• Title/Summary/Keyword: 修辭

Search Result 820, Processing Time 0.023 seconds

The problem point and improvement program of the scene confiscation search of digital evidence at practical affairs (실무상 디지털증거의 현장압수수색 문제점과 개선방안)

  • Kim, Yong-Ho;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.118-122
    • /
    • 2013
  • Currently, under being related with confiscation method of digital store medium from the court of justice, "the sorting confiscation method of principle, the exceptional medium confiscation method" from in section3 no.106 of the criminal procedure code disregard the actual fields of investigation. What is more, there are many difficulties to execute cases by observing this for the achievement of confiscation purpose. At this point, I present the problems of the present confiscation search method and the desirable scene confiscation search method and the improvement program under the new technology circumstance.his is an example of ABSTRACT format.

  • PDF

The Advanced Effective Feature Extraction for Image Retrieval of an Automobile Head Lamp (자동차 전조등 영상검색을 위한 향상된 유효 특징 추출 방법)

  • Son, Byong-Hwan;Lee, Byeong-Il;Son, Sung-Kun;Choi, Heung-Kook
    • Annual Conference of KIPS
    • /
    • 2002.04a
    • /
    • pp.261-264
    • /
    • 2002
  • 자동차 전조등에서 나오는 데이터는 다양한 패턴을 가지는 영상자료와 부분적으로 보이는 문자자료이다. 내용기반 영상검색을 통해 자동차 전조등에서 검사자가 판독하는 텍스트와 부분적인 전조등의 영상정보로 차량의 정보를 추출하기 위한 검색 방법을 국립과학수사연구소의 자료를 기반으로 설계하였으며, 영상검색에 사용된 영상특징값의 구성과 영상 검색방법을 연구하였다. 본 논문에서는 영상데이터의 검색을 위해 효과적인 영상특징이 추출 되도록 향상된 방법론을 제시하였다. 특징함수에 대한 유효성 검증을 위해 샘플 영상에서 각 후보 특징함수들에 대한 결과값들을 비교하였으며, 이를 기반으로 유효한 특징함수를 찾아서 검색에 사용되어지도록 구성하였다. 사용되어진 영상의 특징값은 전조등 영상이 가지는 다수의 텍스쳐함수와 가로, 세로 성분값을 사용하였다. 영상 검색을 위해 추출된 영상 특징값을 데이터베이스화하고 용의차량의 전조등 영상을 질의 영상으로 하여 후보 차량에 대한 정보를 검색하도록 하였다.

  • PDF

A Fundamental Study for the Phenomenology of Communication (커뮤니케이션 현상학에 관한 기초 연구)

  • Lee, Bum-Soo
    • Korean journal of communication and information
    • /
    • v.71
    • /
    • pp.250-273
    • /
    • 2015
  • The phenomenology of communication represents a starting point in the union of consciousness and experience, analogue and digit, expression and perception, person and lived-world, rhetoric and ethic, constitute human communication. A phenomenological definition of communication requires that analysis proceed through a phenomenological description, reduction, interpretation. This analysis thus far has taken up the general issue of fact versus value, consisting in a subdivision into intention and punctuation on the factual side, and convention and legitimation on the value side. It has treated of the relationships among intention and metaphysics, punctuation and epistemology, convention and logic, and legitimation and axiology.

  • PDF

Setences Extraction System using Automatic Division of Paragraph (단락 자동 구분을 통한 중요 문장 추출)

  • Kim, Kye-Sung;Lee, Hyun-Ju;Jung, Young-Giu;Seo, Youn-Kyoung;Son, Ki-Jun;Lee, Sang-Jo
    • Annual Conference on Human and Language Technology
    • /
    • 2000.10d
    • /
    • pp.233-237
    • /
    • 2000
  • 본 논문은 단락의 자동 구분을 통한 중요 문장 추출 시스템을 제안한다. 먼저 어휘의 재출현 여부와 어휘의 일치도, 어휘의 역할 변화를 파악하여 재출현 어휘에 대한 양상을 분석하고 이를 통하여 문장 간의 긴밀도를 정량적으로 계산한다. 다음으로 측정된 문장 간 긴밀도룰 이용하여 사용자의 추출 범위에 따라 단락을 구분하고, 각 단락의 대표 문장을 선정하여 최종문을 생성한다. 제안한 방법은 문서 제목, 문장의 위치, 수사 구조 등의 정보를 이용하지 않으며, 단순히 어휘의 출현 빈도만을 이용하던 기존의 통계적인 방법보다 질 높은 요약문을 생성할 수 있다. 또한 제안한 방법론은 본 논문이 대상으로 삼고 있는 신문기사의 영역뿐만 아니라 다른 영역으로의 적용이 가능하다.

  • PDF

Korean Composed Noun Phrase Chunking Using CRF (CRF를 이용한 한국어 문장의 복합명사 상당어구 묶음)

  • Park, Byul;Seon, Choong-Nyoung;Seo, Jung-Yun
    • Annual Conference on Human and Language Technology
    • /
    • 2011.10a
    • /
    • pp.90-93
    • /
    • 2011
  • 구분분석은 문장을 분석하여 문장의 구문 구조를 밝히는 작업으로, 문장이 길어질수록 문장의 중의성이 높아져 구문분석 복잡도를 증사시키고 성능이 떨어진다. 구문분석의 복잡도를 감소시키기 위한 방법 중 하나로 구묶음을 하는데 본 논문에서는 하나의 명사처럼 쓰일 수 있는 둘 이상의 연속된 명사, 대명사, 수사, 숫자와 이를 수식하는 관형사, 접두사 및 접미사를 묶어서 복합명사 상당어구라고 정의하고 복합명사 상당어구 인식 시스템을 제안한다. 본 논문은 복합명사 상당어구 인식을 기계학습을 이용한 태그 부착 문제로 간주하였다. 문장 내 띄어쓰기, 어절의 어휘 정보, 어절 내 형태소들의 품사 정보와 품사-어휘 정보를 함께 자질로 사용하였다. 실험을 위하여 세종 구문분석 말뭉치 7만여 문장을 학습과 평가에 사용했으며, 실험결과는 95.97%의 정확률과 95.11%의 재현율, 95.54%의 $F_1$-평가치를 보였고, 구문분석의 전처리로써 사용하였을 때 구문분석의 성능과 속도가 향상됨을 보였다.

  • PDF

Meta Analysis on Digital Forensics Research Trends for Securing its Admissibility of Digital Evidence (디지털 증거능력 확보 강화를 위한 디지털 포렌식 연구동향 메타분석)

  • Ryu, Bora;Jeon, Minseo;Ji, Juyeon;Lee, Chanwoo;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.23-32
    • /
    • 2017
  • With the development of information and communication technology, various data including digital data have increased exponentially. In a society where such data utilization is generalized, criminal investigation processes and trial processes have also been influenced. However, in comparison with the progress of the technical capability and analytical capability of digital certification which is increasing exponentially, the establishment of the digital forensic related legal system is still in short supply. Therefore, it is necessary to activate balanced research for legal recognition of digital certification. Therefore, in this research, meta analysis was conducted to grasp trends of research related to digital forensics and to provide objective data for research revitalization.

A study on characteristics of latent fingerprint detection on vinyl leather (합성가죽에서의 잠재지문 현출)

  • Choi, Yong-Bok;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.45-50
    • /
    • 2011
  • While the crime scene investigation, evidences are found to search with the naked eyes and to use science equipments. Crime evidences, which are used as judgement, have various things: blood, sperm, saliva, hair, fingerprint, fiber, soil, paint, and so on, especially, fingerprints could take through crime scene investigation, and in there, it could distinguish individually. In this case study, sort of leathers: a wallet, a belt, and a sofa, which are needed special identification even thought people experience easily in usual day, are tried many of the identification tests. As a result, using fluorescent magnetic powder method or fluorescent powder method as identification of many leathers is most efficient.

A Legislative Proposal to Prevent the Infringement of Privacy and to Solve Operational Problems by Drones (드론에 의한 프라이버시 침해 방지 및 운용 상 문제 해결을 위한 입법 제안)

  • Kim, Yongho;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1141-1147
    • /
    • 2017
  • An unmanned aerial vehicle(UAV), commonly known as a drone, is an aircraft without a human pilot aboard, which is operated by wireless device. A drone provides the capability for the aerial search and traffic control as a police equipment. It has benefits for the missions for the aerial photography with the high resolution camera which can replace eye-dependent search processes. Moreover it has advantage of retrieving several times for the recorded videos. However, if the law enforcement agency misuse and overuse a drone for investigations and search missions without certain regulations and principles, it breaches privacy and personal information infringement. In this paper, we issue a lawful challenges on drone operations and discuss solutions to those challenges.

A Study of IP Spoofing Attack and Defense Through Proxy Server (Proxy Server를 통한 IP Spoofing 공격과 방어 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.281-284
    • /
    • 2010
  • The characteristics of International Hacking is that because even if with tracing techniques, nobody can find Real IP address of the attacker so it is true that Great difficulty in the investigation. so that an attacker goes through the Proxy Server Many times and they use techniques of IP Spoofing to hide their IP address. In this paper, study How attackers use IP Spoofing Technique and the application of Proxy Server. In addition, to Propose IP Spoofing attacks through the Proxy Server attack and defend methods also IP traceback methods so this study materials will contribute to the development of International Hacking and Security Protection Technology.

  • PDF

Generation of Forensic Evidence Data from Script (Script에서 Forensic 증거자료 확보 방안)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.353-355
    • /
    • 2017
  • Recently developed digital devices are being used in cyberspace. Digital device users are engaged in activities such as financial settlement and e-commerce using cyber-connected terminals. With the activation of cyber trading, cyber crimes against users are increasing. Forensic evidence should be obtained from investigations of cybercrime. However, there is a lot of information to analyze digital forensic evidence. In many of these digital information, Scripts are an effective way to secure evidence for cybercrime. In this paper, we study how to secure forensic evidence using scripts. Extract evidence from EnCase and study how to obtain evidence using scripts. This study will be used as the basic data for cyber security for the safe life of the people.

  • PDF