Office Online  
Download
Links
22
22
22
22
22
22
22
 
Quick Search  
  Advanced Search
HighLights More»   
· Reverse Analysis into Stealing-information Trojan through “Reconstructing Execution Path”
· Identifying Synthetic Cannabis 5F-AMB and Benzodiazepine-categorized Diclazepam with GC-MS
· Marks on Cartridge Cases Shot from Seven-kind 9mm Pistols and Their Forensic Value
· Applicability of DNA TyperTM 19 Kit to Distinguish European, African and East Asian Population
· Research Progress on the Relationship between DNA Methylation Detection and Time Association of Biological Evidence
· A SQLite Database Forensic Method Based on the Analysis of Underlying Data
· Exploration into Depicting the Criminal Committing Homicide
· Widening Thought of Primary-level Police to Detect and Solve Traffic Hit-and-run Cases
News  
· Declaration on Publication Ethics and Malpractice
·
·
· International Forum on Advancing Forensic Science and Technology & Conference of Editorial Board Mem
·
·
·
More>>     
Current Issue In Press Forthcoming Articles Top Read Top Downloaded Archive
  Forensic Science And Technology--2019, 44 (4)   Published: 15 August 2019
Select | Export to EndNote
 Research Articles
Reverse Analysis into Stealing-information Trojan through “Reconstructing Execution Path” Hot!
XU Guotian
Forensic Science And Technology. 2019, 44 (4): 283-288. ;  doi: 10.16467/j.1008-3650.2019.04.001
Full Text: RICH HTML ( 0 ) PDF (2283 KB)  ( 109 )
Identifying Synthetic Cannabis 5F-AMB and Benzodiazepine-categorized Diclazepam with GC-MS Hot!
ZHAO Yanbiao, ZHENG Xiaoyu, ZHENG Hui, QIAN Zhenhua, GAO Lisheng
Forensic Science And Technology. 2019, 44 (4): 289-292. ;  doi: 10.16467/j.1008-3650.2019.04.002
Full Text: RICH HTML ( 0 ) PDF (1741 KB)  ( 109 )
Applying E-nose to Identify Paint Thinner
FU Defeng, SUN Jiancong, XUAN Yu, YAO Weixuan, XU Jing, SHEN Liang, ZHOU Enping, YING Jianbo, XIE Weihong, LI Xiaofei
Forensic Science And Technology. 2019, 44 (4): 293-297. ;  doi: 10.16467/j.1008-3650.2019.04.003
Full Text: RICH HTML ( 0 ) PDF (2578 KB)  ( 59 )
Determining Pyrethroid Pesticides with Multi-walled Carbon Nanotube Decorated with Fe3O4 Nanoparticles
SHEN Weidong, YANG Fan, CUI Yanhua, PAN Yaoyue, ZHANG Suling, YAO Weixuan
Forensic Science And Technology. 2019, 44 (4): 298-302. ;  doi: 10.16467/j.1008-3650.2019.04.004
Full Text: RICH HTML ( 0 ) PDF (1897 KB)  ( 52 )
Marks on Cartridge Cases Shot from Seven-kind 9mm Pistols and Their Forensic Value Hot!
LÜ Xiaosen, TIAN Furui, LIU Siye
Forensic Science And Technology. 2019, 44 (4): 303-307. ;  doi: 10.16467/j.1008-3650.2019.04.005
Full Text: RICH HTML ( 0 ) PDF (2683 KB)  ( 121 )
A Multiplex Amplification System Containing Porcine 12 STRs: Construction and Verification
MA Wenhua, MO Xiaoting, ZHANG Ying, BAI Xue, YANG Fan, ZHANG Jian, LI Wanshui, ZHAO Xingchun
Forensic Science And Technology. 2019, 44 (4): 308-312. ;  doi: 10.16467/j.1008-3650.2019.04.006
Full Text: RICH HTML ( 0 ) PDF (1596 KB)  ( 46 )
Quantitative Comparison of Diatoms in Both the Lungs of Rats Died from Drowning and Drowning Media
LI Ying, CHEN Yiqun, LAI Jie, YANG Xuehao, YANG Bowen, REN Liang
Forensic Science And Technology. 2019, 44 (4): 313-316. ;  doi: 10.16467/j.1008-3650.2019.04.007
Full Text: RICH HTML ( 0 ) PDF (1500 KB)  ( 32 )
Detecting Recovery Oil by Its Characteristic Triglyceride Composition
QIAO Jie, SHI Qiuna, ZHAO Pengcheng
Forensic Science And Technology. 2019, 44 (4): 317-321. ;  doi: 10.16467/j.1008-3650.2019.04.008
Full Text: RICH HTML ( 0 ) PDF (2885 KB)  ( 49 )
Characteristic Angle of Human Knee Joint in Walking
MA Yue, DING Hao
Forensic Science And Technology. 2019, 44 (4): 322-326. ;  doi: 10.16467/j.1008-3650.2019.04.009
Full Text: RICH HTML ( 0 ) PDF (1925 KB)  ( 95 )
Applicability of DNA TyperTM 19 Kit to Distinguish European, African and East Asian Population Hot!
MA Quan, JIANG Li, ZHAO Hui, HUANG Meisha, DENG Pan, LI Jiuling, WANG Ling, MA Xin, YE Jian, LI Caixia
Forensic Science And Technology. 2019, 44 (4): 327-331. ;  doi: 10.16467/j.1008-3650.2019.04.010
Full Text: RICH HTML ( 0 ) PDF (1555 KB)  ( 47 )
Comparison of Fingerprint Developing Effect between New-formulated Genipin and Several Other Reagents
LI Hao, QU Huiying, PAN Hong, LI Jin, LIU Heda
Forensic Science And Technology. 2019, 44 (4): 332-336. ;  doi: 10.16467/j.1008-3650.2019.04.011
Full Text: RICH HTML ( 0 ) PDF (2432 KB)  ( 36 )
 Reviews
Research Progress on the Relationship between DNA Methylation Detection and Time Association of Biological Evidence Hot!
LI Shanfei, WANG Ling, ZHAO Hui, SUN Junhong, JI Anquan, FENG Lei, LI Caixia
Forensic Science And Technology. 2019, 44 (4): 337-342. ;  doi: 10.16467/j.1008-3650.2019.04.012
Full Text: RICH HTML ( 0 ) PDF (1533 KB)  ( 53 )
Diatom Test: Development and Application Status in Forensic Diagnosis of Drowning
LIU Mengyan, ZHAO Wei, ZHAO Yi
Forensic Science And Technology. 2019, 44 (4): 343-346. ;  doi: 10.16467/j.1008-3650.2019.04.013
Full Text: RICH HTML ( 0 ) PDF (1526 KB)  ( 54 )
 Research and Discussion
A SQLite Database Forensic Method Based on the Analysis of Underlying Data Hot!
LONG Yuan, XING Guidong, KANG Yanrong, GUO Lili, ZHAO Lu, ZHANG Yaoguo, BAO Menghu
Forensic Science And Technology. 2019, 44 (4): 347-350. ;  doi: 10.16467/j.1008-3650.2019.04.014
Full Text: RICH HTML ( 0 ) PDF (1909 KB)  ( 48 )
Analysis into Characteristics of Carbonless Copying Handwriting
LI Xiao
Forensic Science And Technology. 2019, 44 (4): 351-354. ;  doi: 10.16467/j.1008-3650.2019.04.015
Full Text: RICH HTML ( 0 ) PDF (1876 KB)  ( 44 )
 Technical Notes
Genetic Polymorphism of 24 Y-STR Loci of Han Population in Changchun Area
FENG Zhen, JIN Wei, ZHANG Jian, JIANG Li, SHANG Lei, YU Zhengliang, MO Xiaoting
Forensic Science And Technology. 2019, 44 (4): 355-358. ;  doi: 10.16467/j.1008-3650.2019.04.016
Full Text: RICH HTML ( 0 ) PDF (1667 KB)  ( 49 )
Applicative Forensics for Android Simulator
GUO Wenju, WANG Yudao
Forensic Science And Technology. 2019, 44 (4): 359-361. ;  doi: 10.16467/j.1008-3650.2019.04.017
Full Text: RICH HTML ( 0 ) PDF (1704 KB)  ( 62 )
 Exchangeable Experience
Exploration into Depicting the Criminal Committing Homicide Hot!
ZHANG Wei, XUE Rui, HUANG Zhiping, LIU Zhao
Forensic Science And Technology. 2019, 44 (4): 362-366. ;  doi: 10.16467/j.1008-3650.2019.04.018
Full Text: RICH HTML ( 0 ) PDF (1517 KB)  ( 151 )
Determining the Igniting Site of Fire Scene in Rural Mountain Areas
YANG Fan, YANG Ming
Forensic Science And Technology. 2019, 44 (4): 367-370. ;  doi: 10.16467/j.1008-3650.2019.04.019
Full Text: RICH HTML ( 0 ) PDF (1774 KB)  ( 55 )
DNA Ancestry Inference Assisting to Have a Case Solved
JIANG Li, ZHAO Lei, LIU Jing, ZHAO Wenting, MA Quan, ZHAO Hui, JI Anquan, LI Caixia
Forensic Science And Technology. 2019, 44 (4): 371-373. ;  doi: 10.16467/j.1008-3650.2019.04.020
Full Text: RICH HTML ( 0 ) PDF (1613 KB)  ( 59 )
Widening Thought of Primary-level Police to Detect and Solve Traffic Hit-and-run Cases Hot!
WANG Yong, YANG Luhao
Forensic Science And Technology. 2019, 44 (4): 374-376. ;  doi: 10.16467/j.1008-3650.2019.04.021
Full Text: RICH HTML ( 0 ) PDF (1544 KB)  ( 122 )
Forensic Science And Technology
Advance online publication (AOP)
Note: The latest papers, published online ahead of print. These online versions are definitive and may be cited using the digital object identifier (DOI).
  First page | Prev page | Next page | Last page
  First page | Prev page | Next page | Last page
Forensic Science And Technology
Accepts
Note: The papers published below will continue to be available from this page until they are assigned to an issue. To see an article, click its [PDF] link. To review many abstracts, check the boxes to the left of the titles you want, and click the 'Selected articles' button. To see one abstract at a time, click its [Abstract] link.
»

The forensic identification of the 4 death cases for phosphine poisoning and literature review

Accept: 2018-08-21
Full Text: PDF (0KB) (75)
Show Abstract
Objective To investigate the key point of forensic medical identification in the death of phosphine poisoning .Methods By identificate the death of 4 cases for phosphine poisoning and read the literature review about phosphine poisoning case, the physicochemical properties of phosphine poisoning causes, clinical manifestations, mechanism of poisoning and death, forensic examination, extraction of samples are reviewed. Results There is no specific pathological changes in 4 cases of phosphine poisoning death. Conclusion Case of death for phosphine poisoning forensic must concolusioned based on bodies、investigation、according to the field, and inspect the relevant samples extract in the body.
»

Progress of mRNA profiling for forensic body fluid identification

Accept: 2018-08-21
Full Text: PDF (0KB) (32)
Show Abstract
With the development of molecular biology, forensic scientists aim to transform the research results of molecular biology into forensic science application. Identifying the origin of body fluids left at a crime scene can provide a strong evidence support for crime scene reconstruction and trial of cases. For a long time, mRNA has not been concerned in forensic science because of its instability and easily degradable characteristics. However, innovations in molecular biology such as endpoint PCR and quantitative PCR, transcriptome analysis have changed the public perception of RNA, laying the foundation for the application of RNA profiling in forensic science. At present, the major method for body fluid identification based on mRNA profiling is to construct compound detection system which can simultaneously detect the expression of various specific markers in different body fluid stains. Since 2011, the European DNA Profiling Group (EDNAP) has organized six collaborative exercises to assess the effectiveness and reproducibility of mRNA profiling for forensic body fluids identification. In the current review, we provided an overview of the present knowledge and detection methodologies of mRNA profiling for forensic body fluid identification and discussed its possible practical application in forensic casework, which could provide a theoretical basis for a further research.
»

Accept: 2018-08-21
Full Text: PDF (0KB) (33)
Show Abstract
Objective The thesis aims at developing the method for the quick analysis of gas chromatography-mass spectrometry (GC/MS) and infrared spectroscopy of complex components in poisoned dart. Methods After the liquid in poisoned dart were extracted with alkaline ethyl acetate, the extracts were analyzed by gas chromatography-mass spectrometry and the white precipitate was analyzed by infrared spectroscopy. Results The results showed that this method could detect suxamethonium chloride and procaine in poisoned dart, and the suxamethonium chloride similarity of retrieval by infrared spectroscopy reached 81.3%. Conclusion This method is simple, sensitive and accurate, it can be used for rapid detection in casework.
»

Tibetan high-altitude adaptation research and the application prospect in forensic science

Accept: 2018-08-21
Full Text: PDF (0KB) (31)
Show Abstract
Tibetan have lived in Himalayan Plateau southwest of China for hundreds generations and have adapted to the extreme environment of high altitude. Several candidate genes related to the high-altitude hypoxia adaptation have been revealed that showed large allelic differences between highlander Tibetans and lowlander Han Chinese in recent year. Two hypoxia-related gene, EPAS1 (endothelial PAS domain protein 1; also known as HIF2a) and EGLN1 (egl nine homolog 1; also known as HIF prolylhydroxylase 2, PHD2) are identified to show strong signals of selection. In this paper, the high-altitude adaptation of the Tibetan is reviewed from three aspects including physiological characteristics, high-altitude adaptation genes and SNPs in EPAS1 and EGLN1. In addition, the feasibility of high-altitude adaptation SNPs in forensic application are also reviewed here.
»

The applications of surface plasmon resonance sensing methodologies in evidence analysis

Accept: 2018-08-21
Full Text: PDF (0KB) (25)
Show Abstract
Surface plasmon resonance (SPR) is a physical and optical phenomenon. The detection methodologies based on the principle of SPR play an important role as efficient tools in forensic analysis considering their well known advantages of sensitivity, selectivity, easy functioning, rapid analysis speed, affordability and capability of miniaturization and automation. It can realize non-destructive, in-situ, real-time and dynamic measurement in natural conditions, and has been widely used in the fields of biology, medicine, chemistry and forensic science. Numerous articles reporting applications of SPR for the forensic research can be found in the most qualified journals of analytical chemistry, analytical biochemistry, angewandte chemie, analytica chimica acta, biosensors and bioelectronics, etc. This article reviews the most widespread sensing methodologies based on SPR and their applications for the evidence analysis. The mentioned methodologies including the following fields: SPR/SPRi sensors, fiber optic SPR sensor, and localized SPR sensor. The advantages and existing problems of SPR in evidence analysis have also been pointed out. Significant improvements have been achieved in recent years by the combination of SPR with mass spectrometry (MS) which made it possible to be widely used in complex analysis and the real case.
»

Artificial Intelligence Technologies for Fact-Finding of Criminal Cases

Accept: 2018-08-21
Full Text: PDF (0KB) (41)
Show Abstract
Artificial intelligence technologies gradually rise, which are applied to assist the criminal facts-finding in forensic science, from the early criminal expert auxiliary system to the artificial intelligence technologies based on the bayesian model, to the artificial intelligence technologies based on computational argumention model, artificial intelligence makes the process more scientific, of which the evidences point to the case facts. Artificial intelligence continuously overcomes its technical defects, gets closer to the thinkings and methods of judges and juries to find the criminal case facts, which plays a role to assist the judicial judgment and improve the accuracy of the case facts-finding.
»

The study and forensic potential of skin microbial community

Accept: 2018-08-21
Full Text: PDF (0KB) (44)
Show Abstract
Human skin is the largest human organ, inhabited by a diverse milieu of commensals, including bacteria, fungi, and viruses. With the advances in molecular sciences and genomics, we have learned more about the microbial communities in human skins. Though the skin’s exposure to the external environment and the structural and functional composition of the human skin microbiome can be influenced by many factors,the microbial communities are largely stable over time. They also show site-specificity and individual-specificity. The composition of the skin microbiome may prove a useful indicator of human identification or the time since death. The composition of the skin microbiome may also be a means of linking people, animals, or objects together or to a specific location. The skin microbial communities can provide evidences in many different forensic scenarios, however, most of the work is still at the experimental stage and there are many opportunities for further research. The purpose of this review is to describe the characteristics of the human skin microbiome and the research methods which can explore the skin microbial communities at a high resolution and hoping this review may provide a reference for research of the skin microbial communities and practice in forensic science.
»

Detection of synthetic cannabinoids in novel drugs by high performance liquid chromatography-tandem mass spectrometry

Accept: 2018-08-21
Full Text: PDF (0KB) (32)
Show Abstract
Objective A method for detection of synthetic cannabinoids in novel drugs was present with high performance liquid chromatography and tandem electro-spray mass spectrometry. Methods The samples were extracted by methanol with ultrasound and centrifuged, then the supernatant was removed and filtered through a 0.22 μm membrane. The extract was separated on an Agilent Poroshell 120 EC-C18 (4.6×100 mm, 2.7μm) column with a gradient elution. The flow rate was 0.6 mL/min with acetonitrile-water containing 0.1% formic acid as the mobile phase. ESI(+) with dynamic MRM mode was used to detect the eluted synthetic cannabinoids. Relults The qualitative and quantitative analysis of eight common synthetic cannabinoids were carried out. They all showed a good linear relationship in the range of 0.5-500 ng/mL. The lowest detection limit was in the range of 0.01-0.1 ng/mL for deferent compounds. The intra-day relative standard deviation were not more than 3.05%, and the interday elative standard deviation were not more than 5%. Conlusion The method presented has the advantages of rapid , sensitive and accurate. It was suitable for identification of synthetic cannabinoids in novel drug abuse cases.
»

Review on Forensic Palynology

Accept: 2018-08-21
Full Text: PDF (0KB) (72)
Show Abstract
Forensic palynology is a branch of forensic science and plays an important role in criminal cases. In certain circumstances, it can connect a suspect with the scene of a crime, deduce the death time, provide clues as to the source of the drugs, and disprove alibis. The discipline has been widely used in the countries such as New Zealand, the United Kingdom and the United States, followed by other countries. This paper reviews the application cases of forensic palynology over the past 50 years, and further discusses the developmental emphasis and direction.
»

Recognition and Inference of the Synthetic Information of 11 Cases Methamphetamine Were Seized on Yunnan Border Area

Accept: 2018-08-21
Full Text: PDF (0KB) (56)
Show Abstract
Objective To explore the synthetic route of MA by analyzing the characteristic impurities of 11 cases of "Golden Triangle" transboundary methamphetamine (MA) which were seized in the border area of Yunnan province, to establish a computer retrieval method for the synthesis pattern recognition of methamphetamine, and provide a basis for homology identification of methamphetamine samples. Methods 11 samples were was detected by GC/MS after extracted by HS-SPME, and the correlation was analyzed by the percent content of Impurity peak area. Results Methamphetamine seized in Yunnan province is mainly synthesized from synthetic ephedrine and synthesized by Emde method. The methamphetamine samples have the possibility of using gasoline instead of organic solvents except for the 2nd and 11th sample. Conclusion The study can be used to predict the correlation between the synthetic route of methamphetamine and the characteristic impurities, and provide technical support for the public security organizations in combating illegal drug-making and drugs.
»

Carbon monoxide poisoning death caused by charcoal-burning in closed room

Accept: 2018-05-03
Full Text: PDF (0KB) (98)
Show Abstract
Objective To explore the points for identification of carbon monoxide poisoning death caused by burning charcoal in closed room. Methods Twenty cases of carbon monoxide poisoning death caused by burning charcoal in closed room during 2013-2015 in Wenzhou, Zhejiang were included. Descriptive statistical analysis was performed.Results The majority of cases had been identified as suicide. Last messages in letters, electrical goods, and social media might be direct evidence.Conclusion Self-behavior in the scene is the main feature of suicide, and it is a necessary but not sufficient condition for manner of death determination.
»

Distinguish the way of breaking the window of Theft of property cases in the car

Accept: 2018-05-03
Full Text: PDF (0KB) (56)
Show Abstract
With the rapid development of China's economy and the improvement of people's living standards, the car has entered more and more ordinary families, ordinary people become the means of transport. With the continuous increase in the number of cars in our country, coupled with the poor awareness of the masses of the theft, often stored in the car belongings, leading to the current theft of property cases around the country. One of the most cases is the implementation of the broken window glass of theft, the scene of the commonly used automobile toughened glass traces of, can not provide strong support for the classification of cases judged by failure to distinguish field glass. In view of the above reasons, the author has worked in practice in recent years, the car broke the glass of the field damage by collecting known, combined with relevant information to carry out research, summarizes several such cases in the common broken window glass discrimination method, a reference for the readers.
»

Digital evidence acquisition in the context of Big Data: A two dimensional acquisition Framework

Accept: 2018-05-03
Full Text: PDF (0KB) (27)
Show Abstract
Digital evidence acquisition is one of the most important steps of digital forensics, which relates to the efficiency and final results of digital forensics. Traditional techniques of digital evidence acquisition lay the foundation for digital forensics. However, Big Data period brings new challenges to digital evidence acquisition, such as: large volume of evidences, diversity of evidence sources, complex evidences types, evidences inconsistency, poor internal relations among evidences and overmuch invalid data, etc. In that case, this paper presents a two-dimensional framework for digital evidence acquisition. Firstly, The framework reuses the former experience of existed cases to locate the position of digital evidence with case-based reasoning approach. Secondly, with the assistance of the expert knowledge base built on Ontology, the method can solve the problem of diverse evidence sources. And with the assistance of the inference engine of the knowledge base ,the method can dig out the inner-relationship among evidences and delimit the evidences’ content at the same time. By combining the two dimensions -- the position and the content of digital evidence acquisition, this method can eliminate the invalid data, improve the efficiency and avoid the conflict among evidences. It provides a high-efficiency and solid analytic basis for the follow-up work.
»

Evaluation of Forensic Science Evidence Based on Bayesian Statistical Inference

Accept: 2018-05-03
Full Text: PDF (0KB) (84)
Show Abstract
Currently, Bayesian statistical inference is being developed into an international standard logical framework for the evaluation of forensic science evidence. It uses prior knowledge and evidence information to evaluate the probability of an event (if a hypothesis is true) through statistical inference and probability estimates. In Bayesian framework for the evaluation of forensic evidence, first, the forensic expert make statistical evaluation on the ratio of the probabilities of obtaining evidence given two competing hypotheses (prosecution hypothesis and defense hypothesis)—likelihood ratio, and quantitatively demonstrate the value of the evidence. Then, the triers of fact in court calculate posterior odds under two hypotheses given the evidence using likelihood ratio multiplied prior odds. Finally, the triers of fact update their prior beliefs using likelihood ratios, and make fact inference. This is not only the innovation of forensic science but also the advance in the admission and evaluation of forensic evidence, which is significant for impelling the scientific application of forensic evidence and judicial civilization.
»

Research of Android Phone get physical dump method without root

Accept: 2018-05-03
Full Text: PDF (0KB) (91)
Show Abstract
In Digital evidence examination work, Android phones account for a large proportion. In the past, in order to fully extract and recover data as possible from Android Phone, examiner try to get root (system highest authority) authority for to get physical dump of Android Phone. With the Android system version constantly updated, get root authority of Android phone is more and more difficult, also with high risk of damage to data. So get physical dump of Android phones without root is method more standardized in digital forensic.
»

A Novel Gel-lifter Method for Overlapped Fingerprint Development

Accept: 2018-05-03
Full Text: PDF (0KB) (59)
Show Abstract
Objective A new method of overlapped fingerprint development by gel-lifter is presented, and the overlapped normal latent fingerprints on glass slides were developed by an adhesive fingerprint gel-lifter. Methods The gel-lifter was made by adhesive gelatin (Gel),polyurethane substrate(PU) and polyethylene terephthalate film(PET). Six overlapped fingerprint samples that deposited on glass slides with 0.5-24h interval time were made. And the samples were respectively lifted in series by the gel-lifter to observe the influence of fingerprint age on development effect. Furthermore, a coefficient of interval time between marks deposited Td [Td = (t1-t2)· t2-e], was firstly introduced to discussed the developing results of overlapped fingerprints. Results The gel-lifter repeatedly lifting has good effects on overlapped fingerprint separation and development. And when the coefficient of interval time Td≥0.28, thorough 2 or 3 times adhesive gel-lifter lifting, the overlapped fingerprint ridge interference was eliminated and the single fingerprint image was gained with clear detail and high background contrast. Conclusions The new method of gel-lifter repeatedly lifting could effectively eliminate the ridge interference and develop single fingerprint image from original overlapped fingerprint. This method has some advantages on speed, simplicity, effect and reliability, and more research and application of gel-lifter should be expected in overlapped fingerprint development.
»

Comparative evaluation of different extraction methods for forensic RNA/miRNA analysis

Accept: 2018-05-03
Full Text: PDF (0KB) (72)
Show Abstract
Objective Seven commercially available and commonly used RNA extraction kits and methods(including six commercially available extraction kits and Trizol organic extraction)was compared to assess their relative effectiveness of yielding RNA/miRNA. Methods We set up samples of dried peripheral blood for extraction of RNA by six commercially available extraction kits and Trizol organic extraction methods respectively. RNA quality was assessed by UV spectrophotometer, agar gel electrophoresis and quantitative PCR analysis. Results The results showed that different methods exhibited considerable differences between quality assessment and levels. Trizol organic RNA extraction method and RNeasy? Mini Kit can get RNA/miRNA with good quantity and quality(Total RNA quantity: >1353.50±78.87ng, OD: >1.84±0.03). Conclusions In terms of quantity, quality, and quantitative PCR based analysis, the RNeasy? Mini Kit and Trizol are more suitable for extracting RNA/miRNA from peripheral blood.
»

Recognition of laser printer based on the image processing algorithm by Fourier expansion

Accept: 2018-05-03
Full Text: PDF (0KB) (47)
Show Abstract
Abstract: Objective the experiment is based on the ink changes of files printed by laser printing, finding out the traces which can reflect the stability on the same machine and can reflect the characteristics of the individual differences on different machine. Construct a machine recognition method on the basis of the traces. Methods The academic papers is based on laser printing files, using Matlab software programming for image preprocessing, gray information extraction, the Fourier series expansion is used to algorithm to extract frequency spectrum of 15 major “peak”, calculation the height width position to build a Euro space, finally giving an output value as the evaluation standard, the greater the value is showed, the greater the difference between examination and samples for examination and conversely the more similar samples. Results After experiment it was found that the coincidence rate which latter is greater than former was 95.8% in the two comparing results, the results which the latter is more than twice as the former account for 79.2% of all, for most of the samples between the latter and the former there is a significant difference on the order of magnitude. For the same type of different machines and the latter also greater than the former but there is no clear advantage on number of differences of orders of magnitude. Conclusion The laser printing machine recognition algorithms are practical and effective, especially for different models, for the same type of different machines also presented the bigger difference in this experiment Under the condition of control, 2 * 105 can be used as a threshold effectively rule out the possibility that derived from the same machine
»

The Analysis Method of Y-STR Mutation in Familial Searching

Accept: 2018-05-03
Full Text: PDF (0KB) (67)
Show Abstract
Because of male-specific property, Y chromosome are haploidly inherited in a paternal lineage. Y-STRs which were mainly applied for investigations of sexual assault and paternity before, have been introduced into criminal investigation field theses years. Consequently, the new-established method ‘Y-STRs familial searching’ becomes a powerful tool for criminal detection. However in some practical cases, the Y-STRs genotyping were differences between evidence at the scence and suspected samples screened are significant due to mutations of Y-STRs, leading to the difficulty when performing familial searching based on Y-STRs genotyping. A typical case which exist mutation of four Y-STRs sites, is cited in the article to illuminate data analysis strategy related, and offer suggestions for sites selection for the Y-STRs database construction as well.
»

Application of site reconstruction and characterization theory in suspected murder cases

Accept: 2018-05-03
Full Text: PDF (0KB) (79)
Show Abstract
Abstract: Site inspection is one of the important approaches for criminal investigation. Combined site inspection, autopsy, evidence examination, and information from case investigation, the suspected murder scene could be reasonably analyzed in order to rebuild the process of the murder, deduce the murderer’s action and psychological characteristics. To the maximum extent, these steps could provide clue, reduce the scope of investigation, and indicate the direction for criminal investigations. This study reported a criminal investigation of a skeletonization of body. Though this case report, we reviewed the typical theory and approaches of criminal site inspection, recognized the relationship between the criminal processes and the participants’ actions, evaluated the site reconstruction and characterization theory in murder site analysis.
»

Research on Multi - target fast detection algorithm based on background adaptive video

Accept: 2018-05-03
Full Text: PDF (0KB) (39)
Show Abstract
In the modern investigation relying on the big data platform, through the multi-police synthesis of operations in the big investigation mode, the video detection has become an important part of the big investigation mode. Traditional video investigators often need to watch and analyze mass video. This kind of investigation is not only time consuming and laborious, but also because of the negligence of the investigators, the key investigation information is missing. In view of the problems and challenges in the current public security work, the paper calls on the national public security innovation work to explore the target retrieval algorithm in the video, and compares the advantages and disadvantages of the various algorithms. Target retrieval algorithm (hereinafter referred to as "algorithm"). The algorithm can adapt to the background changes in real time under the fixed camera and analyze and compare the multi - moving target in the video to realize the quick retrieval of the video target.
»

Study on Effects of IL-1 Activities Secreted by PMΦs

Accept: 2018-01-25
Full Text: PDF (0KB) (47)
Show Abstract
Objective To study Effects of IL-1 Activities Secreted by PMΦs。Methods peritoneal macrophages in vitro,The relative activity of IL-1 was evalued by the cell culture and the mouse thymocyte proliferation methods。Results Heroin can promote the mouse PMΦ secreting IL-1, and significantly increase the IL-1 activites in vitro。Conclusion Heroin can speed up the mouse APD course by promoting IL-1secretion。
»

Forensic Science Developmental Research during 13th Five-Year Plan

Accept: 2018-01-22
Full Text: PDF (0KB) (103)
Show Abstract
13th Five-Year plan period is an important period of strategic opportunities for the development of forensic science. On the basis of summarizing the current status of forensic science, this paper puts forward the goal of forensic science in the new era, strengthening the overall design of the whole chain, focusing on solving common problems and promoting the overall promotion of all disciplines. Therefore, in the 13th Five-Year plan period, forensic science should focus on advancing basic theoretical research, suspect characterization research, evidence analysis and tracing research and quality assurance research, in order to achieve breakthrough of theory and technology and promotion of identification quality. Finally, this paper looks into the trend of intellectualization, standardization and industrialization of the future development of forensic science.
»

The applications of direct analysis in real time - mass spectrometry into forensic toxicological analysis

Accept: 2017-09-29
Full Text: PDF (0KB) (114)
Show Abstract
In recent years , direct analysis in real time ( DART),which was a new ambient ionization and a non-contact thermal desorption/ionization source, is a revolutionary mass spectrometry ionization technology. Because of the simplicity of this innovation, the forensic laboratory could analyze the sample on-site, direct, non-destructive, rapid and in-situ. The principle of direct analysis in real time mass spectrometry and its applications in forensic toxicological analysis was introduced in this paper. DART has the potential to significantly impact on forensic science laboratory in the future.
»

Recent Progress in Fluorescent Probes for Detection of 2, 4, 6-Trinitrophenol

Accept: 2017-09-17
Full Text: PDF (0KB) (44)
Show Abstract
»

Difference between Automatic Fingerprint Identification and Artificial Recognition and the Strategy of Man-machine Coordination

WANG Yong, LV Nan, ZHAO Tong
Accept: 2017-09-11
Full Text: PDF (0KB) (99)
Show Abstract
Generally speaking, the mode and method is not exactly the same, when technical personnel and AFIS system independently judging the similarity of two fingerprints. In this paper, according to the author's work experience, on the one hand, the differences between AFIS image processing and artificial fingerprint recognition are given from the point of view of the fingerprint feature extraction and matching, on the other hand with above differences, the fingerprint matching strategies of the combination of man and machine are summarized. Professional and technical personnel can regard this paper as a reference, and increase their own efficiency of fingerprint matching processing.
»

Modification to the Exif information of the JPEG digital photos by rotation operation

LIU Tao, YANG Ming
Accept: 2017-09-11
Full Text: PDF (0KB) (67)
Show Abstract
In the process of browsing photos, in order to facilitate browsing, it is usually needed to rotate the photos clockwise or counterclockwise. However, it is found that the rotation operation of some image browsing software sometimes could modify the many contents of the photos and destroy the aboriginality of the photos, which is adverse to the preservation of important photos, photo identification and so on In the field of Forensic Science. In this paper, the influence of rotation operation on the aboriginality and Exif information of the digital photos was analyzed. A digital photo shot by a Canon 5D II digital SLR camera served as the original photo. Firstly this original photo was rotated inside the Canon 5D II digital SLR camera by using camera rotation function, then five popular kinds of image browsing software, including “Microsoft Windows Photo Viewer”, “ACDSee 17”, “Neoimage”, ”Picasa 3” and “Lightroom5”, were used to commit clockwise and counterclockwise rotation to the original photo. Through analyzing and comparing MD5 and Exif information of the photos before and after rotation, the rotation operation effect on the aboriginality and Exif information of the photo was analyzed and discussed. The results showed that The MD5 changed and the Exif information was modified, thereby the photos aboriginality was destroyed when rotation operation committed inside camera, or by ‘Microsoft Windows Photo Viewer’, ‘ACDSee 17’, ‘Neoimage’. But ‘Picasa 3’ and ’Lightroom5’ did not change the photos aboriginality because they usually used extra files to record the operation process rather than directly operated the photos. It was concluded that the rotation operation was likely to cause the digital photo Exif information changed, and destroyed the photos aboriginality. In the field of judicial expertise and forensic science, in order to ensure the photo aboriginality, it was necessary to adopt the right methods and measures when preserving and browsing the important photos.
»

TriallelicPatterns inthe STRLociUsedinRoutineForensicAnalysis

LIU Zhenping, YANG Yang, TONG Jijun,ZHAI Xiandun
Accept: 2017-09-11
Full Text: PDF (0KB) (40)
Show Abstract
Objective To explore the phenomenon and characteristics of triallelic patterns discovered in the STR loci commonly used in routine forensic practice. Methods Triallelic patterns were screened from 37737 unrelated healthy individuals’ STR-genotyping data obtained with STRtyper-21G kit. All the triallelic patterns were confirmed by other different kits. The frequency of triallelic patterns was calculated and their features were analyzed. Results Of the 26 suspected triallelic patterns, 21 cases were confirmed, 3 cases elusive, and 2 ones were excluded for the rare alleles spanning across the neighboring locus. The frequency of triallelic patterns was 0.0556% (21/37737) in autosomal STRs, 0.0106% (4/37737) at FGA and/or TPOX, plus 0.0079 % (3/37737) at PentaE. Of all the triallelic patterns, it is 71.4% (15/21) for Type 1 and 28.6% (6/21) for Type 2. Conclusion Triallelic patterns are present of certain percentage in population, thus needing careful assessment in routine forensic work.
»

A Research of block feature based copy-movemodel checking

Han Chang, Wang Yunfeng
Accept: 2017-09-11
Full Text: PDF (0KB) (69)
Show Abstract
In view ofthe large number pictures that were forger or tampered on the Internet.In researchthe low quality image tampering and forgery algorithmto detect the authenticity of the image. With the movement of the image - replication model as an example for image tampering, the analysis of the image itself and the statistical properties of the inner sorting process based on dictionary, using three kinds of blind forensics algorithm included DCT,PCA,WAVELET to detection image tampering area. Lastly analysis the algorithm robustnessof three kinds of algorithms in the process of sampling and noise adding, and get a better the experimental results. We have a good exploration in blind forensics algorithm for digital image.
»

Two Methods Exclusive for Extracting DNA from Ordinary and Aged Bones or Teeth

SONG Zhen, SONG Sanping, TU Zheng, ZHAO Jie, HE Yongfeng
Accept: 2017-09-11
Full Text: PDF (0KB) (67)
Show Abstract
Objective To set up new methods for the extraction of DNA from ordinary and aged bones or teeth. Methods 380 samples of bones and teeth, consisting of 347 ordinary and 33 aged ones, were collected from our previous routine casework. Handy-Eco instrument was selected to grind the ordinary samples into powder while the aged samples were to achieve the same efficacy by Freezer Mill apparatus. DNA was extracted from the above-processed samples with Kingfisher automatic system, followed to test its STR profile with Identifiler Plus kit. Results DNA was shown the 15 autosomal STR loci of Identifiler Plus from the 345 ordinary samples, presenting the success rate of extraction as 99.42%. There were 32 aged samples demonstrating their Identifiler Plus’ 15 autosomal STR loci, bringing up the success rate of DNA extraction under 96.97%. Conclusion The established methods here are efficient to extract DNA from either ordinary or aged bones and teeth, applicable in forensic practice.
刑事技术
 Top Read
»

Acquiring Physical Dump-images from Android Phone without Root Authority

JI Chaohao, WANG Jimo, PEI Hongqing
2018, 43(6): 465-465. Full Text: PDF (1571KB) (322)
»

Recognizing the Synthetic Route of Methamphetamine by Its Seizures from 11 Cases at Yunnan Border Area

ZHANG Wenjing, LIAO Xuandong, XU Manman, LI Hong, ZHAO Haiqing, XIE Yanming
2018, 43(6): 458-458. Full Text: PDF (1797KB) (182)
»

Insight on Comprehensive Application of Various Detection Means into Video Tracking

SUN Yihe
2019, 44(3): 260-260. Full Text: PDF (1590KB) (214)
»

Facial Comparison Based on Likelihood Ratio of Similarity Score Obtained from Deep-learning into Features

LI Zhihui, XIE Lanchi, WANG Guiqiang, WANG Haiou, NIU Yong, XU Lei, YAN Yuwen, LI Zhigang, XU Xiaojing, HUANG Wei, ZHANG Ning, GUO Jingjing, HOU Xinyu
2019, 44(1): 8-8. Full Text: PDF (6333KB) (255)
»

Recent Applications of UAV into Crime Scene Investigation

LU Xilong, LIU Guanhua, YAN Yuwen, SHI Yi, ZHAO Xiaohui, SUN Zhenwen, LI Zhigang, LIU Jin, WANG Mingzhi
2018, 43(6): 480-480. Full Text: PDF (2359KB) (255)
»

Application and Optimization of National Database of Shoes’ Patterns

JIN Yifeng, BAI Yanping, SHI Feng, LU Xilong, LIN Min, LIU Weiping
2018, 43(6): 513-513. Full Text: PDF (1567KB) (169)
»

Identification of the Victims from the Sinking of “Eastern Star” Passenger Ship

WANG Haisheng, TIAN Xuemei, WANG Kun, ZHU Chuanhong, LI Shangxun, MIN Jianxiong
2018, 43(6): 492-492. Full Text: PDF (1646KB) (183)
»

Research Progress of Forensic Genealogy Analysis

LIU Jing, JI Anquan, LI Caixia, WANG Guiqiang
2019, 44(3): 194-194. Full Text: PDF (1874KB) (256)
»

Discovery and Extraction of DNA Traces Left from the Burglaries of Technically Unlocking Security Door

WANG Zhi, JIN Yifeng, LIN Xiang
2018, 43(6): 496-496. Full Text: PDF (1707KB) (273)
»

Comparative Evaluation on Different RNA Extraction Methods

LI Ranran, WANG Bing, HU Sheng, LI Yang, ZHAI Yongjie, LI Caixia, SUN Qifan, JI Anquan
2018, 43(6): 435-435. Full Text: PDF (2612KB) (278)
»

A Novel Gel-lifter for Developing Overlapped Fingerprints Deposited at Different Time

GAO Feng, ZHANG Jiamin, XU Xiao, WANG Zizheng, LIU Huan
2018, 43(6): 448-448. Full Text: PDF (3387KB) (173)
»

Effect of Detection Time on Determining the Alcohol Content in Blood Samples in Identification of Driving with Alcohol Drunk

LIU Dongxian, CHEN Zhiwei, HE Jiangnan
2018, 43(6): 462-462. Full Text: PDF (1649KB) (174)
»

Forensic Potential of Skin Microbial Community

XIA Xuqian, NIU Qingshan
2019, 44(3): 200-200. Full Text: PDF (1608KB) (149)
»

An Algorithm for Fast Detection of Video Target

LIU Song, WANG Ziyiwen, WEI Dong, YANG Hongchen
2018, 43(6): 444-444. Full Text: PDF (1615KB) (121)
»

Botanical Evidence and Its Potential Value against Campus Crimes

YANG Ju, LÜ Zhou, ZOU Weidong
2019, 44(1): 25-25. Full Text: PDF (4113KB) (156)
»

Quick Age Estimation from Facial Images

SHEN Xiaohu, JIN Tian, ZHANG Changzhen, WAN Rongchun
2019, 44(2): 99-99. Full Text: PDF (2776KB) (367)
»

Verification of Composite DIP-STR Genetic Markers in Northeast China’s Han Population

JIN Xin, XU Sixian, XIA Mingying, YANG Shuping, YIN Caiyong, LI Shilin
2019, 44(3): 212-212. Full Text: PDF (1813KB) (101)
»

Status of Examination on Second Added Printing

HAN Xingzhou, HAN Yuanli, QIN Da, HAO Hongguang
2018, 43(6): 488-488. Full Text: PDF (2081KB) (131)
»

Identification of a Hit-and-run Case Involving an Injured Child

ZHAO Minghui, ZHANG Daqing, SUN Xihang
2019, 44(3): 282-282. Full Text: PDF (1843KB) (215)
»

Mouth Simulator in Acoustic Analysis

WANG Li, WANG Xiaodi, KANG Jintao, SHENG Hui, LI Jingyang
2019, 44(1): 12-12. Full Text: PDF (3043KB) (127)
»

Fourier Transform Infrared Spectroscopy Identifying Drugs: Advantages and Prospect

BAI Yanping, MIN Shungeng, LIU Cuimei
2019, 44(1): 52-52. Full Text: PDF (5260KB) (102)
»

Consistency Analysis between NFIQ Score and Experts’ Identification for Fingerprint Image Quality

WU Hao, LI Kang, XUE Jing, LI Xiaojun, CHEN Zilong, WANG Zizheng, QIN Qi
2019, 44(3): 268-268. Full Text: PDF (1765KB) (63)
»

Identification of N-isopropyl-benzylamine in Vitro and Urine

LI Junbo, LIAO Hongzhu
2019, 44(1): 33-33. Full Text: PDF (3369KB) (95)
»

One Case of Suspected Homicidal Throttling Death yet from Poisoning by Self-overdosing Narcotics

CHEN Yuanli, ZHOU Ronghua, LU Shouchuan, CAO Qiwen, HE Yongwang
2019, 44(3): 275-275. Full Text: PDF (1759KB) (194)
»

Genetic Analysis of 19 X-STR Loci in Zhejiang Han Population

HAO Honglei, WU Weiwei, REN Wenyan, SU Yanjia, LÜ Dejian, CHEN Linli
2018, 43(6): 453-453. Full Text: PDF (1588KB) (121)
»

Application of DNA Technology in Xiamen “6 • 7” Bus Arson

LIN Yucai, TANG Weiwei, ZHANG Zhihong
2018, 43(6): 507-507. Full Text: PDF (1667KB) (172)
»

Artificial Intelligence Assisting to Finding Facts of Criminal Cases

WEI Bin, ZHENG Zhifeng
2018, 43(6): 476-476. Full Text: PDF (1799KB) (200)
»

Forensic Identification about Four Cases of Death from Phosphine Poisoning

LI Xinqiang, FANG Junjie
2018, 43(6): 516-516. Full Text: PDF (1737KB) (176)
»

Weighing to Count the Quantity of Air Gun Pellets

BAO Liyin, LI Yiyi, ZHANG Wen, CUI Bin, JIN Yifeng, MA Xinhe
2018, 43(6): 440-440. Full Text: PDF (1599KB) (110)
»

Marks on Cartridge Cases Shot from Seven-kind 9mm Pistols and Their Forensic Value

LÜ Xiaosen, TIAN Furui, LIU Siye
2019, 44(4): 307-307. Full Text: PDF (2683KB) (121)
Forensic Science And Technology
 Top Download
»

Quantitative Analysis of Acetone in An Unusual Death

SONG Lijuan, ZHAO Peiduo, ZHANG Guanghua
2015, 40(3): 258-258. Full Text: PDF (2252KB) (19651)
»

Study on Fingerprint Examiner’s Recognition of Fingermarks

LIU Shi-quan,LUO Ya-ping,WU Jian
2015, 40(1): 7-7. Full Text: PDF (2893KB) (2245)
»

Research Progress of Immunological Technique in Analysis of Fingerprints' Contents

ZHANG Ting,YANG Rui-qin
2015, 40(1): 27-27. Full Text: PDF (1714KB) (2071)
»

2016, 41(1): 4-4. Full Text: PDF (1371KB) (1915)
»

USB Device Usage Traces in Windows Environment

DUAN Yan-bing,LUO Wen-hua
2015, 40(2): 141-141. Full Text: PDF (3018KB) (1900)
»

A New Pretreatment Method for Toolmarks on Bone

WANG Zhen, LIU Jin, YAN Yu, HE Chenjiao
2015, 40(4): 271-271. Full Text: PDF (2245KB) (1756)
»

Several Key Issues for China National DNA Database Development

LIU Bing
2015, 40(4): 323-323. Full Text: PDF (2527KB) (1723)
»

2012, 37(3): 12-12. Full Text: PDF (400KB) (1714)
»

Lockscreen Passcode Decryption on Android Smartphone Using a Custom Recovery

SHI Suidong, LI Meng, LEI Ming
2015, 40(4): 329-329. Full Text: PDF (2319KB) (1682)
»

Application of DNA typing from Gloveʼs Imprints into Unearthing Theft Cases

LI Zhongjie, XU Jie, HE Wei, WU Hu
2016, 41(2): 172-172. Full Text: PDF (2762KB) (1667)
Forensic Science And Technology
2019 Vol.44      No.1      No.2      No.3
2018 Vol.43      No.1      No.2      No.3      No.4      No.5      No.6
2017 Vol.42      No.1      No.2      No.3      No.4      No.5      No.6
2016 Vol.41      No.1      No.2      No.3      No.4      No.5      No.6
2015 Vol.40      No.1      No.2      No.3      No.4      No.5      No.6
2014 Vol.39      No.1      No.2      No.3      No.4      No.5      No.6
2013 Vol.38      No.1      No.2      No.3      No.4      No.5      No.6
2012 Vol.37      No.1      No.2      No.3      No.4      No.5      No.6
2011 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2010 Vol.0      No.2      No.1      No.3      No.4      No.5      No.6
2009 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2008 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2007 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2006 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2005 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2004 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2003 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2002 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2001 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
2000 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1999 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1998 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1997 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1996 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1995 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1994 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1993 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1992 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1991 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1990 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1989 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1988 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1987 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1986 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1985 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1984 Vol.0      No.1      No.2      No.3      No.4      No.6
1983 Vol.0      No.1      No.2      No.3      No.4
1982 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1981 Vol.0      No.1      No.3      No.2      No.4      No.5      No.6
1980 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1979 Vol.0      No.1      No.2      No.3      No.4      No.5
1978 Vol.0      No.1      No.2      No.3      No.4      No.5      No.6
1977 Vol.0      No.1      No.2      No.3      No.4      No.5
1976 Vol.0      No.1      No.2      No.3
Copyright © Forensic Science And Technology
TEL:010-66269489,010-66269519,010-63407342 E-mail:xsjsbjb@cifs.gov.cn