A rapid mtDNA assay of 22 SNPs in one multiplex reaction increases the power of forensic testing in European Caucasians

2008 ◽  
Vol 122 (6) ◽  
pp. 517-523 ◽  
Author(s):  
S. Köhnemann ◽  
U. Sibbing ◽  
H. Pfeiffer ◽  
C. Hohoff
Author(s):  
Casey J. Dawson ◽  
Kristine M. Jacquin
Keyword(s):  

2003 ◽  
Vol 66 (6) ◽  
pp. 1055-1062 ◽  
Author(s):  
GABRIELA NÁJERA-SÁNCHEZ ◽  
ROGELIO MALDONADO-RODRÍGUEZ ◽  
PATRICIA RUÍZ OLVERA ◽  
LYDIA MOTA de la GARZA

Two multiplex polymerase chain reactions were developed for the detection of enterotoxigenic strains of Staphylococcus aureus: one multiplex reaction for the simultaneous detection of enterotoxigenic strains type A (entA), type B (entB), and type E (entE) and another for the simultaneous detection of enterotoxigenic strains type C (entC) and type D (entD). Both reactions were standardized with the use of the reference enterotoxigenic strains of S. aureus: FRI 722, producer of staphylococcal enterotoxin (SE) type A (SEA); FRI 1007, producer of SEB; FRI 137, producer of SEC1; FRI 472, producer of SED; and FRI 326, producer of SEE. Optimized methods were used to determine the presence of enterotoxigenic types for 51 S. aureus strains isolated from meat (sausage, ham, and chorizo) and dairy (powdered milk and cheese) products by the Baird-Parker technique. The enterotoxigenic capacities of the strains were determined by the indirect enzyme-linked immunosorbent assay (ELISA) with the use of reference staphylococcal toxins and antitoxins. Fifty of the 51 strains isolated were enterotoxigenic and produced one to four enterotoxin types, with the most frequently produced types being SEA and SED. Levels of correlation between the presence of genes that code for the production of SE (as determined by polymerase chain reaction) and the expression of these genes (as determined by the indirect ELISA) were 100% for SEA and SEE, 86% for SEC, 89% for SED, and 47% for SEB.


2016 ◽  
Vol 33 (24) ◽  
pp. 3792-3814 ◽  
Author(s):  
Rebecca Campbell ◽  
Hannah Feeney ◽  
Steven J. Pierce ◽  
Dhruv B. Sharma ◽  
Giannina Fehler-Cabral

An increasing number of U.S. law enforcement agencies have disclosed that they have large numbers of untested sexual assault kits (SAKs; also called “rape kits”) in police property storage. Whether previously untested SAKs should be tested for DNA evidence has been the subject of considerable public debate. To inform policy and practice regarding rape kit testing, the current study tested a sample of 900 previously unsubmitted SAKs from Detroit, Michigan, and documented the DNA forensic testing outcomes associated with those kits. We assessed how many SAKs yielded DNA profiles eligible for upload into CODIS (Combined DNA Index System), the federal DNA criminal database; how many resulted in a DNA match (termed a “CODIS hit”); and how many of those hits were associated to other sexual assault crimes (i.e., serial sexual assault hits). Overall, there were 259 CODIS hits, 69 of which had DNA matches to another sexual assault case. The potential utility of a DNA profile and CODIS hit may vary depending on whether offender was known or unknown to the victim, so we examined these outcomes separately for SAKs associated with stranger- and non-stranger-perpetrated sexual assaults. We also present six case study examples of how DNA testing and CODIS hits helped identify serial sexual assaults in both stranger and non-stranger sexual assault cases. Implications for rape kit testing policies are discussed.


2000 ◽  
Vol 113 (5) ◽  
pp. 263-267 ◽  
Author(s):  
C. Tomàs ◽  
A. Picornell ◽  
J. A. Castro ◽  
M. M. Ramon ◽  
L. Gusmão ◽  
...  

2021 ◽  
Vol 2 (4) ◽  
pp. 1189-1196
Author(s):  
I Putu Agus Eka Pratama

Data plays the important role, so that data recovery and data security be prioritized. Computer users often lose their data due to personal errors or by attacks. Digital forensics has one sub-field called computer forensic, which has an important role in the process of secure data recovery. USB Flashdisk as the most widely used storage media has a probability of data loss. It is necessary to do computer forensic actions, especially secure data recovery, on it so that it can restore data securely to other media while protecting it by giving privilege root. In this research, computer forensic testing the 2781 files of various data formats that were erased on a 32 GB USB flash drive using Photorec. The media for collecting data recovery results using an Intel computer, 2 GB RAM, 1.8 GHz processor, the Linux operating system Xubuntu 20.04. Testing is carried out following the test scenarios that have been designed, then observed, recorded, and analyzed. Photorec places recovery data in 6 recup_dir subdirectories. Test results and analysis of the test results show that Photorec is a reliable tool for computer forensic, especially secure data recovery because it can restore 100% of data, accompanied by privilege root for all data recovery results, so they cannot be changed and deleted by an end-user without granted access.


2004 ◽  
Vol 118 (3) ◽  
pp. 137-146 ◽  
Author(s):  
Michael D. Coble ◽  
Rebecca S. Just ◽  
Jennifer E. O’Callaghan ◽  
Ilona H. Letmanyi ◽  
Christine T. Peterson ◽  
...  

Author(s):  
D.F. Braganholi ◽  
F.S. Polverari ◽  
I.B. Ambrosio ◽  
R.M.B. Cicarelli
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document