Free Essay

Fingerprint

In:

Submitted By bukatil
Words 275
Pages 2
That, I approached Jimboy Dela Torre, tried to talk with him to calm down, but instead of heeding, he faced upon me, throws punches hitting on my face and head that caused me outbalance and hammered into the concrete pavement. Still not contended, he kicked me several times until I became unconscious. Afterwhich, suspect fled off to unknown direction;

That, I was rushed unconscious by my brother, Gaudencio Ganeron, who witnessed the incident to Kapalong District Hospital for medical attention, and subsequently referred to Davao Regional Hospital in Tagum City for further medical examination;

That, I was confined and undergone head surgery at Davao Regional Hospital from October 4 to 15, 2012 (12 days) with the following findings/diagnosis: EPIDURAL HEMATO, LEFT TEMPOROPAREITAL SECONDARY TO MAULING and undergone procedure of CRANIECTOMY, LEFT FRONTOTEMPOROPAREITAL, EVACUTION OF HEMATOMA; BLOOD TRANSFUSION. Attached is the MEDICO-LEGAL CERTIFICATE issued by DR JOHN RODEL A ACOSTA of Davao Regional Hospital dtd October 22, 2012;

That, I am executing this Affidavit to attest the truth of the foregoing facts and circumstances, and to file criminal charges against JOVANIE DELA TORRE y MANUEL, alias JIMBOY;

IN TRUTH WHEREOF, I have hereunto set my hand and affixed my signature this 11TH day of April 2013 at Hall of Justice, Mankilam, Tagum City, Davao del Norte, Philippines.

_____________________________ FORTUNATO P GANERON JR
Affiant

SUBSCRIBED AND SWORN to before me this _____ day of _______________________ 2013 at the Hall of Justice, Brgy Mankilam, Tagum City, Davao del Norte, Philippines. I HEREBY CERTIFY that I have personally examined the herein affiant and convinced that he executed this statement freely, voluntarily and fully understood the contents of this instrument.

Similar Documents

Free Essay

Fingerprints

...Elliott CRJ 202 Mr. Scott March 11, 14 Fingerprints For over a century, law enforcement agencies, forensic laboratories, and penal courts worldwide have used fingerprint impressions as reliable and conclusive evidence to identify perpetrators of criminal activity. Although fingerprint identification has been repeatedly proven as one of the most robust and definite forensic techniques, a measure of the rate at which latent fingerprints degrade over time has not been established effectively. Ideally, criminal investigators should be able not only to place any given individual at a crime scene but also be able to date the moment any latent fingerprints were deposited at the location. The present report aims to determine particular visual patterns of degradation of latent fingerprints exposed to certain monitored laboratory conditions simulating those in the field. Factors considered include temperature, relative humidity, air currents, composition of fingerprint depositions (sebaceous and eccrine), various exposures to daylight (direct, penumbra, and darkness), and type of physical substrate (glass and plastic) over a period of 6 months. The study employs a titanium dioxide-based powder as developer. Our results indicate that, contrary to common belief, certain latent fingerprints exposed to direct sunlight indoors degrade similarly to those in the dark where environmental conditions are more constant. While all sebaceous latent fingerprints on glass are still useful for identification...

Words: 814 - Pages: 4

Premium Essay

Fingerprints

...Fingerprints Fingerprints have always been a form of identification. This is probably the reason why fingerprints have supplanted most methods of identifying criminals that deny ever being arrested or even committing the crime. Identifying fingerprints has become a science and it also stands out to many other forensic sciences ( www.onin.com). The science of fingerprints, has helped many governments around the world, presenting them with correct discovery of criminals There are millions of people on this planet and never have 2 fingerprints been found that are alike within humans and automated computer comparisons (www.onin.com). No 2 humans have the same finger, palm or footprint. These parts of the human body have ridges that are constantly broken up by endings or forks; these are called characteristics (www.south-wales.police.uk). Every person has unique distributions of the characteristics that build up in womb and throughout life in general, these characteristics stay the same for a time after death too so it makes identifying a body possible People have often tried to alter their fingerprints with different methods like cutting their fingerprints, burning the skin with acid but that doesn’t work because, superficial skin damage is repaired by the body so the same ridges come back with the new skin that forms Fingerprints are formed by our skin and our skin is made out of two layers, dermis and epidermis. The epidermis is a thin layer and it is a protective cover...

Words: 1139 - Pages: 5

Premium Essay

Fingerprint

...Student Attendance System Based On Fingerprint Recognition and One-to-Many Matching A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer Science and Engineering by Rishabh Mishra (Roll no. 107cs016) and Prashant Trivedi (Roll no. 107cs015) Under the guidance of : Prof. B. Majhi Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Orissa, India 2 . Dedicated to Our Parents and Indian Scientific Community . 3 National Institute of Technology Rourkela Certificate This is to certify that the project entitled, ‘Student Attendance System Based On Fingerprint Recognition and One-to-Many Matching’ submitted by Rishabh Mishra and Prashant Trivedi is an authentic work carried out by them under my supervision and guidance for the partial fulfillment of the requirements for the award of Bachelor of Technology Degree in Computer Science and Engineering at National Institute of Technology, Rourkela. To the best of my knowledge, the matter embodied in the project has not been submitted to any other University / Institute for the award of any Degree or Diploma. Date - 9/5/2011 Rourkela (Prof. B. Majhi) Dept. of Computer Science and Engineering 4 Abstract Our project aims at designing an student attendance system which could effectively manage attendance of students at institutes like NIT Rourkela. Attendance is marked after student...

Words: 14646 - Pages: 59

Premium Essay

Anatomy of Fingerprints

...Anatomy of Fingerprints The two fundamental principles of fingerprint identification are that fingerprints are permanent and unique in its nature. This states that fingerprints never change and no two fingerprints are the same (The Basics of Fingerprint Science, 2014). Fingerprints attain their unalterable shape before birth and remain the same for a lifetime unless a permanent scar appears. That is why fingerprints are accepted as a substantial proof of identity which is exclusive to their owner (Azimi, 2013). The practice of utilizing fingerprints as a mean of identification is referred as dactyloscopy, which is an indispensable aid to modern law enforcement (Hoover, 2016). The significance of fingerprint was discovered in late 19th century. Before then, people regarded fingerprints as ordinary curves without any specific importance or meaning. In Quran, Allah points to the fingertips which did not attract anyone’s attention at that time, and calls our attention to their importance in the fourth verse of surah Al-Qiyamah. The verse states “Yes, we are able to put together in perfect order the very tips of his fingers.” (Azimi, 2013) Formation of fingerprints Fingerprint is an impression made by the papillary ridges on the ends of the fingers. It afford an infallible means of personal identification, because the ridge arrangement on every finger of every human being is unique and does not alter with growth or age. It also serve to reveal an individual’s true identity despite...

Words: 1627 - Pages: 7

Premium Essay

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...

Words: 3961 - Pages: 16

Free Essay

Student Attendance with Fingerprint

...Table of Contents 1 Frontal Materials…………………………………………………………………………i 1.1 List of Figures………………………………………………………………………..i 1.2 List of Tables………………………………………………………………………..ii 1.3 List of Symbols…………...………………………………………………………..iii 1.4 List of Definitions…………………………………………………………………..iv 2 Introductory Materials…….…………………………………………………………….1 2.1 Executive Summary…………………………………………………………………1 2.2 Acknowledgment……………………………………………………………………2 2.3 Problem Statement…………………………………………………………………..2 2.4 Operating Environment……………………………………………………………...2 2.5 Intended Users and Uses…………………………………………………………….2 2.6 Assumptions and Limitations……………………………………………………….3 2.7 Expected End Product and Other Deliverables………………………………….…..3 3 Approach & Results……………………………………………………………………..4 3.1 Functional...

Words: 9087 - Pages: 37

Free Essay

Crj 311 Week 4 Dq 2 Fingerprint Evidence

...CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-4-dq-2-fingerprint-evidence/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK...

Words: 697 - Pages: 3

Premium Essay

Introduction to Fingerprint Based Student Attendance

...becoming the foundation for highly secure identification and personal verification solutions./ Biometric applications have the potential to offer much more robust authentication/identification security than traditional systems (eg: passwords or pass codes ,PINs , tokens). The main goal of applying biometrics to user authentication is to provide security to users and detect imposters in terms of users physiological (e.g. fingerprint, face, iris, hand) or behavioural characteristics (e.g. speech, keystroke dynamics). Owing to the unique biometric characteristic that every person possesses, utilization of the same can be done in a form of identity access management. Ever since their inception, Fingerprint based biometric authentication and verification systems have gained immense popularity and acceptance. This is primarily because of the ease of operation, installation and easy acquisition of the biometric feature, which in this case is a fingerprint. Implementing fingerprint recognition system is secure to use since the uniqueness of one’s fingerprint does not change in user’s lifetime. The popularity of mobile devices is undeniable. According to the International Data Corporation (IDC), more smartphones were sold in 2012 than desktop and laptop computers combined. This rise may be due to increasing functionality and technological advances which in turn supports greater functionality. Thus, the frequency with which smartphone owners use their devices, these devices ...

Words: 281 - Pages: 2

Premium Essay

Design and Implementation of a Bio-Metric (Fingerprint) Clocking System

...be very laborious using the conventional method of paper sheets and old file system method. Every corporate organization poses some standards concerning how attendance is to be confirmed for staff in offices. This is to enable the management of the organization identify those staff that are punctual and competent, that is why keeping the accurate record of attendance is very important. Also in institutions, tracking and monitoring staff time of attendance could pose a tedious task, time consuming and as well prone to errors. As an alternative to the traditional manual clocking process by staff in offices, biometrics characteristics can be used for authenticating staff. This research will focus on developing a Fingerprint based Biometric Clocking System.  The fingerprint Biometrics is adopted in this research work due to the fact that it is one of the most successful applications of biometric technology. In the manual signing processes, where a sheet of paper is placed at the entrance of the office for staff to write their names and signature as a form of confirming their presence for a particular day in the office, falsification in staff attendance mostly occur. A situation whereby a staff can sign on behalf of his or her colleague as being present in the office when that is not true. This can be so difficult to prevent from happening especially for large offices where row count can take longer time. The trending concern in this modern age is regarding national security, identifying...

Words: 1919 - Pages: 8

Premium Essay

Two Different Area Where the Fingerprint Identify System Be Used

...Two Different Area Where The Fingerprint Identify System Be Used One of the area that used fingerprint scanner is in Hospital. This technology could help with the complex issue of positive patient identification. The first implementation of fingerprint identification was a standalone system in a single methadone clinic. It was that the hospital system had an opportunity to work out some of the initial issue with the system and to watch the technology mature, according to Catholic Health System Vice President of IT Jeff Baughan. The staff and the patient are asked to register via the “Personal Touch System.” After they registered, they can use their fingerprint to identify their identity. This provides much more consistency in patient identification than usually exists. This also an addition to assuring positive patient identification which is one of the main benefit of the product. Another benefit of the fingerprint identification system is that it can help to eliminate fraud. As a nonprofit, faith-based institution. By the way, the patient privacy is more secure. The patient’s information and personal details are protected by just the few hastily thought-out numbers in our passwords.  Hospital use fingerprint scanner to replace password to improve their efficiency in the medical field. This device allows the doctors to access medical records by swiping simply their fingers rather than typing passwords. This device brings a lot of benefit for the patients who are suffer in...

Words: 567 - Pages: 3

Premium Essay

Fingerprints

...Sherman Alexie ENG 150 – Critical Analysis Assignment Fingerprints Recently, I was introduced to a man named Sherman Alexie. See, what I liked about Sherman from the beginning was the dissimilarity we shared. Too often, as a society we get so caught up in the bait of commonality that we forget it’s the differences that make us individuals. His family was not like mine. The significant values that shape a young man’s life, like Sherman’s and mine, were founded on different life experiences and were respected on unfamiliar levels. I came to see he loved differently and for different reasons. He esteemed for different reasons and his perception on life was remarkable yet understated. Sherman had a way of seeing things… the realness he bestowed was astonishing, but more importantly, he was able to help me see differently too. You’re asking, “Where did you meet this Sherman Alexie?” The answer to that question is difficult to state because I feel like I’ve known him my whole life, but I doubt he’d say the same of me. The Absolutely True Story of a Part Time Indian is a novel by Sherman Alexie written for anyone willing to read it. It displays his inner deepest thoughts through the story of a young man named Junior. The great thing about being introduced to a man through his work is that he reveals himself to you through nothing but the deepest and best thoughts; and Sherman had many. Sherman Alexie was a Native American who grew up on a reservation in Spokane...

Words: 1658 - Pages: 7

Free Essay

Fingerprint

...1 Learning Fingerprint Reconstruction: From Minutiae to Image Kai Cao and Anil K. Jain, Fellow, IEEE Abstract—The set of minutia points is considered to be the most distinctive feature for fingerprint representation and is widely used in fingerprint matching. It was believed that the minutiae set does not contain sufficient information to reconstruct the original fingerprint image from which minutiae were extracted. However, recent studies have shown that it is indeed possible to reconstruct fingerprint images from their minutiae representations. Reconstruction techniques demonstrate the need for securing fingerprint templates, improve the template interoperability and improve fingerprint synthesis. But, there is still a large gap between the matching performance obtained from original fingerprint images and their corresponding reconstructed fingerprint images. In this paper, the prior knowledge about fingerprint ridge structures is encoded in terms of orientation patch and continuous phase patch dictionaries to improve the fingerprint reconstruction. The orientation patch dictionary is used to reconstruct the orientation field from minutiae, while the continuous phase patch dictionary is used to reconstruct the ridge pattern. Experimental results on three public domain databases (FVC2002 DB1 A, FVC2002 DB2 A and NIST SD4) demonstrate that the proposed reconstruction algorithm outperforms the stateof-the-art reconstruction algorithms in terms of both i) spurious ...

Words: 9735 - Pages: 39

Free Essay

Fingerprint

...Bagaimana Software, Hardware, Jaringan, dan Sistem Pengamanan yang Sesuai Untuk FEB UA Sehingga Dapat Meminimalisasi Kecurangan yang Ditimbulkan dari Penggunaan Absensi Manual ( Pembahasan Chapter 5,7,dan 8 ) [pic] Kelas J Kelompok III : Zulfa Nurrahma Fitriani 040913129 / 56 Wahyu Firmandani 040913139 / 57 Dian Yunitasari 040913193 / 63 Rosilia Alfianita 040913216 / 68 Fakultas Ekonomi dan Bisnis Universitas Airlangga 2011 BAB I PENDAHULUAN 1.1 Latar Belakang Salah satu syarat agar sistem perkuliahan dapat berjalan dengan baik adalah diperlukannya pencatatan kehadiran mahasiswa maupun dosen yang akurat. Akurat berarti data kehadiran tersebut dapat dipertanggung jawabkan keasliannya. Pencatatan kehadiran mahasiswa digunakan sebagai syarat untuk mengikuti UTS (Ujian Tengah Semester) dan UAS (Ujian Akhir Semester) yaitu minimal 75% mahasiswa harus menghadiri perkuliahan. Ini adalah salah satu regulasi dan kebijakan akademik yang berlaku saat ini. Selain pencatatan kehadiran mahasiswa digunakan sebagai catatan bahwa mahasiswa tersebut mengikuti perkuliahan dapat juga digunakan sebagai bahan pembanding prestasi mahasiswa. Sementara pencatatan kehadiran dosen digunakan untuk mengukur produktifitas belajar mengajar. Saat ini di Universitas Airlangga, khususnya di Fakultas Ekonomi dan Bisnis, masih menggunakan pencatatan kehadiran secara manual. Data kehadiran menggunakan media kertas yang masih kosong dan diisi oleh dosen dengan tanda tangan...

Words: 4946 - Pages: 20

Free Essay

Fingerprint

...Operating System – CS 407 Spring 2014 (BE (CS)) Course contents Overview of Operating System Objectives and functions of operating system A brief overview of computer architecture Concept of process States of process; Process control block; Address space Threads and processes Concept of threads; context of a thread Symmetric Multiprocessing (SMP) Microkernel architecture of Operating system Concurrency, Mutual exclusion and Synchronization Principles of concurrency Hardware support for mutual exclusion Semaphores and monitors Synchronization through message passing Deadlock and Starvation Deadlock prevention, avoidance and detection Algorithms for deadlock prevention, avoidance and detection Memory management Requirements; Memory partitioning; paging and segmentation Virtual memory management and operating system support Processor Scheduling Types of scheduling and scheduling algorithms Multiprocessor scheduling and real-time scheduling I/O Management and Disk Scheduling Organization of I/O devices; Buffering Disk scheduling; Disk cache RAIDs File management File organization and file directories File sharing and record blocking Secondary storage management Protection and Security Computer security; Threats and attacks Viruses, Worms and Bots Authentication and access control Intrusion detection and malware defence Distributed processing and Networks Communication architecture; Client/server computing ...

Words: 2109 - Pages: 9

Premium Essay

Journal

...(IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 3, March 2012 An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique Josphineleela.R Dr.M.Ramakrishnan Research scholar Department of Computer Science and Engineering Sathyabamauniversity Chennai,India ilanleela@yahoo.com Professor/HOD-IT Velammal Engineering College Chennai,India ramkrishod@gmail.com Abstract— Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm ...

Words: 3558 - Pages: 15