaged in and highlighted aspects of their role they felt were important but were not captured in any metrics. Conclusion: It is proposed this new understanding will be of use to those in developing crime scene investigation practitioners as well as presenting related literature on how expertise in the domain can be recognised, elicited and developed in others. This work also sheds light on the value of sector standards for this field along with what is needed to make them more user- friendly for the developing practitioner.
8

The use of electronic evidence in forensic investigation

Ngomane, Amanda Refiloe 06 1900 (has links)
For millions of people worldwide the use of computers has become a central part of life. Criminals are exploiting these technological advances for illegal activities. This growth of technology has therefore produced a completely new source of evidence referred to as ‘electronic evidence’. In light of this the researcher focused on the collection of electronic evidence and its admissibility at trial. The study intends to assist and give guidance to investigators to collect electronic evidence properly and legally and ensure that it is admitted as evidence in court. Electronic evidence is fragile and volatile by nature and therefore requires the investigator always to exercise reasonable care during its collection, preservation and analysis to protect its identity and integrity. The legal requirements that the collected electronic evidence must satisfy for it to be admissible in court are relevance, reliability, and authenticity. When presenting the evidence in court the investigator should always keep in mind that the judges are not specialists in the computing environment and that therefore the investigator must be able to explain how the chain of custody was maintained during the collection, preservation and analysis of electronic evidence. The complex technology behind electronic evidence must be clearly explained so that the court is able to understand the evidence in a way that an ordinary person or those who have never used a computer before can. This is because the court always relies on the expertise of the investigator to understand electronic evidence and make a ruling on matters related to it. / Police Practice / M. Tech. (Forensic Investigation)
9

Techniky podvodného jednání a forenzní šetření / The techniques of fraudulent conduct and forensic investigation

Rücklová, Žaneta January 2011 (has links)
The thesis deals with the issue of fraudulent conduct, detection, investigation and prevention. The first part defines the most common types of fraudulent schemes, including detailed specifications, warning signals and measures to avoid them. Also describes the role and importance of forensic investigation. The second part analyzes the typical offender and the efficiency of detection of fraudulent conduct. The work is completed by tables and graphs that are supported by actual cases of fraud in the Czech Republic and the USA. The third part describes the impact of the Sarbanes-Oxley Act to improve investors protection and prevention in the fight against fraud on the U.S. capital markets.
10

Compliance Regulatory and Security Challenges in Cloud & IP Telephony -A comparison study between India and Sweden / Compliance Regulatory and Security Challenges in Cloud & IP Telephony -A comparison study between India and Sweden

Manayathil Chackochan, Thomas, Gonsalvez, Ronit January 2023 (has links)
Cloud computing has evolved from cutting-edge technology to a best practice for businesses across industries. However, compliance with regulatory mandates and addressing security challenges in the cloud environment remain significant concerns. This thesis aims to explore the compliance, regulatory, and security challenges associated with cloud computing, with a particular focus on the differences in regulatory frameworks between an Asian country (India) and a European country (Sweden). Additionally, the study delves into the forensic investigation challenges in terms of evidence collection in the cloud environment. The research methodology involves studying the available literature on regulatory rules and cloud forensics, conducting surveys with cloud customers, experts, and cloud service provider (CSP) professionals, and proposing possible solutions and recommendations to overcome the identified challenges. By addressing these issues, this research contributes to a comprehensive understanding of the impacts of compliance regulations on cloud and IP Telephony services and the security and forensic investigation challenges in cloud platforms.

Page generated in 0.0895 seconds