CINXE.COM

Search results for: forensic phonetics

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: forensic phonetics</title> <meta name="description" content="Search results for: forensic phonetics"> <meta name="keywords" content="forensic phonetics"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="forensic phonetics" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="forensic phonetics"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 308</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: forensic phonetics</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">308</span> Forensics Linguistics and Phonetics: The Analysis of Language to Support Investigations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andreas%20Aceranti">Andreas Aceranti</a>, <a href="https://publications.waset.org/abstracts/search?q=Simonetta%20Vernocchi"> Simonetta Vernocchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Marco%20Colorato"> Marco Colorato</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaoutar%20Filahi"> Kaoutar Filahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study was inspired by the necessity of giving forensic linguistics and phonetics more and more importance and the intention to explore those topics in an attempt to understand what the role of these disciplines really is in investigations of any nature. The goal is to analyze what are the achievements that those subjects have been able to reach, and what contribution they gave to the legal world; the analysis and study of those topics are supported by the recounting of real cases that have included forensic and phonetic linguistics. One of the most relevant cases is that of the Unabomber, an investigation that brought to light the importance and highlighted the importance this matter can have in difficult and time-consuming cases such as the one we have here. We also focus on the areas of expertise of those new branches of applied linguistics, focusing on what is the use of this new discipline in Italy and abroad and showing what could be the possible improvements that the Italian state could apply in order to be able to catch up with countries like Great Britain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic%20linguistic" title="forensic linguistic">forensic linguistic</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics" title=" forensic phonetics"> forensic phonetics</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=criminalistics" title=" criminalistics"> criminalistics</a> </p> <a href="https://publications.waset.org/abstracts/160312/forensics-linguistics-and-phonetics-the-analysis-of-language-to-support-investigations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160312.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">307</span> Forensic Imaging as an Effective Learning Tool for Teaching Forensic Pathology to Undergraduate Medical Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vasudeva%20Murthy%20Challakere%20Ramaswamy">Vasudeva Murthy Challakere Ramaswamy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Conventionally forensic pathology is learnt through autopsy demonstrations which carry various limitations such as unavailability of cases in the mortuary, medico-legal implication and infection. Over the years forensic pathology and science has undergone significant evolution in this digital world. Forensic imaging is a technology which can be effectively utilized for overcoming the current limitations in the undergraduate learning of forensic curriculum. Materials and methods: demonstration of forensic imaging was done using a novel technology of autopsy which has been recently introduced across the globe. Three sessions were conducted in international medical university for a total of 196 medical students. The innovative educational tool was evacuated by using quantitative questionnaire with the scoring scales between 1 to 10. Results: The mean score for acceptance of new tool was 82% and about 74% of the students recommended incorporation of the forensic imaging in the regular curriculum. 82% of students were keen on collaborative research and taking further training courses in forensic imaging. Conclusion: forensic imaging can be an effective tool and also a suitable alternative for teaching undergraduate students. This feedback also supports the fact that students favour the use of contemporary technologies in learning medicine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic%20imaging" title="forensic imaging">forensic imaging</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20pathology" title=" forensic pathology"> forensic pathology</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20students" title=" medical students"> medical students</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20tool" title=" learning tool"> learning tool</a> </p> <a href="https://publications.waset.org/abstracts/11591/forensic-imaging-as-an-effective-learning-tool-for-teaching-forensic-pathology-to-undergraduate-medical-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">480</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">306</span> An Enhanced Digital Forensic Model for Internet of Things Forensic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tina%20Wu">Tina Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Martin"> Andrew Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acquisition" title="acquisition">acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=zoning" title=" zoning"> zoning</a> </p> <a href="https://publications.waset.org/abstracts/76982/an-enhanced-digital-forensic-model-for-internet-of-things-forensic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">305</span> Corruption and Economic Performance in Nigeria: The Role of Forensic Accounting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamila%20Garba%20Audu">Jamila Garba Audu</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Adamu"> Peter Adamu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the role of forensic accounting in the fight against corruption in Nigeria for better utilization of public funds and economic growth and development of the Country. We adopted a trend analysis to show the performance of the Nigerian economy as well as the quality of institutions which government economic and political activities in the country. It is an established fact that Nigeria has performed badly since the 1960s to date in terms of institutional quality and economic development despite large amount of money obtained from the export of crude oil. It was revealed also that the fight against corruption has not been very successful in recent times because experts in the field of forensic accounting have not been utilized. With the successes recorded in dealing with fraud and embezzlement using forensic accounting, it has become imperative for the EFCC to use forensic accountants in the fight against corruption in the country. Also, there is the need to introduce very seriously, the teaching of forensic accounting in Nigerian Universities to train experts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corruption" title="corruption">corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20performance" title=" economic performance"> economic performance</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting" title=" forensic accounting"> forensic accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/54077/corruption-and-economic-performance-in-nigeria-the-role-of-forensic-accounting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54077.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">376</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">304</span> Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Venugopal%20Rao%20Gudlur">Venkata Venugopal Rao Gudlur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title="Internet of Things">Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=Process%20Management" title=" Process Management"> Process Management</a>, <a href="https://publications.waset.org/abstracts/search?q=Forensic%20Investigation" title=" Forensic Investigation"> Forensic Investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=M2M%20Framework" title=" M2M Framework"> M2M Framework</a> </p> <a href="https://publications.waset.org/abstracts/154606/importance-of-new-policies-of-process-management-for-internet-of-things-based-on-forensic-investigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">303</span> The Conception of Implementation of Vision for European Forensic Science 2020 in Lithuania</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Egl%C4%97%20Bilevi%C4%8Di%C5%ABt%C4%97">Eglė Bilevičiūtė</a>, <a href="https://publications.waset.org/abstracts/search?q=Vidmantas%20Egidijus%20Kurapka"> Vidmantas Egidijus Kurapka</a>, <a href="https://publications.waset.org/abstracts/search?q=Snieguol%C4%97%20Matulien%C4%97"> Snieguolė Matulienė</a>, <a href="https://publications.waset.org/abstracts/search?q=Sigut%C4%97%20Stankevi%C4%8Di%C5%ABt%C4%97"> Sigutė Stankevičiūtė</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Council of European Union (EU Council) has stressed on several occasions the need for a concerted, comprehensive and effective solution to delinquency problems in EU communities. In the context of establishing a European Forensic Science Area and the development of forensic science infrastructure in Europe, EU Council believes that forensic science can significantly contribute to the efficiency of law enforcement, crime prevention and combating crimes. Lithuanian scientists have consolidated to implement a project named “Conception of the vision for European Forensic Science 2020 implementation in Lithuania” (the project is funded for the period of 1 March 2014 - 31 December 2016) with the objective to create a conception of implementation of the vision for European Forensic Science 2020 in Lithuania by 1) evaluating the current status of Lithuania’s forensic system and opportunities for its improvement; 2) analysing achievements and knowledge in investigation of crimes listed in conclusions of EU Council on the vision for European Forensic Science 2020 including creation of a European Forensic Science Area and the development of forensic science infrastructure in Europe: trafficking in human beings, organised crime and terrorism; 3) analysing conceptions of criminalistics, which differ in different EU member states due to the variety of forensic schools, and finding means for their harmonization. Apart from the conception of implementation of the vision for European Forensic Science 2020 in Lithuania, the project is expected to suggest provisions that will be relevant to other EU countries as well. Consequently, the presented conception of implementation of vision for European Forensic Science 2020 in Lithuania could initiate a project for a common vision of European Forensic Science and contribute to the development of the EU as an area of freedom, security and justice. The article presents main ideas of the project of the conception of the vision for European Forensic Science 2020 of EU Council and analyses its legal background, as well as prospects of and challenges for its implementation in Lithuania and the EU. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EUROVIFOR" title="EUROVIFOR">EUROVIFOR</a>, <a href="https://publications.waset.org/abstracts/search?q=standardization" title=" standardization"> standardization</a>, <a href="https://publications.waset.org/abstracts/search?q=vision%20for%20European%20Forensic%20Science%202020" title=" vision for European Forensic Science 2020"> vision for European Forensic Science 2020</a>, <a href="https://publications.waset.org/abstracts/search?q=Lithuania" title=" Lithuania"> Lithuania</a> </p> <a href="https://publications.waset.org/abstracts/7731/the-conception-of-implementation-of-vision-for-european-forensic-science-2020-in-lithuania" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7731.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">302</span> Financial Statement Fraud: The Need for a Paradigm Shift to Forensic Accounting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ifedapo%20Francis%20Awolowo">Ifedapo Francis Awolowo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The unrelenting series of embarrassing audit failures should stimulate a paradigm shift in accounting. And in this age of information revolution, there is need for a constant improvement on the products or services one offers to the market in order to be relevant. This study explores the perceptions of external auditors, forensic accountants and accounting academics on whether a paradigm shift to forensic accounting can reduce financial statement frauds. Through Neo-empiricism/inductive analytical approach, findings reveal that a paradigm shift to forensic accounting might be the right step in the right direction in order to increase the chances of fraud prevention and detection in the financial statement. This research has implication on accounting education on the need to incorporate forensic accounting into present day accounting curriculum. Accounting professional bodies, accounting standard setters and accounting firms all have roles to play in incorporating forensic accounting education into accounting curriculum. Particularly, there is need to alter the ISA 240 to make the prevention and detection of frauds the responsibilities of bot those charged with the management and governance of companies and statutory auditors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=financial%20statement%20fraud" title="financial statement fraud">financial statement fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting" title=" forensic accounting"> forensic accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20prevention%20and%20detection" title=" fraud prevention and detection"> fraud prevention and detection</a>, <a href="https://publications.waset.org/abstracts/search?q=auditing" title=" auditing"> auditing</a>, <a href="https://publications.waset.org/abstracts/search?q=audit%20expectation%20gap" title=" audit expectation gap"> audit expectation gap</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a> </p> <a href="https://publications.waset.org/abstracts/42346/financial-statement-fraud-the-need-for-a-paradigm-shift-to-forensic-accounting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42346.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">301</span> Term Creation in Specialized Fields: An Evaluation of Shona Phonetics and Phonology Terminology at Great Zimbabwe University</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peniah%20Mabaso-Shamano">Peniah Mabaso-Shamano</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper evaluates Shona terms that were created to teach Phonetics and Phonology courses at Great Zimbabwe University (GZU). The phonetics and phonology terms to be discussed in this paper were created using different processes and strategies such as translation, borrowing, neologising, compounding, transliteration, circumlocution among many others. Most phonetics and phonology terms are alien to Shona and as a result, there are no suitable Shona equivalents. The lecturers and students for these courses have a mammoth task of creating terminology for the different modules offered in Shona and other Zimbabwean indigenous languages. Most linguistic reference books are written in English. As such, lecturers and students translate information from English to Shona, a measure which is proving to be too difficult for them. A term creation workshop was held at GZU to try to address the problem of lack of terminology in indigenous languages. Different indigenous language practitioners from different tertiary institutions convened for a two-day workshop at GZU. Due to the 'specialized' nature of phonetics and phonology, it was too difficult to come up with 'proper' indigenous terms. The researcher will consult tertiary institutions lecturers who teach linguistics courses and linguistics students to get their views on the created terms. The people consulted will not be the ones who took part in the term creation workshop held at GZU. The selected participants will be asked to evaluate and back-translate some of the terms. In instances where they feel the terms created are not suitable or user-friendly, they will be asked to suggest other terms. Since the researcher is also a linguistics lecturer, her observation and views will be important. From her experience in using some of the terms in teaching phonetics and phonology courses to undergraduate students, the researcher noted that most of the terms created have shortcomings since they are not user-friendly. These shortcomings include terms longer than the English terms as some terms are translated to Shona through a whole statement. Most of these terms are neologisms, compound neologisms, transliterations, circumlocutions, and blends. The paper will show that there is overuse of transliterated terms due to the lack of Shona equivalents for English terms. Most single English words were translated into compound neologisms or phrases after attempts to reduce them to one word terms failed. In other instances, circumlocution led to the problem of creating longer terms than the original and as a result, the terms are not user-friendly. The paper will discuss and evaluate the different phonetics and phonology terms created and the different strategies and processes used in creating them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blending" title="blending">blending</a>, <a href="https://publications.waset.org/abstracts/search?q=circumlocution" title=" circumlocution"> circumlocution</a>, <a href="https://publications.waset.org/abstracts/search?q=term%20creation" title=" term creation"> term creation</a>, <a href="https://publications.waset.org/abstracts/search?q=translation" title=" translation"> translation</a> </p> <a href="https://publications.waset.org/abstracts/99915/term-creation-in-specialized-fields-an-evaluation-of-shona-phonetics-and-phonology-terminology-at-great-zimbabwe-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99915.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">300</span> Adoption and Diffusion of Valuation Standards in the Forensic Accounting Community and in Courts: Facilitating and Inhibiting Factors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Matteo%20Manera">Matteo Manera</a>, <a href="https://publications.waset.org/abstracts/search?q=Mariateresa%20Torchia"> Mariateresa Torchia</a>, <a href="https://publications.waset.org/abstracts/search?q=Gregory%20Moscato"> Gregory Moscato</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Forensic accounting is a hot subject of research in accounting. Valuation remains one of the major topics for practitioners. Valuation standards are a powerful instrument that can contribute to a fair process: their use aims at reducing subjectivity and arbitrary decisions in courts. In most jurisdictions, valuation standards are not the law: forensic accountants are not obliged to use valuation standards when they perform valuation works for judges. To date, as far as we know, no literature work has investigated adoption and diffusion of valuation standards in the forensic accounting space. In this paper, we analyze the spread of valuation standards through the lenses of isomorphism and -as corollaries- of Agency Theory and Signaling Theory. Because of lack of research in the particular area of valuation standards adoption, the present work relies on qualitative, exploratory research, based on semi-structured interviews conducted (up to saturation) with expert forensic accountants. Our work digs into motivations behind adoption and diffusion, as well into perceptions of forensic accountants around benefits of valuation standards and into barriers to their diffusion: the result is that, while the vast majority of forensic accountants praise the great work of the standards setters in introducing valuation standards, it might be that less than 50% of forensic accountants actually use valuation standards, in courts. Our preliminary findings, to be supported or refuted by future research, lead us to address a “trilogy” of recommendations to the stakeholders involved in the process of adoption and diffusion of valuation standards in courts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting" title="forensic accounting">forensic accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=valuation%20standards" title=" valuation standards"> valuation standards</a>, <a href="https://publications.waset.org/abstracts/search?q=adoption%20of%20standards" title=" adoption of standards"> adoption of standards</a>, <a href="https://publications.waset.org/abstracts/search?q=motivations" title=" motivations"> motivations</a>, <a href="https://publications.waset.org/abstracts/search?q=benefits" title=" benefits"> benefits</a>, <a href="https://publications.waset.org/abstracts/search?q=barriers" title=" barriers"> barriers</a>, <a href="https://publications.waset.org/abstracts/search?q=Isomorphism" title=" Isomorphism"> Isomorphism</a> </p> <a href="https://publications.waset.org/abstracts/139052/adoption-and-diffusion-of-valuation-standards-in-the-forensic-accounting-community-and-in-courts-facilitating-and-inhibiting-factors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139052.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">172</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">299</span> Filtering and Reconstruction System for Grey-Level Forensic Images</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahd%20Aljarf">Ahd Aljarf</a>, <a href="https://publications.waset.org/abstracts/search?q=Saad%20Amin"> Saad Amin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Images are important source of information used as evidence during any investigation process. Their clarity and accuracy is essential and of the utmost importance for any investigation. Images are vulnerable to losing blocks and having noise added to them either after alteration or when the image was taken initially, therefore, having a high performance image processing system and it is implementation is very important in a forensic point of view. This paper focuses on improving the quality of the forensic images. For different reasons packets that store data can be affected, harmed or even lost because of noise. For example, sending the image through a wireless channel can cause loss of bits. These types of errors might give difficulties generally for the visual display quality of the forensic images. Two of the images problems: noise and losing blocks are covered. However, information which gets transmitted through any way of communication may suffer alteration from its original state or even lose important data due to the channel noise. Therefore, a developed system is introduced to improve the quality and clarity of the forensic images. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20filtering" title="image filtering">image filtering</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20reconstruction" title=" image reconstruction"> image reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20images" title=" forensic images"> forensic images</a> </p> <a href="https://publications.waset.org/abstracts/15654/filtering-and-reconstruction-system-for-grey-level-forensic-images" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15654.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">298</span> Proposition on Improving Environmental Forensic System in China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huilei%20Wang">Huilei Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuanfeng%20Wang"> Yuanfeng Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the early period of China, economy developed rapidly at the cost of environment. Recently, it is generally recognized that the heavily polluted environment not only puts a brake on economic development but also paces negative impact on people’ health as well as probably next decades of generations. Accordingly, the latest Environmental Protection Law revised in 2014 makes a clear-cut division of environmental responsibility and regulates stricter penalties of breaching law. As the new environmental law is enforced gradually, environmental forensic is increasingly required in the process of ascertaining facts in judicial proceedings of environmental cases. Based on the outcomes of documentary analysis for all environmental cases judged on the basis of new environmental law, it is concluded that there still exists problems in present system of environmental forensic. Thus, this paper is aimed to make proposition on improving Chinese environmental forensic system, which involves: (i) promoting capability of environmental forensic system (EFS) to handle professional questions; (ii) develop price mechanism; (iii) multi-departments cooperate to establish unifying and complete EFS system;(iv) enhance the probative value of results of EFS. Such protocol for amending present regulation on environmental forensic is of significant importance because a quality report of environmental forensic will contributes to providing strong probative evidence of culprits’ activity of releasing contaminant into environment, degree of damages for victims and above all, causality between the behavior of public nuisance and damages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=China" title="China">China</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20cases" title=" environmental cases"> environmental cases</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20forensic%20system" title=" environmental forensic system"> environmental forensic system</a>, <a href="https://publications.waset.org/abstracts/search?q=proposition" title=" proposition"> proposition</a> </p> <a href="https://publications.waset.org/abstracts/67446/proposition-on-improving-environmental-forensic-system-in-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67446.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">378</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">297</span> The Forensic Analysis of Engravers&#039; Handwriting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olivia%20Rybak-Karkosz">Olivia Rybak-Karkosz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to present the result of scientific research using forensic handwriting analysis. It was conducted to verify the stability and lability of handwriting of engravers and check if gravers transfer their traits from handwriting to plates and other surfaces they rework. This research methodology consisted of completing representative samples of signatures of gravers written on a piece of paper using a ballpen and signatures engraved on other surfaces. The forensic handwriting analysis was conducted using the graphic-comparative method (graphic method), and all traits were analysed. The paper contains a concluding statement of the similarities and differences between the samples. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artist%E2%80%99s%20signatures" title="artist’s signatures">artist’s signatures</a>, <a href="https://publications.waset.org/abstracts/search?q=engraving" title=" engraving"> engraving</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20handwriting%20analysis" title=" forensic handwriting analysis"> forensic handwriting analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=graphic-comparative%20method" title=" graphic-comparative method"> graphic-comparative method</a> </p> <a href="https://publications.waset.org/abstracts/152839/the-forensic-analysis-of-engravers-handwriting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152839.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">296</span> The Forensic Handwriting Analysis of a Painter’s Signature: Claude Monet’s Case</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olivia%20Rybak-Karkosz">Olivia Rybak-Karkosz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper's purpose was to present a case study on a questioned Claude Monet's signature forensic handwriting analysis. It is an example taken from the author’s experience as a court handwriting expert. A comparative study was conducted to determine whether the signature resembles similarities (and if so, to what measure) with the features representing the writing patterns and their natural variability typical for Claude Monet. It was conducted to check whether all writing features are within the writer's normal range of variation. The paper emphasizes the difficulties and challenges encountered by the forensic handwriting expert while analysing the questioned signature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artist%E2%80%99s%20signatures" title="artist’s signatures">artist’s signatures</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticity%20of%20an%20artwork" title=" authenticity of an artwork"> authenticity of an artwork</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20handwriting%20analysis" title=" forensic handwriting analysis"> forensic handwriting analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=graphic-comparative%20method" title=" graphic-comparative method"> graphic-comparative method</a> </p> <a href="https://publications.waset.org/abstracts/152843/the-forensic-handwriting-analysis-of-a-painters-signature-claude-monets-case" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152843.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">295</span> Harnessing Artificial Intelligence and Machine Learning for Advanced Fraud Detection and Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Avinash%20Malladhi">Avinash Malladhi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Forensic accounting is a specialized field that involves the application of accounting principles, investigative skills, and legal knowledge to detect and prevent fraud. With the rise of big data and technological advancements, artificial intelligence (AI) and machine learning (ML) algorithms have emerged as powerful tools for forensic accountants to enhance their fraud detection capabilities. In this paper, we review and analyze various AI/ML algorithms that are commonly used in forensic accounting, including supervised and unsupervised learning, deep learning, natural language processing Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Support Vector Machines (SVMs), Decision Trees, and Random Forests. We discuss their underlying principles, strengths, and limitations and provide empirical evidence from existing research studies demonstrating their effectiveness in detecting financial fraud. We also highlight potential ethical considerations and challenges associated with using AI/ML in forensic accounting. Furthermore, we highlight the benefits of these technologies in improving fraud detection and prevention in forensic accounting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AI" title="AI">AI</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting%20%26%20fraud%20detection" title=" forensic accounting &amp; fraud detection"> forensic accounting &amp; fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=anti%20money%20laundering" title=" anti money laundering"> anti money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=Benford%27s%20law" title=" Benford&#039;s law"> Benford&#039;s law</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20triangle%20theory" title=" fraud triangle theory"> fraud triangle theory</a> </p> <a href="https://publications.waset.org/abstracts/165809/harnessing-artificial-intelligence-and-machine-learning-for-advanced-fraud-detection-and-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165809.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">294</span> Experimental Research and Analyses of Yoruba Native Speakers’ Chinese Phonetic Errors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Obasa%20Joshua%20Ifeoluwa">Obasa Joshua Ifeoluwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Phonetics is the foundation and most important part of language learning. This article, through an acoustic experiment as well as using Praat software, uses Yoruba students’ Chinese consonants, vowels, and tones pronunciation to carry out a visual comparison with that of native Chinese speakers. This article is aimed at Yoruba native speakers learning Chinese phonetics; therefore, Yoruba students are selected. The students surveyed are required to be at an elementary level and have learned Chinese for less than six months. The students selected are all undergraduates majoring in Chinese Studies at the University of Lagos. These students have already learned Chinese Pinyin and are all familiar with the pinyin used in the provided questionnaire. The Chinese students selected are those that have passed the level two Mandarin proficiency examination, which serves as an assurance that their pronunciation is standard. It is discovered in this work that in terms of Mandarin’s consonants pronunciation, Yoruba students cannot distinguish between the voiced and voiceless as well as the aspirated and non-aspirated phonetics features. For instance, while pronouncing [ph] it is clearly shown in the spectrogram that the Voice Onset Time (VOT) of a Chinese speaker is higher than that of a Yoruba native speaker, which means that the Yoruba speaker is pronouncing the unaspirated counterpart [p]. Another difficulty is to pronounce some affricates like [tʂ]、[tʂʰ]、[ʂ]、[ʐ]、 [tɕ]、[tɕʰ]、[ɕ]. This is because these sounds are not in the phonetic system of the Yoruba language. In terms of vowels, some students find it difficult to pronounce some allophonic high vowels such as [ɿ] and [ʅ], therefore pronouncing them as their phoneme [i]; another pronunciation error is pronouncing [y] as [u], also as shown in the spectrogram, a student pronounced [y] as [iu]. In terms of tone, it is most difficult for students to differentiate between the second (rising) and third (falling and rising) tones because these tones’ emphasis is on the rising pitch. This work concludes that the major error made by Yoruba students while pronouncing Chinese sounds is caused by the interference of their first language (LI) and sometimes by their lingua franca. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chinese" title="Chinese">Chinese</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoruba" title=" Yoruba"> Yoruba</a>, <a href="https://publications.waset.org/abstracts/search?q=error%20analysis" title=" error analysis"> error analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=experimental%20phonetics" title=" experimental phonetics"> experimental phonetics</a>, <a href="https://publications.waset.org/abstracts/search?q=consonant" title=" consonant"> consonant</a>, <a href="https://publications.waset.org/abstracts/search?q=vowel" title=" vowel"> vowel</a>, <a href="https://publications.waset.org/abstracts/search?q=tone" title=" tone"> tone</a> </p> <a href="https://publications.waset.org/abstracts/148984/experimental-research-and-analyses-of-yoruba-native-speakers-chinese-phonetic-errors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148984.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">293</span> Credible Autopsy Report for Investigators and Judiciary</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sudhir%20K.%20Gupta">Sudhir K. Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: When a forensic doctor determines that a suspicious death is a suicide, homicide, or accident, the decision virtually becomes incontestable by the investigating police officer, and it becomes an issue whether the medical opinion was created with necessary checks and balances on the other probabilities of the case. It is suggested that the opinion of Forensic Medical experts is conventional, mutable, and shifting from one expert to another. The determination of suicide, accident, or homicide is mandatorily required, which is the Gold Standard for conducting death investigations. Forensic investigations serve many audiences, but the court is by far the most critical. The likely questions on direct and cross-examination determine how forensic doctors gather and handle evidence and what conclusions they reach. Methodology: The author interacted with the investigative authority, and a crime scene visit was also done along with the perusal of the Postmortem report, subsequent opinion, and crime scene photographs and statements of the witness and accused. Further analysis of all relevant scientific documents and opinions of other forensic doctors, forensic scientists, and ballistic experts involved in these cases was done to arrive at an opinion with scientific justification. Findings: The opinions arrived at by the author and how they helped the judiciary in delivering justice in these cases have been discussed in this article. This can help the readers to understand the process involved in formulating a credible forensic medical expert opinion for investigators and the judiciary. Conclusion: A criminal case might be won or lost over doubt cast on the chain of custody. Medically trained forensic doctors, therefore, learn to practice their profession in legally appropriate ways, and opinions must be based on medical justifications with credible references. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensic%20doctor" title="forensic doctor">forensic doctor</a>, <a href="https://publications.waset.org/abstracts/search?q=professional%20credibility" title=" professional credibility"> professional credibility</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=expert%20opinion" title=" expert opinion"> expert opinion</a> </p> <a href="https://publications.waset.org/abstracts/156415/credible-autopsy-report-for-investigators-and-judiciary" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">292</span> DNA as an Instrument in Constructing Narratives and Justice in Criminal Investigations: A Socio-Epistemological Exploration</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aadita%20Chaudhury">Aadita Chaudhury</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since at least the early 2000s, DNA profiling has achieved a preeminent status in forensic investigations into criminal acts. While the criminal justice system has a long history of using forensic evidence and testing them through establish technoscientific means, the primacy of DNA in establishing 'truth' or reconstructing a series of events is unparalleled in the history of forensic science. This paper seeks to elucidate the ways in which DNA profiling has become the most authoritative instrument of 'truth' in criminal investigations, and how it is used in the legal process to ascertain culpability, create the notion of infallible evidence, and advance the search for justice. It is argued that DNA profiling has created a paradigm shift in how the legal system and the general public understands crime and culpability, but not without limitations. There are indications that even trace amounts of DNA evidence can point to causal links in a criminal investigation, however, there still remains many rooms to create confusion and doubt from empirical evidence within the narrative of crimes. Many of the shortcomings of DNA-based forensic investigations are explored and evaluated with regards to claims of the authority of biological evidence and implications for the public understanding of the elusive concepts of truth and justice in the present era. Public misinformation about the forensic analysis processes could produce doubt or faith in the judgements rooted in them, depending on other variables presented at the trial. A positivist understanding of forensic science that is shared by the majority of the population does not take into consideration that DNA evidence is far from definitive, and can be used to support any theories of culpability, to create doubt and to deflect blame. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DNA%20profiling" title="DNA profiling">DNA profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=epistemology%20of%20forensic%20science" title=" epistemology of forensic science"> epistemology of forensic science</a>, <a href="https://publications.waset.org/abstracts/search?q=philosophy%20of%20forensic%20science" title=" philosophy of forensic science"> philosophy of forensic science</a>, <a href="https://publications.waset.org/abstracts/search?q=sociology%20of%20scientific%20knowledge" title=" sociology of scientific knowledge"> sociology of scientific knowledge</a> </p> <a href="https://publications.waset.org/abstracts/70471/dna-as-an-instrument-in-constructing-narratives-and-justice-in-criminal-investigations-a-socio-epistemological-exploration" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70471.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">291</span> Punishment In Athenian Forensic Oratory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eleni%20Volonaki">Eleni Volonaki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Athenian forensic speeches, the argumentation on punishment of the wrongdoers constitutes a fundamental ideal of exacting justice in court. The present paper explores the variation of approaches to punishment as a means of reformation, revenge, correction, education, example, chance to restoration of justice. As it will be shown, all these approaches reflect the social and political ideology of Athenian justice in the classical period and enhances the role of the courts and the importance of rhetoric in the process of decision-making. Punishment entails a wide range of penalties but also of ideological principles related to the Athenian constitution of democracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=punishment" title="punishment">punishment</a>, <a href="https://publications.waset.org/abstracts/search?q=athenian%20forensic%20speeches" title=" athenian forensic speeches"> athenian forensic speeches</a>, <a href="https://publications.waset.org/abstracts/search?q=justice" title=" justice"> justice</a>, <a href="https://publications.waset.org/abstracts/search?q=athenian%20democracy" title=" athenian democracy"> athenian democracy</a> </p> <a href="https://publications.waset.org/abstracts/139225/punishment-in-athenian-forensic-oratory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139225.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">290</span> Gender Identification Using Digital Forensics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vinod%20C.%20Nayak">Vinod C. Nayak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In day-to-day forensic practice, identification is always a difficult task. Availability of anti-mortem and postmortem records plays a major rule in facilitating this tough task. However, the advent of digital forensic is a boon for forensic experts. This study has made use of digital forensics to establish identity by radiological dimensions of maxillary sinus using workstation software. The findings suggest a significant association between maxillary sinus dimensions and human gender. The author will be discussing the methods and results of the study in this e-poster. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title="digital forensics">digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=identification" title=" identification"> identification</a>, <a href="https://publications.waset.org/abstracts/search?q=maxillary%20sinus" title=" maxillary sinus"> maxillary sinus</a>, <a href="https://publications.waset.org/abstracts/search?q=radiology" title=" radiology"> radiology</a> </p> <a href="https://publications.waset.org/abstracts/41653/gender-identification-using-digital-forensics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41653.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">289</span> Directing the Forensic Investigation of a Catastrophic Structure Collapse: The Jacksonville Parking Garage Collapse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=William%20C.%20Bracken">William C. Bracken</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper discusses the forensic investigation of a fatality-involved catastrophic structure collapse and the special challenges faced when tasked with directing such an effort. While this paper discusses the investigation’s findings and the outcome of the event; this paper’s primary focus is on the challenges faced directing a forensic investigation that requires coordinating with governmental oversight while also having to accommodate multiple parties’ investigative teams. In particular the challenges discussed within this paper included maintaining on-site safety and operations while accommodating outside investigator’s interests. In addition this paper discusses unique challenges that one may face such as what to do about unethical conduct of interested party’s investigative teams, “off the record” sharing of information, and clandestinely transmitted evidence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=catastrophic%20structure%20collapse" title="catastrophic structure collapse">catastrophic structure collapse</a>, <a href="https://publications.waset.org/abstracts/search?q=collapse%20investigation" title=" collapse investigation"> collapse investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=Jacksonville%20parking%20garage%20collapse" title=" Jacksonville parking garage collapse"> Jacksonville parking garage collapse</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20investigation" title=" forensic investigation"> forensic investigation</a> </p> <a href="https://publications.waset.org/abstracts/24535/directing-the-forensic-investigation-of-a-catastrophic-structure-collapse-the-jacksonville-parking-garage-collapse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24535.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">288</span> Applying Massively Parallel Sequencing to Forensic Soil Bacterial Profiling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hui%20Li">Hui Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Xueying%20Zhao"> Xueying Zhao</a>, <a href="https://publications.waset.org/abstracts/search?q=Ke%20Ma"> Ke Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu%20Cao"> Yu Cao</a>, <a href="https://publications.waset.org/abstracts/search?q=Fan%20Yang"> Fan Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qingwen%20Xu"> Qingwen Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Wenbin%20Liu"> Wenbin Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Soil can often link a person or item to a crime scene, which makes it a valuable evidence in forensic casework. Several techniques have been utilized in forensic soil discrimination in previous studies. Because soil contains a vast number of microbiomes, the analyse of soil microbiomes is expected to be a potential way to characterise soil evidence. In this study, we applied massively parallel sequencing (MPS) to soil bacterial profiling on the Ion Torrent Personal Genome Machine (PGM). Soils from different regions were collected repeatedly. V-region 3 and 4 of Bacterial 16S rRNA gene were detected by MPS. Operational taxonomic units (OTU, 97%) were used to analyse soil bacteria. Several bioinformatics methods (PCoA, NMDS, Metastats, LEfse, and Heatmap) were applied in bacterial profiles. Our results demonstrate that MPS can provide a more detailed picture of the soil microbiomes and the composition of soil bacterial components from different region was individualistic. In conclusion, the utility of soil bacterial profiling via MPS of the 16S rRNA gene has potential value in characterising soil evidences and associating them with their place of origin, which can play an important role in forensic science in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bacterial%20profiling" title="bacterial profiling">bacterial profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic" title=" forensic"> forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=massively%20parallel%20sequencing" title=" massively parallel sequencing"> massively parallel sequencing</a>, <a href="https://publications.waset.org/abstracts/search?q=soil%20evidence" title=" soil evidence"> soil evidence</a> </p> <a href="https://publications.waset.org/abstracts/80561/applying-massively-parallel-sequencing-to-forensic-soil-bacterial-profiling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80561.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">563</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">287</span> Determination of the Knowledge Level of Healthcare Professional&#039;s Working at the Emergency Services in Turkey about Their Approaches to Common Forensic Cases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20Tu%C4%9Fba%20Top%C3%A7u">E. Tuğba Topçu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ebru%20E.%20Kazan"> Ebru E. Kazan</a>, <a href="https://publications.waset.org/abstracts/search?q=Erhan%20B%C3%BCken"> Erhan Büken</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Emergency nurses are the first health care professional to generally observe the patients, communicate patients’ family or relatives, touch the properties of patients and contact to laboratory sample of patients. Also, they are the encounter incidents related crime, people who engage in violence or suspicious injuries frequently. So, documentation of patients’ condition came to the hospital and conservation of evidence are important in the inquiry of forensic medicine. The aim of the study was to determine the knowledge level of healthcare professional working at the emergency services regarding their approaches to common forensic cases. The study was comprised of 404 healthcare professional working (nurse, emergency medicine technician, health officer) at the emergency services of 6 state hospitals, 6 training and 6 research hospitals and 3 university hospitals in Ankara. Data was collected using questionnaire form which was developed by researches in the direction of literature. Questionnaire form is comprised of two sections. The first section includes 17 questions related demographic information about health care professional and 4 questions related Turkish laws. The second section includes 43 questions to the determination of knowledge level of health care professional’s working in the emergency department, about approaches to frequently encountered forensic cases. For the data evaluation of the study; Mann Whitney U test, Bonferroni correction Kruskal Wallis H test and Chi Square tests have been used. According to study, it’s said that there is no forensic medicine expert in the foundation by 73.4% of health care professionals. Two third (66%) of participants’ in emergency department reported daily average 7 or above forensic cases applied to the emergency department and 52.1% of participants did not evaluate incidents came to the emergency department as a forensic case. Most of the participants informed 'duty of preservation of evidence' is health care professionals duty related forensic cases. In result, we determinated that knowledge level of health care professional working in the emergency department, about approaches to frequently encountered forensic cases, is not the expected level. Because we found that most of them haven't received education about forensic nursing.Postgraduates participants, educated health professional about forensic nursing, staff who applied to sources about forensic nursing and staff who evaluated emergency department cases as forensic cases have significantly higher level of knowledge. Moreover, it’s found that forensic cases diagnosis score is the highest in health officer and university graduated. Health care professional’s deficiency in knowledge about forensic cases can cause defects in operation of the forensic process because of mistakes in collecting and conserving of evidence. It is obvious that training about the approach to forensic nursing should be arranged. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20nurses" title="emergency nurses">emergency nurses</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20case" title=" forensic case"> forensic case</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20nursing" title=" forensic nursing"> forensic nursing</a>, <a href="https://publications.waset.org/abstracts/search?q=level%20of%20knowledge" title=" level of knowledge"> level of knowledge</a> </p> <a href="https://publications.waset.org/abstracts/68703/determination-of-the-knowledge-level-of-healthcare-professionals-working-at-the-emergency-services-in-turkey-about-their-approaches-to-common-forensic-cases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68703.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">294</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">286</span> Forensic Nursing in the Emergency Department: The Overlooked Roles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20Tugba%20Topcu">E. Tugba Topcu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergency services are usually the first places to encounter forensic cases. Hence, it is important to consider forensics from the perspective of the emergency services staff and the physiological and psychological consequences that may arise as a result of behaviour by itself or another person. Accurate and detailed documentation of the situation in which the patient first arrives at the emergency service and preservation of the forensic findings is pivotal for the subsequent forensic investigation. The first step in determining whether or not a forensic case exists is to perform a medical examination of the patient. For each individual suspected to be part of a forensic case, police officers should be informed at the same time as the medical examination is being conducted. Violent events are increasing every year and with an increase in the number of forensic cases, emergency service workers have increasing responsibility and consequently play a key role in protecting, collecting and arranging the forensic evidence. In addition, because the emergency service workers involved in forensic events typically have information about the accused and/or victim, as well as evidence related to the events and the cause of injuries, police officers often require their testimony. However, both nurses and other health care personnel do not typically have adequate expertise in forensic medicine. Emergency nurses should take an active role for determining that whether any patient admitted to the emergency services is a clinical forensic patient the emergency service with injury and requiring possible punishment and knowing of their roles and responsibilities in this area provides legal protection as well as the protection of the judicial affair. Particularly, in emergency services, where rapid patient turnover and high workload exists, patient registration and case reporting may not exist. In such instances, the witnesses, typically the nurses, are often consulted for information. Knowledge of forensic medical matters plays a vital role in achieving justice. According to the Criminal Procedure Law, Article 75, Paragraph 3, ‘an internal body examination or the taking of blood or other biological samples from the body can be performed only by a doctor or other health professional member’. In favour of this item, the clinic nurse and doctor are mainly responsible for evaluating forensic cases in emergency departments, performing the examination, collecting evidence, and storing and reporting data. The courts place considerable importance on determining whether a suspect is the victim or accused and, thus, in terms of illuminating events, it is crucial that any evidence is gathered carefully and appropriately. All the evidence related to the forensic case including the forensic report should be handed over to the police officers. In instances where forensic evidence cannot be collected and the only way to obtain the evidence is the hospital environment, health care personnel in emergency services need to have knowledge about the diagnosis of forensic evidence, the collection of evidence, hiding evidence and provision of the evidence delivery chain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20department" title="emergency department">emergency department</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20nursing" title=" emergency nursing"> emergency nursing</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20cases" title=" forensic cases"> forensic cases</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20nursing" title=" forensic nursing"> forensic nursing</a> </p> <a href="https://publications.waset.org/abstracts/68830/forensic-nursing-in-the-emergency-department-the-overlooked-roles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">285</span> Digital Forensics Showdown: Encase and FTK Head-to-Head</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rida%20Nasir">Rida Nasir</a>, <a href="https://publications.waset.org/abstracts/search?q=Waseem%20Iqbal"> Waseem Iqbal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the constant revolution in technology and the increase in anti-forensic techniques used by attackers to remove their traces, professionals often struggle to choose the best tool to be used in digital forensic investigations. This paper compares two of the most well-known and widely used licensed commercial tools, i.e., Encase & FTK. The comparison was drawn on various parameters and features to provide an authentic evaluation of licensed versions of these well-known commercial tools against various real-world scenarios. In order to discover the popularity of these tools within the digital forensic community, a survey was conducted publicly to determine the preferred choice. The dataset used is the Computer Forensics Reference Dataset (CFReDS). A total of 70 features were selected from various categories. Upon comparison, both FTK and EnCase produce remarkable results. However, each tool has some limitations, and none of the tools is declared best. The comparison drawn is completely unbiased, based on factual data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title="digital forensics">digital forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=commercial%20tools" title=" commercial tools"> commercial tools</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20evaluation" title=" forensic evaluation"> forensic evaluation</a> </p> <a href="https://publications.waset.org/abstracts/190321/digital-forensics-showdown-encase-and-ftk-head-to-head" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190321.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">19</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">284</span> Body Farming in India and Asia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yogesh%20Kumar">Yogesh Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Adarsh%20Kumar"> Adarsh Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A body farm is a research facility where research is done on forensic investigation and medico-legal disciplines like forensic entomology, forensic pathology, forensic anthropology, forensic archaeology, and related areas of forensic veterinary. All the research is done to collect data on the rate of decomposition (animal and human) and forensically important insects to assist in crime detection. The data collected is used by forensic pathologists, forensic experts, and other experts for the investigation of crime cases and further research. The research work includes different conditions of a dead body like fresh, bloating, decay, dry, and skeleton, and data on local insects which depends on the climatic conditions of the local areas of that country. Therefore, it is the need of time to collect appropriate data in managed conditions with a proper set-up in every country. Hence, it is the duty of the scientific community of every country to establish/propose such facilities for justice and social management. The body farms are also used for training of police, military, investigative dogs, and other agencies. At present, only four countries viz. U.S., Australia, Canada, and Netherlands have body farms and related facilities in organised manner. There is no body farm in Asia also. In India, we have been trying to establish a body farm in A&N Islands that is near Singapore, Malaysia, and some other Asian countries. In view of the above, it becomes imperative to discuss the matter with Asian countries to collect the data on decomposition in a proper manner by establishing a body farm. We can also share the data, knowledge, and expertise to collaborate with one another to make such facilities better and have good scientific relations to promote science and explore ways of investigation at the world level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=body%20farm" title="body farm">body farm</a>, <a href="https://publications.waset.org/abstracts/search?q=rate%20of%20decomposition" title=" rate of decomposition"> rate of decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=forensically%20important%20flies" title=" forensically important flies"> forensically important flies</a>, <a href="https://publications.waset.org/abstracts/search?q=time%20since%20death" title=" time since death"> time since death</a> </p> <a href="https://publications.waset.org/abstracts/170969/body-farming-in-india-and-asia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170969.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">283</span> Digital Forensic Exploration Framework for Email and Instant Messaging Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Manesh">T. Manesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdalla%20A.%20Alameen"> Abdalla A. Alameen</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Mohemmed%20Sha"> M. Mohemmed Sha</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Mohamed%20Mustaq%20Ahmed"> A. Mohamed Mustaq Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensics" title="forensics">forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20sessions" title=" network sessions"> network sessions</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20reconstruction" title=" packet reconstruction"> packet reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20reordering" title=" packet reordering"> packet reordering</a> </p> <a href="https://publications.waset.org/abstracts/57591/digital-forensic-exploration-framework-for-email-and-instant-messaging-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">282</span> Identification of Individuals in Forensic Situations after Allo-Hematopoietic Stem Cell Transplantation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anupuma%20Raina">Anupuma Raina</a>, <a href="https://publications.waset.org/abstracts/search?q=Ajay%20Parkash"> Ajay Parkash</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In forensic investigation, DNA analysis helps in the identification of a particular individual under investigation. A set of Short Tandem Repeats loci are widely used for individualization at a molecular level in forensic testing. STRs with tetrameric repeats of DNA are highly polymorphic and widely used for forensic DNA analysis. Identification of an individual became challenging for forensic examiners after Hematopoietic Stem Cell Transplantation. HSCT is a well-accepted and life-saving treatment to treat malignant and nonmalignant diseases. It involves the administration of healthy donor stem cells to replace the patient’s own unhealthy stem cells. A successful HSCT results in complete donor-derived cells in a patient’s hematopoiesis and hence have the capability to change the genetic makeup of the patient. Although an individual who has undergone HSCT and then committed a crime is a very rare situation, but not impossible. Keeping such a situation in mind, various biological samples like blood, buccal swab, and hair follicle were collected and studied after a certain interval of time after HSCT. Blood was collected from both the patient and the donor before the transplant. The DNA profile of both was analyzed using a short tandem repeat kit for autosomal chromosomes. Among all exhibits studied, only hair follicles were found to be the most suitable biological exhibit, as no donor DNA profile was observed for up to 90 days of study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chimerism" title="chimerism">chimerism</a>, <a href="https://publications.waset.org/abstracts/search?q=HSCT" title=" HSCT"> HSCT</a>, <a href="https://publications.waset.org/abstracts/search?q=STRs%20analysis" title=" STRs analysis"> STRs analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20identification" title=" forensic identification"> forensic identification</a> </p> <a href="https://publications.waset.org/abstracts/166184/identification-of-individuals-in-forensic-situations-after-allo-hematopoietic-stem-cell-transplantation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166184.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">281</span> Assessment of DNA Degradation Using Comet Assay: A Versatile Technique for Forensic Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ritesh%20K.%20Shukla">Ritesh K. Shukla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Degradation of biological samples in terms of macromolecules (DNA, RNA, and protein) are the major challenges in the forensic investigation which misleads the result interpretation. Currently, there are no precise methods available to circumvent this problem. Therefore, at the preliminary level, some methods are urgently needed to solve this issue. In this order, Comet assay is one of the most versatile, rapid and sensitive molecular biology technique to assess the DNA degradation. This technique helps to assess DNA degradation even at very low amount of sample. Moreover, the expedient part of this method does not require any additional process of DNA extraction and isolation during DNA degradation assessment. Samples directly embedded on agarose pre-coated microscopic slide and electrophoresis perform on the same slide after lysis step. After electrophoresis microscopic slide stained by DNA binding dye and observed under fluorescent microscope equipped with Komet software. With the help of this technique extent of DNA degradation can be assessed which can help to screen the sample before DNA fingerprinting, whether it is appropriate for DNA analysis or not. This technique not only helps to assess degradation of DNA but many other challenges in forensic investigation such as time since deposition estimation of biological fluids, repair of genetic material from degraded biological sample and early time since death estimation could also be resolved. With the help of this study, an attempt was made to explore the application of well-known molecular biology technique that is Comet assay in the field of forensic science. This assay will open avenue in the field of forensic research and development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comet%20assay" title="comet assay">comet assay</a>, <a href="https://publications.waset.org/abstracts/search?q=DNA%20degradation" title=" DNA degradation"> DNA degradation</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic" title=" forensic"> forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=molecular%20biology" title=" molecular biology"> molecular biology</a> </p> <a href="https://publications.waset.org/abstracts/88073/assessment-of-dna-degradation-using-comet-assay-a-versatile-technique-for-forensic-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88073.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">280</span> Forensic Analysis of Thumbnail Images in Windows 10</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=George%20Kurian">George Kurian</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongmei%20Chi"> Hongmei Chi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital evidence plays a critical role in most legal investigations. In many cases, thumbnail databases show important information in that investigation. The probability of having digital evidence retrieved from a computer or smart device has increased, even though the previous user removed data and deleted apps on those devices. Due to the increase in digital forensics, the ability to store residual information from various thumbnail applications has improved. This paper will focus on investigating thumbnail information from Windows 10. Thumbnail images of interest in forensic investigations may be intact even when the original pictures have been deleted. It is our research goal to recover useful information from thumbnails. In this research project, we use various forensics tools to collect left thumbnail information from deleted videos or pictures. We examine and describe the various thumbnail sources in Windows and propose a methodology for thumbnail collection and analysis from laptops or desktops. A machine learning algorithm is adopted to help speed up content from thumbnail pictures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20forensic" title="digital forensic">digital forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20tools" title=" forensic tools"> forensic tools</a>, <a href="https://publications.waset.org/abstracts/search?q=soundness" title=" soundness"> soundness</a>, <a href="https://publications.waset.org/abstracts/search?q=thumbnail" title=" thumbnail"> thumbnail</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=OCR" title=" OCR"> OCR</a> </p> <a href="https://publications.waset.org/abstracts/152619/forensic-analysis-of-thumbnail-images-in-windows-10" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152619.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">279</span> The Importance of the Historical Approach in the Linguistic Research</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zoran%20Spasovski">Zoran Spasovski</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper shortly discusses the significance and the benefits of the historical approach in the research of languages by presenting examples of it in the fields of phonetics and phonology, lexicology, morphology, syntax, and even in the onomastics (toponomy and anthroponomy). The examples from the field of phonetics/phonology include insights into animal speech and its evolution into human speech, the evolution of the sounds of human speech from vocals to glides and consonants and from velar consonants to palatal, etc., on well-known examples of former researchers. Those from the field of lexicology show shortly the formation of the lexemes and their evolution; the morphology and syntax are explained by examples of the development of grammar and syntax forms, and the importance of the historical approach in the research of place-names and personal names is briefly outlined through examples of place-names and personal names and surnames, and the conclusions that come from it, in different languages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=animal%20speech" title="animal speech">animal speech</a>, <a href="https://publications.waset.org/abstracts/search?q=glotogenesis" title=" glotogenesis"> glotogenesis</a>, <a href="https://publications.waset.org/abstracts/search?q=grammar%20forms" title=" grammar forms"> grammar forms</a>, <a href="https://publications.waset.org/abstracts/search?q=lexicology" title=" lexicology"> lexicology</a>, <a href="https://publications.waset.org/abstracts/search?q=place-names" title=" place-names"> place-names</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20names" title=" personal names"> personal names</a>, <a href="https://publications.waset.org/abstracts/search?q=surnames" title=" surnames"> surnames</a>, <a href="https://publications.waset.org/abstracts/search?q=syntax%20categories" title=" syntax categories"> syntax categories</a> </p> <a href="https://publications.waset.org/abstracts/177999/the-importance-of-the-historical-approach-in-the-linguistic-research" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177999.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=10">10</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=forensic%20phonetics&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10