Free Essay

Mathematics and Forensics

In: Computers and Technology

Submitted By Pookie47
Words 1097
Pages 5
Mathematics and Forensics

8 March, 2015
Math History - 109

In a world filled with technology, accountability, and a desire for higher quality of living; the world owes it all to math. As children grow up and are taught mathematics in countries all over the world; they are all being taught the same language. Math is the universal language of the world and math has changed the world from the time of the Egyptians to the present day era of technology. Mathematicians like Nicolaus Copernicus gave the world the truth of the universe with heliocentrism, while Isaac Newton gave the world the modern laws of physics. Mathematics has even paved its way into music with each beat of music being timed by numbers. Math is everywhere and people with brilliant minds can use mathematics to contribute to the world in very positive ways. One such way is the science of forensics. Without math, forensics could not exist. As population growth increases at an alarming rate, people have to find ways of holding people accountable for unlawful behavior. Forensic science has allowed civilization to evolve and become less barbaric and move towards factual based evidence when solving crimes against nature. Forensic science measures facts involving a crime and figure out the truth behind those measurements. Whether it is the skid marks from a vehicle collision or blood splatter analysis; mathematics is the reason why this can be done.
Forensics have paved the way to a better justice system providing factual based evidence based upon math laws that are accepted as truth. The study of ballistics and the trajectory of bullets is a crucial element in crime solving strategy. In the United States, it is everyone’s privilege to own a gun lawfully. If the majority of the people had guns, it would be important to have a way of holding citizens accountable. This is done with mathematics. Scientists today can analyze a bullet and scratches surrounding the bullet. Precise measurements allow for factual proof and by doing this the forensic scientists can determine the gun that was used at the scene of the crime ("Use of Mathematics in Forensic Science", 2012). Other ways that ballistics matter is by recreating a crime scene and measuring the trajectory of the bullet compared to that of the perpetrators height. The bullets trajectory matters greatly in crimes towards a perpetrator because if the person’s height does not fit the expected result of the equation, then most likely the person suspected will not be the culprit. Forensics uses measurement to capture fact based evidence and none of this is possible without math.
Forensic scientists are capable of so much in capturing the truth behind a situation. Processes like studying blood splatter and figuring out how to retrieve DNA without compromising evidence is very important to finding the truth of a crime. To be more specific, a forensic biologist can compare two sets of DNA samples and find the probability of which the DNA is a match or not ("Use of Mathematics in Forensic Science", 2012). Another way mathematics impacts forensics is by studying and measuring blood splatter. Precise measurements can lead scientists to figuring out where the person was standing by using trigonometry ("Use of Mathematics in Forensic Science", 2012). Scientists can use triangles to determine exactly how the person shooting the gun was standing, the angle from which the shot took place, and how far away from the person they were. Math is absolute and unchanging which gives scientists all the necessary tools to finding the truth of a situation. People can and will eventually be held accountable for wrongful crimes because, math finds the truth of the world. So far, mathematics in forensics has proved to be worthy of mention in the field of science. One field of forensics that requires extensive knowledge is finding the proportions of human remains in nature. Oftentimes people that commit heinous crimes of murder will hide the victim’s body and it can take several years before remains surface or it could take decades. If a portion of the body is found, the measurements of the bones can determine the victim’s height by measuring weight, length, and density (Datta, 2013). This is very important in determining the age group of the remains found. This can then be put in a database of missing people in the area to see if DNA can be matched with any missing victims. Remains found should be given the respect of being returned to the family and mathematics and forensics have given the right back to the victim. If math did not exist, an arm bone would look the same as any other arm bone. There would not be microscopic details available for the scientist to study, nor would there be equipment made that could help analyze the details of the bones found. Attention to detail is often the difference between finding the truth in a situation. Measuring bones in how they were struck with an object, or at time of impact can help determine the cause of injury, or narrow down the actual cause of death. A person can be shot in the chest several times and survive it but a blow to head with a frying pan might have been the actual cause of death. This can be done by studying the bones very carefully and measuring exact results. Mathematics has changed the way the world works and allows people to be given justice even after death. Upon researching the way mathematics has changed the world, it can easily be forgotten that life as the world knows it today could not exist without math. Mathematics has influenced the way the justice system is run by using factual evidence supported by science. Car accidents can be analyzed down to the skid marks of the cars involved to determine who was at fault if both or one of the victims should die. Never before has our civilization been held to a higher standard of living. In less civilized times, crimes against humanity were harder to stop as people need to see proof. With the modern sciences and math fundamentals of today, people are able to get that proof. The world can benefit from some accountability as population continues to rise.

REFERENCES

Datta, N. (2013). The Common Denominator: Math + Forensic Science = Clever Crime Detection. Retrieved from http://forensicoutreach.com/the-common-denominator-math-forensic-science-clever-crime-detection-2/
Use of Mathematics in Forensic Science. (2012). Retrieved from https://forensicinfo.wordpress.com/2012/02/27/use-of-mathematics-in-forensic-science-k-gnaneshwar/

Similar Documents

Free Essay

Forensic Chemist Careers

...Forensic Chemist The trunk of a stolen car smells of decomposed flesh, a pair of Converse high tops with tiny specs of blood spatter are all alone in the back seat of the same car, and a half smoked cigarette rests softly on a freshly mowed lawn next to the driveway. These are clues of a crime scene. Each clue adds up to the story of something terrible. A crime has taken place, and law enforcement is on the scene. Whether it is a detective, county Sheriff or the FBI, the investigators will rely on their forensic teams to link all the pieces of the puzzle that don’t quite fit yet. A Forensic Chemist can make them fit by scientifically analyzing the evidence. Chemistry, biology, materials science, and genetics to analyze clue found at the scene of the crime, on the victims or in the bodies of the bad guys. Forensic Chemists go into a case with many unknow pieces of the crime scene they need to analyze to determine the nature of each sample. Most Forensic Chemists work in a lab. It is rare for private labs to do this kind of work so most of the time these labs are associated with Local, State, or Federal law enforcement agencies. From local Medical Examiner’s labs to state of the art FBI labs, Forensics Chemists often provide the strongest evidence in court against the defendants. They have many different types of test and methods they use to figure out what the samples mean. Each crime scene brings new types of clues and samples so a Forensic Chemist must......

Words: 984 - Pages: 4

Premium Essay

Table

...WEEK 1 DAY | MORNING SESSION09:00 – 12:00 | AFTERNOON SESSION14:00 – 17:00 | MONDAY22/06/2015 | * Higher Mathematics 1(Gym) * Business Law (RM 1) * Advanced Project Management(RM 2) * Financial reporting and control(RM 33) * Political Science/Philosophy(RM 36) * digital communications systems(RM 33) | * Electricity and Magnetism(RM 36 & 1) * Research Methodology(Gym) * Operations Management(RM 2) * Media and Communications Ethics(RM 2) * Mobile Communications(RM 2) * Social Work Legal and practice(RM 33) * Employee Engagement (RM 33) | TUESDAY23/06/2015 | * Management Information Systems1(Gym & RM 36) * Java Programming(RM 33) * Mathematics for economics (RM 1) * Software Economics(RM 1) * Media and Society (RM 1) * Marketing(RM 2) * Human Resource Development (RM 2) * Human Rights and Development (RM 2) | * Business Communication/Communication Skills(Gym, RMs 36, 33, 2) * Project Planning and Management Software(Project) * Public Finance(RM 1) * Intermediate macroeconomics 2(RM 1) * Project Appraisal(RM 1) * Wood based Materials &Processes I(RM 1) * Financial Management(RM 1) | WEDNESDAY24/06/2015 | * Media Law(RM 1) * Introduction to Business( Gym) * Introduction to Public Administration(RM 36) * Intermediate microeconomics 1(RM 1) * Cyber Law(Gym) * Food security in Developing Countries(RM 33) * Risk Management(RM 2) * Project Design 1(RM 2) | * Sociology of Education(Gym) ......

Words: 924 - Pages: 4

Premium Essay

It 205 Information Use Paper

...Assignment: Information Use Paper Student: Josey Wayne Hudson Class: IT/205 Professor: Li Lo The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work. I work for the government in IT, as a Part Timer. Every morning getting in my building I use My CAT card to enter the building, then I start my day. My occupation is information system, I will begin off with information system, and my obligations are figure out what the association needs in a system and PC framework......

Words: 647 - Pages: 3

Free Essay

Refection Letter of Marijuana Consequences

...Usually, toxicologist graduates from Ph.D.’s or master’s degrees. Most importantly, a strong foundation for any future scientist is based on skills in reading, writing, mathematics, computer science and communication, along with courses in biology, chemistry, and physics. Knowledge of a foreign language is important for exchanging information in our global society. These are very important for toxicologist and need to be prepared during high school and college. * Responsibly and Daily Activities Toxicology combines the elements of many scientific disciplines to help us understand the harmful effects of chemicals on living organisms. Basically, toxicology is the study of the toxic or harmful effects of chemicals. Chemicals make up everything around us like pesticides in the food we eat, pollutants in the air we breathe, chemicals in the water we drink, toxic dump sites near our homes. Usually, toxicologists work in contact with an analytical lab because they do a lot of chemical analytical work. Toxicologists are responsible for a lot of things including our lives. There are three types and they are forensic, veterinary, and environmental toxicologist. Forensic toxicology is a discipline of forensic science concerned with the study of toxic substances or poisons, of which there are many thousands. Currently, forensic toxicology is the study of alcohol, drugs, and poisons, including their chemical composition, preparations and identification. Veterinary toxicology......

Words: 648 - Pages: 3

Free Essay

Computer Forensics

...International Journal of Digital Evidence Fall 2007, Volume 6, Issue 2 Computer Forensic Analysis in a Virtual Environment Derek Bem Ewa Huebner University of Western Sydney, Australia Abstract In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and software tools are presented and discussed. Further we identify the limitations of virtual environments leading to the conclusion that this method can not be considered to be a replacement for conventional techniques of computer evidence collection and analysis. We propose a new approach where two environments, conventional and virtual, are used independently. Further we demonstrate that this approach can considerably shorten the time of the computer forensics investigation analysis phase and it also allows for better utilisation of less qualified personnel. Keywords: Computer Forensics, Virtual Machine, computer evidence. Introduction In this paper we examine the application of the VMWare (VMWare, 2007) virtual environment in the analysis phase of a computer forensics investigation. We show that the environment created by VMWare differs considerably from the original computer system, and because of that VMWare by itself is very unlikely to produce court admissible evidence. We propose a new approach when two environments, conventional and virtual, are used concurrently and independently. After the......

Words: 3983 - Pages: 16

Free Essay

Forensic Science in the 21st Century

...Forensic Science in the 21st Century AJS/592 Aug 2012 Forensic Science in the 21st Century Forensic science is regarded as an essential component in the resolution of crimes and law enforcement. Collecting and deciphering evidence properly and preserving crime scenes are two of the most important elements in crime-solving. Consequently, technological advances are relevant to the limited and challenging forensic science field. Also, it is a field wherein technical aptitude is attained only by the amalgamation of various dynamics. For example, supervision, continuing education, proficiency, training, experience, coupled with appreciativeness of scientific protocols and methods proposed against a setting of harsh professional beliefs. This submission delves into forensic science’s contributions to policing and criminal investigations, court processes, and security efforts. Also it explores the media’s representation of forensic science, influence on popular opinion for justice-related issues, and “CSI” effect on the judicial process. Forensic Science Contributions to Policing and Criminal Investigations The geneses of criminalistics or forensic science are mainly European. Forensic science is an amalgamation of various disciplines, such as chemistry, mathematics, geology, physics, and biology to examine physical evidence associated with crime. Previously, the employment of......

Words: 1778 - Pages: 8

Premium Essay

Letter of Motivation

...PURPOSE. If there is any book that has recreated my mind-set about life, it must be “The Purpose Driven Life” by Rick Warren. Although the book was written from a Christian perspective, he made two assertions that transcend Christianity. First, no one is an accident, a mistake or a mishap or a fluke of nature, we are put on earth for a reason, and secondly, we are created to add to life on earth, not just take from it. These truths has given me a sense of direction and purpose and has revealed that I need to give back to the world just as much as it has given me and contribute my quota in making the world a better place. My future goals and ambitions are founded on these assertions. My career goal is to become a Forensic Accountant. I plan to pursue forensic accounting at the...

Words: 735 - Pages: 3

Free Essay

Careers in Accounting

...auditing are the primary fields with many sub-fields that can be entered into. Accounting, of all types, is a constant demand field. A brief search with the term “accountant” yielded over 500 results on USAJobs.gov alone. Two of the accounting fields that interest me most are Forensic Accounting, and Tax Accounting. These two areas appear to be the most involved and ever changing areas in accounting. A Tax accountant is accountable for the collection of tax-related information, reporting to taxation authorities at the federal, state, county, and local levels in a timely manner, and advising management on the tax impact of various corporate strategies. And a Forensic Accounting is the examination of financial records that will lead to or result from litigation. The results of a forensic accounting investigation can be used as evidence in court, and so are usually heavily documented. With the ever-changing US tax code and the increased scrutiny that business is beginning to face, due to things like the Sarbanes-Oxley Act, these two areas can be the difference between jail and smooth operation. Forensic Accounting is a field that I researched more in-depth. The academic skills necessary for a career in forensic accounting are similar to any other accounting job. One would need a degree in accounting, a CPA, and often need to be a Certified Fraud Examiner. With the high earning potential of this field, many organizations look for extensive education. A master’s degree and many......

Words: 1026 - Pages: 5

Free Essay

University Essay

...THE UNIVERSITY OF TORONTO UNIVERSITY OF TORONTO International Undergraduate Admission Information 2012/13 Established in 1827, the University of Toronto is one of the oldest and most internationally recognized universities in North America. Canada’s largest university takes pride in a tradition of excellence. No other Canadian university offers as great a diversity of programs and resources. Academic excellence is the prime goal, but the importance of the total university experience is also recognized. Student enrolment is 76,000; the faculty numbers 10,391. A mong the University’s many outstanding resources is its library system, rated one of the top five in North America. More than 40 libraries contain the most comprehensive collection of research material in Canada. There is residence space for over 8,300 students, a health service, an advisory bureau, an international student centre, a career centre, a housing service, restaurants, bookstores, athletic and recreational facilities and facilities for music, theatre and debate. LOCATION Toronto is one of the friendliest and safest cities in the world. There are three locations at which students may study. U of T St. George is located in the heart of downtown Toronto; U of T Scarborough is 22 km (14 miles) to the east of U of T St. George; and U of T Mississauga is 27 km (17 miles) to the west of U of T St. George. All three campuses offer studies in arts, science, business and education; most of the......

Words: 7578 - Pages: 31

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is......

Words: 195394 - Pages: 782

Premium Essay

Standard Operating Procedures

...First off, a security plan for the collected data must be established. No person shall tamper with the data that has been held for evidence and must remain in its original state as when it was collected, as tampered evidence may be thrown out in court. This data must be preserved even after criminal prosecution has been established, as this data may prove useful in future cases. The evidence should be stored on both compact disk and storage drive in case one device of storage was to fail. Digital folders within the storage drive must be well labeled and organized accordingly, as well as folders and file cabinets that contain data CDs. Second, the evidence that has been collected must be identified to the perpetrators as evidence. Just as police are obligated by law to explain to a criminal what his/her charges are when arrested, investigators are obligated to explain exactly what evidence can and/or will be used against the perpetrators in the court of law during an interrogation. Each piece of evidence must be expressed to the person that the evidence was obtained from in a manner in which he/she can understand. This will ensure that the investigators and the perpetrators are on the same level, and the court will not think that the investigators are trying an unfair advantage. This will also allow anything that the perpetrator says to be used against him/her in the court of law. Third, a sequence of events during the investigation must be logged in......

Words: 769 - Pages: 4

Free Essay

Women Affair.Pdf

...WOMEN DEVELOPMENT AND NATIONAL POLICY ON WOMEN IN NIGERIA Olubunmi Aderemi Sokefun Abstract This paper discusses the document on women in Nigeria (National Policy on Women). Several past administrations in this country have treated women issues and affairs with calculated levity: Carefully side - tracking or blatantly refusing to accord it the necessary attention. It is now a thing to gladden the hearts of all women of Nigeria that, "after four attempts by four former heads of Nigeria's Government," Chief Obasanjo's administration finally granted government recognition to women's issues in this country. The official document .on Human Rights' issues as it relates to Nigerian women; this document is known as the NATIONAL POLICY ON WOMEN. This paper therefore focuses on the document which promises to bring delight to the heart of every woman in this country. Introduction When late Mrs. Olufunmilayo Ransome Kuti joined the vanguard team as the only nationalist and activist during the early struggle for Nigerian independence, hardly did .anybody realize then that she had a dream, a clear vision of a future Nigerian woman, that vision was crystal clear in her heart, and like a pivot, it stood firmly on three stand posts-known today as women's rights, women emancipation and women empowerment.. . Mrs. Olufunmilayo Ransome-Kuti later joined by some educated women of like minds, fought daringly and relentlessly for these three .pivotal goals of women emergency and relevance in the......

Words: 71889 - Pages: 288

Premium Essay

Health

...lead to a certificate, an associate’s degree, or a bachelor’s degree. Associate’s degree programs are the most common. Certificate programs typically last 6 to 12 months. Typical programs include both classroom training and clinical training. Coursework includes anatomy, pathology, patient care, radiation physics and protection, and image evaluation. The Joint Review Committee on Education in Radiologic Technology (JRCERT) accredits educational and training programs in radiography. Completing an accredited program is required for licensure in some states. High school students who are interested in radiologic technology should take courses that focus on science and math. Suggested courses include anatomy, biology, chemistry, physiology, mathematics, and physics. Radiologic technologists must be licensed or certified in most states; requirements vary by state. To be licensed in most states, radiologic technologists must have graduated from an accredited program and must pass a certification exam from the state or from The American Registry of Radiologic Technologist (ARRT). To keep their certification, radiologic technologists must meet continuing education requirements. Students must also hold a 3.0 G.P.A. (Grade Point Average), or B average, and be legal citizens of the United States. Radiologic technologists typically adjust and maintain imaging equipment. They precisely follow orders from physicians on what areas of the body to image and prepare patients for procedures. My...

Words: 1189 - Pages: 5

Free Essay

Digital Forensics - Uganda’s Preparedness

...Digital Forensics: Uganda’s Preparedness Dennis Tusiime Rwatooro 2014-M142-2002 Dept of Computer Science Abstract — The more our lives continue to depend on digital communication networks and media to perform daily activities such as communication, access to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline......

Words: 7291 - Pages: 30

Free Essay

Forensics of Blood

...Forensics of Blood Blood evidence is the most common, most recognized and possibly most important evidence in the world of criminal justice. Throughout the history of violent and fatal crimes, bloodstain evidence has recently begun to emerge as a recognized forensic skill. “Blood is one of the most significant and frequently encountered types of physical evidence associated with forensic investigation of death and violent crime” (Eckert & James, 11). When a violent crime has been committed, blood is commonly left behind at the scene of the crime. This blood evidence allows police investigators to piece together the events of the crime. The texture, size, shape, and distribution of the blood can be used to determine when the crime occurred, what weapon was used, how the victim was standing, how many times the victim was hit, and more. Even if the perpetrator attempted to cover up the crime by cleaning the blood, evidence of blood still remains. Forensic investigators have different tests that can see where blood has been, whether it is blood, saliva, or semen, and also can test whether the blood is even human or not. Going even further, more tests can be done to compare the blood of different individuals to determine whether or not they were the perpetrator. Within the blood, there is a liquid portion called plasma making up about 55% of the total volume of blood. The plasma contains mostly water with some nutrients, minerals, and oxygen. In the plasma, there are red......

Words: 3486 - Pages: 14