Preferred Language
Articles
/
iqjmc-1257
Forensic Histopathological Approach to Electrocution

Background: Few Studies had been done on the role of histopathology in the medico-legal diagnosis of Electrocution even abroad.
Aim of the study: To determine the main histopathlogical features in cases of electrocution especially at the entry site of the electrical current which help in the diagnosis of those cases.
Methods: A full medico-legal autopsy had been done on 64 cadavers of persons died as a result of electrocution chosen randomly out of a total number of 144 cases of electrocution
during the year 2005 in the medico-legal institute of Baghdad including histopathological examination by ordinary method of different specimens from those cadavers at histopathology
department of the mentioned institute to reach the aim of this study.
Results: Electrocution constituted only 1.4% of all causes of death during the year 2005 in the medico-legal institute of Baghdad. Males were more than females in a ratio of 2:1. The most
affected age group was 30- 39 years old. In 62% of the case the entry of the current was with no exit. In 46.9% of the cases the entry site was in the form of charged centre surrounded by
gray elevated area and took other shapes in the rest of the cases. Microvesicural formation was the commonest histopathological finding in the skin. Pulmonary edema was the commonest histopathological finding in the lung.
Conclusions: Although they are non specific, histopatological features could help the forensic pathologist in the medico-legal diagnosis of electrocution in addition with other findings
especially in cases with less typical gross features or with incomplete information about the case, in addition to other conclusions of the study.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 03 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The relationship of forensic accounting to detecting tax fraud

Tax fraud is following different methods of tax evasion (bypassing the laws, instructions and regulations related to tax) by not showing the real taxable income by using laws, instructions and regulations improperly, and because of the weak basic role of forensic accounting in detecting and reducing tax fraud, the problem has become more influential on the state general tax income. The main objective of the research is to identify forensic accounting and the extent to how it can be applied in the General Tax Authority to assist forensic authorities in issuing judgments in fraud cases. To achieve the objectives of the research, the descriptive analytical approach was used to reach the topic of the research, and a questionnaire (co

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
Enhancement Digital Forensic Approach for Inter-Frame Video Forgery Detection Using a Deep Learning Technique

    The digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th

... Show More
Scopus (8)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Identifying Digital Forensic Frameworks Based on Processes Models

Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.

Scopus (4)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Copy Move Forgery Detection Using Forensic Images

     Digital images are open to several manipulations and dropped cost of compact  cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image  by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY AND UPDATING CHECKLIST OF DIPTERAN SPECIES WITH FORENSIC IMPORTANCE

In the present investigation, 24 adult dipteran species with forensic importance belonging to 13 genera and 8 families that were collected from different localities of Iraq. The specimens were identified by different taxonomical keys; in addition the date and localities of collecting specimens were recorded.

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Aip Conference Proceedings
Quantization approach to steganography perceptual color spaces

In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.

Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
A Metaheuristic Approach to the C1S Problem

Given a binary matrix, finding the maximum set of columns such that the resulting submatrix has the Consecutive Ones Property (C1P) is called the Consecutive Ones Submatrix (C1S) problem. There are solution approaches for it, but there is also a room for improvement. Moreover, most of the studies of the problem use exact solution methods. We propose an evolutionary approach to solve the problem. We also suggest a related problem to C1S, which is the Consecutive Blocks Minimization (CBM). The algorithm is then performed on real-world and randomly generated matrices of the set covering type.  

Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
2017 12th International Conference For Internet Technology And Secured Transactions (icitst)
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Tue Nov 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
The role of maxillary canines in forensic odontology

Background: This study aimed to determine the gender of a sample of Iraqi adults utilizing the mesio-distal width of maxillary canines, inter-canine width and standard maxillary canine index, and to determine the percentage of dimorphism as an aid in forensic odontology. Materials and methods: The sample included 200 sets of study models belong to 200 subjects (100 males and 100 females) with an age ranged between 17-23 years. The mesio-distal crown dimension was measured manually, from the contact points for the maxillary canines (both sides), in addition to the inter-canine width using digital vernier. Descriptive statistics were obtained for the measurements for both genders; independent samples t-test was performed to evaluate the gende

... Show More
View Publication Preview PDF