Geometry.Net - the online learning center
Home  - Basic_F - Fingerprinting

e99.com Bookstore
  
Images 
Newsgroups
Page 4     61-80 of 150    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Fingerprinting:     more books (105)
  1. Video Fingerprinting Algorithm by Xuebing Zhou, 2008-07-28
  2. Free fingerprinting for children offered.(Crime)(A child-safety group offers free fingerprinting for children in Eugene Event will prepare parents for ... from: The Register-Guard (Eugene, OR)
  3. Forensic Techniques: Brain fingerprinting, Autopsy, Entomological evidence collection, Firearm microstamping, Bloodstain pattern analysis
  4. Fingerprinting, a Science at Your Fingertips by Jim Darrach, 1977-06
  5. Practical Fingerprinting by BridgesBc, 2000-01
  6. Practical Fingerprinting Rev Edition by B C Bridges, 1963
  7. Metabolic fingerprinting of three Malaysian ginger (Zingiber officinale Roscoe) using gas chromatography-mass spectrometry.(Report): An article from: American Journal of Applied Sciences by H.J. Mahdi, R. Andayani, et all 2010-01-01
  8. Secure A Kid: Safety Education and Fingerprinting Handbook for Kids and Adults by Pamela Wilson, 2008-01-28
  9. DuPont Markets Microbial Fingerprinting.(Brief Article): An article from: Food Ingredient News
  10. Copyright-Schutz digitaler Daten durch kryptographische Fingerprinting-Schemata / Kognitive Robotik - Perspektiven und Grenzen der KI-Forschung (Colloquia ... - Naturwissenschaften) (German Edition) by Ingrid Biehl, Michael Thielscher, 1999-12-01
  11. Suspect Identities: A History of Fingerprinting and Criminal Identification.(Book Review): An article from: The Historian by Eric Monkkonen, 2003-06-22
  12. Criminal Investigations, Polygraph, Fingerprinting, Surveillance, Assaults, Homocides, Suicides

61. BBC NEWS | Education | Schools In Fingerprinting Row
Tuesday, 23 July, 2002, 1704 GMT 1804 UK Schools in fingerprinting row Printsare said to make libraries more efficient Tens of thousands of children are
http://news.bbc.co.uk/hi/english/education/newsid_2144000/2144188.stm
CATEGORIES TV RADIO COMMUNICATE ... INDEX SEARCH
You are in: Education News Front Page World UK ... Programmes SERVICES Daily E-mail News Ticker Mobile/PDAs Text Only ... Help EDITIONS Change to World Tuesday, 23 July, 2002, 17:04 GMT 18:04 UK Schools in fingerprinting row
Prints are said to make libraries more efficient
Tens of thousands of children are being fingerprinted in school - often without the consent of their parents, a human rights group has complained. Prints are taken for a library lending system which the makers say makes lending more efficient and less vulnerable to abuse. But the pressure group Privacy International says the practice is illegal and breaches the human right to privacy. Dangerous One of the makers of the technology, Micro Librarian Systems (MLS), say they have sold about 1,000 systems to schools in the UK and abroad. One mother from London told BBC News Online she was horrified when her son came home and told her he had been finger-printed at his primary school. She said: "I consider that this was an infringement of my son's civil rights and a breach of trust on the part of the school. "This should not have been done at all, and certainly not without our consent, or indeed knowledge.

62. AFLP Studies In Avian Population Genetic Structure
Studies in the advancement of population level genetic analyses in birds. Includes information on research and polymerase chain reaction based fingerprinting technology.
http://ravel.zoology.wisc.edu/sgaap/index.html
All models are wrong; some are simply less wrong than others.
Welcome!
T his site is dedicated to the advancement of fine-scale population-level genetic analyses in natural populations, especially birds. My primary research interests concern the development of new molecular (especially AFLP) and analytical techniques to characterize genetic variation in spatially structured populations of lekking Neotropical birds. Although I am most interested in how dispersal barriers affect the genetic composition of White-bearded Manakins (family Pipridae) and various hummingbirds (family Trochilidae), I share some time investigating genetic processes in Combtooth Blennies (family Blenniidae) and Drosophila melanogaster . My motivation in creating this site was to provide a resource that would make available many of the protocols and tools I developed for my dissertation research. Although most of the information contained herein is referenced primarily to birds, I hope that other investigators will find this information useful in their own research. UPDATE!

63. BBC NEWS | World | Europe | EU Begins Asylum Fingerprinting
Wednesday, 15 January, 2003, 0857 GMT EU begins asylum fingerprinting Some 400,000people per year seek asylum in the EU The European Union has launched its
http://news.bbc.co.uk/1/hi/world/europe/2659403.stm
CATEGORIES TV RADIO COMMUNICATE ... INDEX SEARCH
You are in: World: Europe News Front Page World ... Programmes SERVICES Daily E-mail News Ticker Mobile/PDAs Text Only ... Help LANGUAGES EDITIONS Change to World Wednesday, 15 January, 2003, 08:57 GMT EU begins asylum fingerprinting
Some 400,000 people per year seek asylum in the EU
The European Union has launched its first centralised fingerprint database aimed at preventing abuses of the asylum system. From Wednesday, all asylum seekers over the age of 14 will be fingerprinted to check that they have not already made an asylum application in another EU country. In public opinion there is this idea that there are major abuses being perpetrated all over the place, right, left and centre
Frank Paul
EU official
Every year, some 400,000 people seek asylum in the 15 countries of the EU. EU officials say the system will put an end to multiple asylum applications, or "asylum-shopping". They say the system complies with human rights obligations and the data will not be made available to national governments. Co-ordinating policy Many people are believed to enter the EU through one country, such as Greece or Italy, but then move on to Germany or Britain, searching for better conditions.

64. Fingerprinting
Several scanners have the capability for operating system fingerprinting.This is done by sending strange packets at the system
http://www.networkice.com/Advice/Countermeasures/Scanners/Fingerprinting/default
Fingerprinting
advICE Countermeasures Scanners : Fingerprinting Several scanners have the capability for operating system fingerprinting. This is done by sending strange packets at the system in order to gauge how it responds. It is the network equivelant of saying "Sprechen Sie Deutsch?" in order to "fingerprint" the language somebody speaks. Some methods for active fingerprinting are:
ICMP
Anthony Osborne published a paper in AUG'98 on fingerprinting systems by their response to ICMP packets. ICMP are special control messages that don't contain normal data.
TCP options
nmap will fingerprint according to options in TCP headers.
TCP flags
queseo will fingerprint according to flags in TCP headers.
TCP ports
sscan will fingerprint according to simple packets sent to ports 1-5.
Similiar to active fingerprinting, passive fingerprinting is based on the principle that every operating system's IP stack has its own idiosyncrasies: RESOURCES
  • Books
  • FAQs
  • Intro
  • News
  • Lists
  • Notes
    SEARCH
    this section advICE
  • 65. AFLP Not Only For Fingerprinting, But For Positional Cloning
    Introduction and detailed protocol by M Liscum and P Oeller, Department of Plant Biology, Carnegie Institution Stanford University.
    http://www-ciwdpb.stanford.edu/publications/methods/aflp.html
    AFLP: not only for fingerprinting, but for positional cloning
    Mannie Liscum(1) and Paul Oeller(2)
    Department of Plant Biology Carnegie Institution of Washington Stanford, CA 94305
    (1)Current address: http://www.biosci.missouri.edu/liscum/LiscumLabPage.html (site contains updated information)
    Division of Biological Sciences
    105 Tucker Hall
    University of Missouri
    Columbia, MO 65211
    phone: 573-882-2672
    fax: 573-882-0123
    email: mliscum@biosci.mbp.missouri.edu (2)Current address: DNA Plant Technology Corporation
    6701 San Pablo Avenue
    Oakland, CA 94609
    phone: 510-547-2395 fax: 510-547-2817 email: oeller@dnap.com NOTE: The protocol presented below is based on the Amplified Fragment Length Polymorphism (AFLP) technology developed by Marc Zabeau and colleagues at Keygene N.V., Agrobusiness Park 90, P.O. Box 216, NL-6700 AE Wageningen, Netherlands (Zabeau, 1992; Zabeau and Vos, 1993; Vos et al., 1995). The AFLP technology is covered by patents and patent applications owned by Keygene N.V. Both, Life Technologies (Gathersberg, MD, USA) and Perkin Elmer (Applied Biosystems Division, Foster City, CA, USA) market research kits (under license) for AFLP fingerprinting of plant DNAs. Background Rational AFLP Protocol (Abridged Version 1.3, 12/95)

    66. NOVA Online | Killer's Trail | Create A DNA Fingerprint
    That DNA is unique from person to person but the same from cell to cell in oneperson can be a handy thing, especially when it comes to DNA fingerprinting.
    http://www.pbs.org/wgbh/nova/sheppard/analyze.html
    Create a DNA Fingerprint
    by Rick Groleau
    DNA. It's what makes you unique. It's the stuff that tells each and every one of your body's 10 trillion cells what it's supposed to be and what it's supposed to do. And although your DNA is different from that of every other person in the world unless you have an identical twin it's the same in every cell that makes up your body.
    That DNA is unique from person to person but the same from cell to cell in one person can be a handy thing, especially when it comes to DNA fingerprinting. DNA fingerprints can be used for anything from determining a biological mother or father to identifying the suspect of a crime. And, as may someday prove to be the case with Sam Sheppard, it can be used to clear someone's name.
    But what exactly is a DNA fingerprint? Well, it certainly isn't an inky impression of a DNA strand. Compared to unimaginably small DNA, a fingerprint is HUGE. So what is it that we're looking at, and how is one of these fingerprints made?
    Here's your chance to find out. You'll find out by solving a mystery a crime of sorts. Solving the mystery involves creating a DNA fingerprint (we'll supply the lab and all necessary materials) and comparing this fingerprint to those of the suspects.

    67. Software IGM
    Program that performs a permutationbased statistical test to detect genetic divergence among populations from DNA fingerprinting data . Downloadable source Fortran code, executable files and user manual .
    http://www.igbe.pv.cnr.it/software.html
    SOFTWARE AVAILABLE
    Watson : a computer program that performs a statistical test to detect genetic divergence among populations from DNA fingerprinting data
    From here you can access the following resources related to Watson:
  • User manual: Welcome to Watson
  • Fortran 90 source code (text file, 11 Kb): Watson.f
  • A sample input data file (text file, 0.4 Kb): datiwats
  • Executable files: File name Operating system Tested on Size (Kb) WatsonD.Z Unix OSF1 4.0D Dec Alpha WatsonS.Z Solaris 7 Sun WatsonL.Z Red Hat 61 Linux rel 6.1 PC with Pentium II WatsonM.hqx Mac OS 8.5 Power Macintosh G3 WatsonW.ZIP DOS - Windows 98/NT PC with Pentium II
    Webmaster: lisa@igm.cnr.it
  • 68. Incidents.org - By The SANS Institute: Passive OS Fingerprinting
    Passive OS fingerprinting Details and Techniques By Toby Miller. This paper willspecifically cover passive OS fingerprinting using TCP and the SYN packet.
    http://www.incidents.org/papers/OSfingerprinting.php
    Passive OS Fingerprinting: Details and Techniques
    By: Toby Miller 1.1 PURPOSE
    The purpose of this paper is to explain the details and techniques that can be used in passive OS fingerprinting. In this paper, we will look at packets captured by TCPDUMP. Although this paper assumes the reader has a basic understanding of the Transmission Control Protocol/Internet Protocol (TCP/IP), we will briefly cover certain fields in the TCP/IP header. This paper will specifically cover passive OS fingerprinting using TCP and the SYN packet. We will cover other flags but the majority of the work has been done analyzing a SYN packet. Passive OS fingerprinting using ICMP has been covered in great detail at http://www.sys-security.com
    Before we begin, I want to clear up any confusion between passive Operating System (OS) fingerprinting (what we are doing here) and active OS fingerprinting (tools like NMAP use this technique). First, passive OS fingerprinting does not send out any packets. All that is needed to perform passive OS fingerprinting is a computer, a sniffer and a desire to dig into a packet. Active OS fingerprinting on the other hand will send special or not so special packets to a machine and wait for a response from that machine. That response will determine what operating system the remote system is running.
    1.2 HEADER OVERVIEW

    69. Improved Protocol For T-RFLP By Capillary Electrophoresis
    Detailed protocol for terminal restriction fragment length polymorphism (TRFLP), which allows the fingerprinting of a community by analyzing the polymorphism of a certain gene. Article by V Gr¼ntzig, B Stres, HL Ayala del R­o and JM Tiedje, Center for Microbial Ecology, Michigan State University, USA
    http://rdp.cme.msu.edu/html/t-rflp_jul02.html
    Improved Protocol for T-RFLP by Capillary Electrophoresis July 2002
    Center for Microbial Ecology, Michigan State University
    East Lansing, Michigan, 48824 I. Overview of T-RFLP method for community studies

    Terminal restriction fragment length polymorphism (T-RFLP) allows the fingerprinting of a community by analyzing the polymorphism of a certain gene. It is a high-throughput, reproducible method that allows the semi-quantitative analysis of the diversity of a particular gene in a community. The figure below illustrates the procedure and the rationale of the method. The DNA is harvested from the analyzed sample (1). The gene of interest is amplified using the polymerase chain reaction (PCR) with a fluorescently labeled primer (2). This yields a mixture of amplicons of the same or similar sizes with a fluorescent label at one end. After purification, the amplicon mixture is digested with a restriction enzyme, which generates fragments of different sizes (A-F) (3). These are separated through gel or capillary electrophoresis (4). A laser reader detects the labeled fragments and generates a profile based on fragment lengths (5). Two methods have been widely used for separation of the fragments obtained after enzymatic restriction of labeled PCR products: gel electrophoresis in polyacrylamide gels and capillary electrophoresis. The former has until recently been more widespread and most of the available protocols for T-RFLP have used this method. However, capillary electrophoresis has been gaining popularity, but the standard procedures for the capillary equipment are not suitable for T-RFLP. Therefore we present a protocol for improved T-RFLP by capillary electrophoresis. The key new steps are identified below as [NEW].

    70. Fingerprint Identification Standards For Emerging Applications
    About transitions in fingerprinting technology, from a traditional law enforcement applications to new biometric technology.
    http://www.dss.state.ct.us/digital/fpstand2.htm
    Fingerprint Identification Standards for Emerging Applications
    By Gordon H. Dechman Automated Fingerprint Identification System (AFIS) technology has been proven in law enforcement over the last 25 years, and the use of AFIS technology is rapidly expanding in a number of new applications areas including welfare. However, the rush to capitalize on the benefits of the technology, in advance of appropriate standards and technology validation methods, is likely to result in a widespread failure to achieve the very valuable programmatic expectations over the long term. For serious large-scale positive-identification applications, no other currently-available biometric technology comes close to fingerprints. Fingerprint identification technologies are:
    • well established : fingerprint identification has been used in law enforcement applications over the past 100 years, and has become the de facto international standard for positive identification of individuals. proven : AFIS (Automated Fingerprint Identification System) technology has been developed, refined and proven in demanding law enforcement applications over the last two decades.

    71. BioInteractive -- Web Video -- Fingerprinting E. Coli
    Epidemiologists can use DNA fingerprinting to determine whether disease outbreaksare caused by the same strain of organism. fingerprinting E. coli.
    http://www.hhmi.org/biointeractive/web_video/ecoli.htm
    Here are 12 clips from CNN on infectious disease with a lesson based on each. Click on the links below. Hantavirus Salmonella Antibiotic Abuse Fingerprinting E. coli Anatomy of an Outbreak Yellowstone Hot Water Science of Anthrax New Antibiotics ... Click and Learn
    Fingerprinting E. coli
    Summary and Background
    Click to Play Video We are used to the notion of using DNA fingerprinting (the pattern of digested DNA samples from an individual) to solve crimes. This method determines whether a suspect's DNA matches that found in trace evidence at a crime scene. Recently, this technology has been expanded to identify bacteria that are making people sick. One such bacterium, Escherichia. coli 0157:H7, is a strain that has caused major outbreaks of bloody diarrhea and kidney failure in children. Epidemiologists can use DNA fingerprinting to determine whether similar outbreaks are caused by the same strain of organism. This CNN clip examines the use of a sophisticated technique called Pulse Field Gel Electrophoresis (PFGE), which enables scientists to ascertain the relatedness of E. coli

    72. Welcome To LabDb.com-Index Page
    Do fast track experiments online for gene analysis, homology analysis for fingerprinting, agarose gel image comparison applications
    http://www.labdb.com
    Express Solutions for the Scientific Industry
    User Name Password
    Select Online Experiments
    Here Free Experiment DNA Length Measurement
    on Agarose Gels
    Regression Analysis
    Preview
    Experiments
    Here
    Launching Soon
    Gene Analysis Proteomics Contact Us
    Cerebral Info.Corp ., U.S.A. WebSite: www.trindus.com Email: neel@trindus.com Submit Resume Search For Candidates BioProcess Experimentation! Diagnosis of Triplet Syndromes! Sequence Homology Analysis! Eukaryotic Protein Code Finder! Database of Triplet Syndrome
    • With LabDB, you can easily do fast track experiments online for BioProcess, Gene Analysis, Homology Analysis for Finger- printing, Agarose Gel Image Comparison Applications and many more.
    BioProcess Experimentation! Regression Analysis Microbial Info Database(IMVIC) Diagnosis of Triplet Syndromes Sequence Homology Analysis Eukaryotic Protein Code Finder Sample Database report of Triplet Syndrome
    • Research are as where LabDB can help you Computer modeling and simulation of BioProcess Research for Yield Optimization

    73. Fingerprinting Web Server Attacks
    to increase the security in your kernel. Features, 3/6/2002 1251.fingerprinting Web Server Attacks. By zenomorph 03/06/2002 1322,
    http://www.linuxsecurity.com/feature_stories/fingerprinting-http.html
    WLAN Security: Reducing The Risks
    Apr 7
    Sebek Released

    Apr 7
    Security flaw hits SETI@home

    Apr 7
    The Virus Threat to Linux

    Apr 7
    Buffer Overflow in Samba allows remote root

    Apr 7
    Fretting About The Future, Lost Liberty
    Apr 7 Using OpenBSD's chrooted Apache Apr 7 Today's Term configuration control The process of regulating changes to hardware, firmware, software, and documentation throughout the development and operational life of a system. (See: administrative security.) ... Today's Tip Using swatch for log analysis Log files are the central place to find information about problematic system errors. Features
    Fingerprinting Web Server Attacks
    By zenomorph Page 1 Page 2 Page 3 [Printer Friendly] In this article, zenomorph discusses multiple ways attackers attempt to exploit port 80 to gain control of a web server. Using this information, an administrator can learn to detect potential attacks and steps that are necessary to protect a server from them.
    Introduction
    Port 80 is the standard port for websites, and it can have a lot of different security issues. These holes can allow an attacker to gain either administrative access to the website, or even the web server itself. This second paper was written to help the average administrator and developer to have a better understanding of the types of threats that exist, along with how to detect them.
    More Common Fingerprints
    This section has examples of more common fingerprints used in exploitation of both web applications, and web servers. This section is not supposed to show you every possible fingerprint, but instead show you more ways an attacker can possibly get into your system, along with how an attackers presence could be masked. These signatures should pick up most of the remaining methods not spoken about in the first paper. This section also describes what each signature is used for, along with examples of it being used in an attack.

    74. The Register
    Steve Kirsch reckons that the relevant technology companies could deliver a working system of brain fingerprinting databases and a companion retina scanning system for (supposedly anonymous) identification reference in something like ninety days' time.
    http://www.theregister.co.uk/content/55/22020.html
    2 April 2003
    Updated: 21:29 GMT
    Register Services Register ISP Reg Jobsearch Reg Merchandise IT-minds bookstore Sections Front Page Software Enterprise Systems Servers ... Contact us The Reg Newsletter
    Enter your email address here for our daily news update.
    Get the Reg Screensaver.

    Join the Reg SETI group.

    Join Reg Cancerbusters.
    Brain-scans can defeat terrorism, InfoSeek founder claims By Thomas C Greene in Washington Posted: 03/10/2001 at 20:56 GMT
    Just when you thought crowd surveillance with facial recognition gear was the sickest idea circulating, some naive do-gooder comes along with 'brain fingerprinting' to detect evil memories, loudly urging its use as a public security measure in the wake of the 11 September tragedies.
    Steve Kirsch, founder of InfoSeek and current CEO of data management outfit Propel Software , reckons that the relevant technology companies could deliver a working system of brain fingerprinting databases and a companion iris scanning system for (supposedly anonymous) identification reference in something like ninety days' time. And this will "infallibly" defeat terrorists, he fervently believes.
    How it works
    Kirsch's mental intrusion scheme is based on 'multifaceted electroencephalographic response analysis' (MERA), an electronic form of phrenology promoted by BrainWave Science company President Larry Farwell, whose Gibson-esque self-promoting

    75. Advanced ID Systems
    THIS INKLESS FINGERPRINT SYSTEM IS DESIGNED TO MAKE BOOKINGAPPLICANT fingerprinting CLEAN AND EASY. (8060914070502A),
    http://www.advancedidsystems.peachhost.com/ct_CG13476406.htm
    Search Catalog Minimum order is $50.00 Home Search Catalog ... Web-Badge Navigation: Start
    Search: FPRINT DIGIT 10 LE-10 THIS INKLESS FINGERPRINT SYSTEM IS DESIGNED TO MAKE BOOKING APPLICANT FINGERPRINTING CLEAN AND EASY. (8060914070502A) FPRINT DIGIT 10 REPLACEMENT KT DIGIT 10 REPLACEMENT KIT LE-110. INCLUDES FINGER PAD AND 5 DEVELOPER SHEETS. (8060914070502B) FPRINT IDENTAPRINT UNIT LE-15 INKLESS FINGERPRINT SYSTEM FOR HIGH VOLUME USE. DEVELOPS INSTANTLY PERMANENT, CLEAR, NON-SMEARING PRINTS. (8060914070502C) FPRINT IDENTAPRINT REPLCMNT KT IDENTAPRINT REPLACEMENT KIT LE-115 - INCLUDES FINGER PAD AND 15 DEVELOPER SHEETS (8060914070502D) FPRINT ROLL PALM INKLESS PRINT INKLESS VERSION LE-21P. COMPRESSIBLE APPLICATOR ROLLER PAD FOR EASY PRINTING OF HARD-TO-PRINT AREAS OF THE HAND (8060914070502E) FPRINT ROLL PALM REPLC PRINTER ROLLER PALM PRINTER REPLACEMENT KIT - BLACK INK VERSION LE-121B (8060914070502F) FPRINT ROLL PALM INKLESS PRINT ROLLER PALM PRINTER REPLACEMENT KIT - INKLESS VERSION LE-121P (8060914070502G) FPRINT ROLL PALM COAT PRINTER PRINTER PI-21 COATING AND IMPRESSION ROLLERS MAKE CONSISTENTLY CLEAR BLACK PRINTS. IMPRESSION ROLLER WILL HANDLE ANY SIZE FORM (8060914070502H)

    76. Aflp
    A basic description of AFLP®, a DNA fingerprinting technique which detects DNA restriction fragments by means of PCR amplification. From the web site of the company Keygene.
    http://www.keygene.com/html/aflp.htm
    : principles and applications
    • The restriction of the DNA with two restriction enzymes, preferably a hexa-cutter and a tetra-cutter; The ligation of double-stranded (ds) adapters to the ends of the restriction fragments; The amplification of a subset of the restriction fragments using two primers complementary to the adapter and restriction site sequences, and extended at their 3' ends by "selective" nucleotides (see Figures 1 and 2); Gel electrophoresis of the amplified restriction fragments on denaturing polyacrylamide gels ("sequence gels"); The visualization of the DNA fingerprints by means of autoradiography, phospho-imaging, or other methods.
    Figure 1
    (see Figure 2) Figure 2
    Figure 3

    A
    • Biodiversity studies, The analysis of germplasm collections, The genotyping of individuals, and genetic distance analyses, The identification of closely-linked DNA markers,
    The construction of genetic DNA marker maps. The construction of physical maps using genomic clones such as YACs and BACs.

    77. DNA I.D.
    Still, there are problems with DNA fingerprinting. What does DNA fingerprintinghave to contribute to identifying bugs on stiffs? ExCuse me?
    http://whyfiles.org/014forensic/genetic_foren2.html
    Your DNA I.D. card
    Here's how DNA fingerprinting works (this procedure is done once on a sample of blood, semen, hair or skin cells from the crime scene, and again on samples taken from the suspect).
  • You take some DNA and cut it with restriction enzymes ( defined ). These chemicals cut the long DNA molecule each time they recognize a certain sequences of sub-units, or bases. It's sort of like going through a phone book and cutting it just before the name "Norman." Thus each fragment would start with Norman. (Why are we picking on Norm? No reason. In genetics, you could just as easily search for the name "ACCGTAGCACGCCAGT," which are letters in the genetic "code" of DNA) The goal of this step is to cut up the DNA evidence into manageable fragments.
  • Then you put the fragments on a layer of gelatin and hook up an electric field to the ends of the gelatin.
  • When you switch on the current, it attracts the fragments across the field.
  • The shorter fragments move faster than long ones, and that sorts the fragments by size.
  • You attach radioactive markers to certain sequences of the DNA. For example, you might label every occurrence of DADDADCAT a different series of "letters" in DNA's alphabet.
  • 78. National Background Check, Inc.
    NBCI is an electronic fingerprinting service that uses the WebCheck technology. Results are received back from BCI in less than two business days.
    http://www.nationalbackgroundcheck.com/NBCIHTML/home.asp

    79. DNA Fingerprinting
    Fortunately for Ochoa, evidence from the crime was still available for DNA fingerprinting,a simple test that can prove whether a biological sample did or did
    http://whyfiles.org/126dna_forensic/
    1. DNA fingerprinting 2. Handiest tool 3. Junky genes speak 4. Latest and greatest Ochoa faces the press at the end of his long ordeal of false imprisonment.
    The Wisconsin Innocence Project team and Christopher Ochoa gather with well wishers at the Texas courthouse.
    Free at last!
    POSTED 25 JAN 2001 After 12 years in prison, a Texas inmate walked free on Jan. 17. The exoneration came courtesy of University of Wisconsin-Madison law students and professors and DNA tests proving that Christopher Ochoa, now 33, was innocent of a 1988 rape and murder.
    Fortunately for Ochoa, evidence from the crime was still available for DNA fingerprinting, a simple test that can prove whether a biological sample did or did not come from a suspect. The arrival of cheap and fast DNA fingerprinting is overturning the quest to convict the guilty and free the innocent. The technology is far more specific than earlier tests of antibodies in blood or semen. Terry Laber, who directed the blood laboratory at the Minnesota Department of Public Safety, says, "Before DNA, you'd have a good suspect, and do all the tests you could do, and you'd end up with 30 percent to 40 percent of the population qualifying." But when biological samples from blood, skin cells or semen are DNA fingerprinted, the specific DNA sequence is extremely unlikely to be found except in the perpetrator. A match, Laber says, is "very powerful evidence." (For a prosecutor's story of DNA fingerprinting, see "And the Blood..." in the

    80. Shimadzu Biotech - Bringing Analysis To Life
    Manufacturers and markets MALDITOF mass spectrometers, designed for analyses in life science and drug discovery, such as peptide mass fingerprinting and protein confirmation through worldwide subsidiaries, from headquarters in Kyoto, Japan.
    http://www.shimadzu-biotech.net/
    Shimadzu Biotech is a new force in applying innovative
    technologies to create the world's most powerful
    analytical solutions for life science and drug discovery.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 4     61-80 of 150    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | Next 20

    free hit counter