• Title/Summary/Keyword: crime data

Search Result 390, Processing Time 0.023 seconds

An Effective Data Model for Forecasting and Analyzing Securities Data

  • Lee, Seung Ho;Shin, Seung Jung
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.32-39
    • /
    • 2016
  • Machine learning is a field of artificial intelligence (AI), and a technology that collects, forecasts, and analyzes securities data is developed upon machine learning. The difference between using machine learning and not using machine learning is that machine learning-seems similar to big data-studies and collects data by itself which big data cannot do. Machine learning can be utilized, for example, to recognize a certain pattern of an object and find a criminal or a vehicle used in a crime. To achieve similar intelligent tasks, data must be more effectively collected than before. In this paper, we propose a method of effectively collecting data.

A Deep Learning-based Streetscapes Safety Score Prediction Model using Environmental Context from Big Data (빅데이터로부터 추출된 주변 환경 컨텍스트를 반영한 딥러닝 기반 거리 안전도 점수 예측 모델)

  • Lee, Gi-In;Kang, Hang-Bong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1282-1290
    • /
    • 2017
  • Since the mitigation of fear of crime significantly enhances the consumptions in a city, studies focusing on urban safety analysis have received much attention as means of revitalizing the local economy. In addition, with the development of computer vision and machine learning technologies, efficient and automated analysis methods have been developed. Previous studies have used global features to predict the safety of cities, yet this method has limited ability in accurately predicting abstract information such as safety assessments. Therefore we used a Convolutional Context Neural Network (CCNN) that considered "context" as a decision criterion to accurately predict safety of cities. CCNN model is constructed by combining a stacked auto encoder with a fully connected network to find the context and use it in the CNN model to predict the score. We analyzed the RMSE and correlation of SVR, Alexnet, and Sharing models to compare with the performance of CCNN model. Our results indicate that our model has much better RMSE and Pearson/Spearman correlation coefficient.

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime

Anslysis of Relationship between Reasons for Mereorological Change and Crime (기상변화요인과 범죄발생의 관계분석)

  • Kim, JongMin;Kim, MinSu;Yoo, SeungJae;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.107-113
    • /
    • 2012
  • This study examined relationship between the major five crimes(murder, robbery, rape, theft and violence) and elements of meteorological change(weather, temperature, precipitation, wind velocity and humidity). Elements of meteoro logical change corresponding to the date recorded by a meteorological office and the number of occurrences from January $1^{st}$ 2010 to October $19^{th}$ 2012 collected from major portal sites were used for this study. Based on this data, SPSS 12.0 was utilized to analyze relationship between crimes and elements of meteorological change, allowing us to find out relationship between crimes and elements of meteorological change. This analysis finding is sure to pave the way for research of this field.

Neighborhood Environment Associated with Physical Activity among Rural Adults: Applying Zero-Inflated Negative Binominal Regression Modeling (영과잉 음이항 회귀모형을 적용한 농촌지역 성인 신체활동의 지역사회환경 요인 분석)

  • Kim, Bongjeong
    • Journal of Korean Public Health Nursing
    • /
    • v.29 no.3
    • /
    • pp.488-502
    • /
    • 2015
  • Purpose: This study was conducted to determine the neighborhood environmental factors associated with physical activity among adults living in rural communities. Methods: A cross-sectional descriptive survey was conducted with a convenience sample of 201 adults living in three Ri in Y-city, Gyeonggi-do. Data were collected from face-to-face interview by trained interviewers and were analyzed using a zero-inflated negative binominal regression model. Results: Participants reported engaged in moderate or vigorous physical activity was 76.1%; 10.5% of participants reported that they met moderate physical activity recommendations and 14.5% of participants reported that they met vigorous physical activity recommendations. Zero-inflated negative binominal regression analysis showed association of increasing days of physical activity with social cohesion (${\beta}=.130$, p=.005), social network (${\beta}=-.096$, p=.003), and safety for crime (${\beta}=-.151$, p=.036), and no days of physical activity was associated with no attainment of education and marginally associated with increasing BMI. Conclusion: Neighborhood environmental factors including social cohesion, social network, and crime for safety were significantly associated with physical activity of rural adults. Community health nurses should expand an approach for individual behavior change to incorporate rural adults' specific neighborhood environmental factors into physical activity interventions.

A study on structural relationships among police service and citizen (경찰 서비스와 시민간의 구조적 관계 연구)

  • Mun, Jun-Seob;Han, Sang-Seol
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.335-360
    • /
    • 2015
  • Police is an organization that provides service to the public. Police service is focusing on enforcing the law and solving the problem to improve the relationship between police and the public within the society. To accomplish their goal, police should build a better relationship with the public. In the current study, the researcher focused on factors of police service quality, community policing, fear of crime, police-citizen relationship, and the relationship among citizens. The current study used the interview methods for collecting data of 371 individuals from Seoul metro area and resulted that each factors had a causal relationship but police-citizen relationship and citizen-citizen relationship did not show the statistically significant results. Based on this study, the research provided critics and implications.

  • PDF

Mobile Digital Forensic Procedure for Crime Investigation in Social Network Service (소셜 네트워크 서비스에서 사건 수사를 위한 모바일 디지털 포렌식 절차에 관한 연구)

  • Jang, Yu Jong;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.3
    • /
    • pp.325-331
    • /
    • 2013
  • Social network services(SNS) has been used as a means of communication for user or express themselves user. Therefore, SNS has a variety of information. This information is useful to help the investigation can be used as evidence. In this paper, A study of mobile digital forensic procedure for crime investigation in social network service. Analysis of database file taken from the smartphone at social network service application for mobile digital forensic procedure. Therefore, we propose a procedure for the efficient investigation of social network service mobile digital forensic.

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.245-254
    • /
    • 2006
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBS, Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch. BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.117-126
    • /
    • 2007
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBs. Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch, BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these Paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF

A Stable Evidence Collection Procedure of a Volatile Data in Research (휘발성 증거자료의 무결한 증거확보 절차에 관한 연구)

  • Kim, Yong-Ho;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.13-19
    • /
    • 2006
  • I would like to explain a method how to get important data from a volatile data securely, when we are not available to use network in computer system by incident. The main idea is that the first investigator who collects a volatile data by applying scripts built in USB media should be in crime scene at the time. In according to volatile data, he generates hash value, and gets witness signature. After that, he analyses the volatile data with authentication in forensics system.

  • PDF