428,483 research outputs found
The Recognition of Fires Originating from Photovoltaic (PV) Solar Systems
There has been an observable increase in the fitting of photovoltaic (PV) solar panels on the roofs
of buildings in the UK over the last decade. The origin of some fires in domestic and commercial
properties has been attributed to PV systems. This thesis examines the ability of fire examiners to
recognise and record details of fires believed to have originated from PV systems, as well as
investigating the effect of internal heating in direct current (DC) isolators to the point at which they
fail.
National fire data was examined along with the methods for collecting and collating these data.
This clarified that national fire data cannot identify the specifics of electrical fires. Validity of these
data was then tested by identifying the confidence and competence in the recognition of the origin
of fire, (especially when associated with PV systems), of some fire staff responsible for collecting
fire data. This suggests that some fire scenes examiners are not confident in their own ability to
recognise fires originating from PV systems. Evidence for fires occurring in PV systems in Kent
between 2009 and 2014 was then examined, including a cold case forensic review of the
evidence. This provided an indication that a potential common point of failure, which may lead to
fire originating from a PV system, was to be found within the DC section of the PV circuits and
probably within the DC isolator switch itself. Experimentation revealed that internal heating of a
terminal connection can lead to changes of the phase of the insulating material, causing failure of
structural integrity and therefore allowing an arc to be established. Observable post fire indicators
associated with this mechanism of failure have been identified as well as hydrocarbons evolved
from pyrolysis of isolator insulating material.
Finally, areas for further experimental research and training of fire staff are suggested as well as
the modification of recording mechanisms and building regulations
Using a Goal-Driven Approach in the Investigation of a Questioned Contract
Part 3: FORENSIC TECHNIQUESInternational audienceThis paper presents a systematic process for describing digital forensic investigations. It focuses on forensic goals and anti-forensic obstacles and their operationalization in terms of human and software actions. The paper also demonstrates how the process can be used to capture the various forensic and anti-forensic aspects of a real-world case involving document forgery
Forensic Face Recognition: A Survey
Beside a few papers which focus on the forensic aspects of automatic face recognition, there is not much published about it in contrast to the literature on developing new techniques and methodologies for biometric face recognition. In this report, we review forensic facial identification which is the forensic experts‟ way of manual facial comparison. Then we review famous works in the domain of forensic face recognition. Some of these papers describe general trends in forensics [1], guidelines for manual forensic facial comparison and training of face examiners who will be required to verify the outcome of automatic forensic face recognition system [2]. Some proposes theoretical framework for application of face recognition technology in forensics [3] and automatic forensic facial comparison [4, 5]. Bayesian framework is discussed in detail and it is elaborated how it can be adapted to forensic face recognition. Several issues related with court admissibility and reliability of system are also discussed. \ud
Until now, there is no operational system available which automatically compare image of a suspect with mugshot database and provide result usable in court. The fact that biometric face recognition can in most cases be used for forensic purpose is true but the issues related to integration of technology with legal system of court still remain to be solved. There is a great need for research which is multi-disciplinary in nature and which will integrate the face recognition technology with existing legal systems. In this report we present a review of the existing literature in this domain and discuss various aspects and requirements for forensic face recognition systems particularly focusing on Bayesian framework
Leveraging Bias in Forensic Science
Dr. Simon Cole calls for a more hierarchical organization of forensic science in his challenging Article, Acculturating Forensic Science: What is ‘Scientific Culture’, and How can Forensic Science Adopt it? Koppl thinks Dr. Cole is right to say that there are different roles in forensic science, but somewhat mistaken in his call for hierarchy
Fraud and the Evolution of Forensic Accounting Education
Forensic accounting, the use of accounting practices in court, developed as a field separate from traditional accounting or auditing throughout the 1900’s. As fraud changed the landscape of auditing practice, forensic accounting slowly began to take shape as the accountant’s answer to fraud. After a series of major frauds at the beginning of the 21st century, forensic accounting became one of the most demanded fields of accounting. The profession, though, was still relatively in its infancy: forensic accountants were predominantly untrained aside from firsthand experience. Since the early 2000’s, schools have begun rapidly implementing forensic accounting programs to meet the increasing demand for forensic accountants. As the demand continues to increase, however, education offerings will be needed
A comparison of forensic toolkits and mass market data recovery applications
Digital forensic application suites are large, expensive, complex software products, offering a range of functions to assist in the investigation of digital artifacts. Several authors have raised concerns as to the reliability of evidence derived from these products. This is of particular concern, given that many forensic suites are closed source and therefore can only be subject to black box evaluation. In addition, many of the individual functions
integrated into forensic suites are available as commercial stand-alone products, typically at a much lower cost, or even free. This paper reports research which compared (rather than individually evaluated) the data recovery function of two forensic suites and three stand alone `non-forensic' commercial applications. The research demonstrates that, for this function at least, the commercial data recovery tools provide comparable performance to that of the forensic software suites. In addition, the research demonstrates that there is some variation in results presented by all of the data recovery tools
A Forensically Sound Adversary Model for Mobile Devices
In this paper, we propose an adversary model to facilitate forensic
investigations of mobile devices (e.g. Android, iOS and Windows smartphones)
that can be readily adapted to the latest mobile device technologies. This is
essential given the ongoing and rapidly changing nature of mobile device
technologies. An integral principle and significant constraint upon forensic
practitioners is that of forensic soundness. Our adversary model specifically
considers and integrates the constraints of forensic soundness on the
adversary, in our case, a forensic practitioner. One construction of the
adversary model is an evidence collection and analysis methodology for Android
devices. Using the methodology with six popular cloud apps, we were successful
in extracting various information of forensic interest in both the external and
internal storage of the mobile device
Proving Genocide? Forensic Expertise and the ICTY
This article works towards developing a theoretical framework outlining the premises and parameters under which forensic experts operate during various stages of international criminal investigations and the presentation of expert witness testimony in court.With reference to law and science literature, the article explores the reasons for undertaking resource-intensive forensic investigations; secondly it outlines the ways in which evidence is gathered and interpreted, the process of
constructing ‘forensic truth’; and finally it examines what happens to ‘forensic
truth’ once it enters the legal arena. The International Criminal Tribunal for the
formerYugoslavia and its activities are used to illustrate the issues involved during
the ‘forensic expertise meets international law’ interface. Specifically the forensic
exhumations conducted around the Srebrenica events of July 1995 and their use in
the Krstic¤ trial serve to contextualize the debate
- …
