ANLY07005 2019 LABORATORY COMPUTING AND INSTRUMENTATION

General Details

Full Title
LABORATORY COMPUTING AND INSTRUMENTATION
Transcript Title
LABORATORY COMPUTING AND INSTR
Code
ANLY07005
Attendance
75 %
Subject Area
ANLY - Analytical Tech/Skills/Spec
Department
LIFE - Life Sciences
Level
07 - NFQ Level 7
Credit
05 - 05 Credits
Duration
Semester
Fee
Start Term
2019 - Full Academic Year 2019-20
End Term
9999 - The End of Time
Author(s)
Ted McGowan
Programme Membership
SG_SFORE_G07 201900 Bachelor of Science in Science in Forensic Invest & Analys(Emb) SG_SFORE_H08 201900 Bachelor of Science (Honours) in Science in Forensic Science and Analysis SG_SFORE_B07 201900 Bachelor of Science in Science in Forensic Investigation and Analysis
Description

This module deals with applications of information technology for forensic and analytical science. Topics will include the following:Introduction to forensic computing; laboratory data acquisition and signal processing; importing and exporting scientific data; hardware and software systems on modern scientific instrumentation; use of information technology to enhance scientific presentations including the application of molecular graphics applications.   

Learning Outcomes

On completion of this module the learner will/should be able to;

1.

Describe the basic processes and features of computer forensics, including evidence collection and analysis

2.

Describe features of computing hardware and software used in the analytical laboratory   

3.

Demonstrate the features of selected advanced analytical instrumentation including associated computer systems.

4.

Apply spreadsheets to process experimental data.

5.

Make use of a range of software applications to present scientific reports

Teaching and Learning Strategies

This module will be delivered fulltime Teaching methodology will involve problem based learning (PBL)approaches. This will be supplemented with introductory lectures, laboratory exercises, independent learning and directed learning. This approach is expected to address student learning needs. Moodle will be used as a repository of educational resources and as a means of assessment (e.g. quizzes, uploading assignments and journals). Self-assessment tests and other forms of formative assessment are provided to students to check their own progress towards achieving the learning outcomes of the module and to motivate learning.

Module Assessment Strategies

This module is 100% Continuous Assessment.  The continuous assessment will include the following elements: formative assessment of engagement in laboratory exercises (15%);three  assignments (15%); Two 20% written assessments around mid- semester and end of semester; project poster and report (20%) due by penultimate week of semester; oral presentation during penultimate week of semester (10%).

The student must achieve 40% overall to pass the subject

Repeat Assessments

Repeat written assessment and assignments.

Module Dependencies

Co-requisites
Non
Incompatibles
None

Indicative Syllabus

1. Describe the basic processes of computer forensics, including evidence collection and analysis

Describe elements of digital forensics including, encryption, steganography, digital signatures and image analysis

 

Overview of forensic computing methodologies and toolkits.

 

Binary and hexadecimal numbering systems

 

Review of ACPO Good Practice Guide for Digital Evidence

 

Regarding Forensic Science Society (FSS) component standard describe the application and  theory relating to a the range of analytical techniques that are available to the forensic scientist, understand the parameters involved in method selection and be able to provide a forensic strategy and an analytical strategy for a given scenario.

 

 

2. Describe features of computing hardware and software used in the analytical laboratory

Modes operation(in-line, off-line, etc.)

Digital and analogue system and electronics

Signals and acquisition

Analogue to digital conversion

Data acquisition systems

Computer interfaces

Operating systems

File formats

Data transfers: import and export between software applications

Laboratory information management systems, and data processing

 

 

 

3. Demonstrate the features of selected advanced analytical instrumentation including their computer systems

 

Fourier data processing with Fourier transform infrared (FTIR) spectrometers

Automation of analysis using a Graphite furnace atomic absorption spectrometer

Overview of an ICP-MS data acquisition and processing system

 

Regarding the FSS component standard it is important to demonstrate an understanding of the theory relating range of analytical procedures, specifically within the forensic context.

 

Regarding the FSS component standard demonstrate competence in operating a range of modern analytical instruments and be conversant with the use of related computer software

 

4. Apply spreadsheet tools to simulate experiments and process experimental data.

 

Acid-base titration simulation using a spreadsheet.

Using Excel Solver for quadratic and multicomponent analysis.

Process standard addition data using Excel

Regarding the FSS component standard evaluate and interpret data from equipment applied to a range of forensic examinations.

 

5. Make use of a range of software applications to present scientific reports

 

Prepare a professional report and electronic poster.

Use molecular graphics applications (e.g. Biovia Draw, Rasmol) to both create and illustrate features of selected chemicals in both two and three dimensions.

Collect data from a range of sources, simplify and present clearly

Regarding the FSS component standard evaluate and interpret data from equipment applied to a range of forensic examinations.

Coursework & Assessment Breakdown

Coursework & Continuous Assessment
100 %

Coursework Assessment

Title Type Form Percent Week Learning Outcomes Assessed
1 Laboratory exercises and assignments Formative Assignment - % OnGoing 1,2,3,4,5
2 Written assessments. Continuous Assessment Assessment 40 % OnGoing 1,2,3
3 Laboratory Exercises and Assignments Continuous Assessment Assignment 30 % OnGoing 1,2,3,4
4 Poster preparation, written report and oral presentation Continuous Assessment Individual Project 30 % Week 11 5

Full Time Mode Workload


Type Location Description Hours Frequency Avg Workload
Problem Based Learning Computer Laboratory Laboratory Practical and PBL exercises 3 Weekly 3.00
Independent Learning Computer Laboratory Self study 4 Weekly 4.00
Total Full Time Average Weekly Learner Contact Time 3.00 Hours

Module Resources

Non ISBN Literary Resources

 

Anson, S. and Bunting, S. (2007) Mastering Windows network forensics and investigation, Indianapolis, Ind: Wiley.

Blitzer, H. L. and Jacobia, J. (2002) Forensic digital imaging and photography, San Diego: Academic Press.

Bloch, S. C. (2000) Excel for engineers and scientists, New York: Wiley.

Bryant, R. D. (2008) Investigating digital crime, Hoboken, NJ: J. Wiley & Sons.

Chainey, S. and Ratcliffe, J. (2005) GIS and crime mapping, Hoboken, NJ: Wiley.

Cohen, N. C. (1996) Guidebook on molecular modeling in drug design, San Diego, Calif: Academic Press.

Cole, E., Krutz, R. L. and Conley, J. W. (2009) Network security bible, Indianapolis, IN: Wiley.

Denise, E. (2008) Excel 2007: top 100 simplified tips & tricks, US: Visual (Wiley Visual Imprint).

Diamond, D. and Hanratty, V. C. A. (1997) Spreadsheet applications in chemistry using Microsoft Excel, New York: Wiley.

Goodman, J. M. and Royal Society of, C. (1998) Chemical applications of molecular modelling, Cambridge, UK: Royal Society of Chemistry.

Grant, G. H. and Richards, W. G. (1995) Computational chemistry, New York: Oxford University Press.

Harris, D. C. (2010) Quantitative chemical analysis, New York: W. H. Freeman and Co

Harvey, G. (2010) Excel 2010 for dummies, Hoboken, NJ: Wiley Pub.

Hinchliffe, A. (2000) Modelling molecular structures, Chichester: Wiley.

Johnson, N. F., Duric, Z. and Jajodia, S. (2001) Information hiding: steganography and watermarking : attacks and countermeasures, Boston: Kluwer Academic.

Kipper, G. (2003) Investigator's guide to steganography, Boca Raton, Fla: CRC.

Leach, A. R. (1996) Molecular modelling: principles and applications, Harlow, England: Longman.

Leach, A. R. (2001) Molecular modelling: principles and applications, New York: Prentice Hall.

Marshall, A. M. (2008) Digital forensics: digital evidence in criminal investigation, Hoboken, NJ: Wiley-Blackwell.

Nelson, B. (2006) Guide to computer forensics and investigations, Boston, Mass: Thomson Course Technology.

Skoog, D. A., Holler, F. J. and Crouch, S. R. (2017) Principles of Instrumental Analysis. Cengage Learning

Schlecht, M. F. (1998) Molecular modeling on the PC, New York: Wiley-VCH.

Steel, C. (2006) Windows forensics: the field guide for conducting corporate computer investigations, Indianapolis, IN: Wiley Pub.

Volonino, L., Anzaldua, R (2008) Computer forensics for dummies, Hoboken, NJ: Wiley Pub.

Journal Resources

TO BE UPDATED 

URL Resources

ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011) Avalable from: https://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf

https://chem.libretexts.org/Bookshelves/Analytical_Chemistry/Book%3A_Analytical_Chemistry_2.0_(Harvey)

Other Resources

UPDATES ON MOODLE

Additional Information

None