際際滷shows by User: PALASHMEHAR / http://www.slideshare.net/images/logo.gif 際際滷shows by User: PALASHMEHAR / Tue, 26 Apr 2022 18:13:52 GMT 際際滷Share feed for 際際滷shows by User: PALASHMEHAR Disaster Victim Identification (DVI) /PALASHMEHAR/disaster-victim-identification-dvi seminarsemivdvipalashmehar-220426181352
Disaster:- The Oxford Dictionary of English Etymology defines disaster as "sudden or great calamity". A disaster can be defined as an unexpected natural or manmade event that may result in personal injury, mass fatalities, property and infrastructural damage. These events can be a result of natural events such as earthquakes and typhoons, accidents (aircraft, rail, maritime, industrial), terrorist activities and conflicts. Types of Disaster:- All disasters can be broadly divided into two categories -Natural and Manrnade disasters. Natural Disasters are not controllable as, indeed, nature is not controllable -such events are often termed as 'acts of God'. The Man-made disasters on the other hand are a rapidly increasing phenomenon in the present day Technological Society and occur as a result of human failure or error or malfunction of some structure or system designed by man. Similarly, while there is sometimes an element of warning in natural disaster. There is generally none in man-made disaster and this lack of warning makes avoidance difficult. Both types of disasters can cause visible damage to a familiar environment, but some technological disasters do not have this effect like nuclear pollution from an accident like that at Chernobyl may be catastrophic, yet cause no visible damage. Whilst Natural Disaster is often predictable to some degree, technological disaster is not. Technological catastrophes are never supposed to happen and hence predictability is not an issue. The King's Cross Underground fire in November 1987 killing 31 persons and causing horrendous injuries could not have been foreseen as escalators are not supposed to erupt into flames. Following are the different types of disasters under the above mentioned categories:- 1. Natural Disasters:- can be of the following types. a) Famines b) Floods c) Storms d) Droughts, and e) Epidemics 2. Man-made Disasters:- a) Air, Rail and Sea disasters b) Fires c) Explosions d) Building collapse disasters e) Industrial accidents f) Football Tragedies g) Holocausts in Civilian Violence, Terrorism and Mass shootings. h) Mass suicides, e.g. Jonestown suicides. 2. Disaster Victim Identification Disaster Victim Identification (DVI) refers to a respectful, systematic and orderly process undertaken in response to a multiple fatality incident with the aim of scientifically identifying the deceased casualties of the incident so that they can be returned to their relatives. The process involves matching post-mortem information from a deceased individual with antemortem information of a missing person and through this identifying the deceased individual. DVI is a multidisciplinary activity that relies on a range of comparative scientific and nonscientific methods to identify human remains. A DVI operation is typically part of the response phase to a multiple fatality event and usually becomes fully operational at the conclusion of the rescue and evacuation part of the operation. ]]>

Disaster:- The Oxford Dictionary of English Etymology defines disaster as "sudden or great calamity". A disaster can be defined as an unexpected natural or manmade event that may result in personal injury, mass fatalities, property and infrastructural damage. These events can be a result of natural events such as earthquakes and typhoons, accidents (aircraft, rail, maritime, industrial), terrorist activities and conflicts. Types of Disaster:- All disasters can be broadly divided into two categories -Natural and Manrnade disasters. Natural Disasters are not controllable as, indeed, nature is not controllable -such events are often termed as 'acts of God'. The Man-made disasters on the other hand are a rapidly increasing phenomenon in the present day Technological Society and occur as a result of human failure or error or malfunction of some structure or system designed by man. Similarly, while there is sometimes an element of warning in natural disaster. There is generally none in man-made disaster and this lack of warning makes avoidance difficult. Both types of disasters can cause visible damage to a familiar environment, but some technological disasters do not have this effect like nuclear pollution from an accident like that at Chernobyl may be catastrophic, yet cause no visible damage. Whilst Natural Disaster is often predictable to some degree, technological disaster is not. Technological catastrophes are never supposed to happen and hence predictability is not an issue. The King's Cross Underground fire in November 1987 killing 31 persons and causing horrendous injuries could not have been foreseen as escalators are not supposed to erupt into flames. Following are the different types of disasters under the above mentioned categories:- 1. Natural Disasters:- can be of the following types. a) Famines b) Floods c) Storms d) Droughts, and e) Epidemics 2. Man-made Disasters:- a) Air, Rail and Sea disasters b) Fires c) Explosions d) Building collapse disasters e) Industrial accidents f) Football Tragedies g) Holocausts in Civilian Violence, Terrorism and Mass shootings. h) Mass suicides, e.g. Jonestown suicides. 2. Disaster Victim Identification Disaster Victim Identification (DVI) refers to a respectful, systematic and orderly process undertaken in response to a multiple fatality incident with the aim of scientifically identifying the deceased casualties of the incident so that they can be returned to their relatives. The process involves matching post-mortem information from a deceased individual with antemortem information of a missing person and through this identifying the deceased individual. DVI is a multidisciplinary activity that relies on a range of comparative scientific and nonscientific methods to identify human remains. A DVI operation is typically part of the response phase to a multiple fatality event and usually becomes fully operational at the conclusion of the rescue and evacuation part of the operation. ]]>
Tue, 26 Apr 2022 18:13:52 GMT /PALASHMEHAR/disaster-victim-identification-dvi PALASHMEHAR@slideshare.net(PALASHMEHAR) Disaster Victim Identification (DVI) PALASHMEHAR Disaster:- The Oxford Dictionary of English Etymology defines disaster as "sudden or great calamity". A disaster can be defined as an unexpected natural or manmade event that may result in personal injury, mass fatalities, property and infrastructural damage. These events can be a result of natural events such as earthquakes and typhoons, accidents (aircraft, rail, maritime, industrial), terrorist activities and conflicts. Types of Disaster:- All disasters can be broadly divided into two categories -Natural and Manrnade disasters. Natural Disasters are not controllable as, indeed, nature is not controllable -such events are often termed as 'acts of God'. The Man-made disasters on the other hand are a rapidly increasing phenomenon in the present day Technological Society and occur as a result of human failure or error or malfunction of some structure or system designed by man. Similarly, while there is sometimes an element of warning in natural disaster. There is generally none in man-made disaster and this lack of warning makes avoidance difficult. Both types of disasters can cause visible damage to a familiar environment, but some technological disasters do not have this effect like nuclear pollution from an accident like that at Chernobyl may be catastrophic, yet cause no visible damage. Whilst Natural Disaster is often predictable to some degree, technological disaster is not. Technological catastrophes are never supposed to happen and hence predictability is not an issue. The King's Cross Underground fire in November 1987 killing 31 persons and causing horrendous injuries could not have been foreseen as escalators are not supposed to erupt into flames. Following are the different types of disasters under the above mentioned categories:- 1. Natural Disasters:- can be of the following types. a) Famines b) Floods c) Storms d) Droughts, and e) Epidemics 2. Man-made Disasters:- a) Air, Rail and Sea disasters b) Fires c) Explosions d) Building collapse disasters e) Industrial accidents f) Football Tragedies g) Holocausts in Civilian Violence, Terrorism and Mass shootings. h) Mass suicides, e.g. Jonestown suicides. 2. Disaster Victim Identification Disaster Victim Identification (DVI) refers to a respectful, systematic and orderly process undertaken in response to a multiple fatality incident with the aim of scientifically identifying the deceased casualties of the incident so that they can be returned to their relatives. The process involves matching post-mortem information from a deceased individual with antemortem information of a missing person and through this identifying the deceased individual. DVI is a multidisciplinary activity that relies on a range of comparative scientific and nonscientific methods to identify human remains. A DVI operation is typically part of the response phase to a multiple fatality event and usually becomes fully operational at the conclusion of the rescue and evacuation part of the operation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seminarsemivdvipalashmehar-220426181352-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Disaster:- The Oxford Dictionary of English Etymology defines disaster as &quot;sudden or great calamity&quot;. A disaster can be defined as an unexpected natural or manmade event that may result in personal injury, mass fatalities, property and infrastructural damage. These events can be a result of natural events such as earthquakes and typhoons, accidents (aircraft, rail, maritime, industrial), terrorist activities and conflicts. Types of Disaster:- All disasters can be broadly divided into two categories -Natural and Manrnade disasters. Natural Disasters are not controllable as, indeed, nature is not controllable -such events are often termed as &#39;acts of God&#39;. The Man-made disasters on the other hand are a rapidly increasing phenomenon in the present day Technological Society and occur as a result of human failure or error or malfunction of some structure or system designed by man. Similarly, while there is sometimes an element of warning in natural disaster. There is generally none in man-made disaster and this lack of warning makes avoidance difficult. Both types of disasters can cause visible damage to a familiar environment, but some technological disasters do not have this effect like nuclear pollution from an accident like that at Chernobyl may be catastrophic, yet cause no visible damage. Whilst Natural Disaster is often predictable to some degree, technological disaster is not. Technological catastrophes are never supposed to happen and hence predictability is not an issue. The King&#39;s Cross Underground fire in November 1987 killing 31 persons and causing horrendous injuries could not have been foreseen as escalators are not supposed to erupt into flames. Following are the different types of disasters under the above mentioned categories:- 1. Natural Disasters:- can be of the following types. a) Famines b) Floods c) Storms d) Droughts, and e) Epidemics 2. Man-made Disasters:- a) Air, Rail and Sea disasters b) Fires c) Explosions d) Building collapse disasters e) Industrial accidents f) Football Tragedies g) Holocausts in Civilian Violence, Terrorism and Mass shootings. h) Mass suicides, e.g. Jonestown suicides. 2. Disaster Victim Identification Disaster Victim Identification (DVI) refers to a respectful, systematic and orderly process undertaken in response to a multiple fatality incident with the aim of scientifically identifying the deceased casualties of the incident so that they can be returned to their relatives. The process involves matching post-mortem information from a deceased individual with antemortem information of a missing person and through this identifying the deceased individual. DVI is a multidisciplinary activity that relies on a range of comparative scientific and nonscientific methods to identify human remains. A DVI operation is typically part of the response phase to a multiple fatality event and usually becomes fully operational at the conclusion of the rescue and evacuation part of the operation.
Disaster Victim Identification (DVI) from Palash Mehar
]]>
5144 0 https://cdn.slidesharecdn.com/ss_thumbnails/seminarsemivdvipalashmehar-220426181352-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Alexander Pichushkin : THE CHESSBOARDKILLER OR THE BITSA PARK MANIAC /slideshow/alexander-pichushkin-the-chessboardkiller-or-the-bitsa-park-maniac/249899854 alexanderpichushkin-210801190135
Alexander is a process-focused serial killer, which means he killed the victims slowly and received enjoyment from the torture and the slow death of the victims. Alexander Pichushkin was arrested on June 16, 2006, and sentenced on October 24, 2007, of 49 murders and 3 attempted murders. He requested that aRussian court add an extra 11 victim to his body count, bringing his guaranteed death toll to 60, and 3 surviving victims. During his trial, as with Andrei Chikatilo, Pichushkin was housed in a glass cage for his own protection. ]]>

Alexander is a process-focused serial killer, which means he killed the victims slowly and received enjoyment from the torture and the slow death of the victims. Alexander Pichushkin was arrested on June 16, 2006, and sentenced on October 24, 2007, of 49 murders and 3 attempted murders. He requested that aRussian court add an extra 11 victim to his body count, bringing his guaranteed death toll to 60, and 3 surviving victims. During his trial, as with Andrei Chikatilo, Pichushkin was housed in a glass cage for his own protection. ]]>
Sun, 01 Aug 2021 19:01:34 GMT /slideshow/alexander-pichushkin-the-chessboardkiller-or-the-bitsa-park-maniac/249899854 PALASHMEHAR@slideshare.net(PALASHMEHAR) Alexander Pichushkin : THE CHESSBOARDKILLER OR THE BITSA PARK MANIAC PALASHMEHAR Alexander is a process-focused serial killer, which means he killed the victims slowly and received enjoyment from the torture and the slow death of the victims. Alexander Pichushkin was arrested on June 16, 2006, and sentenced on October 24, 2007, of 49 murders and 3 attempted murders. He requested that aRussian court add an extra 11 victim to his body count, bringing his guaranteed death toll to 60, and 3 surviving victims. During his trial, as with Andrei Chikatilo, Pichushkin was housed in a glass cage for his own protection. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/alexanderpichushkin-210801190135-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Alexander is a process-focused serial killer, which means he killed the victims slowly and received enjoyment from the torture and the slow death of the victims. Alexander Pichushkin was arrested on June 16, 2006, and sentenced on October 24, 2007, of 49 murders and 3 attempted murders. He requested that aRussian court add an extra 11 victim to his body count, bringing his guaranteed death toll to 60, and 3 surviving victims. During his trial, as with Andrei Chikatilo, Pichushkin was housed in a glass cage for his own protection.
Alexander Pichushkin : THE CHESSBOARD KILLER OR THE BITSA PARK MANIAC from Palash Mehar
]]>
1579 0 https://cdn.slidesharecdn.com/ss_thumbnails/alexanderpichushkin-210801190135-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Rapid DNA Technology /slideshow/rapid-dna-technology/249258321 seminar2020-210609175619
Rapid DNA Technology: A Boon to Forensic DNA Typing The FBI defines Rapid DNA as the fully automated (hands free) process of developing a CODIS Core Loci STR profile from a reference sample swab. The swab in - profile out process consists of automated extraction, amplification, separation, detection, and allele calling without human intervention. Modified Rapid DNA analysis describes the automated (hands-free) process of developing a CODIS Core STR profile from a known reference sample. This swab in profile out process consists of automated extraction, amplification, separation, and detection without human intervention but requires human interpretation and technical review. Approval by : Formal approval not required if validated in accordance with the FBI Directors Quality Assurance Standards ]]>

Rapid DNA Technology: A Boon to Forensic DNA Typing The FBI defines Rapid DNA as the fully automated (hands free) process of developing a CODIS Core Loci STR profile from a reference sample swab. The swab in - profile out process consists of automated extraction, amplification, separation, detection, and allele calling without human intervention. Modified Rapid DNA analysis describes the automated (hands-free) process of developing a CODIS Core STR profile from a known reference sample. This swab in profile out process consists of automated extraction, amplification, separation, and detection without human intervention but requires human interpretation and technical review. Approval by : Formal approval not required if validated in accordance with the FBI Directors Quality Assurance Standards ]]>
Wed, 09 Jun 2021 17:56:19 GMT /slideshow/rapid-dna-technology/249258321 PALASHMEHAR@slideshare.net(PALASHMEHAR) Rapid DNA Technology PALASHMEHAR Rapid DNA Technology: A Boon to Forensic DNA Typing The FBI defines Rapid DNA as the fully automated (hands free) process of developing a CODIS Core Loci STR profile from a reference sample swab. The swab in - profile out process consists of automated extraction, amplification, separation, detection, and allele calling without human intervention. Modified Rapid DNA analysis describes the automated (hands-free) process of developing a CODIS Core STR profile from a known reference sample. This swab in profile out process consists of automated extraction, amplification, separation, and detection without human intervention but requires human interpretation and technical review. Approval by : Formal approval not required if validated in accordance with the FBI Directors Quality Assurance Standards <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seminar2020-210609175619-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rapid DNA Technology: A Boon to Forensic DNA Typing The FBI defines Rapid DNA as the fully automated (hands free) process of developing a CODIS Core Loci STR profile from a reference sample swab. The swab in - profile out process consists of automated extraction, amplification, separation, detection, and allele calling without human intervention. Modified Rapid DNA analysis describes the automated (hands-free) process of developing a CODIS Core STR profile from a known reference sample. This swab in profile out process consists of automated extraction, amplification, separation, and detection without human intervention but requires human interpretation and technical review. Approval by : Formal approval not required if validated in accordance with the FBI Directors Quality Assurance Standards
Rapid DNA Technology from Palash Mehar
]]>
516 0 https://cdn.slidesharecdn.com/ss_thumbnails/seminar2020-210609175619-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum /slideshow/poisonous-plants-1-strychnos-nux-vomica-2-papaver-somniferum/249258190 poisonousplants-copy-210609175039
Study of Various Types of Poisonous Plants:- 1. Strychnos nux vomica 2. Papaver Somniferum ]]>

Study of Various Types of Poisonous Plants:- 1. Strychnos nux vomica 2. Papaver Somniferum ]]>
Wed, 09 Jun 2021 17:50:39 GMT /slideshow/poisonous-plants-1-strychnos-nux-vomica-2-papaver-somniferum/249258190 PALASHMEHAR@slideshare.net(PALASHMEHAR) Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum PALASHMEHAR Study of Various Types of Poisonous Plants:- 1. Strychnos nux vomica 2. Papaver Somniferum <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/poisonousplants-copy-210609175039-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Study of Various Types of Poisonous Plants:- 1. Strychnos nux vomica 2. Papaver Somniferum
Poisonous plants : 1. Strychnos nux vomica 2. Papaver Somniferum from Palash Mehar
]]>
506 0 https://cdn.slidesharecdn.com/ss_thumbnails/poisonousplants-copy-210609175039-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Environmental Impact Assessment (EIA) /PALASHMEHAR/environmental-impact-assessment-eia-249257549 eiapalashmehar-210609172212
Environmental Impact Assessment (EIA) Environmental Impact Assessment (EIA)is a systematic and integrative process for considering possible impacts prior to a decision being taken on whether or not a proposal should be given approval to proceed. (Wood 2003) ]]>

Environmental Impact Assessment (EIA) Environmental Impact Assessment (EIA)is a systematic and integrative process for considering possible impacts prior to a decision being taken on whether or not a proposal should be given approval to proceed. (Wood 2003) ]]>
Wed, 09 Jun 2021 17:22:12 GMT /PALASHMEHAR/environmental-impact-assessment-eia-249257549 PALASHMEHAR@slideshare.net(PALASHMEHAR) Environmental Impact Assessment (EIA) PALASHMEHAR Environmental Impact Assessment (EIA) Environmental Impact Assessment (EIA)is a systematic and integrative process for considering possible impacts prior to a decision being taken on whether or not a proposal should be given approval to proceed. (Wood 2003) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eiapalashmehar-210609172212-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Environmental Impact Assessment (EIA) Environmental Impact Assessment (EIA)is a systematic and integrative process for considering possible impacts prior to a decision being taken on whether or not a proposal should be given approval to proceed. (Wood 2003)
Environmental Impact Assessment (EIA) from Palash Mehar
]]>
1254 0 https://cdn.slidesharecdn.com/ss_thumbnails/eiapalashmehar-210609172212-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Nanotechnology powder /slideshow/nanotechnology-powder/240129756 nanotechnologypowder-201215093840
Nanotechnology Powder Nanotechnology is the field of science that deals with the study of materials in the nanometer scale. Additionally, the domain can also be defined as the synthesis of matter on an atomic level, with sizes ranging from 1 to 100 nm. Nanoparticles are much smaller than most of the particles currently used in fingerprint detection, which are in the order of 110 mm in size. Nanoparticles are distinct, non-aggregated particles with nanometre-size diameters, although nano-structured particles, which may be up to microns in diameter, often exist as aggregates of nano-sized particles The use of nano-particles has recently shown a great potential in producing the next generation of fingerprint development techniques known as nano-fingerprints. ]]>

Nanotechnology Powder Nanotechnology is the field of science that deals with the study of materials in the nanometer scale. Additionally, the domain can also be defined as the synthesis of matter on an atomic level, with sizes ranging from 1 to 100 nm. Nanoparticles are much smaller than most of the particles currently used in fingerprint detection, which are in the order of 110 mm in size. Nanoparticles are distinct, non-aggregated particles with nanometre-size diameters, although nano-structured particles, which may be up to microns in diameter, often exist as aggregates of nano-sized particles The use of nano-particles has recently shown a great potential in producing the next generation of fingerprint development techniques known as nano-fingerprints. ]]>
Tue, 15 Dec 2020 09:38:40 GMT /slideshow/nanotechnology-powder/240129756 PALASHMEHAR@slideshare.net(PALASHMEHAR) Nanotechnology powder PALASHMEHAR Nanotechnology Powder Nanotechnology is the field of science that deals with the study of materials in the nanometer scale. Additionally, the domain can also be defined as the synthesis of matter on an atomic level, with sizes ranging from 1 to 100 nm. Nanoparticles are much smaller than most of the particles currently used in fingerprint detection, which are in the order of 110 mm in size. Nanoparticles are distinct, non-aggregated particles with nanometre-size diameters, although nano-structured particles, which may be up to microns in diameter, often exist as aggregates of nano-sized particles The use of nano-particles has recently shown a great potential in producing the next generation of fingerprint development techniques known as nano-fingerprints. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nanotechnologypowder-201215093840-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Nanotechnology Powder Nanotechnology is the field of science that deals with the study of materials in the nanometer scale. Additionally, the domain can also be defined as the synthesis of matter on an atomic level, with sizes ranging from 1 to 100 nm. Nanoparticles are much smaller than most of the particles currently used in fingerprint detection, which are in the order of 110 mm in size. Nanoparticles are distinct, non-aggregated particles with nanometre-size diameters, although nano-structured particles, which may be up to microns in diameter, often exist as aggregates of nano-sized particles The use of nano-particles has recently shown a great potential in producing the next generation of fingerprint development techniques known as nano-fingerprints.
Nanotechnology powder from Palash Mehar
]]>
665 0 https://cdn.slidesharecdn.com/ss_thumbnails/nanotechnologypowder-201215093840-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ninhydrin Analogs /slideshow/ninhydrin-analogs/240129402 ninhydrinanalogs-201215093221
Ninhydrin The synthesis of ninhydrin (originally described as 1,2,3-triketohydrindene, but also referred to as 1,2,3-indanetrione) First reported by Professor Siegfried Ruhemann, of the University Chemical Laboratories at Cambridge University, England, in 1910. The marks developed by ninhydrin can vary in colour from reddish purple to deep purple, being influenced by the composition of the mark and the substrate it is deposited on. Ninhydrin Analogs An analog is a chemical compound that has a similar structure and similar chemical properties to those of another compound, but differs from it by a single element or a group. The dual goals of producing such an analog are to produce a compound that has intense, visible colored development (as good as or superior to ninhydrin) as well as a superior room temperature fluorescence. ]]>

Ninhydrin The synthesis of ninhydrin (originally described as 1,2,3-triketohydrindene, but also referred to as 1,2,3-indanetrione) First reported by Professor Siegfried Ruhemann, of the University Chemical Laboratories at Cambridge University, England, in 1910. The marks developed by ninhydrin can vary in colour from reddish purple to deep purple, being influenced by the composition of the mark and the substrate it is deposited on. Ninhydrin Analogs An analog is a chemical compound that has a similar structure and similar chemical properties to those of another compound, but differs from it by a single element or a group. The dual goals of producing such an analog are to produce a compound that has intense, visible colored development (as good as or superior to ninhydrin) as well as a superior room temperature fluorescence. ]]>
Tue, 15 Dec 2020 09:32:21 GMT /slideshow/ninhydrin-analogs/240129402 PALASHMEHAR@slideshare.net(PALASHMEHAR) Ninhydrin Analogs PALASHMEHAR Ninhydrin The synthesis of ninhydrin (originally described as 1,2,3-triketohydrindene, but also referred to as 1,2,3-indanetrione) First reported by Professor Siegfried Ruhemann, of the University Chemical Laboratories at Cambridge University, England, in 1910. The marks developed by ninhydrin can vary in colour from reddish purple to deep purple, being influenced by the composition of the mark and the substrate it is deposited on. Ninhydrin Analogs An analog is a chemical compound that has a similar structure and similar chemical properties to those of another compound, but differs from it by a single element or a group. The dual goals of producing such an analog are to produce a compound that has intense, visible colored development (as good as or superior to ninhydrin) as well as a superior room temperature fluorescence. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ninhydrinanalogs-201215093221-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ninhydrin The synthesis of ninhydrin (originally described as 1,2,3-triketohydrindene, but also referred to as 1,2,3-indanetrione) First reported by Professor Siegfried Ruhemann, of the University Chemical Laboratories at Cambridge University, England, in 1910. The marks developed by ninhydrin can vary in colour from reddish purple to deep purple, being influenced by the composition of the mark and the substrate it is deposited on. Ninhydrin Analogs An analog is a chemical compound that has a similar structure and similar chemical properties to those of another compound, but differs from it by a single element or a group. The dual goals of producing such an analog are to produce a compound that has intense, visible colored development (as good as or superior to ninhydrin) as well as a superior room temperature fluorescence.
Ninhydrin Analogs from Palash Mehar
]]>
563 0 https://cdn.slidesharecdn.com/ss_thumbnails/ninhydrinanalogs-201215093221-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye) /slideshow/cyanoacrylate-dye-stains-mrm-10-fluorescent-dye/240129073 mrm10-201215092705
Cyanoacrylate Dye Stains:- MRM 10 (Fluorescent Dye) MRM 10 is a fluorescent dye used to enhance cyanoacrylate developed latent prints on various coloured nonporous surfaces. A laser or alternate light source is used in conjunction with this process. ]]>

Cyanoacrylate Dye Stains:- MRM 10 (Fluorescent Dye) MRM 10 is a fluorescent dye used to enhance cyanoacrylate developed latent prints on various coloured nonporous surfaces. A laser or alternate light source is used in conjunction with this process. ]]>
Tue, 15 Dec 2020 09:27:05 GMT /slideshow/cyanoacrylate-dye-stains-mrm-10-fluorescent-dye/240129073 PALASHMEHAR@slideshare.net(PALASHMEHAR) Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye) PALASHMEHAR Cyanoacrylate Dye Stains:- MRM 10 (Fluorescent Dye) MRM 10 is a fluorescent dye used to enhance cyanoacrylate developed latent prints on various coloured nonporous surfaces. A laser or alternate light source is used in conjunction with this process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mrm10-201215092705-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyanoacrylate Dye Stains:- MRM 10 (Fluorescent Dye) MRM 10 is a fluorescent dye used to enhance cyanoacrylate developed latent prints on various coloured nonporous surfaces. A laser or alternate light source is used in conjunction with this process.
Cyanoacrylate Dye Stains : MRM 10 (Fluorescent Dye) from Palash Mehar
]]>
179 0 https://cdn.slidesharecdn.com/ss_thumbnails/mrm10-201215092705-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Video Spectral Comparator /slideshow/vsc-palash-mehar/240127870 vscpalashmehar-201215090335
A digital imaging instrument manufactured by Foster + Freeman that employs combinations of light sources and filters to examine document evidence under various wavelengths of radiation ranging from ultraviolet to the infrared regions of the electromagnetic spectrum. VSC is a preferred tool as it supports non destructive examination of documents. VSC uses multiple parameters like IR, UV, and White light providing accurate results. ]]>

A digital imaging instrument manufactured by Foster + Freeman that employs combinations of light sources and filters to examine document evidence under various wavelengths of radiation ranging from ultraviolet to the infrared regions of the electromagnetic spectrum. VSC is a preferred tool as it supports non destructive examination of documents. VSC uses multiple parameters like IR, UV, and White light providing accurate results. ]]>
Tue, 15 Dec 2020 09:03:35 GMT /slideshow/vsc-palash-mehar/240127870 PALASHMEHAR@slideshare.net(PALASHMEHAR) Video Spectral Comparator PALASHMEHAR A digital imaging instrument manufactured by Foster + Freeman that employs combinations of light sources and filters to examine document evidence under various wavelengths of radiation ranging from ultraviolet to the infrared regions of the electromagnetic spectrum. VSC is a preferred tool as it supports non destructive examination of documents. VSC uses multiple parameters like IR, UV, and White light providing accurate results. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vscpalashmehar-201215090335-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A digital imaging instrument manufactured by Foster + Freeman that employs combinations of light sources and filters to examine document evidence under various wavelengths of radiation ranging from ultraviolet to the infrared regions of the electromagnetic spectrum. VSC is a preferred tool as it supports non destructive examination of documents. VSC uses multiple parameters like IR, UV, and White light providing accurate results.
Video Spectral Comparator from Palash Mehar
]]>
10171 0 https://cdn.slidesharecdn.com/ss_thumbnails/vscpalashmehar-201215090335-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Polymerase Chain Reaction Ependorf Instrument /slideshow/pcr-ependorf-instrument/238978127 pcr-201026145402
PCR PCR is a method widely used in Molecular biology to make many copies of a specific DNA segment. Using PCR it is possible to generate thousand millions of copies of a particular section of DNA from very small amount of DNA. PCR was originally developed in 1983 by the American Biochemists Kary Mullis. He was awarded the Nobel Prize in Chemistry in 1993 for his pioneering work. ]]>

PCR PCR is a method widely used in Molecular biology to make many copies of a specific DNA segment. Using PCR it is possible to generate thousand millions of copies of a particular section of DNA from very small amount of DNA. PCR was originally developed in 1983 by the American Biochemists Kary Mullis. He was awarded the Nobel Prize in Chemistry in 1993 for his pioneering work. ]]>
Mon, 26 Oct 2020 14:54:02 GMT /slideshow/pcr-ependorf-instrument/238978127 PALASHMEHAR@slideshare.net(PALASHMEHAR) Polymerase Chain Reaction Ependorf Instrument PALASHMEHAR PCR PCR is a method widely used in Molecular biology to make many copies of a specific DNA segment. Using PCR it is possible to generate thousand millions of copies of a particular section of DNA from very small amount of DNA. PCR was originally developed in 1983 by the American Biochemists Kary Mullis. He was awarded the Nobel Prize in Chemistry in 1993 for his pioneering work. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pcr-201026145402-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> PCR PCR is a method widely used in Molecular biology to make many copies of a specific DNA segment. Using PCR it is possible to generate thousand millions of copies of a particular section of DNA from very small amount of DNA. PCR was originally developed in 1983 by the American Biochemists Kary Mullis. He was awarded the Nobel Prize in Chemistry in 1993 for his pioneering work.
Polymerase Chain Reaction Ependorf Instrument from Palash Mehar
]]>
516 0 https://cdn.slidesharecdn.com/ss_thumbnails/pcr-201026145402-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Biomechanics of Injury /slideshow/seminar-238978081/238978081 seminar-201026144903
Poisonous Plants and Related Toxins edited by Thomas Acamovic, Colin S. Stewart, T. W. Pennycott]]>

Poisonous Plants and Related Toxins edited by Thomas Acamovic, Colin S. Stewart, T. W. Pennycott]]>
Mon, 26 Oct 2020 14:49:03 GMT /slideshow/seminar-238978081/238978081 PALASHMEHAR@slideshare.net(PALASHMEHAR) Biomechanics of Injury PALASHMEHAR Poisonous Plants and Related Toxins edited by Thomas Acamovic, Colin S. Stewart, T. W. Pennycott <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/seminar-201026144903-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Poisonous Plants and Related Toxins edited by Thomas Acamovic, Colin S. Stewart, T. W. Pennycott
Biomechanics of Injury from Palash Mehar
]]>
2146 0 https://cdn.slidesharecdn.com/ss_thumbnails/seminar-201026144903-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Forensic Biology Case Study :- The Colin Pitchfork Case /slideshow/forensic-biology-case-study-the-colin-pitchfork-case/220749924 casestudybiology-200116182500
On November 21, 1983 and July 31, 1986 Colin Pitchfork raped and murdered two girls in Narborough, Leicestershire. Lynda Mann, who was 15 years old left her home one evening to visit her friends house and did not return. The next morning she was found on a deserted footpath known locally as the black pad raped and murdered. Taken from the crime scene, semen found was later tested which shown the person had type A blood. On July 31, 1986 Dawn Ashworth, 15 years old took a shortcut instead of taking her normal route home, two days later was found in a wooded area near a footpath called ten pound lane raped and murdered. In the same position as Lynda Mann, a semen sample was taken from Dawn and tested. The modus operandi matched that of the first attack, and semen samples revealed the same blood type. The first criminal caught using DNA fingerprinting (England), using the DNA profiling method published in 1985 by Sir Alec Jeffreys. Richard Buckland became the first person in the world to be exonerated of murder through the use of DNA profiling.]]>

On November 21, 1983 and July 31, 1986 Colin Pitchfork raped and murdered two girls in Narborough, Leicestershire. Lynda Mann, who was 15 years old left her home one evening to visit her friends house and did not return. The next morning she was found on a deserted footpath known locally as the black pad raped and murdered. Taken from the crime scene, semen found was later tested which shown the person had type A blood. On July 31, 1986 Dawn Ashworth, 15 years old took a shortcut instead of taking her normal route home, two days later was found in a wooded area near a footpath called ten pound lane raped and murdered. In the same position as Lynda Mann, a semen sample was taken from Dawn and tested. The modus operandi matched that of the first attack, and semen samples revealed the same blood type. The first criminal caught using DNA fingerprinting (England), using the DNA profiling method published in 1985 by Sir Alec Jeffreys. Richard Buckland became the first person in the world to be exonerated of murder through the use of DNA profiling.]]>
Thu, 16 Jan 2020 18:25:00 GMT /slideshow/forensic-biology-case-study-the-colin-pitchfork-case/220749924 PALASHMEHAR@slideshare.net(PALASHMEHAR) Forensic Biology Case Study :- The Colin Pitchfork Case PALASHMEHAR On November 21, 1983 and July 31, 1986 Colin Pitchfork raped and murdered two girls in Narborough, Leicestershire. Lynda Mann, who was 15 years old left her home one evening to visit her friends house and did not return. The next morning she was found on a deserted footpath known locally as the black pad raped and murdered. Taken from the crime scene, semen found was later tested which shown the person had type A blood. On July 31, 1986 Dawn Ashworth, 15 years old took a shortcut instead of taking her normal route home, two days later was found in a wooded area near a footpath called ten pound lane raped and murdered. In the same position as Lynda Mann, a semen sample was taken from Dawn and tested. The modus operandi matched that of the first attack, and semen samples revealed the same blood type. The first criminal caught using DNA fingerprinting (England), using the DNA profiling method published in 1985 by Sir Alec Jeffreys. Richard Buckland became the first person in the world to be exonerated of murder through the use of DNA profiling. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/casestudybiology-200116182500-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> On November 21, 1983 and July 31, 1986 Colin Pitchfork raped and murdered two girls in Narborough, Leicestershire. Lynda Mann, who was 15 years old left her home one evening to visit her friends house and did not return. The next morning she was found on a deserted footpath known locally as the black pad raped and murdered. Taken from the crime scene, semen found was later tested which shown the person had type A blood. On July 31, 1986 Dawn Ashworth, 15 years old took a shortcut instead of taking her normal route home, two days later was found in a wooded area near a footpath called ten pound lane raped and murdered. In the same position as Lynda Mann, a semen sample was taken from Dawn and tested. The modus operandi matched that of the first attack, and semen samples revealed the same blood type. The first criminal caught using DNA fingerprinting (England), using the DNA profiling method published in 1985 by Sir Alec Jeffreys. Richard Buckland became the first person in the world to be exonerated of murder through the use of DNA profiling.
Forensic Biology Case Study :- The Colin Pitchfork Case from Palash Mehar
]]>
10195 4 https://cdn.slidesharecdn.com/ss_thumbnails/casestudybiology-200116182500-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Privacy Enhanced Mail (PEM) /slideshow/privacy-enhanced-mail-pem/202798671 pem-191207155335
Privacy Enhanced Mail (PEM)- It is an Internet standard adopted by IAB (Internet architecture Board) for secure electronic mail communications over Internet. Described in four specification documents which are RFC no. 1421 to 1424. Security features provided by PEM Working of PEM:- Broad steps in PEM are 1. Canonical conversion 2. Digital signature 3. Encryption 4. Base - 64 - encoding]]>

Privacy Enhanced Mail (PEM)- It is an Internet standard adopted by IAB (Internet architecture Board) for secure electronic mail communications over Internet. Described in four specification documents which are RFC no. 1421 to 1424. Security features provided by PEM Working of PEM:- Broad steps in PEM are 1. Canonical conversion 2. Digital signature 3. Encryption 4. Base - 64 - encoding]]>
Sat, 07 Dec 2019 15:53:35 GMT /slideshow/privacy-enhanced-mail-pem/202798671 PALASHMEHAR@slideshare.net(PALASHMEHAR) Privacy Enhanced Mail (PEM) PALASHMEHAR Privacy Enhanced Mail (PEM)- It is an Internet standard adopted by IAB (Internet architecture Board) for secure electronic mail communications over Internet. Described in four specification documents which are RFC no. 1421 to 1424. Security features provided by PEM Working of PEM:- Broad steps in PEM are 1. Canonical conversion 2. Digital signature 3. Encryption 4. Base - 64 - encoding <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pem-191207155335-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Privacy Enhanced Mail (PEM)- It is an Internet standard adopted by IAB (Internet architecture Board) for secure electronic mail communications over Internet. Described in four specification documents which are RFC no. 1421 to 1424. Security features provided by PEM Working of PEM:- Broad steps in PEM are 1. Canonical conversion 2. Digital signature 3. Encryption 4. Base - 64 - encoding
Privacy Enhanced Mail (PEM) from Palash Mehar
]]>
956 4 https://cdn.slidesharecdn.com/ss_thumbnails/pem-191207155335-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Forensic chemistry case study /slideshow/forensic-chemistry-case-study/202791258 forensicchemistrycasestudy-191207152721
Case Study:- 1) 2008 Karnataka-Tamil Nadu alcohol poisonings (Hooch Tragedy) 2) Godhra train burning]]>

Case Study:- 1) 2008 Karnataka-Tamil Nadu alcohol poisonings (Hooch Tragedy) 2) Godhra train burning]]>
Sat, 07 Dec 2019 15:27:20 GMT /slideshow/forensic-chemistry-case-study/202791258 PALASHMEHAR@slideshare.net(PALASHMEHAR) Forensic chemistry case study PALASHMEHAR Case Study:- 1) 2008 Karnataka-Tamil Nadu alcohol poisonings (Hooch Tragedy) 2) Godhra train burning <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forensicchemistrycasestudy-191207152721-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Case Study:- 1) 2008 Karnataka-Tamil Nadu alcohol poisonings (Hooch Tragedy) 2) Godhra train burning
Forensic chemistry case study from Palash Mehar
]]>
15140 8 https://cdn.slidesharecdn.com/ss_thumbnails/forensicchemistrycasestudy-191207152721-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi) /slideshow/case-study-jesssica-lal-murder-case-manu-sharma-vs-statenct-of-delhi/202789571 jesssicalalmurdercase-191207152104
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi) Introduction:- Jessica Lal(5 January 1965 30 April 1999) was a model inNew Delhiwho was working as a celebrity barmaid at a crowded socialite party when she was shot dead at around 2 am on 30 April 1999. Dozens of witnesses pointed to Siddharth Vashisht, also known asManu Sharma, the son ofVenod Sharma, a wealthy and influentialCongress-nominatedMember of ParliamentfromHaryana, as the murderer. In the ensuing trial, Manu Sharma and a number of others were acquitted on 21 February 2006. Following intense media and public pressure, the prosecution appealed and the Delhi High Court conducted proceedings on a fast track with daily hearings conducted over 25 days. The trial court judgment was overturned, and Manu Sharma was found guilty of having murdered Lal. He was sentenced to life imprisonment on 20 Decesmber 2006. ]]>

Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi) Introduction:- Jessica Lal(5 January 1965 30 April 1999) was a model inNew Delhiwho was working as a celebrity barmaid at a crowded socialite party when she was shot dead at around 2 am on 30 April 1999. Dozens of witnesses pointed to Siddharth Vashisht, also known asManu Sharma, the son ofVenod Sharma, a wealthy and influentialCongress-nominatedMember of ParliamentfromHaryana, as the murderer. In the ensuing trial, Manu Sharma and a number of others were acquitted on 21 February 2006. Following intense media and public pressure, the prosecution appealed and the Delhi High Court conducted proceedings on a fast track with daily hearings conducted over 25 days. The trial court judgment was overturned, and Manu Sharma was found guilty of having murdered Lal. He was sentenced to life imprisonment on 20 Decesmber 2006. ]]>
Sat, 07 Dec 2019 15:21:04 GMT /slideshow/case-study-jesssica-lal-murder-case-manu-sharma-vs-statenct-of-delhi/202789571 PALASHMEHAR@slideshare.net(PALASHMEHAR) Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi) PALASHMEHAR Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi) Introduction:- Jessica Lal(5 January 1965 30 April 1999) was a model inNew Delhiwho was working as a celebrity barmaid at a crowded socialite party when she was shot dead at around 2 am on 30 April 1999. Dozens of witnesses pointed to Siddharth Vashisht, also known asManu Sharma, the son ofVenod Sharma, a wealthy and influentialCongress-nominatedMember of ParliamentfromHaryana, as the murderer. In the ensuing trial, Manu Sharma and a number of others were acquitted on 21 February 2006. Following intense media and public pressure, the prosecution appealed and the Delhi High Court conducted proceedings on a fast track with daily hearings conducted over 25 days. The trial court judgment was overturned, and Manu Sharma was found guilty of having murdered Lal. He was sentenced to life imprisonment on 20 Decesmber 2006. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jesssicalalmurdercase-191207152104-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi) Introduction:- Jessica Lal(5 January 1965 30 April 1999) was a model inNew Delhiwho was working as a celebrity barmaid at a crowded socialite party when she was shot dead at around 2 am on 30 April 1999. Dozens of witnesses pointed to Siddharth Vashisht, also known asManu Sharma, the son ofVenod Sharma, a wealthy and influentialCongress-nominatedMember of ParliamentfromHaryana, as the murderer. In the ensuing trial, Manu Sharma and a number of others were acquitted on 21 February 2006. Following intense media and public pressure, the prosecution appealed and the Delhi High Court conducted proceedings on a fast track with daily hearings conducted over 25 days. The trial court judgment was overturned, and Manu Sharma was found guilty of having murdered Lal. He was sentenced to life imprisonment on 20 Decesmber 2006.
Case Study:- Jesssica Lal Murder Case (Manu Sharma Vs State(NCT of Delhi) from Palash Mehar
]]>
5042 4 https://cdn.slidesharecdn.com/ss_thumbnails/jesssicalalmurdercase-191207152104-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Rehabilitation : Principle and its types /PALASHMEHAR/rehabilitation-principle-and-its-types rehabilitationfinal-191207151106
Rehabilitation- According to WHO Rehabilitation or rehab is the combined and coordinated use of the medical, social, educational, and vocational measures for training and re-training the individual to the highest possible level of functional ability. Principles of Rehabilitation Aspects of Rehabilitation Types of Rehabilitation :- There are too many types rehab to list here but some common types of therapy include, Physical therapy Occupational therapy Speech/swallow therapy Cognitive rehabilitation therapy Vocational rehabilitation ]]>

Rehabilitation- According to WHO Rehabilitation or rehab is the combined and coordinated use of the medical, social, educational, and vocational measures for training and re-training the individual to the highest possible level of functional ability. Principles of Rehabilitation Aspects of Rehabilitation Types of Rehabilitation :- There are too many types rehab to list here but some common types of therapy include, Physical therapy Occupational therapy Speech/swallow therapy Cognitive rehabilitation therapy Vocational rehabilitation ]]>
Sat, 07 Dec 2019 15:11:06 GMT /PALASHMEHAR/rehabilitation-principle-and-its-types PALASHMEHAR@slideshare.net(PALASHMEHAR) Rehabilitation : Principle and its types PALASHMEHAR Rehabilitation- According to WHO Rehabilitation or rehab is the combined and coordinated use of the medical, social, educational, and vocational measures for training and re-training the individual to the highest possible level of functional ability. Principles of Rehabilitation Aspects of Rehabilitation Types of Rehabilitation :- There are too many types rehab to list here but some common types of therapy include, Physical therapy Occupational therapy Speech/swallow therapy Cognitive rehabilitation therapy Vocational rehabilitation <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rehabilitationfinal-191207151106-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rehabilitation- According to WHO Rehabilitation or rehab is the combined and coordinated use of the medical, social, educational, and vocational measures for training and re-training the individual to the highest possible level of functional ability. Principles of Rehabilitation Aspects of Rehabilitation Types of Rehabilitation :- There are too many types rehab to list here but some common types of therapy include, Physical therapy Occupational therapy Speech/swallow therapy Cognitive rehabilitation therapy Vocational rehabilitation
Rehabilitation : Principle and its types from Palash Mehar
]]>
22851 6 https://cdn.slidesharecdn.com/ss_thumbnails/rehabilitationfinal-191207151106-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Crime Scene Documentation_Sketching /slideshow/crime-scene-documentationsketching/193879974 fscmsc1-191115065225
Crime Scene Sketching Types Of Sketches Perspectives: Purpose of Sketching: Methods:- Cross projection Methods Triangulation method Coordinate or Baseline Method Polar Method]]>

Crime Scene Sketching Types Of Sketches Perspectives: Purpose of Sketching: Methods:- Cross projection Methods Triangulation method Coordinate or Baseline Method Polar Method]]>
Fri, 15 Nov 2019 06:52:25 GMT /slideshow/crime-scene-documentationsketching/193879974 PALASHMEHAR@slideshare.net(PALASHMEHAR) Crime Scene Documentation_Sketching PALASHMEHAR Crime Scene Sketching Types Of Sketches Perspectives: Purpose of Sketching: Methods:- Cross projection Methods Triangulation method Coordinate or Baseline Method Polar Method <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fscmsc1-191115065225-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Crime Scene Sketching Types Of Sketches Perspectives: Purpose of Sketching: Methods:- Cross projection Methods Triangulation method Coordinate or Baseline Method Polar Method
Crime Scene Documentation_Sketching from Palash Mehar
]]>
17458 3 https://cdn.slidesharecdn.com/ss_thumbnails/fscmsc1-191115065225-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Creation & Verification of Digital Signature using Adobe Acrobat /slideshow/ppt-2-adobe-acrobat/127683784 ppt2adobeacrobat-190110101314
Digital Signature- Creation & Verification of Digital Signature using Adobe Acrobat Digital Signature Certificate:-A digital certificate or a digital signature certificate(DSC) is a digital record of credentials of an individual or an organization. It verifies the ingenuity of an entity involved in an online transaction. *Digital Signature Standard:-Digital Signature Standard (DSS) is thedigital signaturealgorithm(DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for theauthenticationof electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents. DSS is specified in Federal Information Processing Standard (FIPS). *Creation of digital signature using Adobe Acrobat *Verification of digital signature using Adobe Acrobat ]]>

Digital Signature- Creation & Verification of Digital Signature using Adobe Acrobat Digital Signature Certificate:-A digital certificate or a digital signature certificate(DSC) is a digital record of credentials of an individual or an organization. It verifies the ingenuity of an entity involved in an online transaction. *Digital Signature Standard:-Digital Signature Standard (DSS) is thedigital signaturealgorithm(DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for theauthenticationof electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents. DSS is specified in Federal Information Processing Standard (FIPS). *Creation of digital signature using Adobe Acrobat *Verification of digital signature using Adobe Acrobat ]]>
Thu, 10 Jan 2019 10:13:14 GMT /slideshow/ppt-2-adobe-acrobat/127683784 PALASHMEHAR@slideshare.net(PALASHMEHAR) Creation & Verification of Digital Signature using Adobe Acrobat PALASHMEHAR Digital Signature- Creation & Verification of Digital Signature using Adobe Acrobat Digital Signature Certificate:-A digital certificate or a digital signature certificate(DSC) is a digital record of credentials of an individual or an organization. It verifies the ingenuity of an entity involved in an online transaction. *Digital Signature Standard:-Digital Signature Standard (DSS) is thedigital signaturealgorithm(DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for theauthenticationof electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents. DSS is specified in Federal Information Processing Standard (FIPS). *Creation of digital signature using 鐃Adobe Acrobat *Verification of digital signature using Adobe Acrobat <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ppt2adobeacrobat-190110101314-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Digital Signature- Creation &amp; Verification of Digital Signature using Adobe Acrobat Digital Signature Certificate:-A digital certificate or a digital signature certificate(DSC) is a digital record of credentials of an individual or an organization. It verifies the ingenuity of an entity involved in an online transaction. *Digital Signature Standard:-Digital Signature Standard (DSS) is thedigital signaturealgorithm(DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for theauthenticationof electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents. DSS is specified in Federal Information Processing Standard (FIPS). *Creation of digital signature using 鐃Adobe Acrobat *Verification of digital signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat from Palash Mehar
]]>
370 3 https://cdn.slidesharecdn.com/ss_thumbnails/ppt2adobeacrobat-190110101314-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Creation & Verification of Digital Signature using Digisigner /slideshow/ppt-1-digisigner/127682640 ppt1digisigner-190110094120
Digital Singatute- Basics of Digital Signature Creation & Verification of Digital Signature using Digisigner Steps of creation of digital signature using Digisigner Steps of Validation of Digital signature using Digisigner Working of Digital Signatgure Attributes of Digital Signature Digital signature ensures the confidentiality via. The following three attributes, 1 Authentication 2 Integrity 3 Non-repudiation Controller of Certifying Authority(CCA) Sections related to digital signature Digisigner 4.0 ]]>

Digital Singatute- Basics of Digital Signature Creation & Verification of Digital Signature using Digisigner Steps of creation of digital signature using Digisigner Steps of Validation of Digital signature using Digisigner Working of Digital Signatgure Attributes of Digital Signature Digital signature ensures the confidentiality via. The following three attributes, 1 Authentication 2 Integrity 3 Non-repudiation Controller of Certifying Authority(CCA) Sections related to digital signature Digisigner 4.0 ]]>
Thu, 10 Jan 2019 09:41:20 GMT /slideshow/ppt-1-digisigner/127682640 PALASHMEHAR@slideshare.net(PALASHMEHAR) Creation & Verification of Digital Signature using Digisigner PALASHMEHAR Digital Singatute- Basics of Digital Signature Creation & Verification of Digital Signature using Digisigner Steps of creation of digital signature using Digisigner Steps of Validation of Digital signature using Digisigner Working of Digital Signatgure Attributes of Digital Signature Digital signature ensures the confidentiality via. The following three attributes, 1 Authentication 2 Integrity 3 Non-repudiation Controller of Certifying Authority(CCA) Sections related to digital signature Digisigner 4.0 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ppt1digisigner-190110094120-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Digital Singatute- Basics of Digital Signature Creation &amp; Verification of Digital Signature using Digisigner Steps of creation of digital signature using Digisigner Steps of Validation of Digital signature using Digisigner Working of Digital Signatgure Attributes of Digital Signature Digital signature ensures the confidentiality via. The following three attributes, 1 Authentication 2 Integrity 3 Non-repudiation Controller of Certifying Authority(CCA) Sections related to digital signature Digisigner 4.0
Creation & Verification of Digital Signature using Digisigner from Palash Mehar
]]>
655 3 https://cdn.slidesharecdn.com/ss_thumbnails/ppt1digisigner-190110094120-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Email recovery /slideshow/email-recovery-114944081/114944081 emailrecovery-180917065734
Email Recovery Email Recovery is needed when user gets their email files corrupt, deleted and in un used form. Every email client application when found some of their email files corrupt then they shows the corruption error to user so that they can start to repair them using any recovery solution and access it again after recovery. About Email recovery software :- Microsoft Outlook and Outlook Express store email , contacts, notes, journals, tasks and calendar. Sometimes email messages get deleted and that is panic too much. To retrieve this deleted emails, Email Recovery software is used. ]]>

Email Recovery Email Recovery is needed when user gets their email files corrupt, deleted and in un used form. Every email client application when found some of their email files corrupt then they shows the corruption error to user so that they can start to repair them using any recovery solution and access it again after recovery. About Email recovery software :- Microsoft Outlook and Outlook Express store email , contacts, notes, journals, tasks and calendar. Sometimes email messages get deleted and that is panic too much. To retrieve this deleted emails, Email Recovery software is used. ]]>
Mon, 17 Sep 2018 06:57:34 GMT /slideshow/email-recovery-114944081/114944081 PALASHMEHAR@slideshare.net(PALASHMEHAR) Email recovery PALASHMEHAR Email Recovery Email Recovery is needed when user gets their email files corrupt, deleted and in un used form. Every email client application when found some of their email files corrupt then they shows the corruption error to user so that they can start to repair them using any recovery solution and access it again after recovery. About Email recovery software :- Microsoft Outlook and Outlook Express store email , contacts, notes, journals, tasks and calendar. Sometimes email messages get deleted and that is panic too much. To retrieve this deleted emails, Email Recovery software is used. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/emailrecovery-180917065734-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Email Recovery Email Recovery is needed when user gets their email files corrupt, deleted and in un used form. Every email client application when found some of their email files corrupt then they shows the corruption error to user so that they can start to repair them using any recovery solution and access it again after recovery. About Email recovery software :- Microsoft Outlook and Outlook Express store email , contacts, notes, journals, tasks and calendar. Sometimes email messages get deleted and that is panic too much. To retrieve this deleted emails, Email Recovery software is used.
Email recovery from Palash Mehar
]]>
1794 5 https://cdn.slidesharecdn.com/ss_thumbnails/emailrecovery-180917065734-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-PALASHMEHAR-48x48.jpg?cb=1736184875 https://cdn.slidesharecdn.com/ss_thumbnails/seminarsemivdvipalashmehar-220426181352-thumbnail.jpg?width=320&height=320&fit=bounds PALASHMEHAR/disaster-victim-identification-dvi Disaster Victim Identi... https://cdn.slidesharecdn.com/ss_thumbnails/alexanderpichushkin-210801190135-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/alexander-pichushkin-the-chessboardkiller-or-the-bitsa-park-maniac/249899854 Alexander Pichushkin :... https://cdn.slidesharecdn.com/ss_thumbnails/seminar2020-210609175619-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/rapid-dna-technology/249258321 Rapid DNA Technology