• Title/Summary/Keyword: Scientific crime analysis

Search Result 37, Processing Time 0.024 seconds

A preliminary study of semi-quantitative, comparative evaluation of split or half fingerprints using Densitometric Image Analysis (DIA) - Inter-analyst differences for split or half fingerprints -

  • Song, Minkyu;Kim, Seung-chan;Choi, Sung-Woon
    • Analytical Science and Technology
    • /
    • v.34 no.2
    • /
    • pp.56-67
    • /
    • 2021
  • Due to the difficulty of grading visualized fingerprints with previously known evaluation methods for the comparison of split fingerprints, a preliminary study was performed with the densitometric image analysis (DIA) method as a potential quantitative and supplementary evaluation method. Each image of inked split fingerprints was divided into 4 zones for analysis. Weekly intra- and inter- analysis by two analysts with three whole fingerprints that were constructed by combining inked split fingerprints showed that the average area values and the ranges of difference fluctuation were not significantly different between strong fingerprints and strong-weak pairs, while they were different in weak fingerprints and weak-weak pairs. In the case of weak fingerprints, the exact acquisition of ridges was difficult and this seemed to influence the results. An additional study is needed for the improved reliability using DIA method with weak fingerprints such as 8 zones division rather than 4 zones. In addition, the analysis results performed by several analysts at different times should be used to improve the reliability of the analysis method further. Based on the above result, it can be judged that utilizing the DIA method as a secondary evaluation method of the existing scoring system would be effective with the additional studies especially on weak fingerprints.

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.245-254
    • /
    • 2006
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBS, Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch. BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.117-126
    • /
    • 2007
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBs. Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these Paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

One-probe P300 based concealed information test with machine learning (기계학습을 이용한 단일 관련자극 P300기반 숨김정보검사)

  • Hyuk Kim;Hyun-Taek Kim
    • Korean Journal of Cognitive Science
    • /
    • v.35 no.1
    • /
    • pp.49-95
    • /
    • 2024
  • Polygraph examination, statement validity analysis and P300-based concealed information test are major three examination tools, which are use to determine a person's truthfulness and credibility in criminal procedure. Although polygraph examination is most common in criminal procedure, but it has little admissibility of evidence due to the weakness of scientific basis. In 1990s to support the weakness of scientific basis about polygraph, Farwell and Donchin proposed the P300-based concealed information test technique. The P300-based concealed information test has two strong points. First, the P300-based concealed information test is easy to conduct with polygraph. Second, the P300-based concealed information test has plentiful scientific basis. Nevertheless, the utilization of P300-based concealed information test is infrequent, because of the quantity of probe stimulus. The probe stimulus contains closed information that is relevant to the crime or other investigated situation. In tradition P300-based concealed information test protocol, three or more probe stimuli are necessarily needed. But it is hard to acquire three or more probe stimuli, because most of the crime relevant information is opened in investigative situation. In addition, P300-based concealed information test uses oddball paradigm, and oddball paradigm makes imbalance between the number of probe and irrelevant stimulus. Thus, there is a possibility that the unbalanced number of probe and irrelevant stimulus caused systematic underestimation of P300 amplitude of irrelevant stimuli. To overcome the these two limitation of P300-based concealed information test, one-probe P300-based concealed information test protocol is explored with various machine learning algorithms. According to this study, parameters of the modified one-probe protocol are as follows. In the condition of female and male face stimuli, the duration of stimuli are encouraged 400ms, the repetition of stimuli are encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. In the condition of two-syllable word stimulus, the duration of stimulus is encouraged 300ms, the repetition of stimulus is encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. It was also conformed that the logistic regression (LR), linear discriminant analysis (LDA), K Neighbors (KNN) algorithms were probable methods for analysis of P300 amplitude. The one-probe P300-based concealed information test with machine learning protocol is helpful to increase utilization of P300-based concealed information test, and supports to determine a person's truthfulness and credibility with the polygraph examination in criminal procedure.

The Multi Knowledge-based Image Retrieval Technology for An Automobile Head Lamp Retrieval (자동차 전조등 검색을 위한 다중지식기반의 영상검색 기법)

  • 이병일;손병환;홍성욱;손성건;최흥국
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.3
    • /
    • pp.27-35
    • /
    • 2002
  • A knowledge-based image retrieval technique is image searching methods using some features from the queried image. The materials in this study are automobile head lamps. The input data is composed of characters and images which have various pattern. The numbers, special symbols, and general letters are under the category of the character. The image informations are made up of the distribution of pixel data, statistical analysis, and state of pattern which are useful for the knowledge data. In this paper, we implemented a retrieval system for the scientific crime detection at traffic accident using the proposed multi knowledge-based image retrieval technique. The values for the multi knowledge-based image features were extracted from color and gray scale each. With this 22 features, we improved the retrieval efficiency about the color information and pattern information. Visual basic, crystal report and MS access DB were used for this application. We anticipate the efficient scientific detection for the traffic accident and the tracking of suspicious vehicle.

  • PDF

Study of an Efficient Method for Securing Evidence During the Fire Investigation (화재조사 시 증거물의 효율적인 확보 방안에 관한 연구)

  • Ye, Su-Jo;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.43-47
    • /
    • 2016
  • The recent changes in the judicial system in South Korea, including the stronger trial-centrism and legal market opening, have made fire investigations seek more scientific evidence and structure. The collection of physical evidence is very important to prove the substantial truth of a fire at the court. Without the appropriate physical proof, the credibility of a fire investigation is lost as evidence in a court. Therefore, the fire investigation team needs to carefully handle the fire site and fire initiation evidence because evidence of a fire incident can be destroyed easily by chemical and physical damage. In addition, the fire investigation team also needs to carefully record the collections of any evidence including pictures and their analysis. This study proposed the needs of the procedure manual and guidelines that can provide a step-by-step process of fire investigations in South Korea. This study also helps fire investigation agencies to secure fire-scene evidence to distinctly investigate the facts of fire. The guidelines and manual can eventually improve the ways for the fire investigation processes in South Korea.

An Attempt of Reinterprtation on History of Nursing and Health Care Using Post-structural Method (포스트구조주의적 분석을 이용한 간호와 보건의료의 역사에 대한 재해석의 한 시도)

  • 김남선
    • Journal of Korean Academy of Nursing
    • /
    • v.27 no.3
    • /
    • pp.531-540
    • /
    • 1997
  • The purpose of this study is to reinterpretate the history of nursing and health care from the view-point of post-structuralism. It has been emphasized that the development of modern health care has been due to the progressive efforts of medicine and to medical discoveries. Medicine has dominated the history of health care rather than nursing or other health professions. The present study adopts the post-structural method by Foucault, which tries to unite language and knowledge. Foucault examines "the institutionalization of knowledge and the power exerted thereby, with special reference to the devices of social regulation and their function over the madness, the disease, the crime, and the sexuality. " The concept of power in Foucault's writing is that it is exerted spontaneously in verbal behaviors of individuals through knowledge of everyday life such as definition of body or mind, sexuality and relationship of family. Therefore as to the problem of power, this study tries to understand the meaning of the health care history through an analysis of the formation of medical discourse. In order to have authority in a power relation, the medical professional asserts that medical discourse is the most scientific knowledge. The authority of medical professionals can be reinforced by the fact that male medical professionals outnumber female. Devaluation of nursing care is reinforced by the medicine which has the legitimate authority through use of the political skills.

  • PDF

A preliminary study to determine the order of the latent fingerprint deposition on thermal paper - A short term study - (감열지상 잠재지문의 남겨진 순서결정에 대한 예비적 연구 - 단기연구 -)

  • Lim, Dong-A;Ok, Yun-Seok;Heo, Bo-Reum;Choi, Sung-Woon
    • Analytical Science and Technology
    • /
    • v.30 no.5
    • /
    • pp.279-286
    • /
    • 2017
  • Determination of the order of latent fingerprints deposition on the surface of thermal paper, often found in crime scenes, is related to the study of time course and aging of fingerprints and can provide additional information in criminal investigations. A preliminary study was performed to determine the deposition order of fingerprints left with two different conditions of deposition pressure and time (in seconds) after 1 day intervals for 7 days on thermal paper (receipt and fax thermal paper) using an iodine fuming method. The resultant images of the visualized fingerprints were analyzed with densitometric image analysis to measure the changes in the areas of the ridges, which can be correlated to the deposition order. No significant variation was found with the different types of thermal paper. The average areas of the friction ridges increased gradually or were similar to the values from day 1 for 3 days, and then a continual decrease was shown from day 4 through day 7. The area values from day 6 and day 7 were less than half of those from day 1. Furthermore, the test with overlapped fingerprints showed the possibility of differentiation between fingerprints that are 1-3 and 6-7 days old based on the clarity visible to the naked eye. Additional experiments with the deposition conditions can prove that the current method is valuable for the determining the order of fingerprint deposition on thermal paper.

Analysis of Village Safety Index using Accessibility to Public Facilities (공공시설 접근성을 통한 마을단위 안전지수 분석)

  • Jeon, Jeongbae;Kim, Solhee;Suh, Kyo;Yoon, Seongsoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.2
    • /
    • pp.121-129
    • /
    • 2016
  • A disaster can be defined in many ways based on perspectives, in addition, its types are able to classify differently by various standards. Considering the different perspectives, the disaster can be occurred by natural phenomenon that is like typhoon, earthquake, flood, and drought, and by the accident that is like collapse of facilities, traffic accidents, and environmental pollution, etc. Into the modern society, moreover, the disaster includes the damages by diffusion of epidemic and infectious disease in domestic animals. The disaster was defined by natural and man-made hazards in the past. As societies grew with changes of paradigm, social factors have been included in the concept of the disaster according to new types unexpected by new disease and scientific technology. Change the concept of social disasters, Ministry of Public Safety and Security (MPSS) has provided the regional safety index, which measures the safety level of a local government. However, this regional safety index has some limitation to use because this index provides the information for city unit which is a unit of administrative districts of urban. Since these administrative districts units are on a different level with urban and rural areas, the regional safety index provided by MPSS is not be able to direct apply to the rural areas. The purpose of this study is to determine the regional safety index targeting rural areas. To estimate the safety index, we was used for 3 indicators of the MPSS, a fire, a crime, and an infectious disease which are evaluable the regional safety index using an accessibility analysis. For determining the regional safety index using accessibility from community centers to public facilities, the safety index of fire, crime, and infectious disease used access time to fire station, police office, and medical facility, respectively. An integrated Cheongju, targeting areas in this study, is mixed region with urban and rural areas. The results of regional safety index about urban and rural areas, the safety index in rural area is relatively higher than in the urban. Neverthless the investment would be needed to improve the safety in the rural areas.

A case study of verifying a suicide by carbon monoxide intoxication committed by burning an ignition charcoal briquette (착화탄 연소에 의한 일산화탄소 중독사에서 자살입증에 관한 사례연구)

  • Sung, Tae-myung;Jo, Ju-ik;Ahn, Phil-sang
    • Analytical Science and Technology
    • /
    • v.28 no.6
    • /
    • pp.398-408
    • /
    • 2015
  • Carbon monoxide (CO) intoxication, arising from CO from an ignited charcoal briquette (ICB), is a popular means of committing suicide in Korea. Most CO intoxications are related to suicide attempts; however, the possibility of a homicide disguised as a suicide cannot be ruled out. Therefore, forensic investigation of the deceased and the crime scene is crucial to confirm that the deceased committed suicide. Detection of the components of an ICB on the objects suspected of being contacted by the deceased, such as the hands, nostrils, and doorknobs, is essential for linking the crime scene to the victim in the case of suicides by ignited ICBs. The traces from an ICB were analyzed by investigating the morphological characteristics and obtaining elemental compositions. The ICBs were completely different from blackened wood, as detected by discriminant analysis with the elements of carbon and oxygen. We analyzed one case of CO intoxication to demonstrate an excellent procedure for verifying whether a suicide occurred with an ICB. We employed SEM-EDX for the analysis of an ICB, microscope-FT/IR and pyrolysis-GC/MS for a partly burnt resin-type substance, GC/MS for diphenhydramine (a sleeping drug), and GC/TCD for the CO-Hb level. We detected traces of an ICB on the hands, nostrils, and doorknobs, which were all discriminated into an ICB group. Detection of ICB traces from the nostrils could indicate that the deceased started the fire themselves to commit suicide. The partially burnt black material was analyzed as an acrylronitrilestyrene polymer, which is normally used to make bags for carrying or wrapping and could be assumed to have been used to transport the ICB. Diphenhydramine, a sleeping drug, was detected at a level of 2.3 mg/L in the blood, which was lower than that in fatal cases (8-31 mg/L; mean 16 mg/L). A CO-Hb level of 79% was found in the blood, which means that the cause of death was CO intoxication. The steps shown here could represent an ideal method for reaching a verdict of suicide by CO intoxication produced by burning an ICB in a sealed room or a car.