Geometry.Net - the online learning center
Home  - Basic_F - Fingerprinting
e99.com Bookstore
  
Images 
Newsgroups
Page 8     141-160 of 162    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Fingerprinting:     more books (100)
  1. Fingerprinting of child care providers and teachers by Patricia Young, 1992
  2. Investigation of genetic heterogeneity in Mycobacterium tuberculosis isolates from tuberculosis patients using DNA fingerprinting.(Original Article) : ... from: Indian Journal of Medical Sciences by Azar Khosravi, B. Barazandeh, 2005-06-01

141. Fingerprinting: White Papers And Webcasts From Leading IT Vendors. Start Your Te
Get your fingerprinting white papers, case studies, webcasts and product literature from one trusted source. fingerprinting Reports.
http://www.bitpipe.com/rlist/term/Fingerprinting.html
Search Bitpipe: Search Help Advanced Search
Daily Top 50 Reports Top 100 Topics IT Systems Business Systems ... Identification Systems
Fingerprinting: Reports
Browse the reports below to find the latest Fingerprinting white papers, product literature, webcasts, and case studies.
Most Popular Fingerprinting Reports
by Rainbow Technologies, Inc.
Recent Fingerprinting Reports More on Fingerprinting: Products Companies Analyst Reports Limit Results: ALL Data Sheet Sort by: Title Date Company Name
There are currently no IT Reports cataloged under the topic:
Fingerprinting View All Documents or
click on the links above to find IT Reports on related topics. Sign up for free customized newsletters that deliver the latest White Papers, Webcasts, Case Studies, Product Info on: Fingerprinting
E-mail Address
Home
About Us Contact Us Advertise with Us ... Partner with Us What's Popular? Daily Top 50 Reports Daily Top 100 Topics Popular Report Topics Popular Product Topics Popular Searches: A B C D ... Other

Designated trademarks and brands are the property of their respective owners. Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and info@bitpipe.com

142. 'Brain Fingerprinting' Touted As Truth Meter
Monday, March 1, 2004. Brain fingerprinting touted as truth meter Scientist says guilt or innocence can be assessed by testing electrical brain waves.
http://seattlepi.nwsource.com/local/162685_brain01.html
Jump to Weather Traffic Webtowns Mariners ... Forums NEWS Local
Transportation

Consumer

Education
...
Special Reports

COMMENTARY Opinion
Columnists

Letters

David Horsey
...
Forums

COFFEE BREAK Mike Mailway TV Listings FIND IT! NWclassifieds Jobs Autos Real Estate ... Obituaries P-I ANYWHERE E-mail Newsletters News Alerts PDA Cell Phones ... RSS Feeds OUR AFFILIATES Monday, March 1, 2004 'Brain fingerprinting' touted as truth meter Scientist says guilt or innocence can be assessed by testing electrical brain waves By TOM PAULSON SEATTLE POST-INTELLIGENCER REPORTER "Brain fingerprinting" sounds like science fiction, but for one man it could be a matter of life and death. Larry Farwell, a Harvard-trained neuroscientist who works out of a small office in the Washington Technology Center on the University of Washington campus, hopes to use the case of Oklahoma death-row inmate Jimmy Ray Slaughter to convince law enforcement officials and the courts that the technique is scientifically sound and accurate. Farwell, whose father was a UW physicist who worked on the Manhattan Project, believes that Slaughter's case could be a key test of legal acceptance of the technique. Grant M. Haller / P-I

143. News In Science - New Sprays Catch Elusive Fingerprints - 28/11/2003
this week at a Sydney conference, Lifting the Identification Profile, which celebrated the 100th anniversary of the introduction of fingerprinting in Australia
http://www.abc.net.au/science/news/stories/s998859.htm
Science Home News in Science Features Explore ... Play Print Email to a friend
New sprays catch elusive fingerprints
Anna Salleh ABC Science Online
Friday, 28 November 2003
Fingerprints can now be lifted from rough surfaces (Erie County Sheriff's Office) Forensics experts will no longer need to collect fingerprints from smooth surfaces, according to Australian research, which has tested new chemical sprays that allow prints to be lifted from surfaces as rough as bricks.
Katherine Flynn and colleagues from the University of Technology, Sydney and the Australian Federal Police will publish their work in the Journal of Forensic Sciences
The researchers also presented their findings this week at a Sydney conference, Lifting the Identification Profile , which celebrated the 100th anniversary of the introduction of fingerprinting in Australia.
Fingerprints are one of the most important ways police identify criminals. But picking them up relies on ways of making them visible. Traditionally, this means using a fine powder, such as aluminium or titanium dioxide, which sticks to the fingerprint's moisture and oily components.
Powdering is cheap, quick and easy to use. But 10% of prints are obliterated when the powder is brushed on. And forensic experts cannot always use the method to pick up old prints that have lost their 'stickiness'.

144. Www.sbec.state.tx.us/SBECOnline/faq_fingerprinting.asp
An Introduction to HTTP fingerprinting discussed in this paper. 2. Theory of fingerprinting. A fingerprint is defined as 4. Applications of HTTP fingerprinting. From a network management
http://www.sbec.state.tx.us/SBECOnline/faq_fingerprinting.asp
Board Members Regular Meetings Public Testimony Meeting Highlights Committee Meetings
Related Statutes Rulemaking
Process Adopted Rules Emergency
Adopted Rules
FAQs Instructions Update
How to Become
a Teacher in Texas Certification
Requirements Official Record
Of Educator
Certificates Certificate Renewal
Requirements Comparable Out-of-State Tests Educator Standards Test Frameworks Test Dates Preparation Manuals Registration Bulletins Test Scores Comparable Out-of-State Tests Master Mathematics Master Reading Master Technology About TxBESS Regional Coordinators Evaluation Reports TxBESS Activity Profile Program Standards Performance Standards The Cost of Teacher Turnover Report Rules Accountaiblity System for Educator Preparation Frequently Asked Questions Disciplinary Rules Disciplined Educators Disciplinary History Search Statistics State Office of Administrative Hearings Univeristy Interscholastic League Regulations Code of Ethics Rules Filing A Complaint Statistics Review Committee Interactive Reports Completed Studies Texas Public Education Information Resource Frequently Asked Questions - Fingerprinting updated 2/23/04 To help assist you with questions you may have using the system, please read the following Frequently Asked Questions before contacting our support center.

145. DNA Fingerprinting. The Columbia Encyclopedia, Sixth Edition. 2001
2001. DNA fingerprinting. 1. Methods. A common procedure for DNA fingerprinting is restriction fragment length polymorphism (RFLP).
http://www.bartleby.com/65/dn/DNA-fing.html
Select Search All Bartleby.com All Reference Columbia Encyclopedia World History Encyclopedia Cultural Literacy World Factbook Columbia Gazetteer American Heritage Coll. Dictionary Roget's Thesauri Roget's II: Thesaurus Roget's Int'l Thesaurus Quotations Bartlett's Quotations Columbia Quotations Simpson's Quotations Respectfully Quoted English Usage Modern Usage American English Fowler's King's English Strunk's Style Mencken's Language Cambridge History The King James Bible Oxford Shakespeare Gray's Anatomy Farmer's Cookbook Post's Etiquette Bulfinch's Mythology Frazer's Golden Bough All Verse Anthologies Dickinson, E. Eliot, T.S. Frost, R. Hopkins, G.M. Keats, J. Lawrence, D.H. Masters, E.L. Sandburg, C. Sassoon, S. Whitman, W. Wordsworth, W. Yeats, W.B. All Nonfiction Harvard Classics American Essays Einstein's Relativity Grant, U.S. Roosevelt, T. Wells's History Presidential Inaugurals All Fiction Shelf of Fiction Ghost Stories Short Stories Shaw, G.B. Stein, G. Stevenson, R.L. Wells, H.G. Reference Columbia Encyclopedia PREVIOUS NEXT ... BIBLIOGRAPHIC RECORD The Columbia Encyclopedia, Sixth Edition. DNA fingerprinting or DNA profiling

146. Cornell News: Fingerprint Study
Practical reasons militate against wholesale rejection of fingerprinting, and I expect that the FBI and other organizations will try to upgrade its scientific
http://www.news.cornell.edu/releases/Jan02/fingerprint.study.deb.html
Fingerprint evidence under judicial assault unlikely to be replaced by DNA profiling for criminal identification, says Cornell researcher
FOR RELEASE: Jan. 24, 2002 Contact: David Brand
Office: 607-255-3651
E-Mail: deb27@cornell.edu ITHACA, N.Y. Fingerprint identification, which recently was ruled by a Philadelphia federal judge to be scientifically flawed as evidence, is unlikely to be replaced by DNA profiling in the courts, says a Cornell University researcher. The main reason, he says: Police have come to rely on fingerprint analysis so heavily in presenting evidence. "There are so many cases in which there are no evidentiary equivalents, including DNA profiling. Practical reasons militate against wholesale rejection of fingerprinting, and I expect that the FBI and other organizations will try to upgrade its scientific credentials," says Michael Lynch, professor of science and technology studies at Cornell. Lynch and Simon Cole, a Cornell visiting scientist, have been awarded a $144,000 grant by the National Science Foundation to conduct a yearlong study comparing the scientific histories of DNA profiling and fingerprinting and the sociological implications of the two techniques in their use as evidence in placing criminal defendants at crime scenes. In 1995 Lynch made a study of the first national database of DNA profiles, set up by the British government. Cole is the author of the book Suspect Identities: A History of Fingerprinting and Criminal Identification

147. NO To Ballistic Fingerprinting
Send to a friend. NO to Ballistic fingerprinting by Bart Frazier, October 17, 2002. Such a tyrannical program is what ballistic fingerprinting implies.
http://www.fff.org/comment/com0210f.asp

Send to a friend
NO to Ballistic Fingerprinting
by Bart Frazier October 17, 2002 From the bullet casing, police now know that the shooter is using a rifle that fires .223 caliber bullets. This is not much help because .223 is a common size, used in both military and hunting rifles. But there are those now arguing that the sniper killings are evidence of the need for a federal ballistic-fingerprint database. Bart Frazier is program director at The Future of Freedom Foundation Send to a friend back to top Subscribe to Freedom Daily.
Home
About Us Freedom Daily Commentaries ...
Contact Us

148. Whitehats Network Security Resource
Passive Host fingerprinting Small examples of mundane traffic Win2000 vs Redhat 6.1 Max Vision. UPDATE I haven t updated this
http://www.whitehats.com/library/passive/

149. M235 Forensic Science At Murdoch University
DNA fingerprinting. WARNING TO ALL USERS By accessing this site you agree to assume full responsibility and risk for any consequences
http://wwwscience.murdoch.edu.au/teaching/m235/forensicdna.htm
DNA Fingerprinting
WARNING TO ALL USERS
By accessing this site you agree to assume full responsibility and risk for any consequences of using information found on this site or accessed through this site.
Allan Barton of Murdoch University has a strong interest in the teaching of forensic science, and initiated the Forensic Chemistry stream of the chemistry programme. The following links were selected as an information resource for the course "M235 Forensic Science". B OOKS Forensic DNA Profiling Protocols DNA Fingerprinting DNA Profiling and DNA Fingerprinting (Methods and Tools in Bioscience and Medicine) M ... Victoria Forensic Science Centre (see also 'Related Links' on this page) HUGO Ethics Committee Statement on DNA Sampling: Control and Access The Natural History of Genes Worldwide Forensic Resources on the Web (Scroll down to DNA) DNA Untwisted MIT Biology Hypertextbook: Mendelian Genetics Science on Trial: DNA Fingerprinting Kruglick Law Offices Forensic DNA Links ...
Email for more information on M235 Forensic Science at Murdoch University (including 'continuing education' or 'not for degree' enrolment on a fee or cross-credit basis).
(The Murdoch University CRICOS Provider Code is 00125J)
Since 9 March 2001
FastCounter by bCentral

Written by Allan Barton
Authorised by: Allan Barton
Murdoch University

For further information contact Physical Sciences Secretary
URL: http://wwwscience.murdoch.edu.au/teaching/m235/forensicdna.htm

150. InfoWorld: E-mail Fingerprinting Attacks Bounce Storms: April 12, 2004: By : APP
NEWS, Email fingerprinting attacks bounce storms Everyone.net fights spam By Paul Roberts, IDG News Service, April 12, 2004. BOSTON
http://www.infoworld.com/article/04/04/12/HNemail_1.html
Home About InfoWorld Advertise Subscribe ... Events
NEWS
E-mail fingerprinting attacks bounce storms
Everyone.net fights spam
By Paul Roberts, IDG News Service April 12, 2004 BOSTON - E-mail provider Everyone.net Inc. is trying to head off one type of spam with an encryption technology designed to create a unique signature for each outbound e-mail message. ADVERTISEMENT
SPONSOR
SMART TOOL: CISCO ROI CALCULATOR FOR SECURITY
Sponsored by Cisco
RELATED LINKS
Net needs law enforcement, author says
Microsoft releases monthly security patches Trend Micro, Cisco to fight worms Security RSS feed
IDG ENTERPRISE NETWORK More Security News... ComputerWorld Solaris goes open source - why does Sun bother? TechWorld ... ComputerWorld TOP STORIES Sonic tacks on high availability to integration suite RIM fights for appeal of BlackBerry injunction Net needs law enforcement, author says Top News RSS feed ... U.S. Visitor Databases Set for Huge Expansion TOP SITE REFERRALS The Joys of Outsourcing Now that would have made for an interesting company... (Scott Young's Radio Weblog) SIGN UP FOR THE MAGAZINE FREE EMAIL NEWSLETTERS IT SOLUTION SEARCH The Total Protection 2.0 e-mail protection service zeros in on bounce storms, in which e-mail users who have had their e-mail address stolen by spammers or e-mail worms receive a flood of returned messages.

151. DNA Fingerprinting
Articles related to DNA fingerprinting. The Code; DNA and OJ Simpson Testing Science and Justice. Instructional materials related to DNA fingerprinting.
http://www.dartmouth.edu/~chance/course/topics/DNA.html
Articles related to DNA Fingerprinting
Instructional materials related to DNA Fingerprinting

152. Cod "Fingerprinting" May Aid Conservation
Cod fingerprinting May Aid Conservation. Email this story. In Association With Heroes of the Planet. Cod fingerprinting May Aid Conservation
http://news.nationalgeographic.com/news/2001/09/0924_TVcod.html
Sign up for our free e-mail newsletter Also see: Today's Top Stories
This Story
EarthPulse
E-mail this story

In Association With
Cod "Fingerprinting" May Aid Conservation Bijal P. Trivedi
for National Geographic Today
September 24, 2001
Researchers have developed a way to "fingerprint" cod.
The technique, essentially a genetic identification tag, enables researchers to determine a specific cod's place of origin, which could be particularly useful in enforcing international fishing quotas and catching poachers. Shrinking Harvests

Overfishing in the northwest Atlantic over the past 40 years has reduced cod populations by 75 to 99 percent. Photograph from Bettmann/CORBIS More News Kids News The Environment Travel National Geographic Channel Special Series Emerging Explorers TravelWatch National Geographic Out There Oceans ... Pulse of the Planet Until now there have been no means for determining where cod have been caught once they end up at the fish market. The three populations are so different that as few as two or three fish "can provide an unambiguous conclusion about the origin of the sample," Nielsen and his colleagues wrote in a scientific report published in the September 20 issue of the journal Nature.

153. ABCNEWS.com : Ballistic Fingerprinting: Can It Solve Crimes?
Ballistic fingerprinting relies on the distinct marks, like fingerprints, left on a bullet by a weapon. But critics say the system
http://abcnews.go.com/sections/scitech/DailyNews/ballistics_explainer.html
var SectionID="SciTech"; var SubsectionID="DailyNews"; var NameID="ballistics_explainer"; June 8, 2004 FEATURED SERVICES RELATIONSHIPS SHOPPING DOWNLOADS WIRELESS ... FREE HEADLINE FEED INTERACT BOARDS CHAT NEWS ALERTS CONTACT ABC
Unique markings left on bullets by individual guns can help investigators trace who fired a weapon. (www.fbi.gov) Ballistic Fingerprinting Using the Distinct Marks Left by Weapons to Help Solve Crimes
Oct. 16
Print This Page
Email This Page See Most Sent
Mom Hopes Mystery Boy Is Her Son
... Lowly Fruit Fly's Amazing Flight Secrets MORE ON THIS STORY FULL COVERAGE Sniper Attacks: Subindex VIDEO Inside the Hunt Living in Fear Tracking Serial Sniper Hunt For a Sniper COMMUNITY Ballistic Fingerprinting: Too Flawed to Fund? RELATED STORIES How to Be a Better Eyewitness Timeline of 11 D.C.-Area Sniper Attacks What Is It? Tracing Marks to the Killer Advocates for gun control want to expand the resources of ballistics investigators by creating a national computerized system for tracing bullets and shell casings to the guns that fired them. The system would require manufacturers to test-fire new guns before selling them to stores. Data detailing markings left on bullets by each weapon would then be entered into a computerized system known as IBIS. Proponents say a national ballistic fingerprinting system would allow investigators who have found a bullet or bullets at the scene of a crime to enter data about the bullet's markings into the database and then quickly retrieve possible gun matches. This information could help lead them to the gun's buyer and possibly the perpetrator.

154. The Sanger Institute : Danio Rerio Sequencing Project
FTP Site, Sitemap, Zebrafish Genome fingerprinting Project. A fingerprinting map of the zebrafish genome has been generate in collaboration by three laboratories;.
http://www.sanger.ac.uk/Projects/D_rerio/mapping.shtml
Sanger Home Acedb YourGenome Ensembl ... Databases
D. rerio Overview Frequently asked questions Enquiries/Help clone seq project Select - MAPPING overview mapping contacts zebrafish fpc libraries details - BROWSE vega - SEARCH Blast Server vega Blast - STATUS INFO genome MOT Clone Status - DOWNLOAD EMBL file information ftp EMBL files - OTHER clone submission wgs seq project Select - ASSEMBLY Zv3 ensembl Zv3 Blast/SSAHA search marker search information ftp - ASSEMBLY Zv2 information ftp - ASSEMBLY Zv1/06 information ftp - TRACES trace repository SSAHA search traces - OTHER DAS Server other services Select online RepeatMasker contacts Select Help FAQs Resources
Search
FTP Site Sitemap
Zebrafish Genome Fingerprinting Project A fingerprinting map of the zebrafish genome has been generate in collaboration by three laboratories; Contact Organisation Sean Humphray The Sanger Institute Romke Koch Hubrecht Laboratory ... Max-Planck Institute A bacterial clone physical map of the genome was constructed using restriction enzyme fingerprinting ( Marra et al ). Fingerprints were generated by digesting clones with HindIII. Following electrophoresis on agarose and data collection using a fluorimager, raw images are entered using the software IMAGE . This produces an output of normalised band values and gel traces. Analysis of data takes place in FPC . Clones are contiguated on the basis of shared bands. We have generated 20x coverage across the 1.6Gb genome. The map is providing a template for clone tile path selection, as a prerequisite for

155. Www.phrack.org
remote OS TCP/IP stack fingerprinting techniques = Ofir
http://www.phrack.org/show.php?p=57&a=7

156. CHAPTER #10: GENETIC ENGINEERING
DNA fingerprinting. You will view the video Murder, Rape and DNA in lab and questions on it may appear in subsequent exams. MUTATIONS DNAfingerprinting.
http://www.slic2.wsu.edu:82/hurlbert/micro101/pages/Chap10.html
MICROBIOLOGY 101/102 INTERNET TEXT
CHAPTER X: GENETIC ENGINEERING
Updated:
GLOSSARIES
MICROBIOLOGY GENETICS MOLECULAR BIOLOGY
TABLE OF CONTENTS
The universal principle of molecular recognition. This should be very familiar to you by now, so it may turn up on exams. Every cell contains membrane-bound molecules exposed to the environment which communicate with it. These molecules act as the "eyes, ears and nose" of a cell. That is, they "see", or "smell" what other molecules are out there like a hunting dog winds its prey. They contain, as part of each molecule, specific regions on each molecule called RECEPTORS or BINDING SITES . Molecules in the environment contain specific components called LIGANDS that have the characteristic of binding or attaching (docking with) specifically at unique sites on the cell's receptor molecules. Following this attachment a number of different responses may occur. In some cases a message is passed to the interior of each cell as to the situation it has found, while in others the attached molecule may be transported into the cell. In the former case this information, in turn, triggers the cell to carry out a series of preprogrammed responses based on the data it has received; this is analogous to the Mars rover receiving commands from earth. We will discuss some of these responses throughout the course. Permission to use this cartoon was granted by

157. USENIX Technical Program - Abstract - Security Symposium - 2000
Abstract Security Symposium - 2000. Defeating TCP/IP Stack fingerprinting. Matthew Smart, G. Robert Malan, and Farnam Jahanian, University of Michigan Abstract.
http://www.usenix.org/publications/library/proceedings/sec2000/smart.html
Abstract - Security Symposium - 2000
Defeating TCP/IP Stack Fingerprinting
Matthew Smart, G. Robert Malan, and Farnam Jahanian, University of Michigan
Abstract
This paper describes the design and implementation of a TCP/IP stack fingerprint scrubber. The fingerprint scrubber is a new tool to restrict a remote user's ability to determine the operating system of another host on the network. Allowing entire subnetworks to be remotely scanned and characterized opens up security vulnerabilities. Specifically, operating system exploits can be efficiently run against a pre-scanned network because exploits will usually only work against a specific operating system or software running on that platform. The fingerprint scrubber works at both the network and transport layers to convert ambiguous traffic from a heterogeneous group of hosts into sanitized packets that do not reveal clues about the hosts' operating systems. This paper evaluates the performance of a fingerprint scrubber implemented in the FreeBSD kernel and looks at the limitations of this approach.
  • View the full text of this paper in HTML form

158. Paper -- Passive System Fingerprinting Using Network Client Applications
Passive System fingerprinting using Network Client Applications. Jose Nazario. Four methods of fingerprinting a system are presented, with sample data provided.
http://www.crimelabs.net/docs/passive.html
Passive System Fingerprinting using Network Client Applications
Jose Nazario November 27, 2000 ABSTRACT: Passive target fingerprinting involves the utilization of network traffic between two hosts by a third system to identify the types of systems being used. Because no data is sent to either system by the monitoring party, detection approaches the impossible. Methods which rely solely on the IP options present in normal traffic are limited in the accuracy about the targets. Further inspection is also needed to determine avenues of vulnerability, as well. We describe a method to rapidly identify target operating systems and version, as well as vectors of attack, based on data sent by client applications. While simplistic, it is robust. The accuracy of this method is also quite high in most cases. Four methods of fingerprinting a system are presented, with sample data provided. [full text - postscript] [full text - PDF (Acrobat)] UPDATE: A new link for the "siphon" project is available: http://gravitino.net/projects/siphon/ . This will get rolled into the next version of the paper which is forthcoming. Thanks to Nelson M. for the reminder.

159. COTSE-Fingerprint Tools
Church Of The Swimming Elephant.
http://www.cotse.com/tools/fingerprint.htm
Church Of The
Swimming Elephant Search: News: Home Page
Security Lists

Security News

Privacy News
...
Whitehouse Reports

Online Tools: Proxy Check
Port Search

File Extention Search

Base Converter
...
Subnet Calculator
References: Help Desk Internet Encyclopedia Dictionaries RFC's ... Computer Security Downloads: COTSE Labs CGI Scripts IDS Sniffing Tools ... Windows Tools Privacy: Resources Web Proxy Contact: Privacy Policy Contact Webmaster OS Detection/Fingerprint queso Remote O.S. detector. Sends obscure TCP pkts to determine remote OS. Fully configurable. Runs on Linux, Solaris and probably any OS with libpcap support siphon-v.666 Siphon is a passive OS fingerprinter which sniffs network traffic passing the local machine and uses characteristics of the TCP stream to identify the operating system running on the endpoints. Winfingerprint Winfingerprint is a Win32 Host/Network Enumeration Scanner. Winfingerprint is capable of performing SMB, TCP, UDP, ICMP, RPC, and SNMP scans. Using SMB, winfingerprint can enumerate OS, users, groups, SIDs, password policies, services, service packs and hotfixes, NetBIOS shares, transports, sessions, disks, security event log, and time of day in either an NT Domain or Active Directory environment. Winfingerprint-cli is a command line version of winfingerprint and it is currently bundled with each release. Cotse.Net

160. Howstuffworks "How DNA Evidence Works"
Main Science Life Science How DNA Evidence Works. by Ann MeekerO Connell,
http://science.howstuffworks.com/dna-evidence3.htm
ComputerStuff AutoStuff ElectronicsStuff ScienceStuff ... PeopleStuff
Top Subjects
Car Engines
Lock Picking Nuclear Bombs Tattoos ... Gas Turbine Engines
Sponsored By:
Categories
Earth Science
Engineering Life Science Military ... Browse the Science Library
Explore Stuff
Lidrock.com
Big List of Articles Get the Newsletter Shop or Compare Prices ... Search HSW and the Web
Search Google Main Science Life Science
How DNA Evidence Works
by Ann Meeker-O'Connell Table of Contents Introduction to How DNA Evidence Works Matching DNA Creating a DNA Profile: The Basics Creating a DNA Profile: Step by Step Crunching Numbers Advances in DNA Evidence Using DNA Evidence Lots More Information Creating a DNA Profile: Step by Step Now let's look at the exact steps used...
  • DNA is isolated from a sample such as blood, saliva, semen, tissue, or hair. DNA has to be cleaned up, because, unlike in a pristine laboratory, samples at a crime scene are often contaminated by dirt and other debris. Sometimes, DNA must be isolated from samples dried to patches of cloth or carpet, and getting the sample safely out of these fabrics adds additional steps to the isolation and purification processes.
  • The huge genome is cut up with restriction enzymes to produce short, manageable DNA fragments. These bacterial enzymes recognize specific four to six base sequences and reliably cleave DNA at a specific base pair within this span. Cleaving human DNA with one of these enzymes breaks the chromosomes down into millions of differently sized DNA fragments ranging from 100 to more than 10,000 base pairs long. You have to carefully select an enzyme that doesn't cut within any of the VNTR loci that are being studied; for RFLP analysis, the enzyme(s) chosen will ideally cut close to the end on the outside of a VNTR region.
  • A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 8     141-160 of 162    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9  | Next 20

    free hit counter