DATA EXTRACTION FROM PASSWORD PROTECTED MOBILE PHONE BY USING CHIP-OFF METHOD –A FORENSIC CASE STUDY

The current digital era is full of digital devices and to ensure the safety of their data, users utilize the protective armor of passwords using the fingerprints lock, face lock, pin codes and password locks. The trial-and-error method possesses an infinite possibility of passwords in patterns/ pin locks for unlocking the devices. The levels of security ensure that only a limited number of trials are possible before any device blocks itself or makes unlocking harder. In these circumstances, especially when a victim is a deceased person (e. g. an abetment in suicide case), the password is practically impossible to attain through the authorities. However, the data can be retrieved with the unique and distinctive method of Chip-off analysis. In this study, a password protected mobile phone was retrieved from a deceased individual and only the analysis of his/her mobile could lead to investigative insights for catching the perpetrator. The Chip-off method has several difficulties and a password/ pin protected device increases the difficulties for analysis several folds. This study highlights the significance of chip-off analysis in achieving accurate importing and extraction of maximum data along with the use of the hardware/software, MSAB, XRY and other software.

2009 ◽  
Vol 1 (1) ◽  
Author(s):  
Norbert Németh ◽  
Gabor Petho

AbstractGeological mapping of an unexposed area can be supported by indirect methods. Among these, the use of mushrooms as geobotanical indicators and the shallow-penetration electromagnetic VLF method proved to be useful in the Bükk Mountains. Mushrooms have not been applied to geological mapping before. Common species like Boletus edulis and Leccinum aurantiacum are correlated with siliciclastic and magmatic formations while Calocybe gambosa is correlated with limestone. The validity of this correlation observed in the eastern part of the Bükk Mts. was controlled on a site where there was an indicated (by the mushrooms only) but unexposed occurrence of siliciclastic rocks not mapped before. The extent and structure of this occurrence were explored with the VLF survey and a trial-and-error method was applied for the interpretation. This case study presented here demonstrates the effectiveness of the combination of these relatively simple and inexpensive methods.


2012 ◽  
Vol 170-173 ◽  
pp. 2352-2355 ◽  
Author(s):  
Yue Feng Sun ◽  
Hao Tian Chang ◽  
Zheng Jian Miao

It is difficult to determine a proper neurons number of the mid-layer when using the BP neural network for water demand forecasting. Aiming at the problem, the BP neural network is presented in this paper for water demand forecasting. A suitable neurons number in the mid-layer is calculated based on the empirical formula method and trial and error method. A certain basin in China is taken as a case study. The results indicate that the mean relative error is 2.42%. The water consumption is 42.8 billion m3 in 2015 and 43.6 billion m3 in 2030 in the study area. The results are useful for water resources planning and management.


2016 ◽  
Vol 7 (2) ◽  
pp. 58-67
Author(s):  
Gregory Titus ◽  
Frederik Josep Putuhena

An operation rule curve of a dam provides specific on the target elevation of thereservoir. This can vary throughout the year. This is an indication to the reservoir operator ofactivities to conduct for various situations involving reservoir and the hydrologic conditions.This rule curve shall apply to Murum dam solely for power generation purpose. Thedecisions on when and how much to release will impact the ability to pass a flood as well ashydropower capacity. The main objective of this research is to select the most suitablemethod and to develop the operation rule curves for Murum dam primarily for hydropowergeneration. A trial-and-error method has been selected for this study. Reservoir operationmodeling and simulation have been commenced using historical rainfall data, after runoffwas generated by rainfall runoff modellings. Three (3) simulations are conducted fordeveloping the operation rule curves. They are rule curve according to Sarawak EnergyBerhad’s requirement, ideal rule curve and mean rule curve. All three sets of rule curves aresuccessfully developed using turbine discharges of the dam as the parameters and to achievethe target firm energy generation of 635MW.


2020 ◽  
Vol 4 (2) ◽  
pp. 52-66
Author(s):  
Natalia Anggrarini ◽  
Ida Yulianawati

The digital era is undeniable. Communication all over the world runs with the involvement of digital devices. For widespread information, mobile phones such as smartphones play an essential role in learning media, especially in learning English. In learning English as a foreign language, smartphones provide a variety of features to support the learning process. These potential features benefit the students so they can help themselves in improving their ability, especially in the English language. This study explored the kind of mobile application suggested by the teachers to help their students learn English. By conducting a case study, this study covered a variety of mobile applications and their use in the learning activity. About eight teachers from different senior high schools in Indramayu participated in this study. A questionnaire were distributed to the participants to collect the data; then, it was analyzed qualitatively. 


2018 ◽  
Vol 33 (1) ◽  
pp. 61-69
Author(s):  
Matteo Dini ◽  
Raphaël Royer-De-Vericourt ◽  
Adrien Quaglia ◽  
Christian Reiser ◽  
Jean-François Blassel

In this article, a multi-objective optimization is presented to find optimal cable adjustment for statically indeterminate cable structures. Combining a constrained least-square method and the non-dominated sorting genetic algorithm II, a trade-off curve of potential solutions is generated from which a final set of cable adjustments can be chosen by the designer. Optimal solutions are measured against solutions found by a trial-and-error method on the George C. King Bridge case study. Results show that the proposed strategy can successfully find adjustments that significantly reduce overall tension errors, with fewer cables involved.


Author(s):  
Lidiya Derbenyova

The article focuses on the problems of translation in the field of hermeneutics, understood as a methodology in the activity of an interpreter, the doctrine of the interpretation of texts, as a component of the transmission of information in a communicative aspect. The relevance of the study is caused by the special attention of modern linguistics to the under-researched issues of hermeneutics related to the problems of transmission of foreign language text semantics in translation. The process of translation in the aspect of hermeneutics is regarded as the optimum search and decision-making process, which corresponds to a specific set of functional criteria of translation, which can take many divergent forms. The translator carries out a number of specific translation activities: the choice of linguistic means and means of expression in the translation language, replacement and compensation of nonequivalent units. The search for the optimal solution itself is carried out using the “trial and error” method. The translator always acts as an interpreter. Within the boundaries of a individual utterance, it must be mentally reconstructed as conceptual situations, the mentally linguistic actions of the author, which are verbalized in this text.


2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


2021 ◽  
Vol 157 ◽  
pp. 106132
Author(s):  
Arslan Jamil ◽  
Saadia Tabassum ◽  
Muhammad Waqas Younis ◽  
Ammad Hassan Khan ◽  
Zia ur Rehman ◽  
...  

2021 ◽  
pp. 1-10
Author(s):  
Adam Weintrit ◽  
Jacek Pietraszkiewicz ◽  
Wiesław Piotrzkowski ◽  
Wojciech Tycholiz

Abstract In recent years the transition of marine navigation to the digital era has been gaining momentum. Implementation of e-Navigation solutions varies from country to country in terms of their priorities, goals, levels and effects. Maritime authorities in Poland have been setting the pace in this transition process, not only in Poland but also in general as a global solution. The most recent example is the planned deployment of a variety of e-Navigation tools in the Vistula Lagoon: from GNSS-RTK Ground-Based Augmentation System, to virtual and synthetic aids to navigation, high-resolution bathymetry and advanced navigational software for piloting. The major objectives of this paper are, first, to summarise recent dynamics in the e-Navigation field, and second, to present a practical implementation of the e-Navigation concept in the Vistula Lagoon area.


Sign in / Sign up

Export Citation Format

Share Document