• Title/Summary/Keyword: illegal activities

Search Result 123, Processing Time 0.022 seconds

A Study on the Trigger Technology for Vehicle Occupant Detection (차량 탑승 인원 감지를 위한 트리거 기술에 관한 연구)

  • Lee, Dongjin;Lee, Jiwon;Jang, Jongwook;Jang, Sungjin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.120-122
    • /
    • 2021
  • Currently, as demand for cars at home and abroad increases, the number of vehicles is decreasing and the number of vehicles is increasing. This is the main cause of the traffic jam. To solve this problem, it operates a high-ocompancy vehicle (HOV) lane, a multi-passenger vehicle, but many people ignore the conditions of use and use it illegally. Since the police visually judge and crack down on such illegal activities, the accuracy of the crackdown is low and inefficient. In this paper, we propose a system design that enables more efficient detection using imaging techniques using computer vision to solve such problems. By improving the existing vehicle detection method that was studied, the trigger was set in the image so that the detection object can be selected and the image analysis can be conducted intensively on the target. Using the YOLO model, a deep learning object recognition model, we propose a method to utilize the shift amount of the center point rather than judging by the bounding box in the image to obtain real-time object detection and accurate signals.

  • PDF

The First Step toward Database Marketing Industry in Korea; KT SODiS Case (대한민국 데이터베이스 마케팅 인프라 구축을 위한 KT 소디스 사업의 마케팅 전략 )

  • Kim, Byung-Do;Hong, Seongtae;Shin, Jong Chil;Kang, Myung Soo
    • Asia Marketing Journal
    • /
    • v.7 no.3
    • /
    • pp.121-141
    • /
    • 2005
  • Most of the people in marketing area know that database marketing has been one of the most powerful marketing tools and thus database marketing industry grows bigger and bigger. For both effective database marketing and database marketing industry, personal data are the very essential resources. Unfortunately, in Korea, both database marketing and database marketing industry stays far behind compared to other countries because it is practically very hard to legally trade personal data for database marketing purpose. Instead Korea has a illegal spam problem which might be a natural consequency of strong restriction on personal data in the situation of huge demand for personal data. KT SODiS can be called the frontier of Korea's database marketing industry since it is the first legal business in this area. In the first 5 months, SODiS obtained 2 millions of legal customer consents which can be the strong base to help database marketing activities of other companies. This case shows marketing strategies of KT SODiS to establish infrastructure for Korea's database marketing industry and suggests some future tasks to further develop the industry.

  • PDF

Ecological and Geomorphic Fallout of Escalating River Mining Activities: A Review

  • Sk. Rakibul Islam;Rafi Uddin;Miftahul Zannat;Jahangir Alam
    • Economic and Environmental Geology
    • /
    • v.57 no.3
    • /
    • pp.293-303
    • /
    • 2024
  • River mining, the extraction of sand and gravel from riverbeds, is rising at an alarming rate to keep pace with the increasing demand for construction materials worldwide. The far-reaching deleterious effects of river mining include the lowering of water levels, the augmentation of turbidity, and the erosion of riverbanks, i.e., the disruption of water flow and alteration of river morphology. Aggregates demand, geolocation, and the economy of Bangladesh accelerated illegal extraction. However, limited research has been carried out in this region, despite the severe impact on aquatic and terrestrial ecosystems. To address the corresponding consequences and direct the scope for further research, it is required to evaluate existing studies of other countries having similarities in river morphology, climate, economy, and other related parameters. In this respect, based on previous studies, the effects of sand extraction are particularly prominent in India, having 54 cross-boundary rivers with Bangladesh. The geological profile of numerous rivers in the past decades has been altered due to natural aggregate mining in the Indian subcontinent. Hence, this study focused on relevant research in this region. However, the existing research only focuses on the regional portion of the aforementioned international rivers, which lacks proper assessments of these rivers, taking into account especially the mining effects. Moreover, several global rivers that have similarities with Bangladeshi rivers, considering different parameters, are also included in this study. The findings of this article underline the pressing need for more efficacious measures to address the adverse effects of river mining and safeguard ecosystems and communities globally, especially in the Indian subcontinent, where the situation is particularly vulnerable. For this reason, targeting the aforementioned region, this review highlights the global evidence in assessing the future effects of river mining and the need for further research in this field.

Research on Object Detection Library Utilizing Spatial Mapping Function Between Stream Data In 3D Data-Based Area (3D 데이터 기반 영역의 stream data간 공간 mapping 기능 활용 객체 검출 라이브러리에 대한 연구)

  • Gyeong-Hyu Seok;So-Haeng Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.551-562
    • /
    • 2024
  • This study relates to a method and device for extracting and tracking moving objects. In particular, objects are extracted using different images between adjacent images, and the location information of the extracted object is continuously transmitted to provide accurate location information of at least one moving object. It relates to a method and device for extracting and tracking moving objects based on tracking moving objects. People tracking, which started as an expression of the interaction between people and computers, is used in many application fields such as robot learning, object counting, and surveillance systems. In particular, in the field of security systems, cameras are used to recognize and track people to automatically detect illegal activities. The importance of developing a surveillance system, that can detect, is increasing day by day.

Drone Flight Record Forensic System through DUML Packet Analysis (DUML 패킷 분석을 통한 드론 비행기록 포렌식 시스템)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.103-114
    • /
    • 2024
  • In a situation where drone-related crimes continue to rise, research in drone forensics becomes crucial for preventing and responding to incidents involving drones. Conducting forensic analysis on flight record files stored internally is essential for investigating illegal activities. However, analyzing flight record files generated through the exclusive DUML protocol requires a deep understanding of the protocol's structure and characteristics. Additionally, a forensic analysis tool capable of handling cryptographic payloads and analyzing various drone models is imperative. Therefore, this study presents the methods and characteristics of flight record files generated by drones. It also explains the structure of the flight record file and the features of the DUML packet. Ultimately, we conduct forensic analysis based on the presented structure of the DUML packet and propose an extension forensic analysis system that operates more universally than existing tools, performing expanded syntactic analysis.

Examining Public Responses to Transgressions of CEOs on YouTube: Social and Semantic Network Analysis

  • Jin-A Choi;Sejung Park
    • Journal of Contemporary Eastern Asia
    • /
    • v.23 no.1
    • /
    • pp.18-34
    • /
    • 2024
  • In what was labeled the "nut rage" incident, the vice president of Korean Air, Hyun-Ah Cho (Heather Cho), demonstrated behavior that exemplifies corporate transgression and deviation from societal moral standards toward a flight attendant aboard a flight. Such behavior instigated the public to express negative sentiment on various social media platforms. This study investigates word-of-mouth network on YouTube in response to the crisis, patterns of co-commenting activities across selected YouTube videos, as well as public responses to the incident by employing social and semantic network analysis. A total of 512 YouTube videos featuring the crisis from December 8, 2014 through November 11, 2018, and 52,772 public comments to the videos were collected. The central videos in the network successfully attracted the public's attention and engagements. The results suggest that the video network was decentralized, with multiple videos acting as hubs in the network. The public commented on various videos instead of focusing on a few. The contents of influential videos uploaded by popular news organizations revealed not only Cho's behaviors related to the nut rage crisis but also unrelated illegal behaviors and the moral violations committed by the family members of Korean Air. The public attached derogatory remarks to Cho and her family, and the comments also addressed ethical concerns, management issues of the company, and boycott intentions. The results imply that adverse public reaction was related to the long-standing problem caused by family ownership and governance in large Korean corporations. This Korean Air scandal illustrates backlash toward a leadership breakdown by the family business conglomerate prevalent in the Korean society. This study provides insights for effective handling of similar crises.

DNA barcoding of fish diversity from Batanghari River, Jambi, Indonesia

  • Huria Marnis;Khairul Syahputra;Jadmiko Darmawan;Dwi Febrianti;Evi Tahapari;Sekar Larashati;Bambang Iswanto;Erma Primanita Hayuningtyas Primanita;Mochamad Syaifudin;Arsad Tirta Subangkit
    • Fisheries and Aquatic Sciences
    • /
    • v.27 no.2
    • /
    • pp.87-99
    • /
    • 2024
  • Global climate change, followed by an increase in anthropogenic activities in aquatic ecosystems, and species invasions, has resulted in a decline in aquatic organism biodiversity. The Batanghari River, Sumatra's longest river, is polluted by mercury-containing illegal gold mining waste (PETI), industrial pollution, and domestic waste. Several studies have provided evidence suggesting a decline in fish biodiversity within the Batanghari River. However, a comprehensive evaluation of the present status of biodiversity in this river is currently lacking. The species under investigation were identified through various molecular-based identification methods, as well as morphological identification, which involved the use of neighbor-joining (NJ) trees. All collected specimens were initially identified using morphological techniques and subsequently confirmed with molecular barcoding analysis. Morphological and DNA barcoding identification categorized all specimens (1,692) into 36 species, 30 genera and 16 families, representing five orders. A total of 36 DNA barcodes were generated from 30 genera using a 650-bp-long fragment of the mitochondrial cytochrome oxidase subunit I (COI) gene. Based on the Kimura two-parameter model (K2P), The minimum and maximum genetic divergences based on K2P distance were 0.003 and 0.331, respectively, and the average genetic divergence within genera, families, and orders was 0.05, 0.12, 0.16 respectively. In addition, the average interspecific distance was approximately 2.17 times higher than the mean intraspecific distance. Our results showed that the COI barcode enabled accurate fish species identification in the Batanghari River. Furthermore, the present work will establish a comprehensive DNA barcode library for freshwater fishes along Batanghari River and be significantly useful in future efforts to monitor, conserve, and manage fisheries in Indonesia.

A Study on the System of Private Investigation

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.167-174
    • /
    • 2022
  • Since the Promotion Committee was established on March 25, 2021, urging the enactment of the Detective Business Act, many opinions and attention from all walks of life have been gathered. The Detective Business system, which is also one of the presidential pledges of the current 19th President Moon Jae In, is expected to be significant in that it can promote the development of a welfare state as well as efficient parts such as meeting the demand for security reinforcement services, improving the judicial system, and enhancing internationalization. In accordance with the consensus of the nine judges of the Constitutional Court that the lower part of Article 40 of the "Act on the Use and Protection of Credit Information" which prohibits the use of similar names such as investigating the general life of certain people does not violate the Constitution, detective work became possible regardless of the general life investigation. In particular, the detective job officially appeared on August 5, 2020, and it will be able to provide effective work services to the public by competing with prosecutors, police, and lawyers who have occupied exclusive positions in the field of a criminal investigations. However, although the role of detectives is gradually expanding and society is rapidly changing, illegal activities are prevalent throughout society, and more than 1,600 companies are currently operating suspiciously using the only name of "detectives", but the police are virtually letting go of the situation saying that they are "unauthorized.", and the damage is only going to the people, so at this point, the most worrisome thing is the absence of the law. Meanwhile, amid concerns over institutions overseeing illegal activities caused by the emergence of the detective industry, private security and detectives are similar to each other as in the United States, and it is expected to be able to gain public trust by entrusting the police in charge of managing and supervising private security companies. Therefore, at this time when most OECD countries except Korea legislate the Detective Business Act, prematurely allowing only the detective industry without enacting industry-related laws and systems can further fuel social confusion and hinder the detective industry along with the new fourth industry.

Chinese Maritime Dispute Strategy for territorialization in Korea's West Sea (중국의 한국 서해 내해화 전략 분석)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.113-136
    • /
    • 2022
  • China has been pushing for a systematic strategy for territorialization over a long period of time to invade Korea's West Sea (Yellow Sea) in order to create China's territorial water. China's strategy for territorializing the West Sea is an activity in which China curbs the use of South Korea and enforces the illegal use of China in order to dominate the West Sea exclusively. China aided Chinese fishing boats that engaged in illegal fishing in Korea's jurisdiction as a means to territorialize the West Sea, and is opposed to combined exercise and training of Korea and the United States Naval Forces in the West Sea, while intentionally entering KADIZ(Korea Air Defense Identification Zone). In addition, Beijing used 'scientific exploration and research' measures as a pretext for its strategies in order to encroach on Korea's West Sea. China is carrying out such work to announce to the world that China is a systematic and organized country while consistently attempting to dominate the West Sea. China's activities in the West Sea seriously infringe South Korea's sovereignty. In order to respond to China's strategies of territorialization in the West Sea stated above, I analyzed the rejection effect of the ROK-US combined military training in the West Sea and presented a 'proportional response strategy centered on the ROK-US combined forces'. Korea should be able to respond proportionally to China's activities in the seas around the Korean peninsula, and Korea should be able to neutralize China's attempt to a Fait Accompli. In addition, just as China installs buoys in the Korea-China Provisional Measures Zone, Korea should be able to install and actively utilize some devices in the West Sea and for the use of free and open West Sea. Korea should not just wait for the tragic future to come without preparing for China's gradual and long-term strategy, and Seoul needs to respond to China's maritime policy in the West Sea with a more active attitude than it is now. China has historically taken a bold and aggressive response to neighboring countries that are consistent with a passive attitude, on the other hand, Beijing has taken a cautious approach to neighboring countries that respond with an active attitude. It should not be forgotten that Korea's passive response to the Chinese strategy in the name of a 'realistic approach' such as Korea's economic dependence on China for economy will result in China's success for territorialization of the West Sea.

  • PDF

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.