Background: This study aimed to determine the gender of a sample of Iraqi adults utilizing the mesio-distal width of maxillary canines, inter-canine width and standard maxillary canine index, and to determine the percentage of dimorphism as an aid in forensic odontology. Materials and methods: The sample included 200 sets of study models belong to 200 subjects (100 males and 100 females) with an age ranged between 17-23 years. The mesio-distal crown dimension was measured manually, from the contact points for the maxillary canines (both sides), in addition to the inter-canine width using digital vernier. Descriptive statistics were obtained for the measurements for both genders; independent samples t-test was performed to evaluate the gender difference, percentage of dimorphism was obtained and discriminant function statistics were used for gender identification in addition to the percentages of gender identification accuracy. Results: Generally, the mesio-distal width of the maxillary canine and the inter-canine width were larger in males than females with a high significant difference. The accuracy of genders determination using standard maxillary canine index was 44% for males, 74% for females and 59% for the combined sample, while it was 70% for males, 76% for females and 73% for the combined sample using discriminant function statistics depending upon the canines, inter-canine widths and maxillary canine index. The percentages of dimorphism were 6.13% for the canine mesio-distal width and 4.66% for the inter-canine width. Conclusions: Maxillary canines can be used in genders identification as an aid for forensic odontology.
This research aims to identify the role that forensic accounting plays on the transparency and quality of the financial statements in trade bank of Iraq and the Gulf Commercial Bank in Babylon. This research came to address the problem that most financial institutions suffer from, which is represented by the lack of transparency and the quality of the financial statements issued in a manner. Annual also the manipulation and fraud in the financial data, which causes a big gap between that institutions and organizational stakeholders. According to the implementation of the research hypothesis and the objectives of the research, a questionnaire was prepared consisting of three axes, the first axis dealing with the demographic distri
... Show MoreDigital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show MoreBrain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining
... Show MoreBackground: ultrasound offers non-invasive, rapid and simple method for confirming the clinical diagnosis of maxillary sinus pathologies.
Objective: to evaluate the accuracy of real time ultrasound compared with the computed tomography in evaluation of maxillary sinusitis.
Patients and materials: This comparative cross-sectional study was done on 42 patients referred for computed tomography examination of paranasal sinuses in Al-Yarmook Teaching Hospital-Baghdad, from October 2012 to February 2013 with patients clinically suggesting an underlying maxillary sinusitis. Ultrasound and computed tomography examinations were carried out on the same day, the ultrasound being the first investigation. The sample of this study consisted of 2
With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreSocial factors may affect the available sources of toxic substances and causes of poisoning, and these factors may change over time. Additionally, understanding the characteristics of poisoning cases is important for treating such patients. Therefore, the present study investigated the characteristics of poisoning cases in Baghdad Poisoning Consultation Center (PCC) and Forensic Medicine Institute (FMI). Data on all poisoning cases reported in PCC and FMI during 2013 were retrospectively obtained from medical records. Total of 1131 reports of poisoning cases (1082 from PCC and 49 from FMI) were analyzed according to age, sex, geographical distribution and causes of poisoning according to the type and class of poisoning agent. The results
... Show Moreis at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines
... Show MoreDigital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.