Spelling suggestions: "subject:"forensic analysis"" "subject:"orensic analysis""
1 |
The forensic analysis of soils with particular reference to particle size distribution analysisWanogho, S. O. January 1985 (has links)
No description available.
|
2 |
A stylistic analysis of written language behaviour with practical application to anonymous threat lettersSmith, Nicola-Jane January 1996 (has links)
No description available.
|
3 |
An appraisal of the use of numerical features in the forensic examination of hairBrooks, Elizabeth M, na January 2007 (has links)
The advent of nuclear DNA (nuDNA) analysis altered the way forensic biology
was both practised and viewed by the forensic biologists, police, the legal system
and the general public. The ability of nuDNA to individualise analysis of evidence
and attach a statistical frequency ratio to the result, created an expectation that
numerical objectivity should be part of all forensic analysis. There are few
scientists who would disagree with both the need and desirability of objective
measures of their results. Forensic hair examiners are no exception as indicated by
numerous scientific publications specifically discussing means of objectively
assessing hair and its characteristics. While mitochondrial DNA offers a partially
objective measure of hair the result is destructive of the sample. A method that
objectively supports the hair analysts' microscopic findings and is non destructive
would be beneficial to forensic hair examination. This project attempted to develop
an objective measure of hair analysis by using both traditional light microscopic
comparative techniques combined with a high end digital imaging and image
analysis capacity.
Where objectivity equals an empirical set of numbers that can be manipulated for
statistical significance, the comparative biological sciences such as histology,
anthropology and forensic hair examination struggle. Forensic hair examiners have
long acknowledged the difficulty, even inability, of assigning numerical values to
the features that characterise one hair as being different from another. The human
scalp hair is a "morphological" unit that is not readily split into component parts or
even that these parts lend themselves to a number value. There have been at least
nine separate studies which favourably compare the specificity of microscopic hair
examinations. The challenge this study addressed was to appraise the use of
numerical features in forensic hair examination, with particular emphasis on those
features currently resisting numerical evaluation; specifically, colour and
pigmentary characteristics.
The techniques used were based on obtaining high quality digital images, and using
the pixels inherent in the images to obtain numerical values of such features as
colour and pigmentation. The project sample was taken from the telogen scalp hairs obtained from the hairbrushes of ten nominally brown haired Caucasians, both
male and female. The focus was twofold:
o Compare colour analysis of hair images from brown haired Caucasians
within three standard, internationally recognized colour models, namely
Red-Green-Blue (RGB) colour model; CIE XYZ Tristimulus (1931) colour
model; and CIE L*a*b* (1976) colour model.
o Using the same sets of digital images, undertake pattern recognition
analysis both intra and inter individual hair samples.
Discriminate analysis of the mean colour values collected for each of the inherent
colour variables in the three colour models (red, green, blue; X, Y, Z and L*, a*,
b*) indicated the RGB colour model gave the least separation of brown haired
individuals; CIE XYZ and CIE L*a*b* separated several individuals for all their
individual samples and several other individuals were mostly separated with only
one of their own samples overlapping with another.
Pattern analysis used a small area that represented the overall pigment patterning
observed along the length of the hair shaft. This area was extracted from the digital
image within V++ Digital Optics image analysis software. The extracted pattern
piece was then compared with other sample images within the same hair and four
other hairs from the same individual. Pattern extracts were also compared between
person hair samples. The comparisons generated a set of numerical values based
on the pixel number on the "x" axis of the whole image and the average difference
between the extracted pattern image and the whole image. Analysis of this data
resulted in log distributions when persons were matched with themselves. It was
also possible to refer an unknown pattern extract to this distribution and based on
probabilities, predict as to whether or not the unknown sample fell within any of
the known sample's distribution.
|
4 |
Forensic Analysis of Human DNA from Samples Contaminated with Biological Weapons AgentsTimbers, Jason 11 July 2011 (has links)
The use of biological agents as potential weapons has been a concern of security agencies for many years. Security agencies require alternative field protocols for handling forensic samples that could be contaminated with biological weapons. In this study, manual and automated DNA extractions were compared for the ability to remove biological agents and for their effectiveness and consistency when samples were contaminated with bacteria, spores or toxins. Purified DNA was evaluated for the absence of the agents, and for the effects of the process on the isolated human DNA. Results demonstrated that incubation of samples in a cell lysis solution eliminated bacteria and toxins, but an additional 0.22 µm filtration step was necessary to successfully remove bacterial spores. Blood and buccal swab samples exposed to some bacteria showed DNA loss and/or degradation. The automated extraction procedure would be preferable over the manual protocol to isolate human DNA contaminated with biological weapons.
|
5 |
Forensic Analysis of Human DNA from Samples Contaminated with Biological Weapons AgentsTimbers, Jason 11 July 2011 (has links)
The use of biological agents as potential weapons has been a concern of security agencies for many years. Security agencies require alternative field protocols for handling forensic samples that could be contaminated with biological weapons. In this study, manual and automated DNA extractions were compared for the ability to remove biological agents and for their effectiveness and consistency when samples were contaminated with bacteria, spores or toxins. Purified DNA was evaluated for the absence of the agents, and for the effects of the process on the isolated human DNA. Results demonstrated that incubation of samples in a cell lysis solution eliminated bacteria and toxins, but an additional 0.22 µm filtration step was necessary to successfully remove bacterial spores. Blood and buccal swab samples exposed to some bacteria showed DNA loss and/or degradation. The automated extraction procedure would be preferable over the manual protocol to isolate human DNA contaminated with biological weapons.
|
6 |
Forensic Analysis of Human DNA from Samples Contaminated with Biological Weapons AgentsTimbers, Jason 11 July 2011 (has links)
The use of biological agents as potential weapons has been a concern of security agencies for many years. Security agencies require alternative field protocols for handling forensic samples that could be contaminated with biological weapons. In this study, manual and automated DNA extractions were compared for the ability to remove biological agents and for their effectiveness and consistency when samples were contaminated with bacteria, spores or toxins. Purified DNA was evaluated for the absence of the agents, and for the effects of the process on the isolated human DNA. Results demonstrated that incubation of samples in a cell lysis solution eliminated bacteria and toxins, but an additional 0.22 µm filtration step was necessary to successfully remove bacterial spores. Blood and buccal swab samples exposed to some bacteria showed DNA loss and/or degradation. The automated extraction procedure would be preferable over the manual protocol to isolate human DNA contaminated with biological weapons.
|
7 |
Forensic Analysis of Human DNA from Samples Contaminated with Biological Weapons AgentsTimbers, Jason January 2011 (has links)
The use of biological agents as potential weapons has been a concern of security agencies for many years. Security agencies require alternative field protocols for handling forensic samples that could be contaminated with biological weapons. In this study, manual and automated DNA extractions were compared for the ability to remove biological agents and for their effectiveness and consistency when samples were contaminated with bacteria, spores or toxins. Purified DNA was evaluated for the absence of the agents, and for the effects of the process on the isolated human DNA. Results demonstrated that incubation of samples in a cell lysis solution eliminated bacteria and toxins, but an additional 0.22 µm filtration step was necessary to successfully remove bacterial spores. Blood and buccal swab samples exposed to some bacteria showed DNA loss and/or degradation. The automated extraction procedure would be preferable over the manual protocol to isolate human DNA contaminated with biological weapons.
|
8 |
Analýza bezpečnostních vlastností v OS Android / Analysis of Security Properties in OS AndroidHanyáš, Martin January 2014 (has links)
This thesis describes operating system Android and its security aspects. Furthermore, the thesis will focus on the forensics analysis of this operating system. The aim is to create forensics application which allows to get sensitive data as well as to make forensic analysis using established tools, and to create background materials for teaching.
|
9 |
Characterization of carbon electrode surfaces development of biosensors for forensic DNA applicationsChurinsky, Candace Renee January 2013 (has links)
Quantitative polymerase chain reaction (qPCR) techniques are currently used to quantify samples containing deoxyribonucleic acid (DNA) in forensic analyses. This technology can provide valuable information to an analyst regarding the amount of DNA present but lacks the ability to determine the quality of the sample. Electrochemistry-based biosensors that utilize screen-printed electrodes may provide a method to determine the number of DNA molecules and the length of those molecules in a single assay. This work aimed to create a biosensor by electrostatically loading TPOX oligonucleotides onto a carbon screen-printed electrode for the purpose of quantifying genomic DNA. Electrochemical signal was obtained via the indicating molecule bis-benzimide H33258, which preferentially interacts with double-stranded DNA and would indicate a hybridization event. Cyclic voltammetry was chosen to measure the current signal; peaks obtained using this technique can be analyzed with the Randles-Sevčik equation, which relates current signal with concentration of the target species.
A large amount of signal variation and background charging current was observed when H33258 was used as the redox probe. This led to a study of the surface characteristics of the carbon electrodes themselves (i.e. effective surface area) by utilizing the reversible and well-characterized redox couple hexaammine ruthenium. The effect of electrode activation at high anodic potentials was also studied. Though highly recommended in the literature, activation of the carbon surface caused effective surface area and charging current to increase. While a larger electro-active surface is often desirable, the high background current generated when activation is used within the protocol can mask the signal of interest. Due to the low signal-to-noise ratio and inability to reuse the carbon electrode, it was concluded that carbon screen printed electrodes are not optimal forensic DNA biosensors.
|
10 |
Honeypots in network securityAkkaya, Deniz, Thalgott, Fabien January 2010 (has links)
<p>Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.</p>
|
Page generated in 0.0572 seconds