• Title/Summary/Keyword: 범죄화 분석

Search Result 167, Processing Time 0.029 seconds

Correlation between Narrative Space and Dramatic Immersion - Concentrating on - (내러티브 공간과 극적몰입의 상관관계연구 - <시카리오>를 중심으로 -)

  • Mun, Jung-Mi
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.2
    • /
    • pp.101-110
    • /
    • 2019
  • Filmic spaces are not only a core expressive factors that can embody both internal and external meanings of films, but also play an important role for initiating dramatic context in terms of narratives. They establish visible environment in which provocative incidents occur and characters' behaviors are induced, include characters' psychology or emotional meanings of narratives and provoke tensions through symbolic meanings and the implicit function of surface background. This paper, therefore, analyzes the film, , by focusing on the dramatic function of narrative space. This film provides insights and thoughts through deep philosophical reflection, by escaping from the convention of such a genre, through deep philosophical reflection, by escaping from the convention of such a genre, though it belongs seemingly to the crime thriller genre using Mexico's drug cartel as it main material. In the film, narrative spaces are responsible for emotions invoking dramatic tensions beyond provocative incidents and the elaborately planned and controlled mise-en-scene absorbed audiences' attention by organizing ultimate suspense. In conclusion, flow and dramatic lingering imagery of this film might be achieved by power of scenes rather than plot factors. This study thus explained the correlation between narrative spaces and dramatic immersion, by analyzing spaces appearing in and visualized construction. It is hoped that this will further extends the pattern of researches on dramatic immersion, which have been primarily focused on plots and characters.

Analysis of the Case with Serial Killer Young Cheol Yoo (유영철 연쇄살인사건 분석)

  • Lee, Jin-Dong;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.32-51
    • /
    • 2007
  • Serial violent crimes have occurred more frequently. Additional attention is paid to relevant areas in which discussions has also increased. This study analyzed Young-cheol Yoo, serial killer case. Two of Yoo's crimes were studied for modus operandi. The cases selected were the premeditated break-in homicide of upper-class elderly people and the impulsive homicide of the Hwanghak-Dong street vendor. Crime motives, targets, times, places, means and methods were analyzed. Profiling techniques in Young-cheol Yoo cases were evaluated and the problems discovered during investigation were discussed. The followings are the findings of the analysis of the serial killer Yoo cases. Yoo exhibited a hatred toward the rich, the elderly, and women as well as a fear of diseases and death. Yoo's crime targets were the elderly residing in wealthy houses, street vendors and prostitutes. The numbers of victims were: 3 men and 5 women victims in 4 homicide cases involving the elderly residents in wealthy houses; one man in 1 street vendor homicide case 11 women in 11 prostitute homicide cases, so total 20 persons were murdered in 16 cases. The time of the crimes were between 10 am and noon in the homicide cases of the elderly and very late at night or early in the morning in the prostitute homicide cases. Means and methods facilitated include the use of a knife as a threat and a hammer made by Yoo to strike the head and face of victims. In the homicide cases involving the elderly, he attempted to disguise the crime scene as a burglary or committed arson to destroy the evidence; in the prostitute homicide cases, bodies were mutilated and buried in secret. 1) Generally each serial killer case has different characteristics, motives, and purposes; while some serial killer cases involve similar methods, others use different methods. Unlike other crimes, serial killers' characteristics and tastes are very different, so it is difficult to explain serial killings based on a specific model. It is important to accurately capture modus operandi of each serial killing and for detectives to familiarize themselves with them. The process of tracing and use of imagination which follows a serial killer's psychology and thought must be used to find out what kind of thoughts pushed the killer to commit the crime. In order to investigate and research difficult subjects such as serial killing, various methods, skills, and relevant knowledge should be studied, and institutional endeavors should go hand in hand with individual efforts.

  • PDF

Detecting Weak Signals for Carbon Neutrality Technology using Text Mining of Web News (탄소중립 기술의 미래신호 탐색연구: 국내 뉴스 기사 텍스트데이터를 중심으로)

  • Jisong Jeong;Seungkook Roh
    • Journal of Industrial Convergence
    • /
    • v.21 no.5
    • /
    • pp.1-13
    • /
    • 2023
  • Carbon neutrality is the concept of reducing greenhouse gases emitted by human activities and making actual emissions zero through removal of remaining gases. It is also called "Net-Zero" and "carbon zero". Korea has declared a "2050 Carbon Neutrality policy" to cope with the climate change crisis. Various carbon reduction legislative processes are underway. Since carbon neutrality requires changes in industrial technology, it is important to prepare a system for carbon zero. This paper aims to understand the status and trends of global carbon neutrality technology. Therefore, ROK's web platform "www.naver.com." was selected as the data collection scope. Korean online articles related to carbon neutrality were collected. Carbon neutrality technology trends were analyzed by future signal methodology and Word2Vec algorithm which is a neural network deep learning technology. As a result, technology advancement in the steel and petrochemical sectors, which are carbon over-release industries, was required. Investment feasibility in the electric vehicle sector and technology advancement were on the rise. It seems that the government's support for carbon neutrality and the creation of global technology infrastructure should be supported. In addition, it is urgent to cultivate human resources, and possible to confirm the need to prepare support policies for carbon neutrality.

Counterfeit Money Detection Algorithm based on Morphological Features of Color Printed Images and Supervised Learning Model Classifier (컬러 프린터 영상의 모폴로지 특징과 지도 학습 모델 분류기를 활용한 위변조 지폐 판별 알고리즘)

  • Woo, Qui-Hee;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.12
    • /
    • pp.889-898
    • /
    • 2013
  • Due to the popularization of high-performance capturing equipments and the emergence of powerful image-editing softwares, it is easy to make high-quality counterfeit money. However, the probability of detecting counterfeit money to the general public is extremely low and the detection device is expensive. In this paper, a counterfeit money detection algorithm using a general purpose scanner and computer system is proposed. First, the printing features of color printers are calculated using morphological operations and gray-level co-occurrence matrix. Then, these features are used to train a support vector machine classifier. This trained classifier is applied for identifying either original or counterfeit money. In the experiment, we measured the detection rate between the original and counterfeit money. Also, the printing source was identified. The proposed algorithm was compared with the algorithm using wiener filter to identify color printing source. The accuracy for identifying counterfeit money was 91.92%. The accuracy for identifying the printing source was over 94.5%. The results support that the proposed algorithm performs better than previous researches.

The Effect of working hours on fatigue and immune function in private security (시큐리티 종사자들의 근무시간이 피로도 및 면역기능에 미치는 영향)

  • Jung, Sung-Sook;Park, Jun-Seok;Jeon, Hee-Cheol;Lee, Young-Seok
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.121-134
    • /
    • 2009
  • The purpose of present study was to examine the effects of working time on fatigue and immune function in private security. The number of private guard on which this study has been conducted in 153, who work at large companies, medium or small companies and the like as located in Seoul and kyonggi. In this study blood T-lympocyte, Natural T-Killer cell and immunoglobulin(IgG, IgA and IgM) were measured to see the level of working hours. There was significant difference in Natural T-Killer cell and immunoglobulin(IgG, IgA and IgM) and fatigue between working hours(P<0.05). in view of the results of this study, it can be thought that fatigue and immune function is more affected by working hours In summary, these results are interpreted to mean that fatigue levels and immune function (Natural T-Killer cell, and immunoglobulin) decrease due to a rise in working hours.

  • PDF

Hiker Mobility Model and Mountain Distress Simulator for Location Estimation of Mountain Distress Victim (산악 조난자의 위치추정을 위한 이동성 모델 및 조난 시뮬레이터)

  • Kim, Hansol;Cho, Yongkyu;Jo, Changhyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.55-61
    • /
    • 2022
  • Currently police and fire departments use a Network/Wifi/GPS based emergency location positioning system established by mobile carriers to directly link with the device of the people who request the rescue to accurately position the expected location in the call area. However in the case of mountain rescue it is difficult to rescue the victim in golden time because the location of the search area cannot be limited when the victim is located in a radio shadow area of the mountain or the device power is off and this situation become worse if victim fail to report 911 by himself due to the injury. In this paper, we are expected to solve the previous problem by propose the mobile telecommunication forensic simulator consist of time series of cell information, human mobility model which include some general and specific features (age, gender, behavioral characteristics of victim, etc.) and intelligent infer system. The results of analysis appear in heatmap of polygons on the map based on the probability of the expected location information of the victim. With this technology we are expected to contribute to rapid and accurate lifesaving by reducing the search area of rescue team.

Implementation of Specific Target Detection and Tracking Technique using Re-identification Technology based on public Multi-CCTV (공공 다중CCTV 기반에서 재식별 기술을 활용한 특정대상 탐지 및 추적기법 구현)

  • Hwang, Joo-Sung;Nguyen, Thanh Hai;Kang, Soo-Kyung;Kim, Young-Kyu;Kim, Joo-Yong;Chung, Myoung-Sug;Lee, Jooyeoun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.49-57
    • /
    • 2022
  • The government is making great efforts to prevent crimes such as missing children by using public CCTVs. However, there is a shortage of operating manpower, weakening of concentration due to long-term concentration, and difficulty in tracking. In addition, applying real-time object search, re-identification, and tracking through a deep learning algorithm showed a phenomenon of increased parameters and insufficient memory for speed reduction due to complex network analysis. In this paper, we designed the network to improve speed and save memory through the application of Yolo v4, which can recognize real-time objects, and the application of Batch and TensorRT technology. In this thesis, based on the research on these advanced algorithms, OSNet re-ranking and K-reciprocal nearest neighbor for re-identification, Jaccard distance dissimilarity measurement algorithm for correlation, etc. are developed and used in the solution of CCTV national safety identification and tracking system. As a result, we propose a solution that can track objects by recognizing and re-identification objects in real-time within situation of a Korean public multi-CCTV environment through a set of algorithm combinations.

A Study on the Analysis and Efficiency of Police Budget (경찰의 예산분석 및 효율화 방안에 관한 연구)

  • Park, Jong-Seung;Kim, Chang-Yun
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.7-32
    • /
    • 2014
  • This study is aimed to analyze problems of police budgetary execution and to suggest better ways for establishing effective budget implementation as well as legitimacy of securing budget in the field of police work. For this purpose, this paper analyzed the annual reports on police budgetary execution, from 2009 to 2012, conducted by National Assembly Budget Office. In result, most parts of the police budgetary execution were not satisfied with the audit standard, and especially in terms of management of budgetary execution, it showed 40% in inappropriateness. In addition, excessive and underestimate appropriation in the police budgetary execution, which happened frequently in other offices, was recorded on the second place. 10% of the amount of budget was executed for ordinance violence. Given results analyzed from each division, Transportation Division occupied 40% of the amount of related problems and all of types in the field did not meet the audit standard, thus it is required to manage budgetary execution effectively. In terms of Public Safety Division, the problem was related to budgetary allocation prior to execution, such as overlap in other works, excessive and underestimate appropriation, and inappropriate business plans. Director General for Planning and Coordination did not meet the standard of law system maintenance, Given the light of the result of analyzing programs, traffic safety and securing communication was the most problematic and support for police administration, crime prevention and protecting the disadvantaged, educating professional police officers, and establishment of policing infrastructure were required to be reformed in sequence. In order to resolve these problems, it is demanded to check budgetary execution and the process in business plans on a regular basis. Additionally, in case of using budget in inappropriate parts, tough penality including reduction of budget in related to the local police should be implemented to increase the importance of budgetary execution. Moreover, because of the fact that a part of problem of budgetary execution was originally caused by the budgetary allocation, it is advised to allocate police budget using the budget proposal of National Finance Act and Ministry of Strategy and Finance.

  • PDF

A Study on the Legislative Conception of Terror of the Advanced European Nations (유럽 선진국의 법제적 테러 개념에 관한 고찰)

  • Kwon, Jeong-Hun;Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.29-50
    • /
    • 2008
  • Many countries throughout the world have enacted laws on terrorism in the light of the changes that time has brought to them, geographical features, cultural values, and environmental elements. Especially some advanced European nations prescribe the definition of terrorism, the purpose of terrorism, the behavior of terrorism, and the types of crimes related to terrorism and so on for the following reason that it is more vital for the authorities concerned to investigate and punish terrorists after the rise of terrorism. In this regard, this paper analyzes legislative countermoves against terrorists of advanced countries such as France, Germany, and England and through this sheds light on the need of future anti-terrorism bills. The legislative basic guidelines directly to manipulate future terrors based on theories derived from this study could be summarized as follows. In the first place, providing laws on direct investigative power and harsher punishment to those involved in terrorism is a prerequisite for social security and thus the presidential directive of the state anti-terrorism action guidelines just deals with administrative measures without any effective response to terrorism. Hence it is urgent to make anti-terrorism bill concerning investigation and punishment of terrorists. In the second place, it is associated with the objectives of terror. The expression "all sorts of" stated in Korean law is so quite unclear that it can not fulfill the required conditions for naming it "crime". Comprehending provisoes of the crime that meets the purpose of the terrorists is necessary in order to investigate and inflict punishment on them. Therefore, it is advisable to establish specific and precise principles such as political, social, ideological, and religious purpose of terrorists in the bill. In the third place, to meet the flow of times of technicalization, informatization, such provisoes as destruction of electronic data system, crimes related to nuclear materials, purchases of weapons by terrorists, tax administration for prohibition of sale, and arson should be considered in terror bill. In the fourth place, nonselective attack toward unspecified individuals has become a serious issue in our society. Terrorists leave poisonous foods or beverages to crowded place or dump toxic chemicals into river intentionally. Therefore more strict regulations must be included in terror bill to prevent possible terrorist attacks.

  • PDF

Research on the Level Evaluation Model of the Organization Research Security (조직의 연구보안 수준평가 모형 연구)

  • Na, Onechul;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.3
    • /
    • pp.109-130
    • /
    • 2020
  • Recently, the importance of research and development for technological innovation is increasing. The rapid development of research and development has a number of positive effects, but at the same time there are also negative effects that accelerate crimes of information and technology leakage. In this study, a research security level measurement model was developed that can safely protect the R&D environment conducted at the organizational level in order to prepare for the increasingly serious R&D result leakage accident. First, by analyzing and synthesizing security policies related to domestic and overseas R&D, 10 research security level evaluation items (Research Security Promotion System, Research Facility and Equipment Security, Electronic Information Security, Major Research Information Security Management, Research Note Security Management, Patent/Intellectual Property Security Management, Technology Commercialization Security Management, Internal Researcher Security Management, Authorized Third Party Researcher Security Management, External Researcher Security Management) were derived through expert interviews. Next, the research security level evaluation model was designed so that the derived research security level evaluation items can be applied to the organization's research and development environment from a multidimensional perspective. Finally, the validity of the model was verified, and the level of research security was evaluated by applying a pilot target to the organizations that actually conduct R&D. The research security level evaluation model developed in this study is expected to be useful for appropriately measuring the security level of organizations and projects that are actually conducting R&D. It is believed that it will be helpful in establishing a research security system and preparing security management measures. In addition, it is expected that stable and effective results of R&D investments can be achieved by safely carrying out R&D at the project level as well as improving the security of the organization performing R&D.