• Title/Summary/Keyword: 범죄유형

Search Result 184, Processing Time 0.026 seconds

The System of Arresting Wanted Vehicles for Violent Crimes for Public Safety (국민안전을 위한 강력범죄 수배차량 검거시스템)

  • Ji, Moon-Se;Ki, Heajeong;Ki, Chang-Min;Moon, Beom-Seob;Park, Sung-Geon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1762-1769
    • /
    • 2021
  • The final goal of this study is to develop a system that can analyze whether a wanted vehicle is a criminal vehicle from images collected from black boxes, smartphones, CCTVs, and so on. Data collection was collected using a self-developed black box. The used data in this study has used a total of 83,753 cases such as the eight vehicle types(truck, RV, passenger car, van, SUV, bus, sports car, electric vehicle) and 434 vehicle models. As a result of vehicle recognition using YOLO v5, mAP was found to be 80%. As a result of identifying the vehicle model with ReXNet using the self-developed black box, the accuracy was found to be 99%. The result was verified by surveying field police officers. These results suggest that improving the accuracy of data labeling helps to improve vehicle recognition performance.

Procedures of Coping with Each Type of Infringement using Live Forensic Technology (활성 포렌식 기술을 활용한 피해 유형별 침해사고 대응 절차 연구)

  • Yoon, Ju Hee;Kim, Mi Sun;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.69-78
    • /
    • 2016
  • As the development as the IT society accelerates, the frequency of terrorism from malignant codes and other cyber crimes is increasing. Malignant codes show various forms of attack according to the intentions of the attacker, and leaves behind digital evidences, not analog evidences when damages occur. Digital forensic, the procedure of collecting and analyzing digital evidence is one of the main factors that must be carried out when damages from malignant codes arise. However, there are the difficulties of not being able to preserve the integrity and authenticity in the procedure of coping witht infringements, which must be maintained in the digital forensic procedure. To complement such problems, this paper suggests the method of applying forensic by identifying the malignant code infringement incidents according to the type of damages.

Policing the police service quality, service satisfaction and life satisfaction relationship (경찰의 치안서비스품질과 서비스만족 및 생활만족의 관계)

  • Ahn, Dong Hyon;Kim, Chan Sun
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.71-81
    • /
    • 2014
  • The purpose of this research is to find out the relationship among the quality of service, the satisfaction of service and the satisfaction of life in public security of Police. This research made by Final Judgment based on Seoul Citizens living in Seoul as a focus group, total number of citizens for final analysis is 491. The research consists of 60 questionnaires shows frequency analysis, factor analysis, reliability analysis, multiple regression, path analysis by SPSSWIN 18.0 and reaches the following. The reliability of the survey showed a Cronbach's ${\alpha}$ value of over 0.607. results; First, the quality of service in public security of Police in fluences the satisfaction of service. Second, the quality of service in public security of Police in fluences the satisfaction of life. Third, the satisfaction of service in public security in fluences the satisfaction of life. Fourth, the quality of service in public security of Police in fluences the satisfaction of service in public security and the satisfaction of life directly and indirectly.

Improving the Biography Archive Service of Wikipedia (위키피디아 인물 아카이브 서비스 개선을 위한 분석 연구)

  • Choi, Sanghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.1
    • /
    • pp.447-467
    • /
    • 2018
  • Biographical information about people is usually collected and provided by a company or an institute which has a specific standard to select people for service. Recently, user oriented contents service like Wikipedia has started biographical information service, Wikipedia Biography Portal, in which users select people and freely describe about them. This study collected 500 biographical data from three categories of Wikipedia biography portal such as criminals, faculty, and directors. The contents of data from each category were analyzed with the word frequency and the divergence indicator to identify the characteristics of each category. As a result, divergency indicator is effective to represent the differential factors of each category. This study provides word clouds of top 100 word with divergence indicator and top 100 common words of three categories with word frequency as a guide for users to write about a person in these categories and for editors to accept and monitor the biography from users.

Micro-Geopolitics against the U.S. Forces in S. Korea: Local Problems Caused by the U.S. Military Bases and Strategies for their Resolution (주한미군의 미시적 지정학 - 미군기지로 인한 지역사회의 범죄 및 환경 문제의 발생과 해결방안 -)

  • Choi, Byung-Doo
    • Journal of the Korean association of regional geographers
    • /
    • v.9 no.3
    • /
    • pp.297-313
    • /
    • 2003
  • Problems caused by the U.S. military bases have attracted little attention until recently due to the national security of S.Korea and the peace of North-Eastern Asia, emphasized from the perspective of macro-geopolitics. However, since the political regime has been democratized and political discourses have been liberalized from the 1990s, those problems become a nation-widely serious social issue, though they have been brought about on the local areas. Thus, it can be suggested that micro-geopolitics is highly relevant and significant in approaching the local problems caused by the U.S. military bases, and ultimately resolving the macro-geopolitical problem of longstanding unfair relations in the SOFA and the withdrawal of U.S. troops. This paper aims to consider local problems caused by the U.S. military bases and resolving strategies from the perspective of micro-geopolitics. First of all, it discusses some significance of the micro-geopolitical perspective, as it has been recently emphasized in political geography in considering local problems and politics of life on the basis of place, then looks on empirically criminal and environmental problems caused by the U.S. military bases, analyses the questionnaire date on the perception of local dwellers around the military camps in Nam-gu Daegu, and finally suggests strategies to resolve those problems, which level up from the micro to the macro-scale of geopolitics.

  • PDF

Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention (사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 -)

  • Park, Sang-min;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.103-113
    • /
    • 2017
  • Cyber attacks can be classified by type of cyber war, terrorism and crime etc., depending on the purpose and intent. Those are mobilized the various means and tactics which are like hacking, DDoS, propaganda. The damage caused by cyber attacks can be calculated by a variety of categories. We may identify cyber attackers to pursue trace-back based facts including digital forensics etc. However, recent cyber attacks are trying to induce confusion and deception through the manipulation of digital information or even conceal the attack. Therefore, we need to do the harm-based analysis. In this paper, we analyze the damage caused during cyber attacks from economic and political point of view and by inferring the attack intent could classify types of cyber attacks.

Multinational Enforcement of the Capital Markets Act - Focusing on the Anti-Fraud Regulation by the Public Regulators - (다국적 차원의 자본시장법규 집행 - 공적기관에 의한 불공정거래 규제를 중심으로 -)

  • Chang, Kun-Young
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.419-454
    • /
    • 2017
  • Faced with the internationalization of capital markets, Korea needs to protect its investors and markets by applying the relevant laws extraterritorially. The Financial Investment Services and Capital Markets Act ("Capital Markets Act") explicitly introduced a new provision recognizing the extraterritoriality of the Act. While Article 2 of the Capital Markets Act comprehensively provides for prescriptive extraterritorial jurisdiction, the enactment of extraterritoriality alone does not guarantee that the Act will apply to cross-border transactions effectively. The effective extraterritorial application of an act is inseparable from the adjudicative and enforcement jurisdiction of the act. Specifically, active investigations and detections by the public regulators might be the first step for enforcing the Capital Markets Act. Unlike domestic regulations, however, multinational enforcement actions outside a regulator's home country becomes more problematic because of various obstacles. This Article examines difficulties which domestic regulators may confront in enforcing the Capital Markets Act extraterritorially and makes several recommendations for more effective multinational enforcement as follows. First, the Korean regulators should continue to foster cooperation through the IOSCO and provide international markets with the information and tools necessary for successful regulation of cross-border transactions. Second, the principle of dual criminality should be applied in a modified form for the effective mutual legal assistance in criminal matters. Third, there should be a legal device for the domestic regulator to freeze foreign wrongdoer's assets located outside Korea to repatriate those assets for distribution to defrauded investors in Korea.

A Pattern Matching Method of Large-Size Text Log Data using In-Memory Relational Database System (인메모리 관계형 데이터베이스 시스템을 이용한 대용량 텍스트 로그 데이터의 패턴 매칭 방법)

  • Han, Hyeok;Choi, Jae-Yong;Jin, Sung-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.837-840
    • /
    • 2017
  • 각종 사이버 범죄가 증가함에 따라 실시간 모니터링을 통한 사전 탐지 기술뿐만 아니라, 사후 원인 분석을 통한 사고 재발 방지 기술의 중요성이 증가하고 있다. 사후 분석은 시스템에서 생산된 다양한 유형의 대용량 로그를 기반으로 분석가가 보안 위협 과정을 규명하는 것으로 이를 지원하는 다양한 상용 및 오픈 소스 SW 존재하나, 대부분 단일 분석가 PC에서 운용되는 파일 기반 SW로 대용량 데이터에 대한 분석 성능 저하, 다수 분석가 간의 데이터 공유 불가, 통계 연관 분석 한계 및 대화형 점진적 내용 분석 불가 등의 문제점을 해결하지 못하고 있다. 이러한 문제점을 해결하기 위하여 고성능 인메모리 관계형 데이터베이스 시스템을 로그 스토리지로 활용하는 대용량 로그 분석 SW 개발하였다. 특히, 기 확보된 공격자 프로파일을 활용하여 공격의 유무를 확인하는 텍스트 패턴 매칭 연산은 전통적인 관계형 데이터베이스 시스템의 FTS(Full-Text Search) 기능 활용이 가능하나, 대용량 전용 색인 생성에 따른 비현실적인 DB 구축 소요 시간과 최소 3배 이상의 DB 용량 증가로 인한 시스템 리소스 추가 요구 등의 단점이 있다. 본 논문에서는 인메모리 관계형 데이터베이스 시스템 기반 효율적인 텍스트 패턴 매칭 연산을 위하여, 고성능의 대용량 로그 DB 적재 방법과 새로운 유형의 패턴 매칭 방법을 제안하였다.

Brief Overview of Deep Learning based Anomaly Detection for Smart Surveillance System (스마트 관제를 위한 딥러닝 기반 이상행동 기술 동향 분석)

  • Lee, Jiae;Mun, Sungchul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.11a
    • /
    • pp.14-16
    • /
    • 2019
  • 스마트관제 시스템은 딥러닝 서버내 학습된 백본 네트워크 모델이 실시간으로 스트리밍 되는 CCTV 영상으로부터 이상행동 패턴을 선별적으로 탐지하고 관제요원에게 전달하여, 사전에 사건사고를 예방하거나 즉시 대응 체계의 유연한 운영을 가능케하는 시스템이다. 최근 지능형 CCTV(Closed Circuit Television) 서비스가 일부 지역에 선별 관제의 형태로 시범적으로 운영되고 있는 상황이다. 지능형 시범서비스는 공공 영역에서 선별 CCTV 관제의 형태로 이상행동 상황을 즉각 인지하여 사건사고를 예방하거나 피해를 최소화하고자 하는 목적으로 주로 사용되고 있다. 그러나, 범죄 등의 특정 시나리오에만 한정해서도 이상 행동 유형이 너무나 다양하기 때문에 이상행동 영상의 사전분류(Annotation)를 통해 딥러닝 모델을 학습시키는 것이 현실적으로 어려운 상황이다. 따라서 본고에서는 최신 이상 행동 탐지(Anomaly detection) 알고리즘과 응용사례를 분석하여 실제 현장에 적용할 수 있는 현장 중심의 기법을 제안하고자 한다.

  • PDF

An Analysis on the Changes in ERP According to Type of Stimuli about Fear of Crime (범죄의 두려움에 대한 자극의 유형에 따른 ERP 변화 분석)

  • Kim, Yong-Woo;Kang, Hang-Bong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1856-1864
    • /
    • 2017
  • The ultimate goal of multimedia in bio-signal research is to approach multimedia contents through bio-signal. Hence it is important to interpret user's emotions by analyzing his or her bio-signals. In this paper, we construct ERP task of oddball component to analyze EEG signal between normal stimuli and fear stimuli and measure EEG during ERP task. The results from extracted ERP component show that there is a difference in N200 in visual stimuli, P300 in auditory stimuli, and N100 and P300. Moreover, there are larger changes in audiovisual stimuli, indicating that users recognize greater fear of crime when visual and auditory stimuli are simultaneously presented.