200 resultados para microphione forensics
Resumo:
Issues surrounding the misuse of prohibited and licensed substances in animals destined for food production and performance sport competition continue to be an enormous challenge to regulatory authorities charged with enforcing their control. Efficient analytical strategies are implemented to screen and confirm the presence of a wide range of exogenous substances in various biological matrices. However, such methods rely on the direct measurement of drugs and/or their metabolites in a targeted mode, allowing the detection of restricted number of compounds. As a consequence, emerging practices, in particular the use of natural hormones, designer drugs and low-dose cocktails, remain difficult to handle from a control point of view. A new SME-led FP7 funded project, DeTECH21, aims to overcome current limitations by applying an untargeted metabolomics approach based on liquid chromatography coupled to high resolution mass spectrometry and bioinformatic data analysis to identify bovine and equine animals which have been exposed to exogenous substances and assist in the identification of administered compounds. Markerbased strategies, dealing with the comprehensive analysis of metabolites present in a biological sample (urine/plasma/tissue), offer a reliable solution in the areas of food safety and animal sport doping control by effective, high-throughput and sensitive detection of exogenously administered agents. Therefore, the development of the first commercially available forensic test service based on metabolomics profiling will meet 21st century demands in animal forensics.
Resumo:
In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.
Resumo:
With the rapid development of internet-of-things (IoT), face scrambling has been proposed for privacy protection during IoT-targeted image/video distribution. Consequently in these IoT applications, biometric verification needs to be carried out in the scrambled domain, presenting significant challenges in face recognition. Since face models become chaotic signals after scrambling/encryption, a typical solution is to utilize traditional data-driven face recognition algorithms. While chaotic pattern recognition is still a challenging task, in this paper we propose a new ensemble approach – Many-Kernel Random Discriminant Analysis (MK-RDA) to discover discriminative patterns from chaotic signals. We also incorporate a salience-aware strategy into the proposed ensemble method to handle chaotic facial patterns in the scrambled domain, where random selections of features are made on semantic components via salience modelling. In our experiments, the proposed MK-RDA was tested rigorously on three human face datasets: the ORL face dataset, the PIE face dataset and the PUBFIG wild face dataset. The experimental results successfully demonstrate that the proposed scheme can effectively handle chaotic signals and significantly improve the recognition accuracy, making our method a promising candidate for secure biometric verification in emerging IoT applications.
Resumo:
Side channel attacks permit the recovery of the secret key held within a cryptographic device. This paper presents a new EM attack in the frequency domain, using a power spectral density analysis that permits the use of variable spectral window widths for each trace of the data set and demonstrates how this attack can therefore overcome both inter-and intra-round random insertion type countermeasures. We also propose a novel re-alignment method exploiting the minimal power markers exhibited by electromagnetic emanations. The technique can be used for the extraction and re-alignment of round data in the time domain.
Resumo:
Between the Bullet and the Hole is a film centred on the elusive and complex effects of war on women's role in ballistic research and early computing. The film features new and archival high-speed bullet photography, schlieren and electric spark imagery, bullet sound wave imagery, forensic ballistic photography, slide rulers, punch cards, computer diagrams, and a soundtrack by Scanner. Like a frantic animation storyboard, it explores the flickering space between the frames, testing the perceptual mechanics of visual interpolation, the possibility of reading or deciphering the gap between before and after. Interpolation - the main task of the women studying ballistics in WW2 - is the construction or guessing of missing data using only two known data points. The film tries to unpack this gap, open it up to interrogation. It questions how we read, interpolate or construct the gaps between bullet and hole, perpetrator and victim, presence and absence. The project involves exchanges with specialists in this area such as the Cranfield University Forensics department, London-based Forensic Firearms consultancy, the Imperial War Museum, the ENIAC programmers project, the Smithsonian Institute, and Forensic Scientists at Palm Beach County Sheriff's Office (USA). Exhibitions: Solo exhibition at Dallas Contemporary (Texas, Jan-Mar 2016), including newly commissioned lenticular prints and a dual slide projector installation; Group exhibition the Sydney Biennale (Sydney, Mar-June 2016); UK premiere and solo retrospective screening at Whitechapel Gallery (London); forthcoming solo exhibition at Iliya Fridman Gallery (NY, Oct-Dec 2016); Film festivals and screenings: International Film Festival Rotterdam (Jan 2016); Whitechapel Gallery (London Feb 2016); Cornerhouse/Home (Manchester Nov 2016); Public lectures: Whitechapel Gallery with prof. David Alan Grier and Morgan Quaintance; Carriageworks (Sydney) Prof. Douglas Khan; Monash University (Melbourne); Gertrude Space (Melbourne). Reviews and interviews: Artforum, Studio International, Mousse Magazine.
Resumo:
Cette thèse de doctorat analyse les processus et les actions des consommateurs de pornographie juvénile. Nous soutenons que l’univers des collectionneurs de pornographie juvénile se distingue par trois particularités : la préférence sexuelle, l’offre pornographique dans un monde immatériel et la sociabilité virtuelle. Afin de mettre cette thèse à l’épreuve, nous avons eu accès aux disques durs de 40 personnes condamnées pour des infractions de pornographie juvénile. La méthode de l’analyse informatique judiciaire (computer forensics) utilisée dans ce contexte a permis de recréer les événements entourant la collection d’images par ces personnes. De plus, un échantillon des images possédées par ces individus a été catégorisé selon l’âge et les actes posés sur les images (n = 61 244). En plus des nombreux points qu’il a en commun avec les collectionneurs d’objets populaires, les résultats montrent l’importance de la préférence sexuelle dans la perception et les stratégies du collectionneur, l’omniprésence des images de pornographie adulte dans les collections et la sociabilité virtuelle comme mesure d’efficacité dans la découverte des contenus. En outre, en créant quatre groupes différents en fonction de l’évolution de la gravité des images dans le temps, nous avons découvert que le groupe où il y a aggravation à la fois dans l’âge et dans la gravité des actes posés est le groupe le plus nombreux, avec 37,5 % des sujets. Les résultats de l’étude mettent également en évidence la pertinence de l’utilisation de l’informatique judiciaire dans les études en criminologie.
Resumo:
Mites can be found in all imaginable terrestrial habitats, in freshwater, and in salt water. Mites can be found in our houses and furnishings, on our clothes, and even in the pores of our skin-almost every single person carries mites. Most of the time, we are unaware of them because they are small and easily overlooked, and-most of the time-they do not cause trouble. In fact, they may even proof useful, for instance in forensics. The first arthropod scavengers colonising a dead body will be flies with phoretic mites. The flies will complete their life cycle in and around the corpse, while the mites may feed on the immature stages of the flies. The mites will reproduce much faster than their carriers, offering themselves as valuable timeline markers. There are environments where insects are absent or rare or the environmental conditions impede their access to the corpse. Here, mites that are already present and mites that arrive walking, through air currents or material transfer become important. At the end of the ninetieth century, the work of Jean Pierre M,gnin became the starting point of forensic acarology. M,gnin documented his observations in 'La Faune des Cadavres' [The Fauna of Carcasses]. He was the first to list eight distinct waves of arthropods colonising human carcasses. The first wave included flies and mites, the sixth wave was composed of mites exclusively. The scope of forensic acarology goes further than mites as indicators of time of death. Mites are micro-habitat specific and might provide evidential data on movement or relocation of bodies, or locating a suspect at the scene of a crime. Because of their high diversity, wide occurrence, and abundance, mites may be of great value in the analysis of trace evidence.
Resumo:
A two-locus match probability is presented that incorporates the effects of within-subpopulation inbreeding (consanguinity) in addition to population subdivision. The usual practice of calculating multi-locus match probabilities as the product of single-locus probabilities assumes independence between loci. There are a number of population genetics phenomena that can violate this assumption: in addition to consanguinity, which increases homozygosity at all loci simultaneously, gametic disequilibrium will introduce dependence into DNA profiles. However, in forensics the latter problem is usually addressed in part by the careful choice of unlinked loci. Hence, as is conventional, we assume gametic equilibrium here, and focus instead on between-locus dependence due to consanguinity. The resulting match probability formulae are an extension of existing methods in the literature, and are shown to be more conservative than these methods in the case of double homozygote matches. For two-locus profiles involving one or more heterozygous genotypes, results are similar to, or smaller than, the existing approaches.
Resumo:
The increasing use of social media, applications or platforms that allow users to interact online, ensures that this environment will provide a useful source of evidence for the forensics examiner. Current tools for the examination of digital evidence find this data problematic as they are not designed for the collection and analysis of online data. Therefore, this paper presents a framework for the forensic analysis of user interaction with social media. In particular, it presents an inter-disciplinary approach for the quantitative analysis of user engagement to identify relational and temporal dimensions of evidence relevant to an investigation. This framework enables the analysis of large data sets from which a (much smaller) group of individuals of interest can be identified. In this way, it may be used to support the identification of individuals who might be ‘instigators’ of a criminal event orchestrated via social media, or a means of potentially identifying those who might be involved in the ‘peaks’ of activity. In order to demonstrate the applicability of the framework, this paper applies it to a case study of actors posting to a social media Web site.
Resumo:
1. Understanding the behaviour and ecology of large carnivores is becoming increasingly important as the list of endangered species grows, with felids such as Panthera leo in some locations heading dangerously close to extinction in the wild. In order to have more reliable and effective tools to understand animal behaviour, movement and diet, we need to develop novel, integrated approaches and effective techniques to capture a detailed profile of animal foraging and movement patterns. 2. Ecological studies have shown considerable interest in using stable isotope methods, both to investigate the nature of animal feeding habits, and to map their geographical location. However, recent work has suggested that stable isotope analyses of felid fur and bone is very complex and does not correlate directly with the isotopic composition of precipitation (and hence geographical location). 3. We present new data that suggest these previous findings may be atypical, and demonstrate that isotope analyses of Felidae are suitable for both evaluating dietary inputs and establishing geo-location as they have strong environmental referents to both food and water. These data provide new evidence of an important methodology that can be applied to the family Felidae for future research in ecology, conservation, wildlife forensics and archaeological science.