• Title/Summary/Keyword: forensic technology

Search Result 302, Processing Time 0.026 seconds

Hot Corrosion and Thermally Grown Oxide Formation on the Coating of Used IN738LC Gas Turbine Blade (사용된 IN738LC 가스 터빈 블레이드 코팅층의 고온 부식 및 Thermally Grown Oxide 형성 거동)

  • Choe, Byung Hak;Han, Sung Hee;Kim, Dae Hyun;Ahn, Jong Kee;Lee, Jae Hyun;Choi, Kwang Su
    • Korean Journal of Materials Research
    • /
    • v.32 no.4
    • /
    • pp.200-209
    • /
    • 2022
  • In this study, defects generated in the YSZ coating layer of the IN738LC turbine blade are investigated using an optical microscope and SEM/EDS. The blade YSZ coating layer is composed of a Y-Zr component top coat layer and a Co component bond coat layer. A large amount of Cr/Ni component that diffused from the base is also measured in the bond coat. The blade hot corrosion is concentrated on the surface of the concave part, accompanied by separation of the coating layer due to the concentration of combustion gas collisions here. In the top coating layer of the blade, cracks occur in the vertical and horizontal directions, along with pits in the top coating layer. Combustion gas components such as Na and S are contained inside the pits and cracks, so it is considered that the pits/cracks are caused by the corrosion of the combustion gases. Also, a thermally grown oxide (TGO) layer of several ㎛ thick composed of Al oxide is observed between the top coat and the bond coat, and a similar inner TGO with a thickness of several ㎛ is also observed between the bond coat and the matrix. A PFZ (precipitate free zone) deficient in γ' (Ni3Al) forms as a band around the TGO, in which the Al component is integrated. Although TGO can resist high temperature corrosion of the top coat, it should also be considered that if its shape is irregular and contains pore defects, it may degrade the blade high temperature creep properties. Compositional and microstructural analysis results for high-temperature corrosion and TGO defects in the blade coating layer used at high temperatures are expected to be applied to sound YSZ coating and blade design technology.

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

A Study on the Methods of Building Tools and Equipment for Digital Forensics Laboratory (디지털증거분석실의 도구·장비 구축 방안에 관한 연구)

  • Su-Min Shin;Hyeon-Min Park;Gi-Bum Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.21-35
    • /
    • 2022
  • The use of digital information according to the development of information and communication technology and the 4th industrial revolution is continuously increasing and diversifying, and in proportion to this, crimes using digital information are also increasing. However, there are few cases of establishing an environment for processing and analysis of digital evidence in Korea. The budget allocated for each organization is different and the digital forensics laboratory built without solving the chronic problem of securing space has a problem in that there is no standard that can be referenced from the initial configuration stage. Based on this awareness of the problem, this thesis conducted an exploratory study focusing on tools and equipment necessary for building a digital forensics laboratory. As a research method, focus group interviews were conducted with 15 experts with extensive practical experience in the digital forensic laboratory or digital forensics field and experts' opinions were collected on the following 9 areas: network configuration, analyst computer, personal tools·equipment, imaging devices, dedicated software, open source software, common tools/equipment, accessories, and other considerations. As a result, a list of tools and equipment for digital forensic laboratories was derived.

Study of sweat content analysis and latent fingerprint developing (땀의 성분 분석과 잠재지문 현출에 관한 연구)

  • Choi, Mi-Jung;Sun, Yale-Shik;Kim, Chang-Seong;Choi, Man-Sik;Sung, Nack-Do;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.147-154
    • /
    • 2007
  • Sweat contents were investigated for using those data to forensic purpose. The experiments of identifying sweat contents were as follow: 1) measurement of amino acids (aspartic acid, serine, glycine etc) by HPLC, 2) anions ($Cl^-$, $F^-$, and $SO{_4}^{2-}$) by IC and 3) trace elements (Cu, Zn, Li, B, etc.) by ICP-MS. Amino acid contents in sweat are varied with individual samples and glycine, threonine, alanine, valine and histidine are detected as the prime one. The detected anions are $Cl^-$(2167~4073 ppm) and $F^-$(454~582 ppm) mostly. Trace elements of Rb, Zn and Cu are detected and those concentrations are relatively very high. The compositions of sweat can be influenced by various factors (diet, anthropometric, characteristics, physical fitness, age, gender and the state of the health).

Block and Fuzzy Techniques Based Forensic Tool for Detection and Classification of Image Forgery

  • Hashmi, Mohammad Farukh;Keskar, Avinash G.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1886-1898
    • /
    • 2015
  • In today’s era of advanced technological developments, the threats to the authenticity and integrity of digital images, in a nutshell, the threats to the Image Forensics Research communities have also increased proportionately. This happened as even for the ‘non-expert’ forgers, the availability of image processing tools has become a cakewalk. This image forgery poses a great problem for judicial authorities in any context of trade and commerce. Block matching based image cloning detection system is widely researched over the last 2-3 decades but this was discouraged by higher computational complexity and more time requirement at the algorithm level. Thus, for reducing time need, various dimension reduction techniques have been employed. Since a single technique cannot cope up with all the transformations like addition of noise, blurring, intensity variation, etc. we employ multiple techniques to a single image. In this paper, we have used Fuzzy logic approach for decision making and getting a global response of all the techniques, since their individual outputs depend on various parameters. Experimental results have given enthusiastic elicitations as regards various transformations to the digital image. Hence this paper proposes Fuzzy based cloning detection and classification system. Experimental results have shown that our detection system achieves classification accuracy of 94.12%. Detection accuracy (DAR) while in case of 81×81 sized copied portion the maximum accuracy achieved is 99.17% as regards subjection to transformations like Blurring, Intensity Variation and Gaussian Noise Addition.

Microsatellite-based Genetic Diversity and Evolutionary Relationships of Six Dog Breeds

  • Ye, J.-H.;Ren, D.-R.;Xie, A.-F.;Wu, X.-P.;Xu, L.;Fu, P.-F.;Zhao, H.-A.;Yang, Qianyong
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.22 no.8
    • /
    • pp.1102-1106
    • /
    • 2009
  • The Tibetan Mastiff is one of the most archaic, ferocious and the largest dogs in the world. The Kunming dog is the chief working-dog breed in China. In this study, ten microsatellite loci were used to assess the genetic diversity and evolutionary relationships in six dog breeds, including Tibetan Mastiff, Kunming dog, Belgian Malinois, Labrador Retriever, English Springer Spaniel, and German Shepherd. The highest genetic diversity was exhibited by the Tibetan Mastiff, indicating useful protection and little inbreeding in the modern Tibetan Mastiff. Higher genetic diversity was observed in European breeds, supporting the hypotheses that breeders outcross their pure breed dogs occasionally to avoid deleterious effects in Europe. Evolutionary relationships showed that English Springer Spaniel and Labrador Retriever were clustered together, then with the Tibetan Mastiff, consistent with previous cluster results. German Shepherd and Kunming dog were grouped together, coinciding with the breeding history of Kunming dog. It is the first time that Tibetan Mastiff and Kunming dog have been analyzed with microsatellites.

A License Audit Model for Secure DRM System in Home Network Environment (홈네트워크 환경에서의 안전한 DRM 시스템을 위한 라이센스 감사 모델)

  • Jang, Ui-Jin;Jung, Byung-Ok;Yeo, Sang-Soo;Shin, Yong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.438-447
    • /
    • 2009
  • Digital home devices aims at providing the multimedia service which is not limited at time and space in home network environment. However, it is incapable of the fair use of consumers who legally buys contents, and causes damage to the contents providers owing to the indiscriminate distribution and use of illegal contents. DRM system appeared to solve this problem cannot protect the license stored on digital home devices and manage license by redistribution. This paper proposes a license audit model which makes an inspection of illegal access, modification and redistribution and reports alert logs to server.

  • PDF

Microsurfacing Successes and Failures (마이크로서페이싱의 성공과 실패 사례)

  • Kim, Hyun Hwan;Benjamin, Broughton;Lee, Moon Sup;Lee, Soon Jae
    • International Journal of Highway Engineering
    • /
    • v.17 no.2
    • /
    • pp.71-78
    • /
    • 2015
  • PURPOSES: This study set out to investigate the current state of microsurfacing in Texas and compared the results with the current state of the practice nationwide. METHODS: For this study, case studies were extracted from the existing literature and compared with the data obtained both from site visits by the research team and data obtained from a survey by Texas Department of Transportation (TxDOT) personnel. The successes and failures of microsurfacing are detailed and explanations of different issues are outlined. Forensic studies from Texas are included in the descriptions of those microsurfacings that failed when configured as part of the cape seals. RESULTS : Microsurfacing has been shown to be an effective pavement preservation technique when applied to an appropriate road, at an appropriate timing, and as a remedy for certain issues. The failures experienced in Texas can mostly be attributed to cape seals and an inability to recognize structurally faulty pavement. CONCLUSIONS : When applied to an appropriate road, at an appropriate timing, and as a remedy for certain issues, microsurfacing has been shown to perform well in numerous case studies. The majority of microsurfacing failures are the result of poor project selection, usually involving the treatment being applied to structurally unsound pavement.

DNAchip as a Tool for Clinical Diagnostics (진단의학 도구로서의 DNA칩)

  • 김철민;박희경
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.04a
    • /
    • pp.97-100
    • /
    • 2004
  • The identification of the DNA structure as a double-stranded helix consting of two nucleotide chain molecules was a milestone in modern molecular biology. The DNA chip technology is based on reverse hybridization that follows the principle of complementary binding of double-stranded DNA. DNA chip can be described as the deposition of defined nucleic acid sequences, probes, on a solid substrate to form a regular array of elements that are available for hybridization to complementary nucleic acids, targets. DNA chips based on cDNA clons, oligonucleotides and genomic clons have been developed for gene expression studies, genetic variation analysis and genomic changes associated with disease including cancers and genetic diseases. DNA chips for gene expression profiling can be used for functional analysis in human eel Is and animal models, disease-related gene studies, assessment of gene therapy, assessment of genetically modified food, and research for drug discovery. DNA chips for genetic variation detection can be used for the detection of mutations or chromosomal abnormalities in cnacers, drug resistances in cancer cells or pathogenic microbes, histocompatibility analysis for transplantation, individual identification for forensic medicine, and detection and discrimination of pathogenic microbes. The DNA chip will be generalized as a useful tool in clinical diagnostics in near future. Lab-on-a chip and informatics will facilitate the development of a variety of DNA chips for diagnostic purpose.

  • PDF

The problem point and improvement program of the scene search and seizure of digital evidence at practical affairs (실무상 디지털증거의 현장압수수색 문제점과 개선방안)

  • Kim, Yong-Ho;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2595-2601
    • /
    • 2013
  • Currently, under being related with confiscation method of digital store medium from the court of justice, "the sorting confiscation method of principle, the exceptional medium confiscation method" from in section3 no.106 of the criminal procedure code disregard the actual fields of investigation. What is more, there are many difficulties to execute cases by observing this for the achievement of confiscation purpose. At this point, I present the problems of the present confiscation search method and the desirable scene confiscation search method and the improvement program under the new technology circumstance.