• Title/Summary/Keyword: forensic technology

Search Result 302, Processing Time 0.028 seconds

Simultaneous Analysis of Several Non-Steroidal Anti-Inflammatory Drugs in Urine by Gas Chromatograph/Negative Chemical Ionization-Mass Spectrometry (기체 크로마토그래프-질량분석법을 이용한 뇨중 비스테로이드성 소염진통제 (NSAIDs)의 동시 분석법)

  • Myung, Seung-Woon;Park, Joon-Ho;Kim, Myung-Soo;Cho, Hyun-Woo
    • Analytical Science and Technology
    • /
    • v.12 no.6
    • /
    • pp.571-576
    • /
    • 1999
  • Screening method for NSAIDs (Hon-Steroidal Anti-Inflammatory Drugs) in urine was developed using GC/NCI-MS. Derivatized six fenamates with pentafluoropropionic anhydride showed high sensitivity in NCI-MS. The conditions of the derivatization reaction and chromatographic conditions were established for screening with a trace analysis. Limit of detection was in the range of 4-25 pg/mL. This method may be used to the equine doping analysis for NSAIDs and forensic analysis.

  • PDF

A Comparative Analysis of Step and Touch Voltages Depending on Two Test Voltage Waveforms

  • Jung, Kwang-Seok;Cha, Sang-Wook;Park, Dae-Won;Kil, Gyung-Suk;Oh, Jae-Geun
    • Transactions on Electrical and Electronic Materials
    • /
    • v.12 no.4
    • /
    • pp.152-155
    • /
    • 2011
  • This paper presents a comparative analysis on step and the touch voltages generated by either a sine and a ring wave voltage generator; this analysis was done as a basic study in order to develop a small and lightweight ground meter. A ring wave generator using pulsed power technology was fabricated; an experimental grounding system specified in Institute of Electrical and Electronics Engineers standards 80 and 81 was installed. The step and the touch voltages, which were measured using comparable a sine and a ring waves in terms of magnitude and frequency, were equal. Using pulsed power technology, the weight of the fabricated ring wave generator could be reduced to one-fifth of that of a sine wave generator. Consequently, if a ground meter adopts the ring wave instead of a sine wave, it will be possible to reduce the weight of a ground meter and improve the efficiency of measurement.

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script

  • Kumar, Rajiv;Ravulakollu, Kiran Kumar;Bhat, Rajesh
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.893-913
    • /
    • 2017
  • The handwriting based person identification systems use their designer's perceived structural properties of handwriting as features. In this paper, we present a system that uses those structural properties as features that graphologists and expert handwriting analyzers use for determining the writer's personality traits and for making other assessments. The advantage of these features is that their definition is based on sound historical knowledge (i.e., the knowledge discovered by graphologists, psychiatrists, forensic experts, and experts of other domains in analyzing the relationships between handwritten stroke characteristics and the phenomena that imbeds individuality in stroke). Hence, each stroke characteristic reflects a personality trait. We have measured the effectiveness of these features on a subset of handwritten Devnagari and Latin script datasets from the Center for Pattern Analysis and Recognition (CPAR-2012), which were written by 100 people where each person wrote three samples of the Devnagari and Latin text that we have designed for our experiments. The experiment yielded 100% correct identification on the training set. However, we observed an 88% and 89% correct identification rate when we experimented with 200 training samples and 100 test samples on handwritten Devnagari and Latin text. By introducing the majority voting based rejection criteria, the identification accuracy increased to 97% on both script sets.

Oil Painting Analysis with Statistical Characteristics of Acquired Image (통계적 특성을 이용한 획득 영상의 정보 해석 : 유화의 영상 정보를 중심으로)

  • Ryu, Ho;Moon, Il-young
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.163-167
    • /
    • 2018
  • Probabilistic approach is applied to the experiment of Probability Density Function to get the information. Especially this method will be useful to make the montage to compare similarity. But in the case of art painting, it is more difficult than montage image. In this case, we should study the habit of painter with characteristic point in the paintings. Especially we will study characteristic point in the oil paintings to decide truth or falsehood in this paper.

Rates and Mechanism of Adsorption of Transition Metal Ions on Polystyrene Resins Supported Diethylenetriamine (디에틸렌트리아민을 지지시킨 폴리스틸렌수지에 대한 전이금속이온의 흡착속도와 메카니즘)

  • Kim, Sun-Deuk;Shin, Yun-Yeol;Kim, Chang-Su
    • Analytical Science and Technology
    • /
    • v.12 no.6
    • /
    • pp.465-471
    • /
    • 1999
  • Chloromethylated polystyrene resins supported diethylenetriamine of linear and claw types have been prepared by the reaction of diethylenetriamine with chloromethylated polystyrene. The kinetics of adsorption of transition metal ions on polystyrene resins were measured by the limited-bath technique. This paper reports the results of the diffusion coefficients, entropies of activation, and free energies of activation. The ratedetermining step of the adsorption of transition metals on the resins is a process of diffusion through the particles.

  • PDF

Forensic Analysis recovery Program and Effective Re-build Deleted Internet History Data (복원 프로그램 동작분석과 삭제된 인터넷 접속기록의 효율적인 복원에 관한 연구)

  • Choi, Un-Young;Lee, Hee-Jo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.52-56
    • /
    • 2008
  • 컴퓨터 시스템을 대상으로 하거나 컴퓨터 시스템을 이용하는 범행의 상당수가 PC방에서 이루어지고 있다. 그러나 불특정 다수의 네티즌들이 이용하는 PC방은 관리상의 용이 등의 이유로 대부분 하드디스크 초기화 프로그램(복원)을 사용하고 있으며, 이와 같은 PC방의 관리 환경은 수사의 직접적인 목적인 증거수집 및 복구을 통하여 실체적 진실발견에 많은 어려움을 초래하고 있다. 본 논문에서는 이와 같은 복원 프로그램의 동작원리를 분석하고, 이를 바탕으로 인터넷 접속기록의 효율적인 복원 방법에 대한 논리적인 접근법을 제시하고, 프로그램 구현을 통한 정확한 디지털 증거수집의 실접근법을 제공한다.

  • PDF

Analysis of Threats Factor in IT Convergence Security (IT 융합보안에서의 위협요소 분석)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.49-55
    • /
    • 2010
  • As the developing of the information communication technology, more and more devices are with the capacity of communication and networking. The convergence businesses which communicate with the devices have been developing rapidly. The IT convergence communication is viewed as one of the next frontiers in wireless communications. In this paper, we analyze detailed security threats against M2M(Machine to Machine), intelligent vehicle, smart grid and u-Healthcare in IT convergence architecture. We proposed a direction of the IT convergence security that imbedded system security, forensic security, user authentication and key management scheme.

Behaviour of lightweight composite trusses in fire - A case study

  • Choi, Seng-Kwan;Burgess, Ian;Plank, Roger
    • Steel and Composite Structures
    • /
    • v.7 no.2
    • /
    • pp.105-118
    • /
    • 2007
  • On September $11^{th}$ 2001, the twin towers of the World Trade Center in New York City were struck by two hijacked airplanes. Despite severe local damage induced by the impact, the towers were able to sustain 102 and 56 minutes of the subsequent multi-storey fires before collapsing. The purpose of this study is to contribute to the understanding of the in-fire performance of composite trusses by examining the behaviour of the longer-span type used in the towers. It makes no attempt to be a forensic study of the actual events. Using the finite element package Vulcan, the structural mechanics of typical long-span composite floor trusses are explained, under a variety of scenarios, as the fire temperatures rise. Different boundary conditions, degrees of protection and loading are all covered, the results being presented mainly in the form of graphs of deflection and internal force of members against time.

A Precursor Phenomena Analysis of APT Hacking Attack and IP Traceback (APT 해킹 공격에 대한 전조현상 분석 및 IP역추적)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.275-278
    • /
    • 2013
  • Log is a file system, a system that uses all remaining data. Want situation now being issued in the IT, media Nate on information disclosure, the press agency server hack by numbness crime occurred. Hacking crisis that's going through this log analysis software professionally for professional analysis is needed. The present study, about APT attacks happening intelligently Log In case of more than traceback in advance to prevent the technology to analyze the pattern for log analysis techniques.

  • PDF

A Study on Rivalry Technology of Anti-Digital Forensic (안티 디지털 포렌식에 대한 대응 기술 연구)

  • Lee, Gyu-An;Park, Dae-Woo;Shin, Young-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.183-188
    • /
    • 2008
  • 디지털 포렌식이 활성화 되고 수사에서 활용하는 사례가 증가함에 따라 기업과 개인을 비롯한 범죄혐의자들의 이에 대응하기 위한 기술도 증가하고 있다. 이를 안티포렌식 또는 항포렌식이라고 하는데 이는 디지털 자료의 변조, 파괴, 은닉 등으로 나누어 볼 수 있다. 본 논문에서는 범죄 수사현장에서 필요한 안티포렌식에 대응하는 기술인 위 변조된 데이터 추출 기법, 슬랙 영역의 숨겨진 데이터 추출 기법, 스테카노 그래픽 추출 및 분석 기법, 암호 복호화 기법, 삭제된 데이터 및 파괴된 데이터 복원 기법을 소개하고, 이에 대한 대비책을 제시한다. 본 연구를 통하여 첨단 범죄 수사관들이 안티디지털포렌식에 대한 새로운 디지털 증거의 추출과 분석에 기여하여 컴퓨터 및 첨단 범죄에 대한 디지털 포렌식 기술로 새로운 수사의 방향을 제시 할 수 있을 것이다.

  • PDF