Rules murky on DNA-based identification of disaster victims
نویسندگان
چکیده
منابع مشابه
Victims of crime as victims of disaster.
The gross disparity between the routine attention paid to criminals and that paid to their victims led to the proposition that victims of major crime be treated as victims of disaster. The fresh appraisal might provide the impetus for appropriate services for them as a matter of social policy.
متن کاملData transmission in dental identification of mass disaster victims.
UNLABELLED Dental evidence, especially from radiographs, has been found to be an effective method in personal identification. Previously, it has been shown that wireless personal digital assistants (PDA) can be used to transfer digitized radiographs. The purpose of this study was to set up a secure and reliable mobile connection for transferring dental digital images for disaster victim identif...
متن کاملManagement of chemical disaster victims.
Following a hazardous chemical accident, early critical care life support is crucial to minimizing potential morbidity and mortality (1). Providing effective care to victims, however, depends on the nature of the incident, the number of victims affected, the availability of medical care, the coordination of rescue efforts, the available modes of evacuation, and the availability of post-evacuati...
متن کاملIdentification of the Victims of a Mass Fatality Incident Based on Nuclear Dna Evidence
This paper focuses on the use of nuclear DNA Short Tandem Repeat traits for the identification of the victims of a Mass Fatality Incident. The goal of the analysis is the assessment of the identification probabilities concerning the recovered victims. Identification hypotheses are evaluated conditionally to the DNA evidence observed both on the recovered victims and on the relatives of the miss...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Medicine
سال: 2006
ISSN: 1078-8956,1546-170X
DOI: 10.1038/nm0806-867b