• Title/Summary/Keyword: 검거

Search Result 83, Processing Time 0.026 seconds

A study on shape changes of hangul signature under the influence of alcohol (한글서명의 알콜 섭취에 의한 외형 변화율에 대한 연구)

  • Roh, Seung-Chan;Park, Sung-Woo;Kim, Jung-Ho
    • Analytical Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.607-614
    • /
    • 2010
  • Handwriting identifications are often faced with difficulties in evaluating handwriting by persons under the influence of alcohol. Cerebellar dysfunction is associated with deficits in the control of movement extent, as well as changes in the amplitude and relative amounts of acceleration and deceleration and action tremor. Although numerous articles are available on the subject of alcohol influence on handwriting quality, most of them were based on empirical data such as experience method, without any statistical evaluation. In this study, Hangul signature giyeok and nieun of consonant were measured in samples of handwriting. The result of this study can be used as a basic data of comparison on handwriting by identifying consistency of features and relative individualization of.

A Study on a Violence Recognition System with CCTV (CCTV에서 폭력 행위 감지 시스템 연구)

  • Shim, Young-Bin;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • With the increased frequency of crime such as assaults and sexual violence, the reliance on CCTV in arresting criminals has increased as well. However, CCTV, which should be monitored by human labor force at all times, has limits in terms of budget and man-power. Thereby, the interest in intelligent security system is growing nowadays. Expanding the techniques of an objects behavior recognition in previous studies, we propose a system to detect forms of violence between 2~3 objects from images obtained in CCTV. It perceives by detecting the object with the difference operation and the morphology of the background image. The determinant criteria to define violent behaviors are suggested. Moreover, provable decision metric values through measurements of the number of violent condition are derived. As a result of the experiments with the threshold values, showed more than 80% recognition success rate. A future research for abnormal behaviors recognition system in a crowded circumstance remains to be developed.

A Study on Recognition of New Car License Plates Using Morphological Characteristics and a Fuzzy ART Algorithm (형태학적 특징과 퍼지 ART 알고리즘을 이용한 신 차량 번호판 인식에 관한 연구)

  • Kim, Kwang-Baek;Woo, Young-Woon;Cho, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.273-278
    • /
    • 2008
  • Cars attaching new license plates are increasing after introducing the new format of car license plate in Korea. Therefore, a car new license plate recognition system is required for various fields using automatic recognition of car license plates, automatic parking management systems and arrest of criminal or missing vehicles. In this paper, we proposed an intelligent new car license plate recognition method for the various fields. The proposed method is as follows. First of all, an acquired color image from a surveillance camera is converted to a gray level image and binarized by block binarization method. Second, noises of the binarized image removed by morphological characteristics of cars and then license plate area is extracted. Third, individual characters are extracted from the extracted license plate area using Grassfire algorithm. lastly, the extracted characters are learned and recognized by a fuzzy ART algorithm for final car license plate recognition. In the experiment using 100 car images, we could see that the proposed method is efficient.

  • PDF

전자금융 침해사고 예방 및 대응 강화 방안

  • Lee, Jung-Ho
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.1-20
    • /
    • 2008
  • 편리한 금융거래 수단으로써 인터넷뱅킹을 포함한 전자금융 서비스가 생활화 되었으며 그 중요성 또한 갈수록 증가하고 있다. 이에 대한 부작용으로서 사용자의 실수나 금융기관, 쇼핑몰, 포털 등의 해킹을 통한 전자금융 접근매체의 유출, 비정상적인 지불결제나 인터넷뱅킹 이체 사고 등 침해사고 또한 함께 증가하고 있다. 금융권은 금융감독원을 중심으로 전자금융 종합보안 대책 수립(2005년) 및 전자금융거래법 시행(2007년) 등을 통해 고객 PC의 해킹방지를 위한 다양한 보안프로그램 제공 의무화, 보안등급에 따른 이체한도 차등화, 금융권 통합 OTP 인증체계 구축 등 전자금융 침해사고 예방을 위한 적극적인 노력을 기울여오고 있으나, 최근 들어 피싱/파밍 등 신종 사이버사기 기법이나 해외의 전문 해커에 의해 개발된 고도의 지능화된 해킹툴이 사용되어 보안프로그램을 무력화시킨 후 고객정보를 유출해가거나 일반 포털사이트, 웹하드, 웹메일 등의 해킹을 통해 인터넷 사이트에 등록된 고객의 인터넷뱅킹 접근 매체를 유출하여 인터넷뱅킹 침해 사고를 일으키는 등의 신종 침해사고를 완벽히 차단하지는 못하고 있어, 더욱 강력한 전자금융 침해사고 예방 통제 방안의 수립과 함께 침해사고 발생 시 원인 파악 및 범인 검거를 위한 역추적 시스템의 구축 등 기존 보안체계를 대폭 강화할 필요성이 발생하고 있다. 본 연구에서는 시중 은행의 인터넷뱅킹 침해사고 발생 현황 조사를 중심으로 최근 발생한 전자금융 침해사고의 추이분석, 침해사고 주요 원인과 기존 대응 체계의 현황, 한계점 등을 파악하였다. 그리고 전자금융 침해사고의 효과적인 예방 및 대응 강화 방안으로서 사용자 관점에서 공인인증서를 중심으로 한 전자금융 접근매체의 관리 강화 방안을 제안하였으며, 전자금융 서비스를 제공하는 금융 기관 관점에서 효과적인 전자금융거래 로깅 및 역추적 시스템의 구축 및 전체 금융기관과 감독기관 간의 유기적인 공조를 기반으로 한 침해사고 공동 대응체계의 구축 및 운영을 위한 시스템의 구성 방법, 운영 프로세스, 관련 법률의 검토 및 대응 방법 등을 제안하였다.

The System of Arresting Wanted Vehicles for Violent Crimes for Public Safety (국민안전을 위한 강력범죄 수배차량 검거시스템)

  • Ji, Moon-Se;Ki, Heajeong;Ki, Chang-Min;Moon, Beom-Seob;Park, Sung-Geon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1762-1769
    • /
    • 2021
  • The final goal of this study is to develop a system that can analyze whether a wanted vehicle is a criminal vehicle from images collected from black boxes, smartphones, CCTVs, and so on. Data collection was collected using a self-developed black box. The used data in this study has used a total of 83,753 cases such as the eight vehicle types(truck, RV, passenger car, van, SUV, bus, sports car, electric vehicle) and 434 vehicle models. As a result of vehicle recognition using YOLO v5, mAP was found to be 80%. As a result of identifying the vehicle model with ReXNet using the self-developed black box, the accuracy was found to be 99%. The result was verified by surveying field police officers. These results suggest that improving the accuracy of data labeling helps to improve vehicle recognition performance.

A Study on the Analysis of Fraud Crime Types according to NFT Transactions (NFT 거래에 따른 사기범죄 유형 분석에 관한 연구)

  • HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.908-915
    • /
    • 2023
  • Purpose: The purpose of this study is to examine the types of fraudulent crimes among various crimes taking place during NFT transactions, and to approach institutional problems caused by crime types analysis and crackdown methods and legal limitations. Method: IIn order to classify the types of fraudulent crimes that appear in NFT transactions, the crime types were analyzed through the results of previous studies and cases of current incidents. Result: Most of the crimes that are taking place through NFTs are various types of fraudulent crimes such as rug pools, thefts, personal information theft fraud, and pig murder. Therefore, these types were classified and various damage cases were also analyzed. It is a matter of copyright. Conclusion: Currently, the financial problems caused by the occurrence of fraudulent crimes in NFTs worldwide are the most worrisome, and the scale will be even greater as the market grows in the future. Therefore, in Korea, various institutional supplements and policies should be prepared through analysis of crime types that can affect crime prevention and investigation and arrest activities.

Review on the Cooperative Policing System in Japan (일본의 민경협력치안제도에 대한 고찰 및 시사점)

  • Kim, Gyoo-Sik;Choi, Eung-Ryul
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.29-55
    • /
    • 2013
  • In modern society, citizen's expectation about policing levels have been rising over time and it limited resources of the police to deal with the security services are insufficient. Until now, the state monopoly of the police activity was changing to subject of a variety in cooperation with public security system. The citizens considers community not the destination to police enforce the law but space for effective policing partners. Japanese police focus on cooperation oriented policing to strengthen the police and local residents with crime prevention for a long time. Also, the community through a variety of problem-solving policing activities to identify problems such as anxiety and anguish of the people. The legal basis for cooperative policing activity is that Nagaoka city crime prevention regulation in 1979. In recent years, Tokyo local government legislated the safe town development regulations(東京都安全 安心まちづくり條例) and set up the hot-spot area to promote the safety of public facilities. Cooperative policing not police intervention for crime prevention but national policy for the city reclamation in Japan. Police as well as the Ministry of Land and Transport, Ministry of Justice, Ministry of Education, Prime Minister and all government departments thread safe city, crime prevention, and has been working to make the safe city. Japan's cooperative policing is a system that receives the most attention and greater implications.

  • PDF

Police knighthood introduction and training the realities -Taekwondo's introduction- (경찰 무도의 교육훈련 실태조사 - 태권도 교육 중심으로 -)

  • Oh, Jeong-Soo
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.259-277
    • /
    • 2007
  • The results of realities of the Taekwondo training in Korea National Police University, Police Comprehensive Academy, National Central Police Academy, and police stations and of realities of the Taekwondo blackbelt holders are as below. 1. The Taekwondo training time of Korea National Police University is 4 hours per week for freshmen and 2 hours per week for sophomores, juniors, and seniors. 2. The Taekwondo training of Police Comprehensive Academy is basis for police lieutenants and sergeants. time for Taekwondo training is not allotted in the education course but only allotted as a liberal everyday exercise. In the chivalry master course, 71% of the course composes of basic policeman and on-site arrest techniques and pliceman chilvary such as Taekwondo, and judo. The cadets must select one item among the policeman chivalry and take Taekwondo training for 150 hours during 52 weeks acquire the first grade to be appointed as lieutenant simultaneously with the graduation. 3. The Taekwondo training for newly appointed policemen of National Central Police Academy is 104 hours of arresting criminals and self-protection. 4. In the Taekwondo training in the police stations, when a master completes more than two times of training per month, he receives the first grade by examination and be promoted by one grade each. 5. The policemen with Taekwondo black belt are more than 2.6 times of judo, 4.6 times of fencing, 5.9 times of hapgido.

  • PDF

Moth (Lepidoptera) Fauna of Golf Courses in Jinju, Gyeongsangnamdo, Korea (경남 진주지역 골프장의 나방상 연구)

  • Kim, Jong-Ju;Lee, Suk-Jun;Jung, Young-Hak;Lee, Sang-Myeong;Choo, Ho-Yul;Lee, Dong-Woon
    • Asian Journal of Turfgrass Science
    • /
    • v.25 no.1
    • /
    • pp.30-42
    • /
    • 2011
  • Moths were collected to survey turfgrass pest and to compare species diversity from Jinju Country Club in Jinju, Gyeongsangnamdo, Korea, every 10 days using 200W mercury light trap from middle May to late October in 2008. As the results, only 23 individuals of Pseudaletia separata, Spodoptera depravata, Spodoptera litura, Agrotis segetum, and Agrotis ipsilon were collected as turf grass insect pests. However, 2028 individuals of 388 species in 22 families were collected in total. Dominant species was Culcula panterinaria, Fentonia ocypete, Hypsopygia regina, Culcula panterinaria, Flavocrambus striatellus, and Diarsia camescens in May, June, July, August, September and October, respectively. Species diversity was not different between two surveyed sites, but different among surveyed time. Species richness was more higher in hole 11 (Hole was surrounded by natural forest and located near pond) than hole 15 (Hole was located at the top part of mountain). Dominance index of moth was increased from October compared with diverse index and richness index were decreased from October. A large number of species and individuals were recorded in Noctuidae (502 individuals in 131 species), Geometridae (491 individuals in 84 species), Pyralidae (386 individuals in 73 species), and Notodontidae (277 individuals in 25 species). These four families were 80.9% out of all the collected species.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF