• 제목/요약/키워드: Forensic Model

검색결과 116건 처리시간 0.021초

성인 머리모형 임팩터의 FE 모델 개발 (Development and Validation of FE Adult Headform Impactor for Pedestrian Protection)

  • 최지훈;박부창;김종선
    • 한국자동차공학회논문집
    • /
    • 제20권2호
    • /
    • pp.64-69
    • /
    • 2012
  • Head injury is one of the most common cause of deaths in car-to-pedestrian collisions. To reduce the severity of such injuries, many international safety committees have performed headform impact test for pedestrian protection. In this paper, an adult headform impactor model is developed based on the finite element (FE) method and validated through the numerical simulation. The skin material of headform impactor is known as polyvinyl chloride skin (PVC) and its material was assumed as viscoelastic. The viscoelastic parameters of headform skin are identified by a series of trial and error methods. The new developed FE adult headform impactor is verified by the drop test and FE JARI adult headform impactor provided by Madymo program.

법음성학에서의 오디오 신호의 위변조 구간 자동 검출 방법 연구 (An Automatic Method of Detecting Audio Signal Tampering in Forensic Phonetics)

  • 양일호;김경화;김명재;백록선;허희수;유하진
    • 말소리와 음성과학
    • /
    • 제6권2호
    • /
    • pp.21-28
    • /
    • 2014
  • We propose a novel scheme for digital audio authentication of given audio files which are edited by inserting small audio segments from different environmental sources. The purpose of this research is to detect inserted sections from given audio files. We expect that the proposed method will assist human investigators by notifying suspected audio section which considered to be recorded or transmitted on different environments. GMM-UBM and GSV-SVM are applied for modeling the dominant environment of a given audio file. Four kinds of likelihood ratio based scores and SVM score are used to measure the likelihood for a dominant environment model. We also use an ensemble score which is a combination of the aforementioned five kinds of scores. In the experimental results, the proposed method shows the lowest average equal error rate when we use the ensemble score. Even when dominant environments were unknown, the proposed method gives a similar accuracy.

Neutron activation analysis: Modelling studies to improve the neutron flux of Americium-Beryllium source

  • Didi, Abdessamad;Dadouch, Ahmed;Jai, Otman;Tajmouati, Jaouad;Bekkouri, Hassane El
    • Nuclear Engineering and Technology
    • /
    • 제49권4호
    • /
    • pp.787-791
    • /
    • 2017
  • Americium-beryllium (Am-Be; n, ${\gamma}$) is a neutron emitting source used in various research fields such as chemistry, physics, geology, archaeology, medicine, and environmental monitoring, as well as in the forensic sciences. It is a mobile source of neutron activity (20 Ci), yielding a small thermal neutron flux that is water moderated. The aim of this study is to develop a model to increase the neutron thermal flux of a source such as Am-Be. This study achieved multiple advantageous results: primarily, it will help us perform neutron activation analysis. Next, it will give us the opportunity to produce radio-elements with short half-lives. Am-Be single and multisource (5 sources) experiments were performed within an irradiation facility with a paraffin moderator. The resulting models mainly increase the thermal neutron flux compared to the traditional method with water moderator.

A Deep Learning Approach for Identifying User Interest from Targeted Advertising

  • Kim, Wonkyung;Lee, Kukheon;Lee, Sangjin;Jeong, Doowon
    • Journal of Information Processing Systems
    • /
    • 제18권2호
    • /
    • pp.245-257
    • /
    • 2022
  • In the Internet of Things (IoT) era, the types of devices used by one user are becoming more diverse and the number of devices is also increasing. However, a forensic investigator is restricted to exploit or collect all the user's devices; there are legal issues (e.g., privacy, jurisdiction) and technical issues (e.g., computing resources, the increase in storage capacity). Therefore, in the digital forensics field, it has been a challenge to acquire information that remains on the devices that could not be collected, by analyzing the seized devices. In this study, we focus on the fact that multiple devices share data through account synchronization of the online platform. We propose a novel way of identifying the user's interest through analyzing the remnants of targeted advertising which is provided based on the visited websites or search terms of logged-in users. We introduce a detailed methodology to pick out the targeted advertising from cache data and infer the user's interest using deep learning. In this process, an improved learning model considering the unique characteristics of advertisement is implemented. The experimental result demonstrates that the proposed method can effectively identify the user interest even though only one device is examined.

임상간호사의 개인정보보호 실천 영향요인: 개인정보보호법 지식, 옹호간호를 중심으로 (Factors Influencing Clinical Nurses' Practice of Personal Information Protection: Focusing on Knowledge of Personal Information Protection Law and Nursing Patient Advocacy)

  • 김동은;박완주
    • 임상간호연구
    • /
    • 제29권3호
    • /
    • pp.261-270
    • /
    • 2023
  • Purpose: This study aimed to identify the influence of knowledge of personal information protection law and nursing patient advocacy on practice of personal information protection among nurses. Methods: The subjects were 130 nurses who have worked for six months or more in the ward of the tertiary or general hospitals. Data were collected from February 20 to March 3, 2023. Results: Factors influencing practice of personal information protection were acting as an advocate (β=.32, p=.004), environmental and educational influences (β=.21, p=.040), knowledge of personal information protection law (β=.19, p=.013) and clinical experience for five years or more but less than ten years (β=.17, p=.036). The regression model showed an explanatory power of 34.0%. Conclusion: Acting as an advocate has the most effect on practice of personal information protection. To promote practice of personal information protection for nurses, it is necessary to provide education related to privacy protection and encourage nursing patient advocacy.

해양변사자 신원확인을 위한 해양경찰의 인체유래물 보관사업 모델제시 (Korea Coast Guard's Human Biological Materials Storage Project for Identifying Bodies Recovered from the Sea: A Model Suggestion)

  • 주현정;추민규;백윤기;김남율;최아진;임선영;이종남;김형규;이한성
    • 해양환경안전학회지
    • /
    • 제24권2호
    • /
    • pp.171-178
    • /
    • 2018
  • 해양경찰은 바다라는 극한 환경에서 임무수행 중 빈번히 사망 실종의 위험에 맞닥뜨린다. 사고 발생 시 신속한 신원확인을 위해 해양경찰연구센터는 해양경찰을 대상으로 DNA를 이용한 신원확인 시스템을 구축하였으며 사체가 발견되지 않을 경우를 대비해 국립묘지 안장이 가능한 장치 또한 마련하였다. 순직 실종 등 대비 신원확인용 인체유래물 보관사업 운영규칙에 따라 인체유래물의 관리, 보관, 폐기, 품질검사가 진행되며 이는 관리위원회의 감시 하에 행해진다. 한반도 해역에서는 매년 700여건의 해양 변사자가 발생하는데 사체가 늦게 발견되어 부패가 심하거나, 일부분만 발견되어 지문 또는 치아로 개인 식별이 불가능할 경우 해양 변사자의 신원확인을 위한 방법이 필요하다. 해양경찰연구센터가 운영중인 '인체유래물 보관사업'을 해양 수산 종사자, 관련 연구자, 해양 레저인에게까지 확대 실행한다면 해양 변사자 신원확인에 큰 도움이 될 것이다.

New prediction equations for the estimation of maxillary mandibular canine and premolar widths from mandibular incisors and mandibular first permanent molar widths: A digital model study

  • Shahid, Fazal;Alam, Mohammad Khursheed;Khamis, Mohd Fadhli
    • 대한치과교정학회지
    • /
    • 제46권3호
    • /
    • pp.171-179
    • /
    • 2016
  • Objective: The primary aim of the study was to generate new prediction equations for the estimation of maxillary and mandibular canine and premolar widths based on mandibular incisors and first permanent molar widths. Methods: A total of 2,340 calculations (768 based on the sum of mandibular incisor and first permanent molar widths, and 1,572 based on the maxillary and mandibular canine and premolar widths) were performed, and a digital stereomicroscope was used to derive the the digital models and measurements. Mesiodistal widths of maxillary and mandibular teeth were measured via scanned digital models. Results: There was a strong positive correlation between the estimation of maxillary (r = 0.85994, $r^2=0.7395$) and mandibular (r = 0.8708, $r^2=0.7582$) canine and premolar widths. The intraclass correlation coefficients were statistically significant, and the coefficients were in the strong correlation range, with an average of 0.9. Linear regression analysis was used to establish prediction equations. Prediction equations were developed to estimate maxillary arches based on $Y=15.746+0.602{\times}sum$ of mandibular incisors and mandibular first permanent molar widths (sum of mandibular incisors [SMI] + molars), $Y=18.224+0.540{\times}(SMI+molars)$, and $Y=16.186+0.586{\times}(SMI+molars)$ for both genders, and to estimate mandibular arches the parameters used were $Y=16.391+0.564{\times}(SMI+molars)$, $Y=14.444+0.609{\times}(SMI+molars)$, and $Y=19.915+0.481{\times}(SMI+molars)$. Conclusions: These formulas will be helpful for orthodontic diagnosis and clinical treatment planning during the mixed dentition stage.

Median Filtering Detection of Digital Images Using Pixel Gradients

  • RHEE, Kang Hyeon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제4권4호
    • /
    • pp.195-201
    • /
    • 2015
  • For median filtering (MF) detection in altered digital images, this paper presents a new feature vector that is formed from autoregressive (AR) coefficients via an AR model of the gradients between the neighboring row and column lines in an image. Subsequently, the defined 10-D feature vector is trained in a support vector machine (SVM) for MF detection among forged images. The MF classification is compared to the median filter residual (MFR) scheme that had the same 10-D feature vector. In the experiment, three kinds of test items are area under receiver operating characteristic (ROC) curve (AUC), classification ratio, and minimal average decision error. The performance is excellent for unaltered (ORI) or once-altered images, such as $3{\times}3$ average filtering (AVE3), QF=90 JPEG (JPG90), 90% down, and 110% up to scale (DN0.9 and Up1.1) images, versus $3{\times}3$ and $5{\times}5$ median filtering (MF3 and MF5, respectively) and MF3 and MF5 composite images (MF35). When the forged image was post-altered with AVE3, DN0.9, UP1.1 and JPG70 after MF3, MF5 and MF35, the performance of the proposed scheme is lower than the MFR scheme. In particular, the feature vector in this paper has a superior classification ratio compared to AVE3. However, in the measured performances with unaltered, once-altered and post-altered images versus MF3, MF5 and MF35, the resultant AUC by 'sensitivity' (TP: true positive rate) and '1-specificity' (FN: false negative rate) is achieved closer to 1. Thus, it is confirmed that the grade evaluation of the proposed scheme can be rated as 'Excellent (A)'.

A review of ground camera-based computer vision techniques for flood management

  • Sanghoon Jun;Hyewoon Jang;Seungjun Kim;Jong-Sub Lee;Donghwi Jung
    • Computers and Concrete
    • /
    • 제33권4호
    • /
    • pp.425-443
    • /
    • 2024
  • Floods are among the most common natural hazards in urban areas. To mitigate the problems caused by flooding, unstructured data such as images and videos collected from closed circuit televisions (CCTVs) or unmanned aerial vehicles (UAVs) have been examined for flood management (FM). Many computer vision (CV) techniques have been widely adopted to analyze imagery data. Although some papers have reviewed recent CV approaches that utilize UAV images or remote sensing data, less effort has been devoted to studies that have focused on CCTV data. In addition, few studies have distinguished between the main research objectives of CV techniques (e.g., flood depth and flooded area) for a comprehensive understanding of the current status and trends of CV applications for each FM research topic. Thus, this paper provides a comprehensive review of the literature that proposes CV techniques for aspects of FM using ground camera (e.g., CCTV) data. Research topics are classified into four categories: flood depth, flood detection, flooded area, and surface water velocity. These application areas are subdivided into three types: urban, river and stream, and experimental. The adopted CV techniques are summarized for each research topic and application area. The primary goal of this review is to provide guidance for researchers who plan to design a CV model for specific purposes such as flood-depth estimation. Researchers should be able to draw on this review to construct an appropriate CV model for any FM purpose.

유영철 연쇄살인사건 분석 (Analysis of the Case with Serial Killer Young Cheol Yoo)

  • 이진동;이상한
    • 대한수사과학회지
    • /
    • 제2권1호
    • /
    • pp.32-51
    • /
    • 2007
  • 연쇄강력범죄가 빈발하면서 관련분야에 대한 논의와 관심이 증대되고 있는 가운데 본 연구는 유영철 연쇄살인사건에 대해 분석해 보았다. 이를 위해 본 연구는 첫째, 유영철의 범행과정을 계획적 침입살인인 부유층 노인 살인사건, 무계획적 우발살인인 황학동 노점상 살인사건, 계획적 유인살인인 직업여성 살인사건으로 나누어 살펴보고 둘째, 범행동기 범행대상 범행시간과 장소 범행수단과 방법을 분석해보고 셋째, 유영철 사건의 프로파일링기법에 대한 평가와 경찰수사의 문제점에 대해 살펴보았다. 유영철 연쇄살인사건은 첫째, 범행동기는 부자와 노인, 여성에 대한 증오, 질병과 사망에 대한 공포 등이 복합적으로 작용한 것으로 보인다. 둘째, 범행대상은 부유층 주택 노인, 노점상, 출장마사지와 전화방 도우미로 일하는 직업여성이었고, 피해자 수는 부유층 주택 노인 살인의 경우 4건의 범행에 남성 3명, 여성 5명이고, 노점상 살인은 1건의 범행에 남성 1명이며, 직업여성 살인은 11건의 범행에 여성 11명으로 총 16건에 20명이 살해되었다. 셋째, 범행시간은 부유층 주택 노인 살인의 경우 오전 10시에서 12시 사이에 일어났고, 직업여성의 경우 늦은 밤이나 새벽에 일어났으며, 범행 장소는 부유층 노인 살인의 경우는 강남구 신사동 삼성동, 종로구 구기동 혜화동의 밖에서 안이 잘 보이지 않는 100평 이상의 주택이었고, 직업여성 살인의 경우는 마포구 노고산동에 위치한 자신의 오피스텔이었다. 마지막으로 범행수단과 방법은 잭나이프는 위협수단으로 사용하고 자신이 직접 만든 해머로 두부 및 안면부를 가격하여 살해하였으며, 부유층 주택 노인 살인의 경우는 증거를 인멸하기 위해 강도로 위장하거나 방화를 하였고, 직업여성의 경우 사체를 토막 내어 암매장하였다. 일반적으로 연쇄살인사건에 있어서 각각의 연쇄살인 속에 나타나는 특징이나 동기, 목적, 과정이 모두 다르며 동일한 수법으로 연쇄살인을 저지른 경우도 있지만 그렇지 않은 경우도 많다. 다른 범죄와는 달리 연쇄살인은 살인범의 특성이나 취향이 많이 다르기 때문에 하나의 특정화된 모델만을 가지고 연쇄살인을 설명하는 데 무리가 따르게 된다. 각각의 연쇄살인 사건마다 나타난 특징을 정확하게 잡아서 자기 것으로 만들어야 하며, 연쇄살인범이 어떠한 생각을 가지고 살인을 저지르게 되었는지에 관한 심리적으로나 사고적으로 따라 가보는 추적상상의 과정이 반드시 같이 진행되어야만 한다. 연쇄살인과 같이 어려운 대상을 연구하고 이를 수사하기 위해서는 다양한 기법과 기술, 그리고 관련된 지식을 갖추고 있어야 한다. 이는 제도적인 노력과 함께 개별적인 노력도 함께 병행되어야 할 것이다.

  • PDF