LEADER 04985nam 22006734a 450 001 9910782293803321 005 20230721032531.0 010 $a1-281-39722-9 010 $a9786611397227 010 $a0-8135-4424-6 024 7 $a10.36019/9780813544243 035 $a(CKB)1000000000535682 035 $a(EBL)348830 035 $a(OCoLC)476163937 035 $a(SSID)ssj0000157031 035 $a(PQKBManifestationID)11150827 035 $a(PQKBTitleCode)TC0000157031 035 $a(PQKBWorkID)10131364 035 $a(PQKB)10968982 035 $a(MiAaPQ)EBC348830 035 $a(OCoLC)236080724 035 $a(MdBmJHUP)muse8085 035 $a(DE-B1597)529700 035 $a(DE-B1597)9780813544243 035 $a(Au-PeEL)EBL348830 035 $a(CaPaEBR)ebr10231503 035 $a(CaONFJC)MIL139722 035 $a(EXLCZ)991000000000535682 100 $a20070525d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aForensics under fire$b[electronic resource] $eare bad science and dueling experts corrupting criminal justice? /$fJim Fisher 210 $aNew Brunswick, N.J. $cRutgers University Press$dc2008 215 $a1 online resource (340 p.) 300 $aDescription based upon print version of record. 311 $a0-8135-4271-5 320 $aIncludes bibliographical references (p. 387-324) and index. 327 $aForensic pathologists from hell : bungled autopsies, bad calls, and blown cases -- A question of credibility : bad reputations and the politics of death -- The sudden infant death debate Dr. Roy Meadow, Munchausen syndrome by proxy and Meadow's law -- Infants who can't breathe : illness or suffocation? -- Swollen brains and broken bones : disease or infanticide? -- Fingerprint identification : trouble in paradise -- Fingerprints never lie : except in Scotland -- Shoe print identification and foot morphology : the lay witness and the Cinderella analysis -- Bite mark identification : do teeth leave prints? -- Ear-mark identification : emerging science or bad evidence? -- Expert versus expert : the handwriting wars in the Ramsey case -- John Mark Karr : DNA Trumps the graphologists in the Ramsey case -- Hair and fiber identification : the inexact science -- DNA analysis : backlogs, sloppy work, and unqualified people -- Bullet identification : FBI style overselling the science -- The celebrity expert : Dr. Henry Lee. 330 $aTelevision shows like CSI, Forensic Files, and The New Detectives make it look so easy. A crime-scene photographer snaps photographs, a fingerprint technician examines a gun, uniformed officers seal off a house while detectives gather hair and blood samples, placing them carefully into separate evidence containers. In a crime laboratory, a suspect's hands are meticulously examined for gunshot residue. An autopsy is performed in order to determine range and angle of the gunshot and time-of-death evidence. Dozens of tests and analyses are performed and cross-referenced. A conviction is made. Another crime is solved. The credits roll. The American public has become captivated by success stories like this one with their satisfyingly definitive conclusions, all made possible because of the wonders of forensic science. Unfortunately, however, popular television dramas do not represent the way most homicide cases in the United States are actually handled. Crime scenes are not always protected from contamination; physical evidence is often packaged improperly, lost, or left unaccounted for; forensic experts are not always consulted; and mistakes and omissions on the autopsy table frequently cut investigations short or send detectives down the wrong investigative path. In Forensics Under Fire, Jim Fisher makes a compelling case that these and other problems in the practice of forensic science allow offenders to escape justice and can also lead to the imprisonment of innocent people. Bringing together examples from a host of high-profile criminal cases and familiar figures, such as the JonBenet Ramsey case and Dr. Henry Lee who presented physical evidence in the O. J. Simpson trial, along with many lesser known but fascinating stories, Fisher presents daunting evidence that forensic science has a long way to go before it lives up to its potential and the public's expectations. 606 $aCriminal investigation$zUnited States 606 $aCrime scene searches$zUnited States 606 $aForensic sciences$zUnited States 606 $aEvidence, Criminal$zUnited States 615 0$aCriminal investigation 615 0$aCrime scene searches 615 0$aForensic sciences 615 0$aEvidence, Criminal 676 $a363.25 700 $aFisher$b Jim$f1939-$01555574 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782293803321 996 $aForensics under fire$93817586 997 $aUNINA LEADER 09577nam 2200721 450 001 9910829993603321 005 20240219160541.0 010 $a1-281-84113-7 010 $a9786611841133 010 $a0-470-77767-2 010 $a0-470-77766-4 024 7 $a10.1002/9780470777671 035 $a(CKB)1000000000556321 035 $a(EBL)366863 035 $a(SSID)ssj0000120125 035 $a(PQKBManifestationID)11134548 035 $a(PQKBTitleCode)TC0000120125 035 $a(PQKBWorkID)10079884 035 $a(PQKB)11672173 035 $a(MiAaPQ)EBC366863 035 $a(CaBNVSL)mat08039827 035 $a(IDAMS)0b00006485f0dc45 035 $a(IEEE)8039827 035 $a(PPN)252624076 035 $a(OCoLC)352831719 035 $a(EXLCZ)991000000000556321 100 $a20171024d2008 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCharging for mobile all-IP telecommunications /$fYi-Bing Lin, Sok-Ian Sou 210 1$aChichester, West Sussex, U.K.,$c,$d2008. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2009] 215 $a1 online resource (301 p.) 225 1 $aWiley series on wireless communications and mobile computing 300 $aDescription based upon print version of record. 311 $a0-470-77565-3 320 $aIncludes bibliographical references and index. 327 $aPreface -- Chapter 1: Introduction -- 1.1 Charging for Mobile All-IP Networks -- 1.2 Online Charging -- 1.3 Concluding Remarks -- 1.4 Review Questions -- 1.5 References -- Chapter 2: Telecommunications Networks -- 2.1 Public Switched Telephone Network -- 2.2 Global System for Mobile Communications -- 2.3 Universal Mobile Telecommunications System -- 2.4 IP Multimedia Core Network Subsystem -- 2.5 WLAN and Cellular Interworking -- 2.6 Concluding Remarks -- 2.7 Review Questions -- 2.8 References -- Chapter 3: Telecommunications Services -- 3.1 Automated Attendant -- 3.2 Charging Services -- 3.3 Routing Services -- 3.4 Dialing Services -- 3.5 Screening Services -- 3.6 Interrupt Services -- 3.7 Mass Call -- 3.8 Universal Personal Telecommunications Number -- 3.9 Interactive Voice Response Techniques -- 3.10 Other Telephone Services -- 3.11 Mobile Telecommunications Services -- 3.12 Concluding Remarks -- 3.13 Review Questions -- 3.14 References -- Chapter 4: GPRS Tunneling Protocol Extension -- 4.1 The GTP' Protocol -- 4.2 Connection Setup Procedure -- 4.3 CDR Transfer Procedure -- 4.4 Prepaid Quota Management -- 4.5 Prepaid Quota Management Procedure -- 4.6 Concluding Remarks -- 4.7 Review Questions -- 4.8 References -- Chapter 5: Mobile Charging Protocols -- 5.1 Customized Application for the Mobile Network Enhanced Logic (CAMEL) -- 5.2 Remote Access Dial In User Service (RADIUS) -- 5.3 Diameter -- 5.4 Diameter-based Offline Charging -- 5.5 Diameter-based Online Charging -- 5.6 Session Initiation Protocol: IMS Charging Headers -- 5.7 Concluding Remarks -- 5.8 Review Questions -- 5.9 References -- Chapter 6: UMTS CS/PS Charging Management -- 6.1 Circuit Switched Service Domain -- 6.2 Packet Switched Service Domain -- 6.3 Concluding Remarks -- 6.4 Review Questions -- 6.5 References -- Chapter 7: IMS and MMS Offline Charging Management -- 7.1 Offline Charging for IMS -- 7.2 IMS Charging Correlation -- 7.3 Multimedia Messaging Service Domain -- 7.4 Mediation Device -- 7.5 Concluding Remarks. 327 $a7.6 Review Questions -- 7.7 References -- Chapter 8: UMTS Online Charging -- 8.1 UMTS Charging Architecture (Release 6) -- 8.2 Online Charging Scenarios -- 8.3 Concluding Remarks -- 8.4 Review Questions -- 8.5 References -- Chapter 9: Service Data Flow-based Charging -- 9.1 Online Flow Based Charging Architecture -- 9.2 Content-based Service for Online TPF/GPRS -- 9.3 Online IMS Flow-based Charging -- 9.4 Policy and Charging Control Integration -- 9.5 Concluding Remarks -- 9.6 Review Questions -- 9.7 References -- Chapter 10: Billing for VoIP Services -- 10.1 A VoIP Network Architecture -- 10.2 Call Detail Record Generation -- 10.3 Deriving Call Holding Time Distributions -- 10.4 Observations form the Call Holding Time Statistics -- 10.5 Concluding Remarks -- 10.6 Review Questions -- 10.7 References -- Appendix A. Connection Failure Detection for GTP' -- A.1 GTP' Failure Detection -- A.2 Numerical Examples -- A.3 Concluding Remarks -- A.4 Notation -- A.5 References -- Appendix B. Charging for Integrated Prepaid VoIP and Messaging Services -- B.1 Prepaid Application Server of SIP-based Services -- B.2 Charging Integration for Prepaid Calls and Instant Messaging -- B.2.1 Prepaid IMS-to-PSTN Call Setup and Release -- B.2.2 Prepaid Instant Messaging Delivery -- B.2.3 Charging Policy of the Prepaid Application Server -- B.3 Performance for the PAS Charging Policy -- B.4 Concluding Remarks -- B.5 Notation -- B.6 References -- Appendix C. Modeling Credit Reservation for OCS -- C.1 Recharge Threshold-based Credit Reservation -- C.2 Numerical Examples and Conclusions -- C.3 Notation -- C.4 References -- Appendix D. Reducing Credit Re-authorization Cost -- D.1 Credit Re-authorization Procedure -- D.2 The Threshold-based Scheme -- D.3 Numerical Examples -- D.4 Concluding Remarks -- D.5 Notation -- D.6 References -- Appendix E. Credit Redistribution for UMTS Prepaid Service through CAMEL -- E.1 The IN Approach for the UMTS Prepaid Service -- E.2 The Prepaid Charging Message Flow. 327 $aE.3 The Prepaid Credit Reclaim (PCR) Mechanism -- E.4 Concluding Remarks -- E.5 Notation -- E.6 References -- Appendix F. An Example of IMS Charging Application Server -- F.1 Rf/Ro Interface and Session Initialization -- F.2 Creating Rf/Ro Requests -- F.3 Receiving Answers -- F.4 Error/Timeout Handling and Debugging -- F.5 References -- Appendix G. Non-IP-Based Prepaid Phone Service -- G.1 Non-IP-based Mobile Prepaid Services -- G.2 Wireless Intelligent Network Approach -- G.2.1 WIN Call Origination -- G.2.2 WIN Call Termination -- G.2.3 WIN Prepaid Recharging -- G.3 Service Node Approach -- G.4 Hot Billing Approach -- G.4.1 Hot Billing Initialization and Call Origination -- G.4.2 Hot Billing Customer Query and Recharging -- G.5 Handset-Based Approach -- G.5.1 SIM Card Issues -- G.5.2 Handset-Based Call Origination -- G.5.3 Handset-Based Prepaid Recharging -- G.6 Comparison of the Prepaid Solutions -- G.6.1 Roaming to other networks -- G.6.2 Scalability -- G.6.3 Fraud Risk -- G.6.4 Initial System Setup -- G.6.5 Service Features -- G.6.6 Real-Time Rating -- G.7 Business Issues -- G.8 Concluding Remarks -- G.9. Review Questions -- G.10. References -- Appendix H. Performance of Service Node Based Mobile Prepaid Service -- H.1 The Service Node Approach -- H.2 Numeric Examples -- H.2.1 Effects of the Variation of Call Charges -- H.2.2 Effect of I on E[BL*]/I -- H.2.3 The Cost Function -- H.3 Concluding Remarks -- H.4 Notation -- H.5 References. 330 $aThis book provides a complete and comprehensive overview of 3G UMTS charging services Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile telecommunications incorporates data applications with real-time control and management, and requires a convergent and flexible online charging system. Such convergence is essential to mitigate fraud and credit risks in order to provide more personalized information to users about charges and credit limit controls. Charging for Mobile All-IP Telecommunications provides comprehensive and practical coverage of online and offline charging based on mobile operator experiences, and the latest efforts undertaken by the UMTS specifications. Key features: . Presents a complete overview of the telecommunications charging system, including the evolution from 2G to 3G and all-IP network charging frameworks . Discusses all management aspects related to charging and billing processes, with a focus on the major trends and developments within the telecoms industry . Provides an overview of the telecom networks such as PSTN, GSM, UMTS and IMS . Covers the concepts of the telecom charging on mobile services and the new technologies for implementing online charging system, such as GTP' and Diameter protocol . Contains coverage on network nodes and data flows in relation to charging of mobile applications, such as IMS call and content downloading . Explains the IP-based online charging system, protocol details and recent trends in charging for mobile telecom industry This book is an invaluable resource for graduate students, telecoms and IP engineers, network service providers and system architects. Information technologists and networking equipment manufacturers will also find this book insightful. 410 0$aWiley series on wireless communications and mobile computing. 606 $aInternet telephony$xPrices 606 $aCell phone services industry 606 $aInvoices$xComputer programs 615 0$aInternet telephony$xPrices. 615 0$aCell phone services industry. 615 0$aInvoices$xComputer programs. 676 $a384.5/33 676 $a384.533 676 $a621.3845 700 $aLin$b Yi-Bing$f1961-$067390 701 $aSou$b Sok-Ian$0960341 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910829993603321 996 $aCharging for mobile all-IP telecommunications$92176817 997 $aUNINA LEADER 03697nam 22006975 450 001 9910299686203321 005 20251113184150.0 010 $a81-322-2202-4 024 7 $a10.1007/978-81-322-2202-6 035 $a(CKB)3710000000316032 035 $a(EBL)1968479 035 $a(SSID)ssj0001408108 035 $a(PQKBManifestationID)11782361 035 $a(PQKBTitleCode)TC0001408108 035 $a(PQKBWorkID)11346935 035 $a(PQKB)11312822 035 $a(DE-He213)978-81-322-2202-6 035 $a(MiAaPQ)EBC1968479 035 $a(PPN)183154045 035 $a(EXLCZ)993710000000316032 100 $a20141211d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aComputational Intelligence in Data Mining - Volume 3 $eProceedings of the International Conference on CIDM, 20-21 December 2014 /$fedited by Lakhmi C. Jain, Himansu Sekhar Behera, Jyotsna Kumar Mandal, Durga Prasad Mohapatra 205 $a1st ed. 2015. 210 1$aNew Delhi :$cSpringer India :$cImprint: Springer,$d2015. 215 $a1 online resource (716 p.) 225 1 $aSmart Innovation, Systems and Technologies,$x2190-3026 ;$v33 300 $aDescription based upon print version of record. 311 08$a81-322-2201-6 320 $aIncludes bibliographical references and index. 327 $aAbout the Conference -- Acknowledgement -- Conference Committee -- Editor's Biography -- Preface -- Chapters -- Author Index. 330 $aThe contributed volume aims to explicate and address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. Data Mining aims at the automatic discovery of underlying non-trivial knowledge from datasets by applying intelligent analysis techniques. The interest in this research area has experienced a considerable growth in the last years due to two key factors: (a) knowledge hidden in organizations? databases can be exploited to improve strategic and managerial decision-making; (b) the large volume of data managed by organizations makes it impossible to carry out a manual analysis. The book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book helps to disseminate the knowledge about some innovative, active research directions in the field of data mining, machine and computational intelligence, along with some current issues and applications of related topics. 410 0$aSmart Innovation, Systems and Technologies,$x2190-3026 ;$v33 606 $aComputational intelligence 606 $aData mining 606 $aArtificial intelligence 606 $aComputational Intelligence 606 $aData Mining and Knowledge Discovery 606 $aArtificial Intelligence 615 0$aComputational intelligence. 615 0$aData mining. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aData Mining and Knowledge Discovery. 615 24$aArtificial Intelligence. 676 $a006 676 $a006.3 676 $a006.312 676 $a620 702 $aJain$b Lakhmi C$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBehera$b Himansu Sekhar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMandal$b Jyotsna Kumar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMohapatra$b Durga Prasad$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910299686203321 996 $aComputational Intelligence in Data Mining - Volume 3$92514542 997 $aUNINA