Academic Journal of

Forensic Sciences

[Abbr: Acd. Jr. AJFSc]
English
2581-4273
2016

Examination of Various Adulterants in non-branded Mustard Oil for Forensic Considerations

by Preeti Pandey, Dr. Munish Mishra, Dr. Lav Kesharwani

One of the sources of essential fatty acids is edible oils and fats which also add special flavours and helps in maintaining the integrity of the cell membrane. Due to its crucial importance in our day to day life it has been easily prone to various kind of adulterants. The prime cause of the adulteration is the plain price variations and economic gain. Mustard oil is one of preferred edible oil in northern India. Adulterants like Aregemone oil, rice bran oil, palm oil, linseed oil etc., are frequently used to adulterate the Mustard oil. Light pale cheaper oils, dyed with synthetic dyes along with the addition of allyl isothiocyanate which adds mustard pungency factor, are sometimes sold under the name of mustard oil. In the current paper simple, rapid and reliable colour test such as improved nitric acid ,azo dye test, bauduoin test, halpen’s test and solvent separation techniques have been stated and TLC was performed and calculated Rf value was compared with the standard ones. 20 different samples were collected from the local area and analysed. After analysis it was found that 80% samples were found adulterated with more than one adulterants. Keywords: Adulteration, Mustard oil, Thin layer chromatography

Critical Review on Role of Blood Protein in Forensic Science

by Anu Priya Singh, Priya Singh, Dr. Vaibhav Saran

In crime scene, mostly blood, semen, saliva, urine, vaginal fluid, sweat etc. are mostly found in case of sexual assault, theft, burglary, murder, suicide, homicide, road accident etc. these evidence play major role in criminal investigation as they can help to link criminal with crime as act of Locard principal of exchange. This reviewed paper discuss about the different techniques for the identification of blood protein in the body fluids. Also explains the difference between the body fluids on the basis of specific protein present in all body fluids. Keywords: Blood Protein, Body Fluids, SDS-PAGE, MALDI-TOF.

Effect of Hands Writing in Various Drug Addict Person

by Nikhil Dubey, Priyanka Soni, Sushma Upadhyay

The case study highlights the importance of observing the handwriting which was damaged due to drug abuse. Handwriting of a medication buyer introduces certain qualities that are helpful to be known and broke down by specific masters associated with research in both the Criminal and Medical field. Handwriting investigation can turn into a profitable therapeutic determination instrument for observing the advancement made by medication addicts under medicine; the ends uncover the qualities of harmed Handwriting because of medication misuse, subsequent to breaking down a few Handwriting of a multi-year people who are dependent on medications. The outcomes of drugs on the image gesture shapes can be quickly classified as: - inconstant pressure; - inconsistency and incoherence in keeping slant left/ right; - performing person letters with different slants, - sloppiness and mistakes, sudden deviations, vertically - horizontally superficiality and ailment in the familiar corporation of writing in page; - variations in pressure between the upper and the decrease zones due to exhaustion and rest of muscle tone; - tendency to radically change the angular shapes into threaded movements. The frequent characteristics always are analyzed after taking into consideration the subject’s medical history, intellectual illness or any other illnesses that can alter his normal fitness status, the age, and the type of drug used (narcotics, Alcohol, Cocaine or any medical drugs). Keywords: Toxicology, Drug Abuse, Handwriting after Drug Addictions.

Dermatoglyphics Inferences in Sex Determination amongst Tribal Population – A Review

by Kiruthiga U

Dermatoglyphics is a well-known detailed scientific study of epidermal ridges that are present on the palmer surface, fingers and sole of the feet. The epidermal ridges are known for their individuality and uniqueness that are distinguishable even between the monozygotic twins and thus their forensic significance. The present review focuses on the characteristic features of fingerprints such as ridge density, total fingerprint ridge count (TFRC) and ridge breadth amongst tribal population in India and other countries. Keywords: Dermatoglyphics, Fingerprints, Tribal population.

A Study on RAT (Remote Access Trojan)

by Mirdul Sharma

RAT (Remote Access Trojan) is a malware that can control compromised System remotely and creates backdoors to steal data, using target system for illegal purposes etc. A RAT is always installed without victim’s knowledge by many means of communication like E-mail, online free app distribution, torrent, chatting messengers and many other means, Remote access Trojan usually hide its operation processes from the victim and from security software (Antivirus, firewall). RAT usually work on a server undetectably running and listening to TCP/UDP ports on an infected machine. A RAT is once installed, RATs play out their unforeseen or even unapproved activities and utilize a cluster of methods to conceal their follows to stay undetectable and keep on infected system for a long time. The main objective of paper is to provide awareness about remote access Trojans and how to detect a remote access Trojan and stay protected. A RAT is a zombie malware that sits on your system unassumingly waiting for you to input sensitive details like password’s, email accounts, logins to internet banking and more. In this papers I am going to show you how to disinfect an infected or compromised system and how to play safe while working on internet to stay away from RATs. But as we all know prevention is better than cure, so I am also going to show some methods to stay protected from these type of malicious programs that can be very dangerous for an individual as well as society. Keywords: RAT, Compromised system, infected system, remote access Trojans, TCP/UDP, Malware

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking