Search results for: forensic signature
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 492

Search results for: forensic signature

102 Realization and Characterizations of Conducting Ceramics Based on ZnO Doped by TiO₂, Al₂O₃ and MgO

Authors: Qianying Sun, Abdelhadi Kassiba, Guorong Li

Abstract:

ZnO with wurtzite structure is a well-known semiconducting oxide (SCO), being applied in thermoelectric devices, varistors, gas sensors, transparent electrodes, solar cells, liquid crystal displays, piezoelectric and electro-optical devices. Intrinsically, ZnO is weakly n-type SCO due to native defects (Znⱼ, Vₒ). However, the substitutional doping by metallic elements as (Al, Ti) gives rise to a high n-type conductivity ensured by donor centers. Under CO+N₂ sintering atmosphere, Schottky barriers of ZnO ceramics will be suppressed by lowering the concentration of acceptors at grain boundaries and then inducing a large increase in the Hall mobility, thereby increasing the conductivity. The presented work concerns ZnO based ceramics, which are fabricated with doping by TiO₂ (0.50mol%), Al₂O₃ (0.25mol%) and MgO (1.00mol%) and sintering in different atmospheres (Air (A), N₂ (N), CO+N₂(C)). We obtained uniform, dense ceramics with ZnO as the main phase and Zn₂TiO₄ spinel as a secondary and minor phase. An important increase of the conductivity was shown for the samples A, N, and C which were sintered under different atmospheres. The highest conductivity (σ = 1.52×10⁵ S·m⁻¹) was obtained under the reducing atmosphere (CO). The role of doping was investigated with the aim to identify the local environment and valence states of the doping elements. Thus, Electron paramagnetic spectroscopy (EPR) determines the concentration of defects and the effects of charge carriers in ZnO ceramics as a function of the sintering atmospheres. The relation between conductivity and defects concentration shows the opposite behavior between these parameters suggesting that defects act as traps for charge carriers. For Al ions, nuclear magnetic resonance (NMR) technique was used to identify the involved local coordination of these ions. Beyond the six and forth coordinated Al, an additional NMR signature of ZnO based TCO requires analysis taking into account the grain boundaries and the conductivity through the Knight shift effects. From the thermal evolution of the conductivity as a function of the sintering atmosphere, we succeed in defining the conditions to realize ZnO based TCO ceramics with an important thermal coefficient of resistance (TCR) which is promising for electrical safety of devices.

Keywords: ceramics, conductivity, defects, TCO, ZnO

Procedia PDF Downloads 163
101 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 72
100 Cheiloscopy: A Study on Predominant Lip Print Patterns among the Gujarati Population

Authors: Pooja Ahuja, Tejal Bhutani, M. S. Dahiya

Abstract:

Cheiloscopy, the study of lip prints, is a tool in forensic investigation technique that deals with identification of individuals based on lips patterns. The objective of this study is to determine predominant lip print pattern found among the Gujarati population, to evaluate whether any sex difference exists and to study the permanence of the pattern over six months duration. The study comprised of 100 healthy individuals (50 males and 50 females), in the age group of 18 to 25 years of Gujarati population of the Gandhinagar region of the Gujarat state, India. By using Suzuki and Tsuchihashi classification, Lip prints were then divided into four quadrants and also classified on the basis of peripheral shape of the lips. Materials used to record the lip prints were dark brown colored lipstick, cellophane tape, and white bond paper. Lipstick was applied uniformly, and lip prints were taken on the glued portion of cellophane tape and then stuck on to a white bond paper. These lip prints were analyzed with magnifying lens and virtually with stereo microscope. On the analysis of the subject population, results showed Branched pattern Type II (29.57 percentage) to be most predominant in the Gujarati population. Branched pattern Type II (35.60 percentage) and long vertical Type I (28.28 percentage) were most prevalent in males and females respectively and large full lips were most predominantly present in both the sexes. The study concludes that lip prints in any form can be an effective tool for identification of an individual in a closed or open group forms.

Keywords: cheiloscopy, lip pattern, predomianant, Gujarati population

Procedia PDF Downloads 276
99 Cheiloscopy and Dactylography in Relation to ABO Blood Groups: Egyptian vs. Malay Populations

Authors: Manal Hassan Abdel Aziz, Fatma Mohamed Magdy Badr El Dine, Nourhan Mohamed Mohamed Saeed

Abstract:

Establishing association between lip print patterns and those of fingerprints as well as blood groups is of fundamental importance in the forensic identification domain. The first aim of the current study was to determine the prevalent types of ABO blood groups, lip prints and fingerprints patterns in both studied populations. Secondly, to analyze any relation found between the different print patterns and the blood groups, which would be valuable in identification purposes. The present study was conducted on 60 healthy volunteers, (30 males and 30 females) from each of the studied population. Lip prints and fingerprints were obtained and classified according to Tsuchihashi's classification and Michael Kuchen’s classification, respectively. The results show that the ulnar loop was the most frequent among both populations. Blood group A was the most frequent among Egyptians, while blood groups O and B were the predominant among Malaysians. Significant relations were observed between lip print patterns and fingerprint (in the second quadrant for Egyptian males and the first one for Malaysian). For Malaysian females, a statistically significant association was proved in the fourth quadrant. Regarding the blood groups, 89.5% of ulnar loops were significantly related to blood group A among Egyptian males. The results proved an association between the fingerprint pattern and the lip prints, as well as between the ABO blood group and the pattern of fingerprints. However, further researches with larger sample sizes need to be directed to approve the current results.

Keywords: ABO, cheiloscopy, dactylography, Egyptians, Malaysians

Procedia PDF Downloads 196
98 The Prevalence of Blood-Borne Viral Infections among Autopsy Cases in Jordan

Authors: Emad Al-Abdallat, Faris G. Bakri, Azmi Mahafza, Rayyan Al Ali, Nidaa Ababneh, Ahmed Idhair

Abstract:

Background: Morgues are high-risk areas for the spread of infection from the cadavers to the staff during the postmortem examination. Infection can spread from corpses to workers by the airborne route, by direct contact, or from needle and sharp object injuries. Objective: Knowledge about the prevalence of these infections among autopsies is prudent to appreciate any risk of transmission and to further enforce safety measures. Method: A total of 242 autopsies were tested. Age ranged from 3 days to 94 years (median 75.5 years, mean 45.3 (21.9 ± SD)). There were 172 (71%) males. Results: The cause of death was considered natural in 137 (56.6%) cases, accidental in 89 (36.8%), homicidal in 9 (3.7%), suicidal in 4 (1.7%), and unknown in 3 (1.2%). Hepatitis B surface antigen was positive in 5 (2.1%) cases. Hepatitis C virus antibody was detected in 5 (2.1%) cases and the hepatitis C virus polymerase chain reaction was positive in 2 of them (0.8%). HIV antibody was not detected in any of the cases. Conclusions: Autopsies can be associated with exposure to blood borne viruses. Autopsies performed during the study period were tested for hepatitis B surface antigen, hepatitis C virus antibody, and human immunodeficiency virus antibody. Positive tests were subsequently confirmed by polymerase chain reaction. There is low prevalence of infections with these viruses in our autopsy cases. However, the risk of transmission remains a threat. Healthcare workers in the forensic departments should adhere to standard precautions.

Keywords: autopsy, hepatitis B virus, hepatitis C virus, human immunodeficiency virus, Jordan

Procedia PDF Downloads 355
97 Ambivalence as Ethical Practice: Methodologies to Address Noise, Bias in Care, and Contact Evaluations

Authors: Anthony Townsend, Robyn Fasser

Abstract:

While complete objectivity is a desirable scientific position from which to conduct a care and contact evaluation (CCE), it is precisely the recognition that we are inherently incapable of operating objectively that is the foundation of ethical practice and skilled assessment. Drawing upon recent research from Daniel Kahneman (2021) on the differences between noise and bias, as well as different inherent biases collectively termed “The Elephant in the Brain” by Kevin Simler and Robin Hanson (2019) from Oxford University, this presentation addresses both the various ways in which our judgments, perceptions and even procedures can be distorted and contaminated while conducting a CCE, but also considers the value of second order cybernetics and the psychodynamic concept of ‘ambivalence’ as a conceptual basis to inform our assessment methodologies to limit such errors or at least better identify them. Both a conceptual framework for ambivalence, our higher-order capacity to allow for the convergence and consideration of multiple emotional experiences and cognitive perceptions to inform our reasoning, and a practical methodology for assessment relying on data triangulation, Bayesian inference and hypothesis testing is presented as a means of promoting ethical practice for health care professionals conducting CCEs. An emphasis on widening awareness and perspective, limiting ‘splitting’, is demonstrated both in how this form of emotional processing plays out in alienating dynamics in families as well as the assessment thereof. In addressing this concept, this presentation aims to illuminate the value of ambivalence as foundational to ethical practice for assessors.

Keywords: ambivalence, forensic, psychology, noise, bias, ethics

Procedia PDF Downloads 67
96 Age and Sex Identification among Egyptian Population Using Fingerprint Ridge Density

Authors: Nazih Ramadan, Manal Mohy-Eldine, Amani Hanoon, Alaa Shehab

Abstract:

Background and Aims: The study of fingerprints is widely used in providing a clue regarding identity. Age and gender identification from fingerprints is an important step in forensic anthropology in order to minimize the list of suspects search. The aim of this study was to determine finger ridge density and patterns among Egyptians, and to estimate age and gender using ridge densities. Materials and Methods: This study was conducted on 177 randomly-selected healthy Egyptian subjects (90 males and 87 females). They were divided into three age groups; Group (a): from 6-< 12 years, group (b) from 12-< 18 years and group (c) ≥ 18 years. Bilateral digital prints, from every subject, were obtained by the inking procedure. Ridge count per 25 mm² was determined together with assessment of ridge pattern type. Statistical analysis was done with references to different age and sex groups. Results: There was a statistical significant difference in ridge density between the different age groups; where younger ages had significantly higher ridge density than older ages. Females proved to have significantly higher ridge density than males. Also, there was a statistically significant negative correlation between age and ridge density. Ulnar loops were the most frequent pattern among Egyptians then whorls then arches then radial loops. Finally, different regression models were constructed to estimate age and gender from fingerprints ridge density. Conclusion: fingerprint ridge density can be used to identify both age and sex of subjects. Further studies are recommended on different populations, larger samples or using different methods of fingerprint recording and finger ridge counting.

Keywords: age, sex identification, Egyptian population, fingerprints, ridge density

Procedia PDF Downloads 330
95 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 233
94 A Framework Based Blockchain for the Development of a Social Economy Platform

Authors: Hasna Elalaoui Elabdallaoui, Abdelaziz Elfazziki, Mohamed Sadgal

Abstract:

Outlines: The social economy is a moral approach to solidarity applied to the projects’ development. To reconcile economic activity and social equity, crowdfunding is as an alternative means of financing social projects. Several collaborative blockchain platforms exist. It eliminates the need for a central authority or an inconsiderate middleman. Also, the costs for a successful crowdfunding campaign are reduced, since there is no commission to be paid to the intermediary. It improves the transparency of record keeping and delegates authority to authorities who may be prone to corruption. Objectives: The objectives are: to define a software infrastructure for projects’ participatory financing within a social and solidarity economy, allowing transparent, secure, and fair management and to have a financial mechanism that improves financial inclusion. Methodology: The proposed methodology is: crowdfunding platforms literature review, financing mechanisms literature review, requirements analysis and project definition, a business plan, Platform development process and implementation technology, and testing an MVP. Contributions: The solution consists of proposing a new approach to crowdfunding based on Islamic financing, which is the principle of Mousharaka inspired by Islamic financing, which presents a financial innovation that integrates ethics and the social dimension into contemporary banking practices. Conclusion: Crowdfunding platforms need to secure projects and allow only quality projects but also offer a wide range of options to funders. Thus, a framework based on blockchain technology and Islamic financing is proposed to manage this arbitration between quality and quantity of options. The proposed financing system, "Musharaka", is a mode of financing that prohibits interests and uncertainties. The implementation is offered on the secure Ethereum platform as investors sign and initiate transactions for contributions using their digital signature wallet managed by a cryptography algorithm and smart contracts. Our proposal is illustrated by a crop irrigation project in the Marrakech region.

Keywords: social economy, Musharaka, blockchain, smart contract, crowdfunding

Procedia PDF Downloads 53
93 Current Drainage Attack Correction via Adjusting the Attacking Saw-Function Asymmetry

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

Current drainage attack suggested previously is further studied in regular settings of closed-loop controlled Brushless DC (BLDC) motor with Kalman filter in the feedback loop. Modeling and simulation experiments are conducted in a Matlab environment, implementing the closed-loop control model of BLDC motor operation in position sensorless mode under Kalman filter drive. The current increase in the motor windings is caused by the controller (p-controller in our case) affected by false data injection of substitution of the angular velocity estimates with distorted values. Operation of multiplication to distortion coefficient, values of which are taken from the distortion function synchronized in its periodicity with the rotor’s position change. A saw function with a triangular tooth shape is studied herewith for the purpose of carrying out the bias injection with current drainage consequences. The specific focus here is on how the asymmetry of the tooth in the saw function affects the flow of current drainage. The purpose is two-fold: (i) to produce and collect the signature of an asymmetric saw in the attack for further pattern recognition process, and (ii) to determine conditions of improving stealthiness of such attack via regulating asymmetry in saw function used. It is found that modification of the symmetry in the saw tooth affects the periodicity of current drainage modulation. Specifically, the modulation frequency of the drained current for a fully asymmetric tooth shape coincides with the saw function modulation frequency itself. Increasing the symmetry parameter for the triangle tooth shape leads to an increase in the modulation frequency for the drained current. Moreover, such frequency reaches the switching frequency of the motor windings for fully symmetric triangular shapes, thus becoming undetectable and improving the stealthiness of the attack. Therefore, the collected signatures of the attack can serve for attack parameter identification via the pattern recognition route.

Keywords: bias injection attack, Kalman filter, BLDC motor, control system, closed loop, P-controller, PID-controller, current drainage, saw-function, asymmetry

Procedia PDF Downloads 55
92 Sequence Polymorphism and Haplogroup Distribution of Mitochondrial DNA Control Regions HVS1 and HVS2 in a Southwestern Nigerian Population

Authors: Ogbonnaya O. Iroanya, Samson T. Fakorede, Osamudiamen J. Edosa, Hadiat A. Azeez

Abstract:

The human mitochondrial DNA (mtDNA) is about 17 kbp circular DNA fragments found within the mitochondria together with smaller fragments of 1200 bp known as the control region. Knowledge of variation within populations has been employed in forensic and molecular anthropology studies. The study was aimed at investigating the polymorphic nature of the two hypervariable segments (HVS) of the mtDNA, i.e., HVS1 and HVS2, and to determine the haplogroup distribution among individuals resident in Lagos, Southwestern Nigeria. Peripheral blood samples were obtained from sixty individuals who are not related maternally, followed by DNA extraction and amplification of the extracted DNA using primers specific for the regions under investigation. DNA amplicons were sequenced, and sequenced data were aligned and compared to the revised Cambridge Reference Sequence (rCRS) GenBank Accession number: NC_012920.1) using BioEdit software. Results obtained showed 61 and 52 polymorphic nucleotide positions for HVS1 and HVS2, respectively. While a total of three indels mutation were recorded for HVS1, there were seven for HVS2. Also, transition mutations predominate nucleotide change observed in the study. Genetic diversity (GD) values for HVS1 and HVS2 were estimated to be 84.21 and 90.4%, respectively, while random match probability was 0.17% for HVS1 and 0.89% for HVS2. The study also revealed mixed haplogroups specific to the African (L1-L3) and the Eurasians (U and H) lineages. New polymorphic sites obtained from the study are promising for human identification purposes.

Keywords: hypervariable region, indels, mitochondrial DNA, polymorphism, random match probability

Procedia PDF Downloads 93
91 Conformance to Spatial Planning between the Kampala Physical Development Plan of 2012 and the Existing Land Use in 2021

Authors: Brendah Nagula, Omolo Fredrick Okalebo, Ronald Ssengendo, Ivan Bamweyana

Abstract:

The Kampala Physical Development Plan (KPDP) was developed in 2012 and projected both long term and short term developments within the City .The purpose of the plan was to not only shape the city into a spatially planned area but also to control the urban sprawl trends that had expanded with pronounced instances of informal settlements. This plan was approved by the National Physical Planning Board and a signature was appended by the Minister in 2013. Much as the KPDP plan has been implemented using different approaches such as detailed planning, development control, subdivision planning, carrying out construction inspections, greening and beautification, there is still limited knowledge on the level of conformance towards this plan. Therefore, it is yet to be determined whether it has been effective in shaping the City into an ideal spatially planned area. Attaining a clear picture of the level of conformance towards the KPDP 2012 through evaluation between the planned and the existing land use in Kampala City was performed. Methods such as Supervised Classification and Post Classification Change Detection were adopted to perform this evaluation. Scrutiny of findings revealed Central Division registered the lowest level of conformance to the planning standards specified in the KPDP 2012 followed by Nakawa, Rubaga, Kawempe, and Makindye. Furthermore, mixed-use development was identified as the land use with the highest level of non-conformity of 25.11% and institutional land use registered the highest level of conformance of 84.45 %. The results show that the aspect of location was not carefully considered while allocating uses in the KPDP whereby areas located near the Central Business District have higher land rents and hence require uses that ensure profit maximization. Also, the prominence of development towards mixed-use denotes an increased demand for land towards compact development that was not catered for in the plan. Therefore in order to transform Kampala city into a spatially planned area, there is need to carefully develop detailed plans especially for all the Central Division planning precincts indicating considerations for land use densification.

Keywords: spatial plan, post classification change detection, Kampala city, landuse

Procedia PDF Downloads 68
90 Paternity Index Analysis on Disputed Paternity Cases at Sardjito Hospital Yogyakarta, Indonesia

Authors: Taufik Hidayat, Yudha Nurhantari, Bambang U. D. Rianto

Abstract:

Introduction: The examination of the Short Tandem Repeats (STR) locus on nuclear DNA is very useful in solving the paternity cases. The purpose of this study is to know the description of paternity cases and paternity index/probability of paternity analysis based on Indonesian allele frequency at Sardjito Hospital Yogyakarta. Method: This was an observational study with cross-sectional analytic method. Population and sample were all cases of disputed paternity from January 2011 to June 2015 that fulfill the inclusion and exclusion criteria and were examined at Forensic Medicine Unit of Sardjito Hospital, Medical Faculty of Gadjah Mada University. The paternity index was calculated with EasyDNA Program by Fung (2013). Analysis of the study was conducted by comparing the results through unpaired categorical test using Kolmogorov-Smirnov test. This study was designed with 95% confidence interval (CI) with α = 5% and significance level is p < 0,05. Results: From 42 disputed paternity cases we obtained trio paternity cases were 32 cases (76.2%) and duo without a mother was 10 cases (23.8%). The majority of the fathers' estimated ages were 21-30 years (33.3%) and the mother's age was 31-40 years (38.1%). The majority of the ages of children examined for paternity were under 12 months (47.6%). The majority of ethnic clients are Javanese. Conclusion of inclusion was 57.1%, and exclusion was 42.9%. The Kolmogorov-Smirnov test obtained p-value = 0.673. Conclusion: There is no significant difference between paternity index/probability of paternity based on Indonesian allele frequency between trio and duo of paternity.

Keywords: disputed paternity, paternity index, probability of paternity, short tandem

Procedia PDF Downloads 149
89 The Analysis of Deceptive and Truthful Speech: A Computational Linguistic Based Method

Authors: Seham El Kareh, Miramar Etman

Abstract:

Recently, detecting liars and extracting features which distinguish them from truth-tellers have been the focus of a wide range of disciplines. To the author’s best knowledge, most of the work has been done on facial expressions and body gestures but only few works have been done on the language used by both liars and truth-tellers. This paper sheds light on four axes. The first axis copes with building an audio corpus for deceptive and truthful speech for Egyptian Arabic speakers. The second axis focuses on examining the human perception of lies and proving our need for computational linguistic-based methods to extract features which characterize truthful and deceptive speech. The third axis is concerned with building a linguistic analysis program that could extract from the corpus the inter- and intra-linguistic cues for deceptive and truthful speech. The program built here is based on selected categories from the Linguistic Inquiry and Word Count program. Our results demonstrated that Egyptian Arabic speakers on one hand preferred to use first-person pronouns and present tense compared to the past tense when lying and their lies lacked of second-person pronouns, and on the other hand, when telling the truth, they preferred to use the verbs related to motion and the nouns related to time. The results also showed that there is a need for bigger data to prove the significance of words related to emotions and numbers.

Keywords: Egyptian Arabic corpus, computational analysis, deceptive features, forensic linguistics, human perception, truthful features

Procedia PDF Downloads 183
88 Sudden Death and Chronic Disseminated Intravascular Coagulation (DIC): Two Case Reports

Authors: Saker Lilia, Youcef Mellouki, Lakhdar Sellami, Yacine Zerairia, Abdelhaid Zetili, Fatma Guahria, Fateh Kaious, Nesrine Belkhodja, Abdelhamid Mira

Abstract:

Background: Sudden death is regarded as a suspicious demise necessitating autopsy, as stipulated by legal authorities. Chronic disseminated intravascular coagulation (DIC) is an acquired clinical and biological syndrome characterized by a severe and fatal prognosis, stemming from systemic, uncontrolled, diffuse coagulation activation. Irrespective of their origins, DIC is associated with a diverse spectrum of manifestations, encompassing minor biological coagulation alterations to profoundly severe conditions wherein hemorrhagic complications may take precedence. Simultaneously, microthrombi contribute to the development of multi-organ failures. Objective This study seeks to evaluate the role of autopsy in determining the causes of death. Materials and Methods: We present two instances of sudden death involving females who underwent autopsy at the Forensic Medicine Department of the University Hospital of Annaba, Algeria. These autopsies were performed at the request of the prosecutor, aiming to determine the causes of death and illuminate the exact circumstances surrounding it. Methods Utilized: Analysis of the initial information report; Findings from postmortem examinations; Histological assessments and toxicological analyses. Results: The presence of DIC was noted, affecting nearly all veins with distinct etiologies. Conclusion: For the establishment of a meaningful diagnosis: • Thorough understanding of the subject matter is imperative; • Precise alignment with medicolegal data is essential.

Keywords: chronic disseminated intravascular coagulation, sudden death, autopsy, causes of death

Procedia PDF Downloads 52
87 Rt. Side Sleeping Position Prevents Sudden Infant Death Syndrome

Authors: Othman Salim Hussein Al-Fleesy

Abstract:

Background: Studies showed that sudden infant death syndrome (SIDS) has association with sleeping positions. Up-to-date no study explained how could they prevent it? Objectives: 1-To determine which sleeping position is certainly safe one to prevent SIDS. 2-To establish criteria for suggesting definition and making diagnosis for SIDS. 3-To discuss the controversy surrounding SUND, ALTE, NM, as compared to SIDS. Method: This literature review was built on a previous literature. Articles were obtained randomly according to their availability to the author. For the purpose of this work an easy approach was built by modeling an overview on SIDS topic after clarifying the misconception and misinterpretation of a number of controversial issues in regard to SIDS such as: asphyxia, sudden unexpected death among adults (Bangungut or Pokkuri), apparent life threatening event (ALTE), Nightmare, and comparing the findings with the literature review results..By this unique method we got a clue for prevention of Sudden Infant Death Syndrome. Results: The revision revealed with no doubt that no study before have studied right-side sleeping position at all. The author determined right side as the only safe position to preventing SIDS. A new definition for SIDS is suggested. The author postulated a Right side position hypothesis (Alfleesy hypothesis) which is a testable hypothesis in front of all researchers for further study . Conclusion: Our results contradict totally all previous studies and recommendations. We recommended strongly the right side position only for sleeping to prevent SIDS. New definition is suggested and a new hypothesis is postulated.

Keywords: SIDS, ALTE, nightmare, forensic sciences

Procedia PDF Downloads 426
86 Enhanced Dielectric Properties of La Substituted CoFe2O4 Magnetic Nanoparticles

Authors: M. Vadivel, R. Ramesh Babu

Abstract:

Spinel ferrite magnetic nanomaterials have received a great deal of attention in recent years due to their wide range of potential applications in various fields such as magnetic data storage and microwave device applications. Among the family of spinel ferrites, cobalt ferrite (CoFe2O4) has been widely used in the field of high-frequency applications because of its remarkable material qualities such as moderate saturation magnetization, high coercivity, large permeability at higher frequency and high electrical resistivity. For aforementioned applications, the materials should have an improved electrical property, especially enhancement in the dielectric properties. It is well known that the substitution of rare earth metal cations in Fe3+ site of CoFe2O4 nanoparticles leads to structural distortion and thus significantly influences the structural and morphological properties whereas greatly modifies the electrical and magnetic properties of a material. In the present investigation, we report on the influence of lanthanum (La3+) ion substitution on the structural, morphological, dielectric and magnetic properties of CoFe2O4 magnetic nanoparticles prepared by co-precipitation method. Powder X-ray diffraction patterns reveal the formation of inverse cubic spinel structure with the signature of LaFeO3 phase at higher La3+ ion concentrations. Raman and Fourier transform infrared spectral analysis also confirms the formation of inverse cubic spinel structure and Fe-O symmetrical stretching vibrations of CoFe2O4 nanoparticles, respectively. Transmission electron microscopy study reveals that the size of the particles gradually increases with increasing La3+ ion concentrations whereas the agglomeration gets slightly reduced for La3+ ion substituted CoFe2O4 nanoparticles than that of undoped CoFe2O4 nanoparticles. Dielectric properties such as dielectric constant and dielectric loss were recorded as a function of frequency and temperature which reveals that the dielectric constant gradually increases with increasing temperatures as well as La3+ ion concentrations. The increased dielectric constant might be the reason that the formation of LaFeO3 secondary phase at higher La3+ ion concentrations. Magnetic measurement demonstrates that the saturation magnetization gradually decreases from 61.45 to 25.13 emu/g with increasing La3+ ion concentrations which is due to the nonmagnetic nature of La3+ ions substitution.

Keywords: cobalt ferrite, co-precipitation, dielectric properties, saturation magnetization

Procedia PDF Downloads 288
85 “It Just Feels Risky”: Intuition vs Evidence in Child Sexual Abuse Cases. Proposing an Empirically Derived Risk and Protection Protocol

Authors: Christian Perrin, Nicholas Blagden, Louise Allen, Sarah Impey

Abstract:

Social workers in the UK and professionals globally are faced with a particular challenge when dealing with allegations of child sexual abuse (CSA) in the community. In the absence of a conviction or incontestable evidence, staff can often find themselves unable to take decisive action to remove a child from harm, even though there may be a credible threat to their welfare. Conversely, practitioners may over-calculate risk through fear of being accountable for harm. This is, in part, due to the absence of a structured and evidence-based risk assessment tool which can predict the likelihood of a person committing child sexual abuse. Such assessments are often conducted by forensic professionals who utilise offence-specific data and personal history information to calculate risk. In situations where only allegations underpin a case, this mode of assessment is not viable. There are further ethical issues surrounding the assessment of risk in this area which require expert consideration and sensitive planning. This paper explores this entangled problem extant in the wider call to prevent sexual and child sexual abuse in the community. To this end, 32 qualitative interviews were undertaken with social workers dealing with CSA cases. Results were analysed using thematic analysis and operationalised to formulate a risk and protection protocol for use in case management. This paper reports on the early findings associated with the initial indications of protocol reliability. Implications for further research and practice are discussed.

Keywords: sexual offending, child sexual offence, offender rehabilitation, risk assessment, offence prevention

Procedia PDF Downloads 83
84 Subthalamic Nucleus in Adult Human Cadaveric Brain: A Morphometric Study

Authors: Mangala Kohli, P. A. Athira, Reeha Mahajan

Abstract:

The subthalamic nucleus (STN) is a biconvex nucleus situated in the diencephalon. The knowledge of the morphometry of the subthalamic nucleus is essential for accurate targeting of the nucleus during Deep Brain Stimulation. The present study aims to note the morphometry of the subthalamic nucleus in both the cerebral hemispheres which will prove to be of great value to radiologists and neurosurgeons. A cross‐sectional observational study was conducted in the Departments of Anatomy and Forensic Medicine, Lady Hardinge Medical College & Associated Hospitals, New Delhi on thirty adult cadaveric brain specimens of unclaimed and donated corpses. The specimens were categorized into 3 age groups: 20-35, 35-50 and above 50 years. All samples were collected after following the standard protocol for ethical clearance. The morphometric study of 60 subthalamic nucleus was thus conducted. Transverse section of the brain was made at a plane 4mm ventral to the plane containing mid commissural point. The dimensions of the subthalamic nucleus were measured bilaterally with the aid of digital Vernier caliper and magnifying glass. In the present study, the mean length and width and AC-PC length of the subthalamic nucleus was recorded on the right and left side in Group A, B and C. On comparison of mean of subthalamic nucleus dimensions between the right and left side in Group C, no statistically significant difference was observed. The length and width of subthalamic nucleus measured in the 3 age groups were compared with each other and the p value calculated. There was no statistically significant difference between the dimensions of Group A and B, Group B and C as well as Group A and C. The present study reveals that there is no significant reduction in the size of the nucleus was noted with increasing age. Thus, the values obtained in the present study can be used as a reference for various invasive and non-invasive procedures on subthalamic nucleus.

Keywords: cerebral hemisphere, deep brain stimulation, morphometry, subthalamic nucleus

Procedia PDF Downloads 159
83 Improving Sample Analysis and Interpretation Using QIAGENs Latest Investigator STR Multiplex PCR Assays with a Novel Quality Sensor

Authors: Daniel Mueller, Melanie Breitbach, Stefan Cornelius, Sarah Pakulla-Dickel, Margaretha Koenig, Anke Prochnow, Mario Scherer

Abstract:

The European STR standard set (ESS) of loci as well as the new expanded CODIS core loci set as recommended by the CODIS Core Loci Working Group, has led to a higher standardization and harmonization in STR analysis across borders. Various multiplex PCRs assays have since been developed for the analysis of these 17 ESS or 23 CODIS expansion STR markers that all meet high technical demands. However, forensic analysts are often faced with difficult STR results and the questions thereupon. What is the reason that no peaks are visible in the electropherogram? Did the PCR fail? Was the DNA concentration too low? QIAGEN’s newest Investigator STR kits contain a novel Quality Sensor (QS) that acts as internal performance control and gives useful information for evaluating the amplification efficiency of the PCR. QS indicates if the reaction has worked in general and furthermore allows discriminating between the presence of inhibitors or DNA degradation as a cause for the typical ski slope effect observed in STR profiles of such challenging samples. This information can be used to choose the most appropriate rework strategy.Based on the latest PCR chemistry called FRM 2.0, QIAGEN now provides the next technological generation for STR analysis, the Investigator ESSplex SE QS and Investigator 24plex QS Kits. The new PCR chemistry ensures robust and fast PCR amplification with improved inhibitor resistance and easy handling for a manual or automated setup. The short cycling time of 60 min reduces the duration of the total PCR analysis to make a whole workflow analysis in one day more likely. To facilitate the interpretation of STR results a smart primer design was applied for best possible marker distribution, highest concordance rates and a robust gender typing.

Keywords: PCR, QIAGEN, quality sensor, STR

Procedia PDF Downloads 468
82 The Structural Analysis of Out-of-Sequence Thrust: Insights from Chaura Thrust of Higher Himalaya in Himachal Pradesh, India

Authors: Rajkumar Ghosh

Abstract:

This paper focuses on the structural analysis of Chaura Thrust in Himachal Pradesh, India. It investigates mylonitised zones under microscopic observation, characterizes the box fold and its signature in the regional geology of Himachal Himalaya, and documents the Higher Himalayan Out-of-Sequence Thrust (OOST) in the region. The study aims to provide field evidence and documentation for Chaura Thrust (CT), which was previously considered a blind thrust. The research methodology involves geological field observation, microscopic studies, and strain analysis of oriented samples collected along the Jhakri-Chaura transect. The study presents findings such as the activation ages of MCT and STDS, the identification of mylonitised zones and various types of crenulated schistosity, and the manifestation of box folds and OOST. The presence of meso- and micro-scale box folds around Chaura suggests structural upliftment, while kink folds and shear sense indicators were identified. The research highlights the importance of microscopic studies and contributes to the understanding of the structural analysis of CT and its implications in the regional geology of the Himachal Himalaya. Mylonitised zones with S-C fabric were observed under the microscope, along with dynamic and bulging recrystallization and sub-grain formation. Various types of crenulated schistosity were documented, including a rare case of crenulation cleavage and sigmoid Muscovite occurring together. The conclusions emphasize the non-blind nature of Chaura Thrust, the characterization of box folds, the activation timing of different thrusts, and the significance of microscopic observations. Jhakri/Chaura/Sarahan thrusts are the zone of tectonic imbrication that transport Higher Himalayan gneissic rock on Rampur Quartzite. The evidence of frequent earthquakes and landslides in the Jhakri region confirm the study of morphometric conclusion that there is considerable neo-tectonic activity along an active fault in the Sutlej river basin. The study also documents the presence of OOST in Himachal Pradesh and its potential impact on strain accumulation.

Keywords: Main Central Thrust, Jhakri Thrust, Chaura Thrust, Higher Himalaya, Out-of-Sequence Thrust, Sarahan Thrust

Procedia PDF Downloads 60
81 Alphabet Recognition Using Pixel Probability Distribution

Authors: Vaidehi Murarka, Sneha Mehta, Dishant Upadhyay

Abstract:

Our project topic is “Alphabet Recognition using pixel probability distribution”. The project uses techniques of Image Processing and Machine Learning in Computer Vision. Alphabet recognition is the mechanical or electronic translation of scanned images of handwritten, typewritten or printed text into machine-encoded text. It is widely used to convert books and documents into electronic files etc. Alphabet Recognition based OCR application is sometimes used in signature recognition which is used in bank and other high security buildings. One of the popular mobile applications includes reading a visiting card and directly storing it to the contacts. OCR's are known to be used in radar systems for reading speeders license plates and lots of other things. The implementation of our project has been done using Visual Studio and Open CV (Open Source Computer Vision). Our algorithm is based on Neural Networks (machine learning). The project was implemented in three modules: (1) Training: This module aims “Database Generation”. Database was generated using two methods: (a) Run-time generation included database generation at compilation time using inbuilt fonts of OpenCV library. Human intervention is not necessary for generating this database. (b) Contour–detection: ‘jpeg’ template containing different fonts of an alphabet is converted to the weighted matrix using specialized functions (contour detection and blob detection) of OpenCV. The main advantage of this type of database generation is that the algorithm becomes self-learning and the final database requires little memory to be stored (119kb precisely). (2) Preprocessing: Input image is pre-processed using image processing concepts such as adaptive thresholding, binarizing, dilating etc. and is made ready for segmentation. “Segmentation” includes extraction of lines, words, and letters from the processed text image. (3) Testing and prediction: The extracted letters are classified and predicted using the neural networks algorithm. The algorithm recognizes an alphabet based on certain mathematical parameters calculated using the database and weight matrix of the segmented image.

Keywords: contour-detection, neural networks, pre-processing, recognition coefficient, runtime-template generation, segmentation, weight matrix

Procedia PDF Downloads 359
80 Molecular Alterations Shed Light on Alteration of Methionine Metabolism in Gastric Intestinal Metaplesia; Insight for Treatment Approach

Authors: Nigatu Tadesse, Ying Liu, Juan Li, Hong Ming Liu

Abstract:

Gastric carcinogenesis is a lengthy process of histopathological transition from normal to atrophic gastritis (AG) to intestinal metaplasia (GIM), dysplasia toward gastric cancer (GC). The stage of GIM identified as precancerous lesions with resistance to H-pylori eradication and recurrence after endoscopic surgical resection therapies. GIM divided in to two morphologically distinct phenotypes such as complete GIM bearing intestinal type morphology whereas the incomplete type has colonic type morphology. The incomplete type GIM considered to be the greatest risk factor for the development of GC. Studies indicated the expression of the caudal type homeobox 2 (CDX2) gene is responsible for the development of complete GIM but its progressive downregulation from incomplete metaplasia toward advanced GC identified as the risk for IM progression and neoplastic transformation. The downregulation of CDX2 gene have promoted cell growth and proliferation in gastric and colon cancers and ascribed in chemo-treatment inefficacies. CDX2 downregulated through promoter region hypermethylation in which the methylation frequency positively correlated with the dietary history of the patients, suggesting the role of diet as methyl carbon donor sources such as methionine. However, the metabolism of exogenous methionine is yet unclear. Targeting exogenous methionine metabolism has become a promising approach to limits tumor cell growth, proliferation and progression and increase treatment outcome. This review article discusses molecular alterations that could shed light on the potential of exogenous methionine metabolisms, such as gut microbiota alteration as sources of methionine to host cells, metabolic pathway signaling via PI3K/AKt/mTORC1-c-MYC to rewire exogenous methionine and signature of increased gene methylation index, cell growth and proliferation in GIM, with insights to new treatment avenue via targeting methionine metabolism, and the need for future integrated studies on molecular alterations and metabolomics to uncover altered methionine metabolism and characterization of CDX2 methylation in gastric intestinal metaplasia for potential therapeutic exploitation.

Keywords: altered methionine metabolism, Intestinal metaplesia, CDX2 gene, gastric cancer

Procedia PDF Downloads 38
79 Threshold Sand Detection Limits for Acoustic Monitors in Multiphase Flow

Authors: Vinod Ponnagandla, Brenton McLaury, Siamack Shirazi

Abstract:

Sand production can lead to deposition of particles or erosion. Low production rates resulting in deposition can partially clog systems and cause under deposit corrosion. Commercially available nonintrusive acoustic sand detectors are attractive as they claim to detect sand production. Acoustic sand detectors are used during oil and gas production; however, operators often do not know the threshold detection limits of these devices. It is imperative to know the detection limits to appropriately plan for cleaning of separation equipment or examine risk of erosion. These monitors are based on detecting the acoustic signature of sand as the particles impact the pipe walls. The objective of this work is to determine threshold detection limits for acoustic sand monitors that are commercially available. The minimum threshold sand concentration that can be detected in a pipe are determined as a function of flowing gas and liquid velocities. A large scale flow loop with a 4-inch test section is utilized. Commercially available sand monitors (ClampOn and Roxar) are evaluated for different flow regimes, sand sizes and pipe orientation (vertical and horizontal). The manufacturers’ recommend that the monitors be placed on a bend to maximize the number of particle impacts, so results are shown for monitors placed at 45 and 90 degree positions in a bend. Acoustic sand monitors that clamp to the outside of pipe are passive and listen for solid particle impact noise. The threshold sand rate is calculated by eliminating the background noise created by the flow of gas and liquid in the pipe for various flow regimes that are generated in horizontal and vertical test sections. The average sand sizes examined are 150 and 300 microns. For stratified and bubbly flows the threshold sand rates are much higher than other flow regimes such as slug and annular flow regimes that are investigated. However, the background noise generated by slug flow regime is very high and cause a high uncertainty in detection limits. The threshold sand rates for annular flow and dry gas conditions are the lowest because of high gas velocities. The effects of monitor placement around elbows that are in vertical and horizontal pipes are also examined for 150 micron. The results show that the threshold sand rates that are detected in vertical orientation are generally lower for all various flow regimes that are investigated.

Keywords: acoustic monitor, sand, multiphase flow, threshold

Procedia PDF Downloads 378
78 Controlled Doping of Graphene Monolayer

Authors: Vedanki Khandenwal, Pawan Srivastava, Kartick Tarafder, Subhasis Ghosh

Abstract:

We present here the experimental realization of controlled doping of graphene monolayers through charge transfer by trapping selected organic molecules between the graphene layer and underlying substrates. This charge transfer between graphene and trapped molecule leads to controlled n-type or p-type doping in monolayer graphene (MLG), depending on whether the trapped molecule acts as an electron donor or an electron acceptor. Doping controllability has been validated by a shift in corresponding Raman peak positions and a shift in Dirac points. In the transfer characteristics of field effect transistors, a significant shift of Dirac point towards positive or negative gate voltage region provides the signature of p-type or n-type doping of graphene, respectively, as a result of the charge transfer between graphene and the organic molecules trapped within it. In order to facilitate the charge transfer interaction, it is crucial for the trapped molecules to be situated in close proximity to the graphene surface, as demonstrated by findings in Raman and infrared spectroscopies. However, the mechanism responsible for this charge transfer interaction has remained unclear at the microscopic level. Generally, it is accepted that the dipole moment of adsorbed molecules plays a crucial role in determining the charge-transfer interaction between molecules and graphene. However, our findings clearly illustrate that the doping effect primarily depends on the reactivity of the constituent atoms in the adsorbed molecules rather than just their dipole moment. This has been illustrated by trapping various molecules at the graphene−substrate interface. Dopant molecules such as acetone (containing highly reactive oxygen atoms) promote adsorption across the entire graphene surface. In contrast, molecules with less reactive atoms, such as acetonitrile, tend to adsorb at the edges due to the presence of reactive dangling bonds. In the case of low-dipole moment molecules like toluene, there is a lack of substantial adsorption anywhere on the graphene surface. Observation of (i) the emergence of the Raman D peak exclusively at the edges for trapped molecules without reactive atoms and throughout the entire basal plane for those with reactive atoms, and (ii) variations in the density of attached molecules (with and without reactive atoms) to graphene with their respective dipole moments provides compelling evidence to support our claim. Additionally, these observations were supported by first principle density functional calculations.

Keywords: graphene, doping, charge transfer, liquid phase exfoliation

Procedia PDF Downloads 41
77 Modal Composition and Tectonic Provenance of the Sandstones of Ecca Group, Karoo Supergroup in the Eastern Cape Province, South Africa

Authors: Christopher Baiyegunhi, Kuiwu Liu, Oswald Gwavava

Abstract:

Petrography of the sandstones of Ecca Group, Karoo Supergroup in the Eastern Cape Province of South Africa have been investigated on composition, provenance and influence of weathering conditions. Petrographic studies based on quantitative analysis of the detrital minerals revealed that the sandstones are composed mostly of quartz, feldspar and lithic fragments of metamorphic and sedimentary rocks. The sandstones have an average framework composition of 24.3% quartz, 19.3% feldspar, 26.1% rock fragments, and 81.33% of the quartz grains are monocrystalline. These sandstones are generally very fine to fine grained, moderate to well sorted, and subangular to subrounded in shape. In addition, they are compositionally immature and can be classified as feldspathic wacke and lithic wacke. The absence of major petrographically distinctive compositional variations in the sandstones perhaps indicate homogeneity of their source. As a result of this, it is inferred that the transportation distance from the source area was quite short and the main mechanism of transportation was by river systems to the basin. The QFL ternary diagrams revealed dissected and transitional arc provenance pointing to an active margin and uplifted basement preserving the signature of a recycled provenance. This is an indication that the sandstones were derived from a magmatic arc provenance. Since magmatic provenance includes transitional arc and dissected arc, it also shows that the source area of the Ecca sediments had a secondary sedimentary and metasedimentary rocks from a marginal belt that developed as a result of rifting. The weathering diagrams and semi-quantitative weathering index indicate that the Ecca sandstones are mostly from a plutonic source area, with climatic conditions ranging from arid to humid. The compositional immaturity of the sandstones is suggested to be due to weathering or recycling and low relief or short transport from the source area. The detrital modal compositions of these sandstones are related to back arc to island and continental margin arc. The origin and deposition of the Ecca sandstones are due to low-moderate weathering, recycling of pre-existing rocks, erosion and transportation of debris from the orogeny of the Cape Fold Belt.

Keywords: petrography, tectonic setting, provenance, Ecca Group, Karoo Basin

Procedia PDF Downloads 393
76 Development of an Integrated Criminogenic Intervention Programme for High Risk Offenders

Authors: Yunfan Jiang

Abstract:

In response to an identified gap in available treatment programmes for high-risk offenders with multiple criminogenic needs and guided by emerging literature in the field of correctional rehabilitation, Singapore Prison Service (SPS) developed the Integrated Criminogenic Programme (ICP) in 2012. This evidence-informed psychological programme was designed to address all seven dynamic criminogenic needs (from the Central 8) of high-risk offenders by applying concepts from rehabilitation and psychological theories such as Risk-Need-Responsivity, Good Lives Model, narrative identity, and motivational interviewing. This programme also encompasses a 6-month community maintenance component for the purpose of providing structured step-down support in the aftercare setting. These sessions provide participants the opportunity for knowledge reinforcement and application of skills attained in-care. A quantitative evaluation of the ICP showed that the intervention group had statistically significant improvements across time in most self-report measures of criminal attitudes, substance use attitudes, and psychosocial functioning. This was congruent with qualitative data from participants saying that the ICP had the most impact on their criminal thinking patterns and management of behaviours in high-risk situations. Results from the comparison group showed no difference in their criminal attitudes, even though they reported statistically significant improvements across time in their substance use attitudes and some self-report measures of psychosocial functioning. The programme’s efficacy was also apparent in the lower rates of recidivism and relapse within 12 months for the intervention group. The management of staff issues arising from the development and implementation of an innovative high-intensity psychological programme such as the ICP will also be discussed.

Keywords: evaluation, forensic psychology, intervention programme, offender rehabilitation

Procedia PDF Downloads 556
75 Nondecoupling Signatures of Supersymmetry and an Lμ-Lτ Gauge Boson at Belle-II

Authors: Heerak Banerjee, Sourov Roy

Abstract:

Supersymmetry, one of the most celebrated fields of study for explaining experimental observations where the standard model (SM) falls short, is reeling from the lack of experimental vindication. At the same time, the idea of additional gauge symmetry, in particular, the gauged Lμ-Lτ symmetric models have also generated significant interest. They have been extensively proposed in order to explain the tantalizing discrepancy in the predicted and measured value of the muon anomalous magnetic moment alongside several other issues plaguing the SM. While very little parameter space within these models remain unconstrained, this work finds that the γ + Missing Energy (ME) signal at the Belle-II detector will be a smoking gun for supersymmetry (SUSY) in the presence of a gauged U(1)Lμ-Lτ symmetry. A remarkable consequence of breaking the enhanced symmetry appearing in the limit of degenerate (s)leptons is the nondecoupling of the radiative contribution of heavy charged sleptons to the γ-Z΄ kinetic mixing. The signal process, e⁺e⁻ →γZ΄→γ+ME, is an outcome of this ubiquitous feature. Taking the severe constraints on gauged Lμ-Lτ models by several low energy observables into account, it is shown that any significant excess in all but the highest photon energy bin would be an undeniable signature of such heavy scalar fields in SUSY coupling to the additional gauge boson Z΄. The number of signal events depends crucially on the logarithm of the ratio of stau to smuon mass in the presence of SUSY. In addition, the number is also inversely proportional to the e⁺e⁻ collision energy, making a low-energy, high-luminosity collider like Belle-II an ideal testing ground for this channel. This process can probe large swathes of the hitherto free slepton mass ratio vs. additional gauge coupling (gₓ) parameter space. More importantly, it can explore the narrow slice of Z΄ mass (MZ΄) vs. gₓ parameter space still allowed in gauged U(1)Lμ-Lτ models for superheavy sparticles. The spectacular finding that the signal significance is independent of individual slepton masses is an exciting prospect indeed. Further, the prospect that signatures of even superheavy SUSY particles that may have escaped detection at the LHC may show up at the Belle-II detector is an invigorating revelation.

Keywords: additional gauge symmetry, electron-positron collider, kinetic mixing, nondecoupling radiative effect, supersymmetry

Procedia PDF Downloads 107
74 Unlocking Justice: Exploring the Power and Challenges of DNA Analysis in the Criminal Justice System

Authors: Sandhra M. Pillai

Abstract:

This article examines the relevance, difficulties, and potential applications of DNA analysis in the criminal justice system. A potent tool for connecting suspects to crime sites, clearing the innocent of wrongdoing, and resolving cold cases, DNA analysis has transformed forensic investigations. The scientific foundations of DNA analysis, including DNA extraction, sequencing, and statistical analysis, are covered in the article. To guarantee accurate and trustworthy findings, it also discusses the significance of quality assurance procedures, chain of custody, and DNA sample storage. DNA analysis has significantly advanced science, but it also brings up substantial moral and legal issues. To safeguard individual rights and uphold public confidence, privacy concerns, possible discrimination, and abuse of DNA information must be properly addressed. The paper also emphasises the effects of the criminal justice system on people and communities while highlighting the necessity of equity, openness, and fair access to DNA testing. The essay describes the obstacles and future directions for DNA analysis. It looks at cutting-edge technology like next-generation sequencing, which promises to make DNA analysis quicker and more affordable. To secure the appropriate and informed use of DNA evidence, it also emphasises the significance of multidisciplinary collaboration among scientists, law enforcement organisations, legal experts, and policymakers. In conclusion, DNA analysis has enormous potential for improving the course of criminal justice. We can exploit the potential of DNA technology while respecting the ideals of justice, fairness, and individual rights by navigating the ethical, legal, and societal issues and encouraging discussion and collaboration.

Keywords: DNA analysis, DNA evidence, reliability, validity, legal frame, admissibility, ethical considerations, impact, future direction, challenges

Procedia PDF Downloads 44
73 Qualitative Analysis of Current Child Custody Evaluation Practices

Authors: Carolyn J. Ortega, Stephen E. Berger

Abstract:

The role of the custody evaluator is perhaps one of the most controversial and risky endeavors in clinical practice. Complaints filed with licensing boards regarding a child-custody evaluation constitute the second most common reason for such an event. Although the evaluator is expected to answer for the family-law court what is in the “best interest of the child,” there is a lack of clarity on how to establish this in any empirically validated manner. Hence, practitioners must contend with a nebulous framework in formulating their methodological procedures that inherently places them at risk in an already litigious context. This study sought to qualitatively investigate patterns of practice among doctoral practitioners conducting child custody evaluations in the area of Southern California. Ten psychologists were interviewed who devoted between 25 and 100% of their California private practice to custody work. All held Ph.D. degrees with a range of eight to 36 years of experience in custody work. Semi-structured interviews were used to investigate assessment practices, ensure adherence to guidelines, risk management, and qualities of evaluators. Forty-three Specific Themes were identified using Interpretive Phenomenological Analysis (IPA). Seven Higher Order Themes clustered on salient factors such as use of Ethics, Law, Guidelines; Parent Variables; Child Variables; Psychologist Variables; Testing; Literature; and Trends. Evaluators were aware of the ever-present reality of a licensure complaint and thus presented idiosyncratic descriptions of risk management considerations. Ambiguity about quantifying and validly tapping parenting abilities was also reviewed. Findings from this study suggested a high reliance on unstructured and observational methods in child custody practices.

Keywords: forensic psychology, psychological testing, assessment methodology, child custody

Procedia PDF Downloads 256