• Title/Summary/Keyword: Forensic Model

Search Result 116, Processing Time 0.025 seconds

Three-dimensional Crush Measurement Methodologies Using Two-dimensional Data (2차원 데이터를 활용한 3차원 충돌 변형 측정 방법)

  • Han, Inhwan;Kang, Heejin;Park, Jong-Chan;Ha, Yongmin
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.23 no.3
    • /
    • pp.254-262
    • /
    • 2015
  • This paper presents 3D collision deformation modelling methodologies using photogrammetry for reconstruction of vehicle accidents. A vehicle's deformation shape in collision provides important information on how the vehicle collided. So effective measurement(scanning) and construction of a corresponding appropriate model are essential in the analysis of collision deformation shape for obtaining much information related to collision accident. Two measurement methods were used in this study: Indirect-photogrammetry which requires relatively small amount of photos or videos, and direct-photogrammetry which requires large amount of photos directly taken for the purpose of 3D modelling. When the indirect-photogrammetry method, which was mainly used in this study, lacked enough photographic information, already secured 2D numerical deformation data was used as a compensation. This made 3D collision deformation modelling for accident reconstruction analysis possible.

Forensic Computing Model for Contents Protection on d-Commerce (디지털 상거래에서 컨텐츠 보호를 위한 법 적용 컴퓨팅 모델)

  • Hwang, Chul;Hwang, Dae-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.433-436
    • /
    • 2001
  • 지적 재산권 보호 중에서 디지털 상거래에서 가장 절실한 저작물 보호는 근래에 활발히 연구되고 있으며 법 과학 분야는 지문감식, 치아감정 DNA 등 많은 분야가 있다. 그러나 법과학 분야중 법적용 컴퓨팅(Forensic Computing)에 관한 응용은 아직 부족한 상태이다. 그중에도 디지털 저작물에 대하여 증거를 보전 하고자 많은 연구가 진행 되고 있지만 디지털 저작물에 관하여 네트워크를 통한 능동적 저작물 보호는 미약하다. 현재의 데이터 추출(Extraction), 발굴(Exploitation), 복구, 암호 해독, 패스워스 풀기(Defeat), 미러 이미징등의 방법 가지고 해결 못하는 경우와 인터넷 상에서 온라인으로 이루어지는 불법 복제에서 결정적 기여(smoking gun)를 찾아내려고 하는 것이 본 논문에서 해결 하고자 하는 부분이다. 오프라인일 경우도 가능하며 분석된 결과는 변호사/대리인, 법인, 보험회사, 법집행관등에게 온라인으로 제공한다. 진행 과정은 서버에서 파견시킨, 미션을 부여받은 에이전트가 저작물 불법 복제 상황을 트래킹 한 후, 네트워크를 통하여 정해진 시간별로 서버에 전달하면, 법 조항과 매핑시켜서 분석한 다음 서버의 지식베이스에 저장되어 사용자의 요구에 응하는 능동형 디지털 저작물 보호 관리 시스템이다.

  • PDF

A Study on the Digital Forensic Investigator Model using Privacy Protection Technology (개인정보보호 기술을 활용한 디지털 포렌식 수사 모델 연구)

  • Jang, hee-young;Park, koo-rack;Kim, jea-woong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2016.05a
    • /
    • pp.317-318
    • /
    • 2016
  • 급속한 현대사회의 정보화로 인하여 개인 정보에 대한 정보 유출 및 위협의 빈도가 높아지고 있는 상황에서 기존의 디지털 포렌식 수사 모델에서 사용하고 있는 해시 검색 프로세스는 개인정보 노출에 취약한 파일이 존재하고 있다. 이에 본 논문에서는 개인정보 노출 취약점 진단을 추가한 해시 검색 프로세스를 제안한다. 이를 통하여 정밀 조사와 일반 조사 대상을 정확하게 파악할 수 있을 것으로 기대된다.

  • PDF

A Study on the License Management Model for Secure Contents Distribution in Ubiquitous Environment (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.550-558
    • /
    • 2009
  • In ubiquitous environment, more small, lightweight, cheap and movable device is used than one device used in wired network environment. Multimedia service which is anytime, anywhere, is provided by device. However, it does not ensure the fair use of multimedia contents and causes damage to the contents providers because of illegal copy and distribution and indiscriminate use of digital contents. For solving this problems, DRM is applied to wired network but it has the problems does not protect stored license and manage license completely because of depending on simple protection such as device authentication and cryptographic algorithm. This paper proposes the license management model using digital forensic and DRM that prevents contents and licenses from distributing illegally and also enables the creation of evidence for legal countermeasure and the protection of license in whole life cycle.

  • PDF

Proteomic Analysis of a Rat Cerebral Ischemic Injury Model after Human Cerebral Endothelial Cell Transplantation

  • Choi, Tae-Min;Yun, Misun;Lee, Jung-Kil;Park, Jong-Tae;Park, Man-Seok;Kim, Hyung-Seok
    • Journal of Korean Neurosurgical Society
    • /
    • v.59 no.6
    • /
    • pp.544-550
    • /
    • 2016
  • Objective : Cerebral endothelial cells have unique biological features and are fascinating candidate cells for stroke therapy. Methods : In order to understand the molecular mechanisms of human cerebral endothelial cell (hCMEC/D3) transplantation in a rat stroke model, we performed proteomic analysis using 2-dimensional electrophoresis and matrix-assisted laser desorption/ionization time-of-flight mass spectrometry. Protein expression was confirmed by quantitative real-time PCR and Western blot. Results : Several protein spots were identified by gel electrophoresis in the sham, cerebral ischemia (CI), and CI with hCMEC/D3 treatment cerebral ischemia with cell transplantation (CT) groups, and we identified 14 differentially expressed proteins in the CT group. Proteins involved in mitochondrial dysfunction (paraplegin matrix AAA peptidase subunit, SPG7), neuroinflammation (peroxiredoxin 6, PRDX6), and neuronal death (zinc finger protein 90, ZFP90) were markedly reduced in the CT group compared with the CI group. The expression of chloride intracellular channel 4 proteins involved in post-ischemic vasculogenesis was significantly decreased in the CI group but comparable to sham in the CT group. Conclusion : These results contribute to our understanding of the early phase processes that follow cerebral endothelial cell treatment in CI. Moreover, some of the identified proteins may present promising new targets for stroke therapy.

Control Variables of Remote Joint Analysis Realization on the M2M Case

  • Lim, Sung-Ryel;Choi, Bo-Yun;Lee, Hong-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.98-115
    • /
    • 2012
  • New trend called ubiquitous leads the recent business by standardization and integration. It should be the main issue how to guarantee the integration and accountability on each business, especially in mission critical system which is mainly supported by M2M (Machine to Machine) control mechanism. This study is from the analysis of digital forensics case study that is from the M2M Sensing Control Mechanism problem of the "Imjin River" case in 2009, where a group of family is swept away to death by water due to M2M control error. The ubiquitous surroundings bring the changes in the field of criminal investigation to real time controls such as M2M systems. The needs of digital forensics on M2M control are increasing on every crime scene but we suffer from the lack of control metrics to get this done efficiently. The court asks for more accurately analyzed results accounting high quality product development design. Investigators in the crime scene need real-time analysis against the crime caused by poor quality of mission critical systems. It seems to be every need of Real-Time-Enterprise, so called ubiquitous society on the case. We try to find the efficiency and productivity in discovering non-functional design defects in M2M convergence products focusing on three metrics in study model with quick implementation. Digital forensics system in present status depends on know-how of each investigator and is hard to expect professional analysis on every field. This study set up a hypothesis "Co-working of professional investigators on each field will qualify Performance and Integrity" especially in mission critical system such as M2M and suggests "Online co-work analysis model" to efficiently detect and prevent mission critical errors in advance. At the conclusion, this study proved the statistical research that was surveyed by digital forensics specialists around M2M crime scene cases with quick implementation of dash board.

Regression model for the preparation of calibration curve in the quantitative LC-MS/MS analysis of urinary methamphetamine, amphetamine and 11-nor-Δ9-tetrahydrocannabinol-9-carboxylic acid using R (소변 중 메트암페타민, 암페타민 및 대마 대사체 LC-MS/MS 정량분석에서 검량선 작성을 위한 R을 활용한 회귀모델 선택)

  • Kim, Jin Young;Shin, Dong Won
    • Analytical Science and Technology
    • /
    • v.34 no.6
    • /
    • pp.241-250
    • /
    • 2021
  • Calibration curves are essential in quantitative methods and for improving the accuracy of analyte measurements in biological samples. In this study, a statistical analysis model built in the R language (The R Foundation for Statistical Computing) was used to identify a set of weighting factors and regression models based on a stepwise selection criteria. An LC-MS/MS method was used to detect the presence of urinary methamphetamine, amphetamine, and 11-nor-9-carboxy-Δ9 -tetrahydrocannabinol in a sample set. Weighting factors for the calibration curves were derived by calculating the heteroscedasticity of the measurements, where the presence of heteroscedasticity was determined via variance tests. The optimal regression model and weighting factor were chosen according to the sum of the absolute percentage relative error. Subsequently, the order of the regression model was calculated using a partial variance test. The proposed statistical analysis tool facilitated selection of the optimal calibration model and detection of methamphetamine, amphetamine, and 11-nor-9-carboxy-Δ9-tetrahydrocannabinol in urine. Thus, this study for the selection of weighting and the use of a complex regression equation may provide insights for linear and quadratic regressions in analytical and bioanalytical measurements.

A License Audit Model for Secure DRM Systems in IP-based Environments

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.253-260
    • /
    • 2010
  • Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.

A Study on Development of Digital Forensic Capability Evaluation Indices (디지털 포렌식 수준 평가 지표 개발에 관한 연구)

  • Park, Hee-il;Yoon, Jong-seong;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1153-1166
    • /
    • 2015
  • With the acceleration of information digitization caused by fast growth of Information Technology, the application of digital forensics has increased but it is underestimated because digital evidence is easy to forge. Especially, the evaluation of the reliability of digital forensics organization is judged only by judges domestically because there is no objective verification system or evaluation method of the capability of digital forensics organization. Therefore, the evaluation model and indices of the capability of digital forensics concentrated on the digital forensics organization, personnel, technology, facilities and the procedure in domestic justice system was presented in this research after reviewing the domestic and foreign evaluation method and the standard of the capability of digital forensics and information security. The standard for judicial evaluation of digital evidence and composition, management, evaluation of digital forensics organization would be presented based on this research.

Lack of Association of the Cyclooxygenase-2 Gene 8473T>C Polymorphism with Breast Cancer Risk: a Meta-analysis

  • Yang, Xi;Zhao, Fen;Li, Yue-Hua;Huang, Min;Huang, Ying;Yi, Cheng
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.22
    • /
    • pp.9693-9698
    • /
    • 2014
  • Background: Associations between the 8473T>C polymorphism (rs5275) in the cyclooxygenase-2 (COX-2) gene and breast cancer (BC) risk are still inconclusive and ambiguous. The aim of this meta-analysis was to comprehensively estimate the genetic risk of 8473T>C polymorphism in the COX-2 gene for BC. Materials and Methods: We searched PubMed, Web of Science, Medline, Chinese biomedical (CBM), Weipu, China national knowledge infrastructure (CNKI), and Wanfang databases, covering all publications (last search was updated on Aug 17, 2014). Statistical analyses were performed using Revman 5.3 and STATA 10.0 software. Results: A total of 6,720 cases and 9,794 controls in 12 studies were included in this study. The results indicated no significant associations between the 8473T>C polymorphism of the COX-2 gene and BC risk for the CC+TC vs TT model (pooled odds ratio (OR)=0.97, 95% confidence interval (CI)=0.90-1.03, and p=0.29). On subgroup analysis, we also found that subdivision on ethnicity among Caucasians, Asians and others also revealed no relationship with BC susceptibility. With the study design (CC+TC vs TT), no significant associations were found in either population-based case-control studies (PCC), or hospital-based case-control studies (HCC). Conclusions: This present meta-analysis suggests that the 8473T>C polymorphism in the COX-2 gene is not a conspicuous low-penetrant risk factor for developing BC.