scholarly journals Investigation of Frauds in Signature Rubber-Stamps

Author(s):  
Vivekkumar Mangilal Chayal ◽  
Rakesh Rawal ◽  
Deepak Raj Handa ◽  
Vijay Verma ◽  
Himanshu A. Pandya

In the 21st century, new digital electronic technologies like computer, scanner, digital camera, computerized photo-stat machines and different types of printers, editing soft-wares are used, which can be utilize to commit document frauds. Rubber-stamps are used as an official seal describing government, private officer’s designation, department information etc. They sometimes use rubber-stamp for authentication, certification or verification of original documents. Fraudster uses digital technology to develop imitation of ‘signature rubber-stamp’ to perform white caller crime. Such rubber-stamps containing ‘Signatures’ and utilize it for committing crime by applying on documents. This is a case study, which defines a specific modus operandi used by fraudsters in India. Authors have investigated such modus operandi of fraud, which is very difficult to identify by a layman. This type of modus operandi could only be detected with the scientific instrument namely VSC-6000/HS with different functionality. The main aim of this research work is to develop simple, rapid, sensitive, eco-friendly and non-destructive method to identify signatures applied with rubber-stamps. The research in such field will be directly beneficial to society, financial institutions, law enforcement agencies which give additional motivation to do research for examination of questioned documents.

2021 ◽  
Vol 45 (4) ◽  
pp. 329-334
Author(s):  
Irida Markja ◽  
Klodian Dhoska ◽  
Dervish Elezi ◽  
Reza Moezzi ◽  
Michal Petru

In this paper we have proposed an experimental study of the steel grains sizes effect on the shift frequency of the ultrasonic waves being propagated in steels. Ultrasonic testing has been used in most inspection services for different materials as non-destructive testing. The novelty of our research work has been focused on the investigation of the new method for determining microstructure evolution of metals by using ultrasonic signals in conjunction with changes in grain size and hardness of steels. Furthermore, we have studied the microstructure of steel types S355, S275, Corten B and S275N. The microstructure results of steels have shown the changes that have been undergone from thermal and mechanical processes by using the attenuation of ultrasound waves during non-destructive testing.


2021 ◽  
Vol 2137 (1) ◽  
pp. 012005
Author(s):  
Yi Xie ◽  
Jianjun Liu ◽  
Chao Feng ◽  
Jun Zhang ◽  
Sanwei Liu ◽  
...  

Abstract Because of the frequent occurrence of power cable fault, rapid and accurate fault diagnosis is an important subject in this field. In this paper, the DR detection cases of cables and related components with different voltage levels are described and analyzed based on the research work of radiographic detection carried out by our research group in the field of cables and their accessories in the recent three years. The results show that the technology can effectively detect and analyze the internal damage of cable outer breaking point, the ablative defect of cable buffer layer, the size and position deviation of cable joint. Due to the large number of cable layers and material types, the paper also gives some solutions to the problem of shielding copper core and some examples of abnormal image identification. Cable ontology, cable joints and other accessories produced by different manufacturers have certain structural differences due to numerous processes and procedures. It is necessary to continue to carry out research on DR testing for cable engineering structural parts of different types, establish relevant standard comparison atlas and provide reference for the application of DR technology in the field of cable testing.


2017 ◽  
Vol 1 (1) ◽  
pp. 1-16
Author(s):  
John Harner ◽  
Lee Cerveny ◽  
Rebecca Gronewold

Natural resource managers need up-to-date information about how people interact with public lands and the meanings these places hold for use in planning and decision-making. This case study explains the use of public participatory Geographic Information System (GIS) to generate and analyze spatial patterns of the uses and values people hold for the Browns Canyon National Monument in Colorado. Participants drew on maps and answered questions at both live community meetings and online sessions to develop a series of maps showing detailed responses to different types of resource uses and landscape values. Results can be disaggregated by interaction types, different meaningful values, respondent characteristics, seasonality, or frequency of visit. The study was a test for the Bureau of Land Management and US Forest Service, who jointly manage the monument as they prepare their land management plan. If the information generated is as helpful throughout the entire planning process as initial responses seem, this protocol could become a component of the Bureau’s planning tool kit.


Author(s):  
Erick Kim ◽  
Kamjou Mansour ◽  
Gil Garteiz ◽  
Javeck Verdugo ◽  
Ryan Ross ◽  
...  

Abstract This paper presents the failure analysis on a 1.5m flex harness for a space flight instrument that exhibited two failure modes: global isolation resistances between all adjacent traces measured tens of milliohm and lower resistance on the order of 1 kiloohm was observed on several pins. It shows a novel method using a temperature controlled air stream while monitoring isolation resistance to identify a general area of interest of a low isolation resistance failure. The paper explains how isolation resistance measurements were taken and details the steps taken in both destructive and non-destructive analyses. In theory, infrared hotspot could have been completed along the length of the flex harness to locate the failure site. However, with a field of view of approximately 5 x 5 cm, this technique would have been time prohibitive.


The effective altruism movement consists of a growing global community of people who organize significant parts of their lives around two key ideas, represented in its name. Altruism: If we use a significant portion of the resources in our possession—whether money, time, or talents—with a view to helping others, we can improve the world considerably. Effectiveness: When we do put such resources to altruistic use, it is crucial to focus on how much good this or that intervention is reasonably expected to do per unit of resource expended (for example, per dollar donated). While global poverty is a widely used case study in introducing and motivating effective altruism, if the ultimate aim is to do the most good one can with the resources expended, it is far from obvious that global poverty alleviation is highest priority cause area. In addition to ranking possible poverty-alleviation interventions against one another, we can also try to rank interventions aimed at very different types of outcome against one another. This includes, for example, interventions focusing on animal welfare or future generations. The scale and organization of the effective altruism movement encourage careful dialogue on questions that have perhaps long been there, throwing them into new and sharper relief, and giving rise to previously unnoticed questions. In the present volume, the first of its kind, a group of internationally recognized philosophers, economists, and political theorists contribute in-depth explorations of issues that arise once one takes seriously the twin ideas of altruistic commitment and effectiveness.


Author(s):  
Andrea B. Temkin ◽  
Mina Yadegar ◽  
Christine Cho ◽  
Brian C. Chu

In recent years, the field of clinical psychology has seen a growing movement toward the research and development of transdiagnostic treatments. Transdiagnostic approaches have the potential to address numerous issues related to the development and treatment of mental disorders. Among these are the high rates of comorbidity across disorders, the increasing need for efficient protocols, and the call for treatments that can be more easily disseminated. This chapter provides a review of the current transdiagnostic treatment approaches for the treatment of youth mental disorders. Three different types of transdiagnostic protocols are examined: mechanism-based protocols, common elements treatments, and general treatment models that originated from single-disorder approaches to have broader reach. A case study illuminates how a mechanism-based approach would inform case conceptualization for a client presenting with internalizing and externalizing symptoms and how a transdiagnostic framework translates into practice.


Geosciences ◽  
2021 ◽  
Vol 11 (4) ◽  
pp. 150
Author(s):  
Nilgün Güdük ◽  
Miguel de la Varga ◽  
Janne Kaukolinna ◽  
Florian Wellmann

Structural geological models are widely used to represent relevant geological interfaces and property distributions in the subsurface. Considering the inherent uncertainty of these models, the non-uniqueness of geophysical inverse problems, and the growing availability of data, there is a need for methods that integrate different types of data consistently and consider the uncertainties quantitatively. Probabilistic inference provides a suitable tool for this purpose. Using a Bayesian framework, geological modeling can be considered as an integral part of the inversion and thereby naturally constrain geophysical inversion procedures. This integration prevents geologically unrealistic results and provides the opportunity to include geological and geophysical information in the inversion. This information can be from different sources and is added to the framework through likelihood functions. We applied this methodology to the structurally complex Kevitsa deposit in Finland. We started with an interpretation-based 3D geological model and defined the uncertainties in our geological model through probability density functions. Airborne magnetic data and geological interpretations of borehole data were used to define geophysical and geological likelihoods, respectively. The geophysical data were linked to the uncertain structural parameters through the rock properties. The result of the inverse problem was an ensemble of realized models. These structural models and their uncertainties are visualized using information entropy, which allows for quantitative analysis. Our results show that with our methodology, we can use well-defined likelihood functions to add meaningful information to our initial model without requiring a computationally-heavy full grid inversion, discrepancies between model and data are spotted more easily, and the complementary strength of different types of data can be integrated into one framework.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document