• 제목/요약/키워드: profiling.

Search Result 1,533, Processing Time 0.025 seconds

Criminal Profiling Simulation Training and Assessment System based on Virtual Reality (가상현실 기반 범죄 프로파일링 시뮬레이션 교육 및 평가 시스템)

  • Kim, Han-Seob;Kim, Hae-Ji;Lee, Yoon-Sik;Lee, Jieun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.24 no.3
    • /
    • pp.83-92
    • /
    • 2018
  • In this paper, we propose a system to a criminal profiling simulation training and assessment with virtual reality technology. Profiling has emerged as the incidence of violent crime has increased by 45.2 % in the country over the past decade. However, the number of profilers in Korea is 36, due to the problem of existing courses. "Criminal Reproduction Learning" is the common way to profiling training, but there are numerous constraints that prevent practical training. Thus, the system used virtual reality technology to overcome existing constraints. Users can receive simulation training and assessment of profiling at crime scene that have been implemented as virtual reality, with an immersive experience through interaction. We expect this system to contribute to the activation of profiling education in many institutions and to the development of good profilers with diverse training.

Application Plan of U.S Aviation Profiling for Prevention of Air Terrorism in Korea (항공테러 예방을 위한 미국 항공프로파일링 기법의 국내 활용방안)

  • Yang, Seung-Don;Yang, Young-Mo
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.33-56
    • /
    • 2014
  • This study is aim to make use of prevention of air terrorism and strengthen of air security in Korea. To achieve it. searching main feature in U.S aviation profiling. Aviation profiling in U.S used to Secure Flight, Screening Passengers by Observation Technique, Registered Travel Program. Through U.S Aviation Profiling, Prevention of air terrorism in Korea are as in the following. First, Through U.S Aviation Profiling, Information of terrorism constructed in advance and unification of constructed information. Second, Identifiying that institution exclusively for prevention of air terrorism. Third, Identifiying that human rights and privacy invasion to a minimun plan anout U.S aviation profiling. Finally, Identifiying that the spread of research development for prevention of air terrorism and strengthen of air security in Korea.

  • PDF

A Study on the Intellectual Structure Analysis by Keyword Type Based on Profiling: Focusing on Overseas Open Access Field (프로파일링에 기초한 키워드 유형별 지적구조 분석에 관한 연구 - 국외 오픈액세스 분야를 중심으로 -)

  • Kim, Pan Jun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.4
    • /
    • pp.115-140
    • /
    • 2021
  • This study divided the keyword sets searched from LISTA database focusing on the overseas open access fields into two types (controlled keywords and uncontrolled keywords), and examined the results of performing an intellectual structure analysis based on profiling for the each keyword type. In addition, these results were compared with those of an intellectual structural analysis based on co-word analysis. Through this, I tried to investigate whether similar results were derived from profiling, another method of intellectual structure analysis, and to examine the differences between co-word analysis and profiling results. As a result, there was a similar difference to the co-word analysis in the results of intellectual structure analysis based on profiling for each of the two keyword types. Also, there were also noticeable differences between the results of intellectual structural analysis based on profiling and co-word analysis. Therefore, intellectual structure analysis using keywords should consider the characteristics of each keyword type according to the research purpose, and better results can be expected to be used based on profiling than co-word analysis to more clearly understand research trends in a specific field.

A Wide-Window Superscalar Microprocessor Profiling Performance Model Using Multiple Branch Prediction (대형 윈도우에서 다중 분기 예측법을 이용하는 수퍼스칼라 프로세서의 프로화일링 성능 모델)

  • Lee, Jong-Bok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.7
    • /
    • pp.1443-1449
    • /
    • 2009
  • This paper presents a profiling model of a wide-window superscalar microprocessor using multiple branch prediction. The key idea is to apply statistical profiling technique to the superscalar microprocessor with a wide instruction window and a multiple branch predictor. The statistical profiling data are used to obtain a synthetical instruction trace, and the consecutive multiple branch prediction rates are utilized for running trace-driven simulation on the synthesized instruction trace. We describe our design and evaluate it with the SPEC 2000 integer benchmarks. Our performance model can achieve accuracy of 8.5 % on the average.

Customer Behavior Based Customer Profiling Technique for Personalized Products Recommendation (개인화된 제품 추천을 위한 고객 행동 기반 고객 프로파일링 기법)

  • Park, You-Jin;Jung, Eau-Jin;Chang, Kun-Nyeong
    • Korean Management Science Review
    • /
    • v.23 no.3
    • /
    • pp.183-194
    • /
    • 2006
  • In this paper, we propose a customer profiling technique based on customer behavior for personalized products recommendation in Internet shopping mall. The proposed technique defines customer profile model based on customer behavior Information such as click data, buying data, market basket data, and interest categories. We also implement CBCPT(customer behavior based customer profiling technique) and perform extensive experiments. The experimental results show that CBCPT has higher MAE, precision, recall, and F1 than the existing other customer profiling technique.

A Study for the Criminal Profiling of Arsonists (방화범죄자에 대한 Criminal Profiling 적용 가능성 고찰)

  • Kim, Kyeong-Ok
    • Journal of Korean Institute of Fire Investigation
    • /
    • v.11 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Recently, police agency and social scientists' interest in the criminal profiling is increasing. Since serial killings had sharply increased during 1960s in U.S. the American law enforcement agency were pushed to solve those criminal incidents. Therefore, they drew various investigative techniques. But there are no study for the criminal profiling of arsonists. So, this paper reviewed prior studies on the arsonist's type and suggested how to apply this kind of basic information for investigating arson cases in Korea.

  • PDF

Perception of Offender Profiling and its Development Strategies (범죄자 프로파일링에 대한 인식과 발전 방향)

  • Park, Ji-Sun;Choi, Nak-Bum
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.413-423
    • /
    • 2012
  • Offender profiling, as a crime investigation technique, aims to respond more effectively to violent crimes. However, attitude that police investigators hold toward offender profiling is quite skeptical, which prevents offender profiling from making effective and practical contributions to police investigations. Therefore, the present study explored development strategies of offender profiling by examining perceptions of offender profiling among 156 Korean National Police University students. Furthermore, a total of 166 students from other universities also participated as a control group. As a result, participants showed positive attitude toward offender profiling, in terms of its necessity, effectiveness, and reliability. However, they believed that Korean police agencies are not making the good use of offender profiling and that profilers are not necessarily taking the lead in solving cases. In terms of the profiler education, the majority of the students who showed interest in becoming a profiler did not know what to learn and how to prepare for becoming one. Finally, limitations of the present study were discussed and suggestions for further research were made.

Andro-profiler: Anti-malware system based on behavior profiling of mobile malware (행위기반의 프로파일링 기법을 활용한 모바일 악성코드 분류 기법)

  • Yun, Jae-Sung;Jang, Jae-Wook;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.145-154
    • /
    • 2014
  • In this paper, we propose a novel anti-malware system based on behavior profiling, called Andro-profiler. Andro-profiler consists of mobile devices and a remote server, and is implemented in Droidbox. Our aim is to detect and classify malware using an automatic classifier based on behavior profiling. First, we propose the representative behavior profiling for each malware family represented by system calls coupled with Droidbox system logs. This is done by executing the malicious application on an emulator and extracting integrated system logs. By comparing the behavior profiling of malicious applications with representative behavior profiling for each malware family, we can detect and classify them into malware families. Andro-profiler shows over 99% of classification accuracy in classifying malware families.

Power Trace Selection Method in Template Profiling Phase for Improvements of Template Attack (프로파일링 단계에서 파형 선별을 통한 템플릿 공격의 성능 향상)

  • Jin, Sunghyun;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.15-23
    • /
    • 2017
  • Template attack is a powerful side-channel analysis technique which can be performed by an attacker who has a test device that is identical to target device. Template attack is consisted of building template in profiling phase and matching the target device using template that were calculated in profiling phase. One methods to improve the success rate of template attack is to better estimate template which is consisted sample mean and sample covariance matrix of gaussian distribution in template profiling. However restriction of power trace in profiling phase led to poor template estimation. In this paper, we propose new method to select noisy power trace in profiling phase. By eliminating noisy power trace in profiling phase, we can construct more advanced mean and covariance matrix which relates to better performance in template attack. We proved that the proposed method is valid through experiments.