This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd...This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.展开更多
According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference me...According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference mechanism of expert system and evidence mining engine. This model takes advantage of flexility and openness, so it can be widely used in mining evidence.展开更多
Integrating with practical e-commerce application, this paper introduces a novel multi-dimension evaluation method to depict and calculate the trust values. The multi-dimension evaluation metrics include functional an...Integrating with practical e-commerce application, this paper introduces a novel multi-dimension evaluation method to depict and calculate the trust values. The multi-dimension evaluation metrics include functional and nonfunctional properties and corresponding weights. The continuous measurement values and the Markov chain mechanism are adopted to compute the trust value and detect the malicious behaviors. The current evaluation has larger influence factor on the next transaction behavior. A trust model is implemented with web service which consists of publication, filtrating, calculating and storage center. It is easily extended and the user only defines each property and its weights according to specific requirements, then the trust values are got. In order to conveniently manage and avoid the dead-lock, some constraint rules are proposed. The results show that the method based on multi-dimension can reflect objectively the dynamic change of trust values.展开更多
Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking c...Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among youngsters.This paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics toolkit.We describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying detection.We use forensics techniques,Machine Learning(ML),and Deep Learning(DL)algorithms to exploit suspicious patterns to help the forensics investigation where every evidence contributes to the case.Experiments on a real-time dataset reveal better results for the detection of cyberbullying content.The Random Forest in ML approach produces 87%of accuracy without SMOTE technique,whereas the value of F1Score produces a good result with SMOTE technique.The LSTM has 92%of validation accuracy in the DL algorithm compared with Dense and BiLSTM algorithms.展开更多
The purpose of this research is to study the process of forensic science execution in order to use crime investigation in three southern border provinces of Thailand, such as the study of problems and obstacles includ...The purpose of this research is to study the process of forensic science execution in order to use crime investigation in three southern border provinces of Thailand, such as the study of problems and obstacles including the factors that affect forensic examination to use criminal investigation in three southern border provinces, offer the guidance in pattern development of forensic sciences examination in three southern border provinces with standard, and are able to use in criminal investigation effectively. Data were collected from all related agencies. The results of this research have showed that executive process of forensic science is used to investigate the crime in three southern border provinces that can be divided the operations into three main issues as following: crime scene examination, evidence testing, autopsy in case of crime scene, and factors which affect forensic work for using in criminal investigation in three southern border provinces of police practitioners. They should have the knowledge about forensic science, commitment, bravery, and cunning work.展开更多
This paper presents dynamic-behavior comparisons and related forensic analyses of a submerged floating tunnel(SFT)between numerical simulation and physical experiment under regular and irregular waves.The experiments ...This paper presents dynamic-behavior comparisons and related forensic analyses of a submerged floating tunnel(SFT)between numerical simulation and physical experiment under regular and irregular waves.The experiments are conducted in the 3Dwave tank with 1:33.3 scale,and the corresponding coupled time-domain simulation tool is devised for comparison.The entire SFT systemconsists of a long concrete tunnel and 12 tubular aluminummooring lines.Two numerical simulation models,the Cummins equation with 3D potential theory including second-order wave-body interaction effects and the much simpler Morison-equation-based formula with the lumped-massbased line model,are designed and compared.Forensic analyses for mooring-line adjustments in the simulation are carried out in view of the best representation of the physical system.After that,the measured pre-tension distribution and systemstiffness of twelvemooring lines arewell reproduced in the numericalmodel.Subsequently,the dynamic responses and mooring tensions of the SFT are compared under regular and irregular waves.The measured and simulated results coincide reasonably well for both regular-and irregular-wave conditions.展开更多
This paper proposes a new method for extracting ENF (electric network frequency) fluctuations from digital audio recordings for the purpose of forensic authentication. It is shown that the extraction of ENF componen...This paper proposes a new method for extracting ENF (electric network frequency) fluctuations from digital audio recordings for the purpose of forensic authentication. It is shown that the extraction of ENF components from audio recordings is realizable by applying a parametric approach based on an AR (autoregressive) model. The proposed method is compared to the existing STFT (short-time Fourier transform) based ENF extraction method. Experimental results from recorded electrical grid signals and recorded audio signals show that the proposed approach can improve the time resolution in the extracted ENF fluctuations and improve the detection of tampering with short alterations in longer audio recordings.展开更多
目的 建立基于常用STR分型试剂盒的肿瘤组织身源鉴定方法。方法 采用ForenSeq^(TM) DNA Signature Prep试剂盒检测55例配对肿瘤组织样本(肿瘤组织和同一个体正常组织成对)以及75例无关个体全血样本27个常染色体STR基因座的分型情况,并模...目的 建立基于常用STR分型试剂盒的肿瘤组织身源鉴定方法。方法 采用ForenSeq^(TM) DNA Signature Prep试剂盒检测55例配对肿瘤组织样本(肿瘤组织和同一个体正常组织成对)以及75例无关个体全血样本27个常染色体STR基因座的分型情况,并模拟55例肿瘤组织的全同胞、亲子对分型数据,统计成对肿瘤(paired carcinoma,PC)、肿瘤-无关个体(tumor-unrelated individual,UI)、肿瘤-全同胞(tumor-simulated full sibling,FS)与肿瘤-亲子(tumor-simulated parent-offspring,PO)的共有等位基因个数(number of total identical alleles,A_n)及状态一致性(identity by state,IBS)评分。以上述统计结果作为参照,建立8个常用STR分型试剂盒的肿瘤组织身源鉴定预测模型,并尝试构建一个专用于肿瘤组织身源鉴定的模型。使用另外23例配对肿瘤组织样本的检测结果对鉴定模型的准确性、灵敏度及特异度进行验证与评估。结果 (1)在任一试剂盒中,全不同基因座数量(A_0)在PC组与PO组之间差异无统计学意义。1个相同基因座数量(A_(1))、2个相同基因座数量(A_(2))和IBS评分在PC组与UI、FS、PO组之间差异均有统计学意义。(2)不同STR基因座的A_n与IBS评分在不同组别存在差异,其中,13个STR基因座(CSF1PO、D12S391、D19S433、D20S482、D2S1338、D3S1358、D4S2408、D7S820、D8S1179、FGA、TH01、TPOX、vWA)的A_(2)在PC组均高于其他STR基因座;2个STR基因座(D6S1043、PentaE)的A_(2)在UI组低于其他STR基因座。(3)成功构建了8个常用STR分型试剂盒的肿瘤组织身源鉴定预测模型以及15个STR基因座的肿瘤组织身源鉴定模型(15-STRs),灵敏度均达100%,特异度为97.56%~99.88%,准确度为97.59%~99.89%。其中,15-STRs模型的灵敏度为100%,特异度为99.88%,准确率为99.89%,高于常用商业化试剂盒。结论 本研究成功建立了8个常用STR分型试剂盒的肿瘤组织身源鉴定方法,拓展了肿瘤组织身源鉴定的应用范围。通过比较不同基因座在肿瘤组织身源鉴定中的差异,筛选出了15个特别适用于肿瘤组织身源鉴定的STR基因座,为未来肿瘤组织溯源的试剂盒构建提供了数据基础。展开更多
Objective To explore the correlation between volume rendering(VR) statistics of medial clavicular epiphysis and living age,and establish the mathematical models for living age evaluation using the CT image of medial c...Objective To explore the correlation between volume rendering(VR) statistics of medial clavicular epiphysis and living age,and establish the mathematical models for living age evaluation using the CT image of medial clavicular epiphysis based on the growth rules of osteoepiphysis of medial clavicle.Methods The CT images of the medial clavicles from 795 teenagers aged 15-25,387 males and 408 females,were collected in East and South China.VR 3D images were reconstructed from 0.60 mm-thick slice CT images.The epiphyseal diameter,sternal end diameter,and their respective diameter ratio(the left: x 1;the right: x 3);epiphyseal area,sternal end area,and their respective area ratio(the left: x 2;the right: x 4),were measured and calculated.All these observations were analyzed using SPSS 19.0 statistical software.The statistical differences in gender and age were analyzed by Mann-Whitney U test.The mathematical models were established using least square.Sixty trained subjects,30 males and 30 females,were tested to verify the accuracy of the established mathematical models.Results In the group of same age,x 1 showed significant difference in gender;the same results were observed in x 2,x 3,and x 4,which suggested that the growth rules of osteoepiphysis of medial clavicle were highly correlated with living age.The accuracy of these mathematical models were all above 67.6%(±1.0 year) and 78.5%(±1.5 year).Conclusion The mathematical models with reasonable accuracy could be manageable in practice to confirm the conclusion of the atlas method.The current study can contribute to the single skeletal age evaluation.展开更多
文摘This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.
基金Supported by the Scientific and TechnologicalBureau of the Ministry of Public Security of P.R.China ,the Projectof the Network Supervising Bureau(2005yycxhbst117) the Project ofthe 15th Overall Plan of Education Department of Hubei Province(2004d349) the Project of the 15th Overall Plan of Social ScienceFund of Hubei Province([2005]073)
文摘According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference mechanism of expert system and evidence mining engine. This model takes advantage of flexility and openness, so it can be widely used in mining evidence.
文摘Integrating with practical e-commerce application, this paper introduces a novel multi-dimension evaluation method to depict and calculate the trust values. The multi-dimension evaluation metrics include functional and nonfunctional properties and corresponding weights. The continuous measurement values and the Markov chain mechanism are adopted to compute the trust value and detect the malicious behaviors. The current evaluation has larger influence factor on the next transaction behavior. A trust model is implemented with web service which consists of publication, filtrating, calculating and storage center. It is easily extended and the user only defines each property and its weights according to specific requirements, then the trust values are got. In order to conveniently manage and avoid the dead-lock, some constraint rules are proposed. The results show that the method based on multi-dimension can reflect objectively the dynamic change of trust values.
文摘Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among youngsters.This paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics toolkit.We describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying detection.We use forensics techniques,Machine Learning(ML),and Deep Learning(DL)algorithms to exploit suspicious patterns to help the forensics investigation where every evidence contributes to the case.Experiments on a real-time dataset reveal better results for the detection of cyberbullying content.The Random Forest in ML approach produces 87%of accuracy without SMOTE technique,whereas the value of F1Score produces a good result with SMOTE technique.The LSTM has 92%of validation accuracy in the DL algorithm compared with Dense and BiLSTM algorithms.
文摘The purpose of this research is to study the process of forensic science execution in order to use crime investigation in three southern border provinces of Thailand, such as the study of problems and obstacles including the factors that affect forensic examination to use criminal investigation in three southern border provinces, offer the guidance in pattern development of forensic sciences examination in three southern border provinces with standard, and are able to use in criminal investigation effectively. Data were collected from all related agencies. The results of this research have showed that executive process of forensic science is used to investigate the crime in three southern border provinces that can be divided the operations into three main issues as following: crime scene examination, evidence testing, autopsy in case of crime scene, and factors which affect forensic work for using in criminal investigation in three southern border provinces of police practitioners. They should have the knowledge about forensic science, commitment, bravery, and cunning work.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea Government(MSIT)(No.2017R1A5A1014883).
文摘This paper presents dynamic-behavior comparisons and related forensic analyses of a submerged floating tunnel(SFT)between numerical simulation and physical experiment under regular and irregular waves.The experiments are conducted in the 3Dwave tank with 1:33.3 scale,and the corresponding coupled time-domain simulation tool is devised for comparison.The entire SFT systemconsists of a long concrete tunnel and 12 tubular aluminummooring lines.Two numerical simulation models,the Cummins equation with 3D potential theory including second-order wave-body interaction effects and the much simpler Morison-equation-based formula with the lumped-massbased line model,are designed and compared.Forensic analyses for mooring-line adjustments in the simulation are carried out in view of the best representation of the physical system.After that,the measured pre-tension distribution and systemstiffness of twelvemooring lines arewell reproduced in the numericalmodel.Subsequently,the dynamic responses and mooring tensions of the SFT are compared under regular and irregular waves.The measured and simulated results coincide reasonably well for both regular-and irregular-wave conditions.
文摘This paper proposes a new method for extracting ENF (electric network frequency) fluctuations from digital audio recordings for the purpose of forensic authentication. It is shown that the extraction of ENF components from audio recordings is realizable by applying a parametric approach based on an AR (autoregressive) model. The proposed method is compared to the existing STFT (short-time Fourier transform) based ENF extraction method. Experimental results from recorded electrical grid signals and recorded audio signals show that the proposed approach can improve the time resolution in the extracted ENF fluctuations and improve the detection of tampering with short alterations in longer audio recordings.
文摘目的 建立基于常用STR分型试剂盒的肿瘤组织身源鉴定方法。方法 采用ForenSeq^(TM) DNA Signature Prep试剂盒检测55例配对肿瘤组织样本(肿瘤组织和同一个体正常组织成对)以及75例无关个体全血样本27个常染色体STR基因座的分型情况,并模拟55例肿瘤组织的全同胞、亲子对分型数据,统计成对肿瘤(paired carcinoma,PC)、肿瘤-无关个体(tumor-unrelated individual,UI)、肿瘤-全同胞(tumor-simulated full sibling,FS)与肿瘤-亲子(tumor-simulated parent-offspring,PO)的共有等位基因个数(number of total identical alleles,A_n)及状态一致性(identity by state,IBS)评分。以上述统计结果作为参照,建立8个常用STR分型试剂盒的肿瘤组织身源鉴定预测模型,并尝试构建一个专用于肿瘤组织身源鉴定的模型。使用另外23例配对肿瘤组织样本的检测结果对鉴定模型的准确性、灵敏度及特异度进行验证与评估。结果 (1)在任一试剂盒中,全不同基因座数量(A_0)在PC组与PO组之间差异无统计学意义。1个相同基因座数量(A_(1))、2个相同基因座数量(A_(2))和IBS评分在PC组与UI、FS、PO组之间差异均有统计学意义。(2)不同STR基因座的A_n与IBS评分在不同组别存在差异,其中,13个STR基因座(CSF1PO、D12S391、D19S433、D20S482、D2S1338、D3S1358、D4S2408、D7S820、D8S1179、FGA、TH01、TPOX、vWA)的A_(2)在PC组均高于其他STR基因座;2个STR基因座(D6S1043、PentaE)的A_(2)在UI组低于其他STR基因座。(3)成功构建了8个常用STR分型试剂盒的肿瘤组织身源鉴定预测模型以及15个STR基因座的肿瘤组织身源鉴定模型(15-STRs),灵敏度均达100%,特异度为97.56%~99.88%,准确度为97.59%~99.89%。其中,15-STRs模型的灵敏度为100%,特异度为99.88%,准确率为99.89%,高于常用商业化试剂盒。结论 本研究成功建立了8个常用STR分型试剂盒的肿瘤组织身源鉴定方法,拓展了肿瘤组织身源鉴定的应用范围。通过比较不同基因座在肿瘤组织身源鉴定中的差异,筛选出了15个特别适用于肿瘤组织身源鉴定的STR基因座,为未来肿瘤组织溯源的试剂盒构建提供了数据基础。
基金funded by the Natural ScienceFund Projects(81102305)the 12th five-year National Science and Technology Support Project(2012BAK16B01)+1 种基金Fund Projects of Institute of Forensic Science,Ministry of Justice,P.R.China(2011-1)the Council of Shanghai Key Laboratory of Forensic Medicine(13DZ2271500)
文摘Objective To explore the correlation between volume rendering(VR) statistics of medial clavicular epiphysis and living age,and establish the mathematical models for living age evaluation using the CT image of medial clavicular epiphysis based on the growth rules of osteoepiphysis of medial clavicle.Methods The CT images of the medial clavicles from 795 teenagers aged 15-25,387 males and 408 females,were collected in East and South China.VR 3D images were reconstructed from 0.60 mm-thick slice CT images.The epiphyseal diameter,sternal end diameter,and their respective diameter ratio(the left: x 1;the right: x 3);epiphyseal area,sternal end area,and their respective area ratio(the left: x 2;the right: x 4),were measured and calculated.All these observations were analyzed using SPSS 19.0 statistical software.The statistical differences in gender and age were analyzed by Mann-Whitney U test.The mathematical models were established using least square.Sixty trained subjects,30 males and 30 females,were tested to verify the accuracy of the established mathematical models.Results In the group of same age,x 1 showed significant difference in gender;the same results were observed in x 2,x 3,and x 4,which suggested that the growth rules of osteoepiphysis of medial clavicle were highly correlated with living age.The accuracy of these mathematical models were all above 67.6%(±1.0 year) and 78.5%(±1.5 year).Conclusion The mathematical models with reasonable accuracy could be manageable in practice to confirm the conclusion of the atlas method.The current study can contribute to the single skeletal age evaluation.