• Title/Summary/Keyword: 범죄화 분석

Search Result 167, Processing Time 0.031 seconds

Video Big Data Processing Scheme for Spatio-Temporal Analysis of Moving Objects (움직이는 물체의 시공간 분석을 위한 동영상 빅 데이터 처리 방안)

  • Jung, Seungwon;Kim, Yongsung;Jung, Sangwon;Kim, Yoonki;Hwang, Eenjun
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.833-836
    • /
    • 2017
  • 최근 블랙박스 및 CCTV 같은 영상 촬영 장치가 보편화되면서, 방대한 양의 영상 데이터가 실시간으로 생성되고 있다. 만약 이 대용량 데이터 안의 차량 정보를 추출할 수 있다면 범죄 차량 추적, 교통 혼잡도 측정 등의 활용이 가능할 것이다. 이를 구현하기 위해서는 수많은 자동차에서 실시간으로 생성되는 영상 데이터를 처리할 수 있는 시스템이 필수적이나, 이러한 시스템을 찾기 힘든 것이 현실이다. 이를 위해 이 논문에서는 아파치 카프카, Hbase를 이용한 영상 빅데이터 처리 시스템을 제안한다. 아파치 카프카는 시스템 내에서 영상 손실이 없는 전송과 영상 처리 노드의 스케줄링을 수행하며, Hbase는 처리된 데이터를 테이블로 저장하고 사용자가 보낸 쿼리를 처리한다. 더불어, Hbase에 인덱스를 구성하여 빠른 쿼리 처리가 가능하도록 만든다. 실험 결과, 제안된 시스템은 인덱스가 없을 때보다 뛰어난 쿼리 처리 성능을 보이는 것을 확인할 수 있었다.

Research on Service Design of the Sharing Taxi Safety For Female Passengers in their 20s and 30s (20-30대 여성 승객을 위한 공유택시 안전 서비스디자인 연구)

  • YIN, JINGJING
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.325-326
    • /
    • 2019
  • 서비스화(servitization)와 공유경제 패러다임이 확산되면서 서비스 산업에서도 IT기술을 융합시킨 다양한 형태의 새로운 비즈니스가 성공적으로 정착되고 있다. 특히 대중교통 서비스 산업에서 우버(Uber) 택시는 IT기술과 공유경제 개념을 절묘하게 접목시킨 새로운 차원의 성공적인 공유택시 비즈니스 모델로 자리매김하였고, IT기술을 적용한 교통예약 소프트웨어는 공유택시의 차별적 경쟁우위를 확보하기 위한 중요한 수단이 되고 있다. 공유택시 예약 프로그램은 택시이용자에게 신속하고 편리함을 제공할 뿐만 아니라 에너지 절약, 교통체증으로 인한 스트레스 완화 등의 많은 사회적 혜택과 이익을 제공하고 있기 때문에, 여러 분야에서 다양한 연구가 진행되고 있다. 최근 중국에서는 보다 진보된 공유택시 예약 프로그램이 공유택시에 접목되면서 공유택시 이용객이 급히 증가하고 있으며, 이와 함께 공유택시 차별화에 핵심적인 역할을 하는 소프트웨어 시장의 경쟁도 가속화 되고 있다. 그러나, 이용객을 대상으로 강력범죄 발생빈도 증가와 이로 인한 부정적인 여론의 급속한 확산은 공유택시 산업발전에 심각한 방해요인이 되고 있지만, 근본적인 해결방법에 관한 연구는 미비한 실정이다. 따라서 본 연구는 공유택시 예약 프로그램에 이용객의 안전을 위한 컨텐츠 개발과 적용을 통해 공유택시 이용객의 불안해소와 공유택시 산업 발전에 기여할 수 있는 방법을 제안하고자 하였다. 연구방법은 중국현지의 공유택시 이용객을 대상으로 실증연구를 진행할 계획이며, 고객여정맵(CJM)과 Kano 분석을 통해 결과와 시사점을 도출할 계획이다.

  • PDF

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.

Forensic Investigation of External USB Drive (외장형 USB 저장장치의 포렌식 조사방법)

  • Song, Yu-Jin;Lee, Jae-Yong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.39-45
    • /
    • 2010
  • Because of portable storage device's technical improvement, it's speeding up the conversion of mass storage. It means it's easier to move and save data. Generally, USB is using for portable storage device and forensic perspective, it's possible us to study data drain through portable storage device under securement of using vestige of USB. If we can secure using vestige of USB from boot domain it's possible to investigate data drain & prove criminal act. This thesis is suggesting Key/Thumb drive & USB Drive Enclosure's confirmation of using or not and division way though Disk Signature analysis.

Block based Smart Carving System for Forgery Analysis and Fragmented File Identification

  • Lee, Hanseong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.93-102
    • /
    • 2020
  • In order for data obtained through all stages of digital crime investigation to be recognized as evidence capability, it must satisfy legal / technical requirements. In this paper, we propose a mechanism and implement software to provide digital forensic evidence by automatically recovering files by scanning / inspecting the unallocated area inside the storage disk block without relying on information provided by the file system. The proposed technique checks / analyzes the RAW disk data of the system under analysis in 512-byte block units based on information on the storage format / file structure of various files stored on the disk without referring to the file system-related information provided by the operating system. The file carving process was implemented, and a smart carving mechanism was proposed to intelligently restore deleted or damaged files in the storage device. As a result, we have provided a block based smart carving method to intelligently identify fragmented and damaged files in storage efficiently for forgery analysis on digital forensic investigation.

A Method of Comparing Risk Similarities Based on Multimodal Data (멀티모달 데이터 기반 위험 발생 유사성 비교 방법)

  • Kwon, Eun-Jung;Shin, WonJae;Lee, Yong-Tae;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.510-512
    • /
    • 2019
  • Recently, there have been growing requirements in the public safety sector to ensure safety through detection of hazardous situations or preemptive predictions. It is noteworthy that various sensor data can be analyzed and utilized as a result of mobile device's dissemination, and many advantages can be used in terms of safety and security. An effective modeling technique is needed to combine sensor data generated by smart-phones and wearable devices to analyze users' moving patterns and behavioral patterns, and to ensure public safety by fusing location-based crime risk data provided.

  • PDF

A Study on Analysis of National Petition Data for Deriving Current Issues in Education (교육관련 이슈 도출을 위한 국민청원 데이터 분석 연구)

  • Min, Jeongwon;Shim, Jaekwoun
    • Journal of Creative Information Culture
    • /
    • v.6 no.2
    • /
    • pp.57-64
    • /
    • 2020
  • As the information society gradually advances, various opinions overflow and their complexity increases. As the results, it was made more difficult to derive important issues and properly respond to those problems. Accordingly, it is necessary to get a handle on emerging problems in education in addition to existing discourses and issues. This study aimed at examining the issues of education by analyzing the petitions posted under 'parenting and education' category on National Petition board. In order to offer objective and detailed results, we employed the topic modeling based LDA algorithm, which is an effective method to extract topics in multiple documents. Nine topics were derived as the result of the analysis and the relationship among those topics was visualized. The values of this study exist in that the derived topics represent important issues that reflect the public opinions.

An Analysis on Anti-Drone Technology Trends of Domestic Companies Using News Crawling on the Web (뉴스 기사의 크롤링을 통한 국내 기업의 안티 드론에 사용되는 기술 현황 분석)

  • Kim, Kyuseok
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.458-464
    • /
    • 2020
  • Drones are being spreaded for the purposes such as construction, logistics, scientific research, recording, toy and so on. However, anti-drone related technologies which make the opposite drones neutralized are also widely being researched and developed because some drones are being used for crime or terror. The range of anti-drone related technologies can be divided into detection, identification and neutralization. The drone neutralization methods are divided into Soft-kill one which blocks the detected drones using jamming and Hard-kill one which destroys the detected ones physically. In this paper, Google and Naver domestic news articles related to anti-drone were gathered. Analyzing the domestic news articles, 8 of related technologies using RF, GNSS, Radar and so on were found. Regarding as this, the general features and usage status of those technologies were described and those on anti-drone for each company and agency were gathered and analyzed.

Suggestions for establishing a smart system to revitalize the local traditional market (지역 전통시장 활성화를 위한 지능형 시스템 구축 제언)

  • Lee, Junghun;Cho, Jungwon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.191-193
    • /
    • 2022
  • The advent of the 4th Industrial Revolution due to the trigger of digital technologies such as artificial intelligence and big data has caused many changes in society, culture, and industry. However, traditional markets in each region are not responding quickly to new distribution environments and consumer changes. In particular, in the case of traditional markets in Jeju, regional characteristics such as marketing strategies for tourists visiting Jeju have not been utilized. Therefore, this study proposes the establishment of a smart traditional market based on big data and artificial intelligence that utilizes the regional characteristics of Jeju. The research contents include customer profiling through visitor big data analysis, providing tourist movement results through traffic analysis, providing real-time popular product charts, and developing video-based fire and crime prevention functions.

  • PDF

Priority Scheduling of Digital Evidence in Forensic (포렌식에서 디지털 증거의 우선순위 스케쥴링)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2055-2062
    • /
    • 2013
  • Digital evidence which is the new form of evidence to crime makes little difference in value and function with existing evidences. As time goes on, digital evidence will be the important part of the collection and the admissibility of evidence. Usually a digital forensic investigator has to spend a lot of time in order to find clues related to the investigation among the huge amount of data extracted from one or more potential containers of evidence such as computer systems, storage media and devices. Therefore, these evidences need to be ranked and prioritized based on the importance of potential relevant evidence to decrease the investigate time. In this paper we propose a methodology which prioritizes order in which evidences are to be examined in order to help in selecting the right evidence for investigation. The proposed scheme is based on Fuzzy Multi-Criteria Decision Making, in which uncertain parameters such as evidence investigation duration, value of evidence and relation between evidence, and relation between the case and time are used in the decision process using the aggregation function in fuzzy set theory.