To see the other types of publications on this topic, follow the link: Forensic sciences.

Dissertations / Theses on the topic 'Forensic sciences'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Forensic sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Brancoli, Daniel Luz 1986. "O efeito da ivermectina na duração das fases de decomposição, sobre os insetos necrófagos e interpretação termográfica da distribuição espacial da massa larval de dípteros em carcaças de cabras (Capra aegragrus hircus L.,1758)." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/317460.

Full text
Abstract:
Orientador: Arício Xavier Linhares
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Biologia
Made available in DSpace on 2018-08-23T07:56:31Z (GMT). No. of bitstreams: 1 Brancoli_DanielLuz_M.pdf: 2919175 bytes, checksum: 945c65bec3a80aec88b5f6b239293fd2 (MD5) Previous issue date: 2013
Resumo: A estimativa do intervalo pós-morte (IPM), período entre a ocorrência da morte e o momento em que o corpo ou carcaça é encontrado, é uma das principais utilizações de insetos na área forense. A partir de informações sobre a biologia, ecologia e distribuição geográfica dos insetos, bem como do comportamento de toda fauna presente em um corpo é possível estimar o menor intervalo da ocorrência da morte. Diversos fatores tais como temperatura, umidade, presença de substâncias tóxicas nos tecidos de uma carcaça, podem interferir no ciclo de vida de um inseto, afetando diretamente a estimativa do IPM quando esta é baseada em parâmetros biológicos do inseto. Por isso, múltiplos fatores devem ser considerados para que a perícia seja mais precisa. Com o aumento no número de mortes de animais de importância econômica devido à intoxicação medicamentosa, se faz necessárias pesquisas voltadas para a entomotoxicologia, uma área que carece de estudos específicos. Assim, o presente trabalho visou identificar a entomofauna associada a carcaças de cabras (Capra aegagrus hircus L.) mortas após tratamento com ivermectina, expostas em ambiente natural, além de averiguar possíveis diferenças na atratividade, no desenvolvimento dos imaturos que utilizaram esse substrato para alimentação e se a temperatura e o padrão de colonização da massa larval divergem entre as carcaças de animais mortos por intoxicação. Esse último parâmetro foi avaliado por meio de registros termográficos realizados em intervalos de 12 horas. Além da importância de fatores abióticos como luminosidade, temperatura, umidade e pluviosidade, pôde-se observar a ação da ivermectina nas carcaças tratadas, interferindo na composição da fauna colonizadora, no tempo total e em cada estágio da decomposição, assim como no padrão físico e comportamental das massas larvais em comparação ao grupo controle. Ainda foi demonstrado que a termografia pode ser utilizada como uma nova ferramenta em estudos periciais, auxiliando de forma significativa a avaliação dos parâmetros das massas larvais
Abstract: The estimation of the postmortem interval (PMI), period between the occurrence of death and the time at which the body or casing is found, is one of the main uses of insects in the forensic field. Using information on the biology, ecology and geographical distribution of insects, as well as the behavior of the entire fauna present in a body, is possible to estimate the time of death. Several factors such as temperature, humidity, presence of toxic substances in the tissues of a carcass, may interfere with the life cycle of an insect, directly affecting the estimate of PMI when it is based on biological parameters of the insect. Therefore, multiple factors should be considered so that the forensic analysis is more accurate. With the increase in the number of animal's deaths of economic importance due to drug intoxication, becomes necessary a research on entomotoxicology, an area with lack of specific studies. Thus, the present study aimed to identify the insect fauna associated with carcasses of goats (Capra aegagrus hircus L.) killed after treatment with ivermectin and exposed in the natural environment. Still, investigate possible differences in attractiveness, the immature development that used this substrate for feeding and if the temperature and the colonization pattern of larval mass differ between carcasses of animals killed after ivermectin inoculation. This last parameter was evaluated by thermographic shots performed at intervals of 12 hours. Besides the importance of abiotic factors such as luminosity, temperature, humidity and rainfall, the action of ivermectin on carcasses couse interferense in the composition of the colonizing fauna, the total time of colonization and the time of the decomposition stages, as well as the physical patterns and behavior of larval masses compared to the control group. Although it has been shown that thermography can be used as a new tool in forensic studies, helping to evaluate the parameters of larval mass
Mestrado
Parasitologia
Mestre em Parasitologia
APA, Harvard, Vancouver, ISO, and other styles
2

Cervelli, Federico. "Methods and applications for forensic sciences." Doctoral thesis, Università degli studi di Trieste, 2012. http://hdl.handle.net/10077/7443.

Full text
Abstract:
2009/2010
La scienza forense è quella branca della scienza che si occupa dell’analisi del ma- teriale probatorio. Lo scopo di questa analisi è quello di comprendere le dinamiche del delitto, al fine di trovare il colpevole. In questo lavoro sono stati studiati tre nuovi metodi per affrontare alcuni dei problemi che devono affrontare gli esperti di scienze forensi. Il primo è un sistema per l’identificazione automatica delle calzature, al fine di trovare la marca e il modello della scarpa che ha lasciato l’impronta sulla scena del crimine. Un algoritmo basato sulla distanza di Mahalanobis è stato impiegato per lo scopo ed è stato confrontato con altri sistemi disponibili in letteratura sia su tracce di scarpa sintetiche che su tracce di scarpa reali, ovvero sia tracce prodotte aggiungende sinteticamente rumore che tracce provenienti dalla scena del crimine, rispettivamente. In un secondo sistema studio è stato analizzato lo spettro di terzo ordine, cioè il bispettro. Il bispettro può essere utilizzato per restaurare segnali corrotti, ma molti degli algoritmi disponibili soffrono per la comparsa di una traslazione sconosciuta nel segnale ricostruito. L’algoritmo proposto esegue la ricostruzione utilizzando direzioni parallele del dominio del bispettro e offre una soluzione semplice per risolvere e dimostrare la soppressione del problema nel caso di segnali 1D. Nell’ultimo sistema studiato, viene svolta l’analisi di impronte digitali utiliz- zando tecniche non standard. Un microspettrometro a trasformata di Fourier nel- l’infrarosso (FT-IRMS) viene utilizzato per analizzare il contenuto delle impronte digitali. L’FT-IRMS produce un’immagine iperspettrale, ed il sistema proposto elabora ognuno degli spettri prima stimando il numero di gruppi funzionali che lo compongono e poi individuando i loro parametri. A completamento del qua- dro, sono state impiegate diverse metodiche basate sui raggi x per lo studio degli eventuali contaminanti presenti nell’impronta.
Forensic science is the branch of science dealing with the analysis of evidence material. Its aim is to understand the dynamics of the crime, in order to find the culprit. In this work three new methods have been studied as an aid for the forensic experts. The first one is a system for the automatic retrieval of footwear to find the make and model of the shoe that left its mark on the crime scene. A Mahalanobis distance based algorithm is employed for the purpose and is compared with other systems available in literature on both synthetic and real shoe marks, i.e. on both computer generated shoe marks and on marks coming from crime scene. In a second study the third order spectrum, i.e. the bispectrum, is analyzed. The bispectrum can be used to restore corrupted signals but many available al- gorithms suffer for the emergence of an unknown translation in the reconstructed signal. Here the procedure is performed using two parallel paths in the domain of the bispectrum and a simple solution to the unwanted translation is found and demonstrated in the case of a 1D signal. Finally, fingerprint analysis is performed using non standard techniques. A Fourier transform infrared microspectroscope (FT-IRMS) is used to analyze the content of fingerprints. The FT-IRMS produces a hyperspectral like image and the proposed system processes each spectrum to estimate the number of func- tional groups and to give their parameters. Finally contained contaminants have been studied with several x-ray based techniques to give a comprehensive picture of the fingerprint evidence.
XXIII Ciclo
1973
APA, Harvard, Vancouver, ISO, and other styles
3

Chan, Ka-lai. "Some statistical aspects in forensic science /." Hong Kong : University of Hong Kong, 2000. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2148241X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

陳家麗 and Ka-lai Chan. "Some statistical aspects in forensic science." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B31222237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ward, Jennifer. "Origins and development of forensic medicine and forensic science in England, 1823-1946." Thesis, n.p, 1993. http://ethos.bl.uk/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rinke, Caitlin. "Selective Multivariate Applications in Forensic Science." Doctoral diss., University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5459.

Full text
Abstract:
A 2009 report published by the National Research Council addressed the need for improvements in the field of forensic science. In the report emphasis was placed on the need for more rigorous scientific analysis within many forensic science disciplines and for established limitations and determination of error rates from statistical analysis. This research focused on multivariate statistical techniques for the analysis of spectral data obtained for multiple forensic applications which include samples from: automobile float glasses and paints, bones, metal transfers, ignitable liquids and fire debris, and organic compounds including explosives. The statistical techniques were used for two types of data analysis: classification and discrimination. Statistical methods including linear discriminant analysis and a novel soft classification method were used to provide classification of forensic samples based on a compiled library. The novel soft classification method combined three statistical steps: Principal Component Analysis (PCA), Target Factor Analysis (TFA), and Bayesian Decision Theory (BDT) to provide classification based on posterior probabilities of class membership. The posterior probabilities provide a statistical probability of classification which can aid a forensic analyst in reaching a conclusion. The second analytical approach applied nonparametric methods to provide the means for discrimination between samples. Nonparametric methods are performed as hypothesis test and do not assume normal distribution of the analytical figures of merit. The nonparametric permutation test was applied to forensic applications to determine the similarity between two samples and provide discrimination rates. Both the classification method and discrimination method were applied to data acquired from multiple instrumental methods. The instrumental methods included: Laser Induced-Breakdown Spectroscopy (LIBS), Fourier Transform Infrared Spectroscopy (FTIR), Raman spectroscopy, and Gas Chromatography-Mass Spectrometry (GC-MS). Some of these instrumental methods are currently applied to forensic applications, such as GC-MS for the analysis of ignitable liquid and fire debris samples; while others provide new instrumental methods to areas within forensic science which currently lack instrumental analysis techniques, such as LIBS for the analysis of metal transfers. The combination of the instrumental techniques and multivariate statistical techniques is investigated in new approaches to forensic applications in this research to assist in improving the field of forensic science.
Ph.D.
Doctorate
Chemistry
Sciences
Chemistry
APA, Harvard, Vancouver, ISO, and other styles
7

Daniels, Jason M. "Forensic and Anti-Forensic Techniques for OLE2-Formatted Documents." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/141.

Full text
Abstract:
Common office documents provide significant opportunity for forensic and anti-forensic work. The Object Linking and Embedding 2 (OLE2) specification used primarily by Microsoft’s Office Suite contains unused or dead space regions that can be over written to hide covert channels of communication. This thesis describes a technique to detect those covert channels and also describes a different method of encoding that lowers the probability of detection. The algorithm developed, called OleDetection, is based on the use of kurtosis and byte frequency distribution statistics to accurately identify OLE2 documents with covert channels. OleDetection is able to correctly identify 99.97 percent of documents with covert channel and only a false positive rate 0.65 percent. The improved encoding scheme encodes the covert channel with patterns found in unmodified dead space regions. This anti-forensic technique allows the covert channel to masquerade as normal data, lowering the ability probability for any detection tool to is able to detect its presence.
APA, Harvard, Vancouver, ISO, and other styles
8

Woide, Daniela. "Modular submicroliter lab-on-a-chip in forensic sciences." Diss., lmu, 2010. http://nbn-resolving.de/urn:nbn:de:bvb:19-119425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tse, Wai-hin Kenneth, and 謝維軒. "Forensic analysis using FAT32 file cluster allocation patterns." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46605733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Srinivasan, Arunshankar. "Forensic information management system." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3356.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2004.
Title from document title page. Document formatted into pages; contains xii, 88 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 87-88).
APA, Harvard, Vancouver, ISO, and other styles
11

Salem, Roberta Sue. "Developing a one-semester course in forensic chemical science for university undergraduates." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Coelho, Alexandra Miranda. "Crenças e atitudes dos agentes policiais face à violência contra a mulher." Master's thesis, Faculdade de Medicina da Universidade do Porto, 2009. http://hdl.handle.net/10216/55356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dias, Inês Isabel Marques Lourinhã. "Caracterização e prevalência de xenobióticos em vítimas fatais sujeitas a autópsia na Delegação do Norte do Instituto Nacional de Medicina Legal, I.P de 2007 a 2008." Master's thesis, Faculdade de Medicina da Universidade do Porto, 2011. http://hdl.handle.net/10216/62214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

João, Guido Sozinho Teresa. "Avaliação do dano corporal pós-traumático por acidentes de viação e de trabalho em Angola." Master's thesis, Faculdade de Medicina da Universidade do Porto, 2011. http://hdl.handle.net/10216/63788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Coelho, Alexandra Miranda. "Crenças e atitudes dos agentes policiais face à violência contra a mulher." Dissertação, Faculdade de Medicina da Universidade do Porto, 2009. http://hdl.handle.net/10216/55356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dias, Inês Isabel Marques Lourinhã. "Caracterização e prevalência de xenobióticos em vítimas fatais sujeitas a autópsia na Delegação do Norte do Instituto Nacional de Medicina Legal, I.P de 2007 a 2008." Dissertação, Faculdade de Medicina da Universidade do Porto, 2011. http://hdl.handle.net/10216/62214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

João, Guido Sozinho Teresa. "Avaliação do dano corporal pós-traumático por acidentes de viação e de trabalho em Angola." Dissertação, Faculdade de Medicina da Universidade do Porto, 2011. http://hdl.handle.net/10216/63788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shah, Jayna J. "Microfluidic devices for forensic DNA analysis." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2878.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.
Title from PDF t.p. (viewed Jan. 22, 2008). Thesis director: Rao V. Mulpuri. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering. Vita: p. 159. Includes bibliographical references (p. 145-158). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
19

Haglund, William D. "Applications of taphonomic models to forensic investigations /." Thesis, Connect to this title online; UW restricted, 1991. http://hdl.handle.net/1773/6424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Barros, Franciéllen de. "Mensuração da espessura de tecidos moles da face de indivíduos brasileiros adultos /." Araraquara, 2018. http://hdl.handle.net/11449/154031.

Full text
Abstract:
Orientador: Clemente Maia da Silva Fernandes
Resumo: A Reconstrução Facial Forense (RFF) é uma técnica das Ciências Forenses que possibilita o reconhecimento de um indivíduo, a partir da modelagem dos contornos dos tecidos faciais sobre um crânio encontrado sem identificação. Para isto é necessário ter o conhecimento da espessura dos tecidos moles faciais (ETMFs) que recobrem os pontos craniométricos no crânio subjacente, pois os mesmos são utilizados como base para a obtenção do contorno facial. Fatores como sexo, ancestralidade, idade, e índice de massa corporal (IMC) influenciam tais espessuras. O objetivo deste estudo foi mensurar ETMFs de sujeitos brasileiros adultos vivos, a partir de imagens de tomografia computadorizada de feixe cônico (TCFC), considerando-se as variáveis sexo, cor de pele, idade e índice de massa corporal. Foram efetuadas mensurações de 21 pontos craniométricos de referência através do uso do software Osirix Lite. Um total de 92 imagens foram analisadas (62 de sujeitos do sexo feminino e 30 do sexo masculino). Os resultados obtidos mostraram que os homens, na maioria das vezes, apresentaram espessuras de tecidos moles faciais maiores do que as mulheres. Em relação às outras variáveis, houve interação com o sexo a cor de pele nos pontos glabela, nasion, infradentale, eminência frontal, supraorbital e linha oclusal, mas nos pontos eminência mentoniana e suborbital a significância foi correspondente à cor da pele. O IMC não evidenciou interação com o sexo, porém, nos pontos filtro médio e supradentale, os... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: Forensic Facial Reconstruction (FFR) is a Forensic Science technique that enables the recognition of an individual, from modeling the contours of facial tissues on a skull found without identification. For this, it is necessary to know the thickness of the facial soft tissue that covers the craniometric points in the underlying skull, since they are used as the basis for obtaining the facial contour. Factors such as sex, ancestry, age, and body mass index (BMI) influence such thicknesses. The objective of this study was to measure the facial soft tissue thickness (FSTT) of living adult Brazilian subjects using cone beam computed tomography (CBCT) images, considering the variables sex, skin color, age and body mass index. Twenty-one reference craniometric points were measured using the Osirix Lite software. A total of 92 images were analyzed (62 females and 30 males). The results showed that men, for the most part, had greater facial soft tissue thicknesses than women. In relation to the other variables, there was interaction with the skin color at the glabella, nasion, infradentale, frontal eminence, supraorbital and occlusal lines, but at the eminence points of the chin and suborbital the significance was corresponding to the color of the skin. The BMI did not show interaction with the sex, however, in the medium and supradentale filter points, the men presented higher values of thickness, independently of the BMI. At the remaining points, only BMI influenced the thickness o... (Complete abstract click electronic access below)
Mestre
APA, Harvard, Vancouver, ISO, and other styles
21

Thakur, Neha S. "Forensic Analysis of WhatsApp on Android Smartphones." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1706.

Full text
Abstract:
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a popular social networking application. We will be forming an outline on how forensic investigators can extract useful information from WhatsApp and from similar applications installed on an Android platform. Our area of focus is extraction and analysis of application user data from non-volatile external storage and the volatile memory (RAM) of an Android device.
APA, Harvard, Vancouver, ISO, and other styles
22

Singh, Parmjit. "Web based forensic information management system." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4721.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2006.
Title from document title page. Document formatted into pages; contains xiii, 316 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 315-316).
APA, Harvard, Vancouver, ISO, and other styles
23

Law, Yuet-wing, and 羅越榮. "Investigation models for emerging computer forensic challenges." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Keyzer, Jim. "Forensic Carving from Unallocated Space." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1301.

Full text
Abstract:
Computer Forensics investigations have become more and more common while investigating IT-related issues. From experience, hard disks, USB thumb, memory sticks contains information that might be useful. Computer Forensics is regulary conducted by Police, Customs, Tax investigators but also within private companies and organisations. However, there are areas within the storage device that are not part of the organisied structure that a file system gives. The reason for that might be that the information has been erased by intention, a virus destroyed the file system and so on. Areas without this structure are referred to as Unallocated Space and there are issues to locate specific file information within Unallocated Space. Today, two methods are used. The first is to use specific keywords to locate a specific file. The other method is to search for file signatures, such as file header or file footer. However, these methods are not especially successful. During 2006-2007 the organisation DFRWS arranged two challenges to try to overcome these shortcomings. The results from the challenges gave interesting aspects and might be possible to work further with. Most of the specific forensic software available do not incorperate good methods for file extraction and basically they rely on the two methods mentioned above.
IT-forensiska undersökningar, sk Computer Forensics, har idag blivit mer och mer vanligt i samband med IT-relaterade ärenden. Erfarenhetsmässigt har det visat sig att hårddiskar, USB-minnen, minneskort m.m. ofta innehåller information av betydelse och IT-undersökningar görs idag regelmässigt av bl a polis, tull, skattemyndigheter men också inom privata företag och organisationer. Emellertid finns det områden på ett lagringsmedia som inte omfattas av någon filstruktur. Det kan ha sin orsak i att filer medvetet raderats från mediet, att ett virusangrepp förstört tillgänglig struktur osv. De områden på lagringsmediat som saknar nämnda struktur benämns som oallokerat utrymme och det medför avsevärda svårigheter att hitta de filer som trots allt finns där. I dag används i huvudsak två metoder för uppgiften. Den ena baseras sig på vissa specifika nyckelord som kan återfinnas i filer. Den andra använder en metod där filer extraheras baserat på viss information i filens specifika signatur. Det är ofta en sekvens tecken som återfinns i filens huvud men i förekommande fall kan det också finnas sådana typiska sekvenser i filens slut. Metodiken är emellertid inte särskilt effektiv och därför pågår arbete för att hitta nya metoder. I ett öppet forum på Internet, http://www.dfrws.org, har under åren 2006-2007 anordnats sk utmaningar på temat. De metoder som diskuterats och framkommit via DFRWS bygger på alternativa sökningar och kombinationer av dessa, vilka visat sig ge ett gott resultat. Många av de metoder som inkommit har innehållit intressanta aspekter som sannolikt kommer att vidareutvecklas. I stort sett alla av de tillgängliga analysprogramvarorna som i dag finns på marknaden har begränsade möjligheter att återskapa filer från oallokerat utrymme och framförallt förlitar de sig på signatur- och nyckelordssökningar.
APA, Harvard, Vancouver, ISO, and other styles
25

Burkey, Chris Rush, Tusty ten Bensel, and Jeffery T. Walker. "Forensic Investigation of Sex Crimes and Sexual Offenders." Digital Commons @ East Tennessee State University, 2013. https://www.amzn.com/0323228046.

Full text
Abstract:
The investigation of sex crimes is a specific function for many law enforcement agencies, requiring an understanding of how to investigate, process crime scenes, interact with victims and offenders, and prepare for court. Drawing on new methods of investigation and the effects of such crimes on victims, Forensic Investigation of Sex Crimes and Sexual Offenders provides in-depth coverage in these areas, offering a valuable supplement for criminal justice courses and an accessible guide for law enforcement.
https://dc.etsu.edu/etsu_books/1134/thumbnail.jpg
APA, Harvard, Vancouver, ISO, and other styles
26

Baize, John. "Forensic Soil Analysis: Characterization of the Sand Fraction." TopSCHOLAR®, 1997. http://digitalcommons.wku.edu/theses/767.

Full text
Abstract:
The purpose of this project was to develop a comprehensive analytical method for the characterization of soil by examining particle size, elemental composition, and percent organic matter in soil, and to determine its forensic applicability. In this study, five soils of varying geological locations were examined including two samples from Kentucky; two samples from Pennsylvania; and one from Washington D C A Gilson sonic sieve shaker was used to separate fractions of soil to determine particle size, and a JEOL scanning electron microscope with a Kevex EDS detector was used to determine elemental composition. These techniques coupled with percent total carbon analysis (determined with a LECO CHN-1000) provide a method that measures three forensic properties instead of one for the forensic comparison of soil.
APA, Harvard, Vancouver, ISO, and other styles
27

Tagesson, Samuel. "Anti-forensik mot minnesforensik : En litteraturstudie om anti-forensiska metoder mot minnesdumpning och minnesanalys." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17818.

Full text
Abstract:
IT-forensiker möter många svårigheter i sitt arbete med att inhämta och analysera data. Brottslingar använder mer och mer anti-forensiska metoder för att gömma bevis som kan användas emot dem. En vanligt förekommande anti-forensisk metod är kryptering. För att IT-forensiker skall kunna komma åt den krypterade informationen kan krypteringsnyckeln hittas i minnet på datorn. Vilket gör att datorns minne blir värdefullt att hämta och analysera. Däremot finns det flera anti-forensiska metoder som en förbrytare kan använda för att förhindra att minnet hämtas eller analyseras. Denna studie utför en systematisk litteraturstudie för att identifiera de aktuella anti-forensiska metoder mot minnesanalys och minnesdumpning på Windows system. Flera metoder tas upp där bland annat operativsystemet modifieras eller inbyggda säkerhetsfunktioner på CPUn används för att förhindra att information hämtas eller analyseras från minnet.
IT forensics face many difficulties in their work of obtaining and analyzing data. Criminals are using more and more anti-forensic methods to hide evidence that can be used against them. One common anti-forensic method is encryption. In order for IT forensics to access the encrypted information, the encryption key can be found in the memory of the computer. This makes the computer's memory valuable to retrieved and analyze. However, there are several anti-forensic methods that a criminal can use to prevent the memory from being retrieved or analyzed. This study performs a systematic literature study to identify the current anti-forensic methods against memory analysis and memory dumping on Windows system. Several methods are addressed where, among other things, the operating system is modified or built-in security functions on the CPU are used to prevent information being retrieved or analyzed from memory.
APA, Harvard, Vancouver, ISO, and other styles
28

Etow, Tambue Ramine. "IMPACT OF ANTI-FORENSICS TECHNIQUES ON DIGITAL FORENSICS INVESTIGATION." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97116.

Full text
Abstract:
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly because forensic investigations are based on artifacts left oncomputers and other digital devices. In recent times, perpetrators of computer crimesare getting abreast of the digital forensics dynamics hence, capacitated to use someanti-forensics measures and techniques to obfuscate the investigation processes.Incases where such techniques are employed, it becomes extremely difficult, expensive and time consuming to carry out an effective investigation. This might causea digital forensics expert to abandon the investigation in a pessimistic manner.ThisProject work serves to practically demonstrate how numerous anti-forensics can bedeployed by the criminals to derail the smooth processes of digital forensic investigation with main focus on data hiding and encryption techniques, later a comparativestudy of the effectiveness of some selected digital forensics tools in analyzing andreporting shreds of evidence will be conducted.
APA, Harvard, Vancouver, ISO, and other styles
29

Day, Donnah Marie. "Development of immature blowflies and their application to forensic science." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060731.111615/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lu, Andy. "Forensic analysis on wireless medical devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2541.

Full text
Abstract:
The number of Internet of Things (IoT) devices is forecast to grow to over 25 billion by 2030, with the healthcare IoT market projected to grow to 25.9% of IoT devices by 2028 worldwide. However, with new and growing technologies come new types of risks. Current risk assessment and risk management methods haven’t been designed to anticipate or predict these risks. IoT risks relate to openness and lack of standardisation, linking and connectivity between the devices and the lack of skilled support for IoT devices and networks. These factors put medical IoT devices and, by extension, their users at risk from cyber threats. Additionally, the attack surface for the medical IoT has not been fully mapped, nor have the risks been fully assessed. The lack of coverage means increased risk for manufacturers, medical facilities, and potentially, patients. This project evaluates the effectiveness of how new and emerging wireless and connected medical devices can be managed and analysed through a digital forensic framework. An initial analysis of the currently available frameworks showed that they did not address the nuances of implementing a wireless or connected medical device into a healthcare organisation. Digital forensic frameworks that were deemed relevant to wireless medical devices were selected and tested against several currently available wireless medical devices. Four frameworks were tested across four devices each. The outcome was that none of the frameworks was fully able to effectively manage wireless medical devices (at least in terms of the objectives of digital forensics), with each missing elements that would aid an investigator or a hospital organisation in the case of a cyber-related incident. These results led to the synthesis and testing of a framework that addressed the missing elements. The framework emphasises forensic readiness planning and risk management. The synthesised framework was tested against a new device. The results of the test found that the synthesised framework was effective in both the proactive digital forensics approach and reactive approach. The testing found that the framework performed better than the other tested frameworks, containing additional phases and steps that were advantageous in preparing and reacting to incidents involving wireless medical devices.
APA, Harvard, Vancouver, ISO, and other styles
31

Govindarajulu, Sriram. "A Web based forensic information management system." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3845.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2005
Title from document title page. Document formatted into pages; contains x, 128 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 127-128).
APA, Harvard, Vancouver, ISO, and other styles
32

Apple, Kendra Kea. "Inquiry-based science for high school students: a forensic unit." Thesis, University of North Texas, 2000. https://digital.library.unt.edu/ark:/67531/metadc2585/.

Full text
Abstract:
This project constitutes an instructional unit for honors biology that involves the use of science in the field of criminal investigation and forensics. Before beginning the unit, the learners should have mastered basic laboratory skills, including use of the microscope. They should also have an understanding of the basic structure and function of DNA and its role in heredity and protein synthesis. The standard time frame is 24 days with 70-minute periods, but can be easily adjusted to meet classroom needs. Several instructional strategies enhance student learning and make science fun. The unit is inquiry-driven and activity-based. Students are surprised by the crime, gather and analyze evidence, and work towards proposing an explanation. This real world problem involves the use of cooperative learning and a variety of assessment techniques.
APA, Harvard, Vancouver, ISO, and other styles
33

Kling, Martin. "Unsecured sessions with ICQ : applying forensic computing." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4724.

Full text
Abstract:
Digital evidence is becoming more and more frequent and important in investigations carried out by the police. To make the correct judgements, the police force needs to know what one can do with ICQ and in what ways it can be exploited. This thesis aims to point out weaknesses in ICQ that can aid the police in their work. But these weaknesses can not only be used by the police, also crackers can perform malicious acts with them. Therefore, I investigated if the use of ICQ resulted in non-secure sessions. To investigate ICQ’s security, I divided a session into an authentication phase, sending of messages, and the protection of stored messages in a history file. While investigating ICQ, I sniffed its Internet traffic and monitored files on the computer’s hard drive with MD5 checksums. I have investigated the following three ICQ applications: ICQ Pro 2003a, ICQ2Go and the Linux clone Licq. The result of the entire investigation showed that ICQ had a non-secured authentication phase, non-secured messages and no protection for stored messages. From these results the main conclusion was derived: The use of ICQ resulted in non-secure instant messaging sessions. Your ICQ account can be hijacked and another person can impersonate you and send messages that you dislike. Also, your messages can be intercepted on the Internet and their content can be read. If your computer is compromised, all your previous messages on ICQ Pro 2003a and Licq can be read.
Martin Kling Fältv 17 SE-291 39 Kristianstad martinkling@hotmail.com 0733691999
APA, Harvard, Vancouver, ISO, and other styles
34

Chan, Man-fai. "The development of the forensic services in Hong Kong." [Hong Kong : University of Hong Kong], 1992. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Patterson, Farrah M. "The implications of virtual environments in digital forensic investigations." Master's thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4819.

Full text
Abstract:
This research paper discusses the role of virtual environments in digital forensic investigations. With virtual environments becoming more prevalent as an analysis tool in digital forensic investigations, it's becoming more important for digital forensic investigators to understand the limitation and strengths of virtual machines. The study aims to expose limitations within commercial closed source virtual machines and open source virtual machines. The study provides a brief overview of history digital forensic investigations and virtual environments, and concludes with an experiment with four common open and closed source virtual machines; the effects of the virtual machines on the host machine as well as the performance of the virtual machine itself. My findings discovered that while the open source tools provided more control and freedom to the operator, the closed source tools were more stable and consistent in their operation. The significance of these findings can be further researched by applying them in the context of exemplifying reliability of forensic techniques when presented as analysis tool used in litigation.
ID: 030646240; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (M.S.)--University of Central Florida, 2011.; Includes bibliographical references (p. 46).
M.S.
Masters
Computer Science
Engineering and Computer Science
Digital Forensics; Science/Computing Track
APA, Harvard, Vancouver, ISO, and other styles
36

Curran, James Michael. "Forensic Applications of Bayesian Inference to Glass Evidence." Thesis, University of Auckland, 1996. http://hdl.handle.net/2292/2454.

Full text
Abstract:
The role of the scientist in the courtroom has come under more scrutiny this century than ever before. As a consequence, scientists must constantly look for ways to improve the validity of the evidence they deliver. It is here that the professional statistician can provide assistance. The use of statistics in the courtroom and in forensic science is not new, but until recently has not been common either. Statistics can provide objectivity to subjective assessments and strengthen a case for the prosecution or the defence, but only if is used correctly. The aim of this thesis is to enhance and replace the existing technology used in statistical analysis and presentation of trace evidence, i.e. all non-genetic evidence (hairs, fibres, glass, paint, etc.) and transfer problems.
APA, Harvard, Vancouver, ISO, and other styles
37

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
APA, Harvard, Vancouver, ISO, and other styles
38

Johansson, Christian. "Computer Forensic Text Analysis with Open Source Software." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4994.

Full text
Abstract:
Detta papper koncentrerar sig på kriminaltekniska undersökningar av text, med fokus på användande av mjukvara med öppen källkod. Pappret diskuterar och undersöker olika tekniker för framtida automatisering av dessa undersökningar.
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Mengmeng, and 王萌萌. "Temporal analysis on HFS+ and across file systems in digital forensic investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50900122.

Full text
Abstract:
In computer forensics, digital evidence related to time is both important and complex. The rules of changes in time associated with digital evidence, such as files or folders, can be used to analyze certain user behaviors like data access, modification or transfer. However, the format and the rules in time information for user actions are quite different for different file systems, even for different versions of operating systems with the same file system. Some research on temporal analysis has already been done on NTFS and FAT file systems, while there are few resources that describe temporal analysis on the Hierarchical File System Plus (HFS+), the default file system in Apple computer. Moreover, removable devices like USB disks are used frequently; transferring files and folders between different devices with different file systems and operating systems happens more and more frequently, so the changes of times across different file systems are also crucial in digital forensics and investigations. In this research, the changes in time attributes of files and folders resulting from user actions on the HFS+ file system and across file systems are analyzed, and the rules of time are generated by inductive reasoning to help reconstruct crime scenes in the digital forensic investigation. Since inductive reasoning is not definitely true compared with deductive reasoning, experiments are performed to validate the rules. The usage of the rules is demonstrated by analyzing a case in details. The methods proposed here are efficient, practical and easy to put into practice in real scenarios.
published_or_final_version
Computer Science
Master
Master of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
40

Filiault, Matthew. "Digitization protocols and applications for laser scanning human bone in forensic anthropology." Honors in the Major Thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1531.

Full text
Abstract:
In medico-legal investigations involving unidentified skeletal remains, forensic anthropologists commonly assist law enforcement and medical examiners in their analysis and identification. The traditional documentation techniques employed by the forensic anthropologist during their analysis include notes, photographs, measurements and radiographic images. However, relevant visual information of the skeleton can be lacking in morphological details in 2D images. By creating a 3D representation of individual bones using a laser-scanner, it would be possible to overcome this limitation. Now that laser scanners have become increasingly affordable, this technology should be incorporated in the documentation methodologies of forensic anthropology laboratories. Unfortunately, this equipment is rarely used in forensic anthropology casework. The goal of this project is to investigate the possible visualization applications that can be created from digitized surface models of bone for use in medico-legal investigations. This research will be achieved in two phases. First, examples of human bone as well as replicas of bone will be scanned using a NextEngine™ laser scanner. In conjunction with this will be the exploration and documentation of protocols for scanning different bone types and processing the scan data for creating a 3D model. The second phase will investigate how the resulting 3D model can be used in lieu of the actual remains to achieve improved documentation methodologies through the use of several commercial computer graphics programs. The results demonstrate that an array of visual applications can be easily created from a 3D file of bone, including virtual curation, measurement, illustration and the virtual reconstruction of fragmented bone. Based on the findings of this project, the implementation of laser scanning technology is recommended for forensic anthropology labs to enhance documentation, analysis and presentation of human bone.
ID: 031908492; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Accepted in partial fulfillment of the requirements for honors in the major in DEPT HERE.; Thesis (B.A.)--University of Central Florida, 2012.; Includes bibliographical references.
B.A.
Bachelors
Sciences
Anthropology
APA, Harvard, Vancouver, ISO, and other styles
41

McCallister, Ronald F. "Forensic Computing for Non-Profits: A Case Study for Consideration When Non-Profits Need to Determine if a Computer Forensic Investigation is Warranted." [Johnson City, Tenn. : East Tennessee State University], 2004. https://dc.etsu.edu/etd/940.

Full text
Abstract:
Thesis (M.S.)--East Tennessee State University, 2004.
Title from electronic submission form. ETSU ETD database URN: etd-0831104-124226 Includes bibliographical references. Also available via Internet at the UMI web site.
APA, Harvard, Vancouver, ISO, and other styles
42

Chan, Man-fai, and 陳文輝. "The development of the forensic services in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1992. http://hub.hku.hk/bib/B31976876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lesaoana, Mpasi Pascalis. "The analysis of the artefacts produced by forensically significant blowfly (Diptera: Calliphoridae) activity and their effect on bloodstain pattern analysis." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/20918.

Full text
Abstract:
Violent crimes involving bloodshed may result in bloodstains spattering on the surrounding surfaces. Accurate analysis of bloodstains at the scene can provide investigators with insights into the series of events that occurred during the execution of a violent crime. At a crime scene, blowflies feed on bloodstains and deposit artefacts that may cause confusion during crime scene reconstruction. Experimental cages of two possible crime scene surfaces (paper to simulate wallpaper and linoleum) were developed such that fly artefacts can be characterized and differentiated from legitimate bloodstains. Pooled bloodstains were created within the experimental cages and blowflies were allowed access to the cages. A total of 10739 and 740 artefacts deposited on paper surfaces and linoleum walls respectively were examined. Clear differences between fly artefacts and legitimate bloodstains were noted and unique characteristics of fly artefacts resembling true blood spatters with a possibility of confounding crime scene reconstruction were distinguished.
APA, Harvard, Vancouver, ISO, and other styles
44

Bennett, Tracy. "Exploring the Medico-legal death scene investigation of sudden unexpected death of infants admitted to Salt River mortuary, Cape Town, South Africa." Master's thesis, Faculty of Health Sciences, 2018. http://hdl.handle.net/11427/30064.

Full text
Abstract:
A death scene investigation (DSI) forms an integral part of the inquiry into death, particularly for sudden unexpected death of infants (SUDI). Global guidelines exist for DSI, however, it is unclear how many countries adhere to them, and to what extent they are followed. Therefore, a systematic literature review was undertaken to assess the scope of SUDI DSI performed internationally. It was found that national protocols have been established in some countries, and have shown value in guiding medico-legal examinations. Further, South Africa did not routinely perform DSI for SUDI cases, nor was there a protocol. This was largely attributed to the burden of SUDI cases as well as the lack of resources. Therefore, this study aimed to suggest realistic and feasible ways to improve DSI for local SUDI cases. This research study consisted of three phases: 1) A twoyear review of medico-legal case files from SUDI cases investigated at Salt River Mortuary; 2) The prospective observation of DSI for ten SUDI cases, using a semi-structured checklist; and 3) he distribution and analysis of a survey regarding SUDI DSI to all registered, qualified forensic pathologists in South Africa. The results showed that the SUDI death scenes were assessed in 59.2% of cases at Salt River Mortuary, with inconsistent levels of documentation or photography. Death scenes were never investigated in cases where the infant was pronounced dead on arrival at a medical facility. In both scene observations (n=10) and retrospective analysis (n=454) only one case incorporated a re-enactment, but the majority of infants were moved prior to DSI. The findings support the need for a standardised approach to DSI, coupled with specialised training for staff. Based on the available resources, this should focus on the establishment of guidelines pertaining to photography, handling medicine and scene reconstruction, as well as accurate use of relevant documentation.
APA, Harvard, Vancouver, ISO, and other styles
45

Brooks, Elizabeth M. "An appraisal of the use of numerical features in the forensic examination of hair /." full text via ADT, 2007. http://erl.canberra.edu.au/public/adt-AUC20080624.144159/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Bourg, Rachel. "Bloom Filters for Filesystem Forensics." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/1288.

Full text
Abstract:
Digital forensics investigations become more time consuming as the amount of data to be investigated grows. Secular growth trends between hard drive and memory capacity just exacerbate the problem. Bloom filters are space-efficient, probabilistic data structures that can represent data sets with quantifiable false positive rates that have the potential to alleviate the problem by reducing space requirements. We provide a framework using Bloom filters to allow fine-grained content identification to detect similarity, instead of equality. We also provide a method to compare filters directly and a statistical means of interpreting the results. We developed a tool--md5bloom--that uses Bloom filters for standard queries and direct comparisons. We provide a performance comparison with a commonly used tool, md5deep, and achieved a 50% performance gain that only increases with larger hash sets. We compared filters generated from different versions of KNOPPIX and detected similarities and relationships between the versions.
APA, Harvard, Vancouver, ISO, and other styles
47

Chick, A. "The effect of nicotine on carrion feeding insects with considerations for use within forensic sciences." Thesis, Nottingham Trent University, 2014. http://irep.ntu.ac.uk/id/eprint/28284/.

Full text
Abstract:
The presence of invertebrates on decomposing animal matter has been used extensively by forensic entomologists to estimate time of death for over 100 years. The presence of toxins such as drugs and pesticides on carrion can affect the behaviour and life cycle of such invertebrates. The aim of this thesis was to examine the effects of nicotine upon the colonisation of carrion by invertebrates; nicotine was used because of its historical use as an insecticide and its ubiquitous use in society. The investigations aimed to examine these possible effects both in situ in field-based testing and ex situ in a controlled laboratory environment and to work towards an empirically testable correction factor for the estimation of Postmortem interval estimates in the presence of nicotine. The field-based testing was done using Sus domestica (Linnaeus) carrion with a solution of nicotine injected into the cadaveric throat of the animal. The carrion was protected from feeding and removal by vertebrate scavengers. It was found that nicotine affected the time taken for Diptera to colonise the carrion as well as affecting the behaviour of feeding. Diptera larvae showed avoidance of the nicotine treated throat sites on the carrion, which is the normal site of oviposition. It was determined that the rove beetle Creophilus maxillosus (Linnaeus) was exclusively found on the higher dose nicotine carrion. The rare hoverfly Rhingia rostrata (Linnaeus) was discovered on the control animal; this is the first specimen reported in Nottinghamshire. The investigation also found the first record of the Soldierfly Sargus bipunctatus breeding in carrion; the late breeding period of this species and its significance to the forensic entomologist is considered. The experiments were conducted in the Autumn/Winter months and Spring/Summer months. Nicotine appeared to have a differing effect with the season as the autumnal fauna varied from that of the spring fauna. The presence of nicotine appeared to prevent the animal carcass from drying out, typified by mycophagus beetles in autumn and semi-liquid habitat breeding flies in the summer. The laboratory based investigation examined the effects of nicotine upon the life cycle of Calliphora vomitoria including the effects upon oviposition, rate of development and survivablity. It was found that nicotine significantly affects rate of development of this forensically important fly. This study has shown that a careful study of a single chemical compound and its interaction with carrion and entomology has profound effects upon the alteration of the normal activity of a range of forensically important invertebrates. It will assist in improving the evidential usefulness of entomology to the Forensic Science and Policing communities in criminal investigations.
APA, Harvard, Vancouver, ISO, and other styles
48

Smith, Fiona. "Wetting and evaporation of human blood in relation to forensic analysis." Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0479.

Full text
Abstract:
La physique de mouillage et de séchage de sang n’est pas encore bien connue. Dans le cadre d’un travail collaboratif, une étude est réalisée afin d’apporter de nouveaux outils aux équipes d’investigations criminelles. L’objectif est de comprendre les dynamiques qui entrent en jeu dans la formation de traces de sang, un fluide complexe. Nous nous intéressons aux traces dites passives telles que l’égouttement ou l’accumulation, qui résultent de l’action de la pesanteur. Nous considérons d’abord les gouttes passives. Le comportement d’impact de gouttes de fluides complexes est un sujet qui a été largement étudié mais suscite encore de vifs débats. Bien que le séchage d’une goutte déposée ait déjà été étudié, ceci n’est pas le cas pour des gouttes qui viennent impacter perpendiculairement une surface, tombant depuis une certaine hauteur. Parallèlement nous étudions le séchage de flaques de sang car leur dynamique de séchage n’a pas été étudiée jusqu’à présent. Différents paramètres tels que la nature des substrats, l’humidité et la température sont pris en compte afin de comprendre le lien entre la typologie des motifs séchés et les phénomènes observés en vue de répondre à des applications criminelles. Enfin des relations empiriques sont établies. Grace à des méthodes inverses, ces relations permettent, par la suite, d’obtenir une estimation de la vitesse d’impact de gouttes séchées
The physics behind wetting and drying of blood is not yet completely understood. In the context of a collaborative project, new techniques have been developed to provide evidence for investigators in crime solving. Given that blood is a complex fluid, the major aim has been to investigate the dynamics involved in the patterns of stain formation. Interest is focused on passive stains, which result from the action of gravity in dripping or blood flow accumulation. In the case of drip stains, the impact behaviour of complex fluid droplets, despite many studies, raises much debate. Although the drying dynamics of a deposited drop of blood were already studied, this is not the case for drops of blood impacting perpendicularly a surface, falling from a certain height. Beside this, until the present work, little attention has been paid to the dynamics controlling the drying of blood pools. In both situations, the influence of different parameters such as substrates, humidity and temperature are examined. Empirical relations are established between final dried blood patterns and the generating mechanism, yielding possible application in blood pattern analysis for forensic investigations. Finally, using inverse methods, the empirical relations allow estimating an impact velocity, for dried drip stains
APA, Harvard, Vancouver, ISO, and other styles
49

Moffa, Morgan S. "The evidence and expert judgments of their relative importance in confession adjudication /." View thesis online, 2008. http://docs.rwu.edu/psych_thesis/1/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Van, der Walt Juanita. "The storage of forensic evidence at the forensic science laboratory (FSL) in Pretoria." Thesis, 2011. http://hdl.handle.net/10210/3866.

Full text
Abstract:
M.Tech.
It is the responsibility of the Forensic Science Laboratory (FSL) in Pretoria to analyse and store (DNA) evidence. This includes evidence received from the South African Police Service (SAPS), evidence in process and DNA stored for future analysis. Evidence is eventually presented and questioned in court and the flow of the evidence from the crime scene to the courts must be validated by ensuring that contamination does not take place at any point during the evidence supply chain, including the collecting, handling and documenting thereof. Rectifying mistakes in this process could be costly to the judicial system, not only in monetary terms, but in time and resources. The main purpose of this study has therefore been to investigate the FSL as a storage facility and to identify the warehousing activities that take place. In order to fulfil this purpose, the study covers the following aspects: the role and importance of the evidence supply chain the storage of evidence at the FSL the warehousing activities and procedures of the FSL, for example: the tracking and order picking of evidence the storage facilities and systems of the FSL, for example: the Electronic Management System (EMS) the customer service provided by the FSL conclusions and recommendations regarding the flow of DNA evidence from receipt of evidence up to delivering the findings after analysis of evidence at the FSL. The study includes detailed case studies of DNA evidence and its uses, as well as information of the storage and warehousing of DNA evidence at the FSL.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography