Results 61 to 70 of about 99,455 (306)

Making sense of the story - the dialogues between the police and forensic laboratories in the construction of DNA evidence [PDF]

open access: yes, 2014
The use of DNA technologies for criminal investigation purposes illuminates an interplay of knowledge and expertise where meaning and relevance of biological traces are negotiated.
Santos, Filipe
core   +1 more source

Effect of Reaction Time and Temperature on the Impurity Profile of Amphetamine in the Leuckart Method

open access: yesDrug Testing and Analysis, EarlyView.
This study investigates the effect of the reaction temperature (step 1) and reaction time (step 1 and 2) on the conversion efficiency and impurity profile of amphetamine synthesized via the Leuckart method. Conversion efficiency and impurity profile were assessed using gas chromatography–flame ionization detection (GC–FID) and GC–mass spectrometry (GC ...
Maartje C. M. Verhoeven   +7 more
wiley   +1 more source

From self-affirmation to national security threat

open access: yesRevista Científica General José María Córdova, 2022
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars.
Yuriy Yu. Nizovtsev   +2 more
doaj   +1 more source

The Proficiency of Experts [PDF]

open access: yes, 2018
Expert evidence plays a crucial role in civil and criminal litigation. Changes in the rules concerning expert admissibility, following the Supreme Court\u27s Daubert ruling, strengthened judicial review of the reliability and the validity of an expert ...
Garrett, Brandon L., Mitchell, Gregory
core   +2 more sources

Expert testimony, law and epistemic authority [PDF]

open access: yes, 2016
© Society for Applied Philosophy, 2016 This article discusses the concept of epistemic authority in the context of English law relating to expert testimony.
Ward, Tony
core   +1 more source

Filtering Trust: Disclosing the Role of Artificial Intelligence Decreases Trust in Technology, but Does Not Prevent Harm to Body Image After Viewing AI‐Generated Content

open access: yesInternational Journal of Eating Disorders, EarlyView.
ABSTRACT Objectives Despite the rapid growth of generative artificial intelligence (AI), virtually no research exists examining the psychological impacts of viewing or interacting with AI‐generated images of people. Additionally, it remains relatively unknown whether informing viewers when images are AI‐generated is an effective way to lessen harm or ...
Brooke L. Bennett   +5 more
wiley   +1 more source

Modern Capacities, Methods, and Means of Forensic Construction Investigations

open access: yesТеория и практика судебной экспертизы, 2023
The article considers the issues of applying specific research methods in forensic construction examinations. The authors propose a classification of methods and means based on various criteria, including the impact on objects and the principles of ...
A. Yu. Butyrin, E. B. Stativa
doaj   +1 more source

How can Francis Bacon help forensic science? The four idols of human biases [PDF]

open access: yes, 2009
Much debate has focused on whether forensic science is indeed a science. This paper is not aimed at answering, or even trying to contribute to, this question.
Dror, I
core  

Forensic psychiatric expertise: Posttraumatic stress disorder

open access: yesSrpski arhiv za celokupno lekarstvo, 2011
Introduction. This article presents our experiences in the field of forensic post-traumatic stress disorder (PTSD). Objective. The study examined parameters of 30 patients with PTSD who were the subject of forensic expertise (PTSDF) and in 30 patients with PTSD who were not (PTSDN). Methods.
openaire   +3 more sources

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy