• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.025 seconds

The Rhetorical Features of the Sijo During Chosun Dynasty (조선조(朝鮮朝) 산수시조(山水時調)의 수사적(修辭的) 특성(特性))

  • Choi, Dong-Kook
    • Sijohaknonchong
    • /
    • v.25
    • /
    • pp.129-144
    • /
    • 2006
  • The purpose of this paper is to reveal the rhetorical features of the Chosun Sijo through researching them. A poem has been made by imagination and rhetorics which are based on the poet's experience. The qualifies of the Poem have been determined by how the poet described the object oddly. So it is essential for the poet to struggle to make embellishments and artistic skills when he or she makes a poem. But the Chosun clerisy ostracized the poet who was trying to do these things mentioned above, which was a kind of special poetic point of view the Chosun clerisy had. They recognized embellishments and artistic skills as a resort to petty trick as a result of their sticking to the external form of the objects. The reason they thought them like this was that the Chosun clerisy thought the embellishments and artistic skills could show the self-pride and self-righteousness. Also, there were concerns on the distortion of the object nature by the artificial concoction. Because they can interrupted and distorted the stream of feeling and the original meaning, the artistic skills mush not be recognized as the artistic skills of itself. As a result, they valued the poem made from restraining the rhetoric and artistic skills. They valued the poem which had common words related people's daily life, but was able to feel the simple Lyricism. The poem based on these features has remains as a work which makes people enjoy the nature, and face their life without any resorts, and which has the natural leeway.

  • PDF

A study on the Private Investigator usage for Cyber Crime (사이버범죄의 효과적인 대응을 위한 민간조사제도의 도입방안)

  • Shin, Hyun-Joo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.63-86
    • /
    • 2016
  • The object of this study is to propose a study on the Private Investigator usage for Cyber Crime. The latest trend of cyber crime is being evolve in sophisticated and complex way over the global, like internet fraud, cyber gambling, hacking and etc. Hence national investigative authority mobilize high specialized skills and method of criminal investigation by each nation. But it is hard to respond in rapid and effective way because of propoor, distribution of group and insufficient of related legal system. Already in other countries, not considerable amount of services are given to private investigators in detection and tracking part which is inefficient by nation. So it has significantly meaningful to compensate the defect and study about private investigator usage as companion of cooperation policing for effectively respond to cyber-crime. The way to effectively deal with the cyber-crime is reevaluate meaning of partnership policing and need of private investigator usage. Also it is to analyze the main issue about introduction of a system and suggest the effective way of introduction. First, legislation of private investigator usage which is based upon partnership policing should be made up. Moreover, to establish the range of private investigator's business and enhance the reliability, it is to propose introduction of leading professional global certificate and license system with sufficient education and test. We are expecting introduction of private investigator usage can improve efficiency of investigation and promote effective countermeasures of cyber-crime.

  • PDF

A Study on Rhetorical Expression of Public Information Design -Focus on Information Design Case for Seoul Public Transportation- (공공정보디자인의 수사학적 표현에 관한 연구 - 서울시 대중교통 정보디자인 사례를 중심으로 -)

  • Yang, Seung-Ju
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.95-104
    • /
    • 2005
  • Although the volume and complexity of available information have increased, our ability to process such volume of complex information has not been met with corresponding development. Information designers have been given the responsibility to address such unbalanced progress by developing effective visual systems to deliver and communicate such information to the masses in a manner that is quick and easy to process and understand. This study originated in recognition of these issues. This study seeks to find a solution to these issues in rhetorics in order to proliferate visual communications in recognition of the increasing importance of information and visual communication. Rhetorics, a field of study with a long history of analyzing the delivery of communication, provides numerous possibilities for the re-establishment of importance placed on visual information communication. Included in this study are (i) a thorough analysis of the principals of expression and logic offered by rhetorics, as applicable to information design (ii) a proposal to the solution to the above-mentioned issues encompassing the rhetoric process and methods of expression of information design and (iii) the practical application of these design principals to social activities. In order to provide an example of the practical use of the rhetoric methodology Presented in this study, we applied the rhetoric methodology to the 'Information Design for Public Transportation of Seoul.' and developed a new map and a guidebook. The raw data necessary for the foregoing were obtained through the analysis of the information designs that are currently in use in connection with mass transportation in Seoul and the survey evaluation conducted among Seoul residents. We modulated the infrastructure of Seoul by using 48 TAZs, computed the routes that are most likely to be used, and proposed the predictable information analysis process. The design proposed on this study encompasses color coding and use of combined information, and application of style and sequential information analysis process.

  • PDF

Nursing students' experience of visiting the National Institute for Scientific Investigation (간호대학생의 국립과학수사연구소 탐방 경험)

  • Kim, Mi-Hwa
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.35-41
    • /
    • 2021
  • The purpose is a qualitative study on the search for career paths of nursing students after visiting the National Institute of Science and Investigation. Participants in this study were 13 people who participated in the National Institute of Science and Investigation visit program during a club event for 3rd graders at a university in M city, Gyeongsangbuk-do. Data collection was made through a self-report within 48 hours of visiting the National Institute of Science and Investigation. The collected data were analyzed using Krippendorff's phenomenological method. As a result of analyzing the experiences of nursing students' visits to the National Institute of Forensic Science, 3 categories, 6 themes, and 20 meaningful statements were identified. The three categories were derived from "Beyond the boundaries of the nursing profession," "The difference between drama and reality", and "Challenge in a new field". As a result of this study, it was confirmed that the experience of visiting the National Institute of Forensic Science provided an understanding of forensic nurses and had opportunities for various social participation attitudes as nurses. In addition, it is expected to be used as basic data useful for career guidance and student counseling in the future, and it is expected to be used as basic data for educational demand structure and educational development for forensic nurses.

A Study on the Expansion of Workflow for the Collection of Surface Web-based OSINT(Open Source Intelligence) (표면 웹기반 공개정보 수집을 위한 워크플로우 확장 연구)

  • Lee, SuGyeong;Choi, Eunjung;Kim, Jiyeon;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.367-376
    • /
    • 2022
  • In traditional criminal cases, there is a limit to information collection because information on the subject of investigation is provided only with personal information held by the national organization of legal. Surface web-based OSINT(Open Source Intelligence), including SNS and portal sites that can be searched by general search engines, can be used for meaningful profiling for criminal investigations. The Korean-style OSINT workflow can effectively profile based on OSINT, but in the case of individuals, OSINT that can be collected is limited because it begins with "name", and the reliability is limited, such as collecting information of the persons with the same name. In order to overcome these limitations, this paper defines information related to individuals, i.e., equivalent information, and enables efficient and accurate information collection based on this. Therefore, we present an improved workflow that can extract information related to a specific person, ie., equivalent information, from OSINT. For this purpose, different workflows are presented according to the person's profile. Through this, effective profiling of a person (individuals) is possible, thereby increasing reliability in collecting investigation information. According to this study, in the future, by developing a system that can automate the analysis process of information collected using artificial intelligence technology, it can lay the foundation for the use of OSINT in criminal investigations and contribute to diversification of investigation methods.

Analysis of Fiber Damage data Due to Physical and Chemical Causes (물리적, 화학적 원인에 의한 섬유 손상 데이터 분석)

  • Ji-Young, Seo;You, Jae-Doo;Dong-Min, Lee;Cho-Won, Park;Young-Wook, Woon
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.93-101
    • /
    • 2023
  • In this study, the physical and chemical fiber damage caused by knives, scissors, and chemicals was analyzed and used as technical data to determine the cause of the damage. Using 4 types of knives, 5 types of scissors and 4 types of chemicals(Sulfuric Acid, Hydrochloric Acid, Sodium Hydroxide, Potassium Hydroxide) physical and chemical to Cotton, Wool, Polyester, Rayon, T/C (Polyester 50%, Cotton 50%), T/W (Polyester 50%, Wool 50%) Damages were created and analyzed for damage caused by tools and chemicals. For penetrating damage caused by knives and scissors, 'V' type damage was generally seen when the blade part was penetrated, 'T', 'ㅁ', ''C' type damage was found, and in the case of scissors, 'Y' ' This type of damage was common. Fiber damage caused by chemicals showed various damage such as remanent trace, corrosion, degraded, contracting, and color changes. Physical damage of fibers showed differences in characteristics according to the shape characteristics of tools, and chemical damage showed differences in characteristics according to chemicals and types of fibers.

Developing of latent fingerprint on human skin (생체피부에서의 잠재지문 현출)

  • Lee, Hee-Il;Choi, Mi-Jung;Kim, Jai-Hoon;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.21 no.3
    • /
    • pp.222-228
    • /
    • 2008
  • On living skin the chances of a successfully developing latent fingerprint are very limited. This is due to the fact that continual perspiration and rapid absorption diffuse into the lipophillic layer on skin. A study was conducted to investigate effectively developing method of latent fingerprints on human skin surfaces and pig skin likely corpse's skin. We used commercial fingerprint powder, black powders, black magnetic powder, fluorescence magnetic powder, Cyanoacrylate fuming (CA) and direct lifting methods (lifting paper, glasses and photo glossy paper). Developing of fresh fingerprints on living skin was achieved with S-powderblack, CA fuming and CA fuming following S-powder, fluorescence powder. The other powder tends to overwhelm the latent print and the background. But, latent fingerprint residue was disappeared with time after deposit on a living surface. In case of pig skin likely corpse's skin, latent fingerprint detection was achieved with CA fuming following S-powder and deposited print during 6 hr at $25^{\circ}C$, 40% relative moisture yielded excellent fingerprints with clear ridge details using 1 min CA fuming. And enhancement of fingerprint detection image using forensic light source was achieved.

Evaluation of two DNA extraction methods on exhumed bone samples: Ultrafiltration versus column affinity (유골에서 DNA 추출법 비교 연구: Ultrafiltration과 Column affinity)

  • Kim, Soonhee;Hong, Seungbeom;Kemp, Brian M.;Park, Kiwon;Han, Myunsoo
    • Analytical Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.338-343
    • /
    • 2008
  • Extraction of DNA from skeletal material is of great importance in the identification of human remains, but is particularly difficult because the high amount of microbial DNA was often co-extracted with human bone DNA. We found that a phenol/chloroform extraction, followed by ultrafiltration, and cleanup by via the $QIAquick^{(R)}$ PCR purification kit yields higher amounts of human genomic DNA compared with extraction by the column affinity $method^{(R)}$ alone. Ultrafiltration extraction of human DNA from ten exhumed bone samples yielded $0.041-1.120ng/{\mu}L$ DNA (mean = $0.498ng/{\mu}L$ DNA), and purification using the column affinity resulted in $0.016-0.064ng/{\mu}L$ DNA (mean = $0.034ng/{\mu}L$ DNA). Although the STR genotyping by the column affinity method was partially successful, all DNA samples by the ultrafiltration method produced full profiles from the multiplex PCR. The efficiency of STR genotyping was in accordance with the amounts of the human DNA extracted.

The cutoff criterion and the accuracy of the polygraph test for crime investigation (범죄수사를 위한 거짓말탐지 검사(polygraph test)의 판정기준과 정확성)

  • Yu Hwa Han ;Kwangbai Park
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.4
    • /
    • pp.103-117
    • /
    • 2008
  • The polygraph test administered by the Korean Prosecutors Office for crime investigations customarily uses the score of -12 as the cutoff point separating the subjects who lie from those who tell the truth. The criterion used by the KPO is different from the one (-13) suggested by Backster (1963) who invented the particular method for lie detection. Based on the signal detection theory applied to the real polygraph test data obtained from real crime suspects by the KPO, the present study identified the score of -8 as an optimal criterion resulting in the highest overall accuracy of the polygraph test. The classification of the subjects with the score of -8 as the criterion resulted in the highest accuracy (83.17%) compared with the accuracies of classifications with the Backster's criterion (76.24%) and the KPO's criterion (80.20%). However, the new criterion was also found to result in more false-positive cases. Based on the results from the present study, it was recommended to use the score of -8 as the criterion when the overall accuracy is important but the score of -12 or -13 when avoiding false-positive is more important than securing the overall accuracy.

  • PDF

Application Example of Forensic Speaker Analysis Method for Voice-phishing Speech Files (보이스피싱 음성 파일에 대한 법과학적 화자 분석 방법의 적용 사례)

  • 박남인;이중;전옥엽;김태훈
    • Journal of Digital Forensics
    • /
    • v.13 no.1
    • /
    • pp.35-44
    • /
    • 2019
  • The voice-phishing is done by inducing victims to send money, only with voice through the personal information illegally obtained. The amount of damage caused by voice-phishing continues to increase every year, and it became a social problem. Recently, the Financial Supervisory Service (i.e. the FSS) in Republic of Korea has been collecting the voices of voice-phishing scamer from victims. In this paper, we describe an effective forensic speaker analysis method for detecting the voice from the same person compared with the large-scale speech files stored in database(DB), and apply the aforementioned forensic speaker analysis method with the collected voice-phising speech files from victims. At first, an i-vector of each speech file had been extracted from the DB, then, the cosine similarity matrix for the all speech files had been generated through the cosine distance among the extracted the i-vectors of all speech file in DB. In other words, it performed the speaker analysis as grouping a set of candidates with high common similarity among i-vectors of all speech files in DB. As a result of EER(Error Equal Rate) measurement for 6,724 speech files composed of 82 speakers, it was confirmed that the EER of the i-vector-based method is improved than that of the GMM-based method. Finally, as a result of comparing the collected 2,327 voice-phishing speech files collected by the FSS, it was shown that some of the speech files having similar voice features were grouped each other.