• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.03 seconds

A Study on the Crime Prevention Smart System Based on Big Data Processing (빅데이터 처리 기반의 범죄 예방 스마트 시스템에 관한 연구)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.75-80
    • /
    • 2020
  • Since the Fourth Industrial Revolution, important technologies such as big data analysis, robotics, Internet of Things, and the artificial intelligence have been used in various fields. Generally speaking it is understood that the big-data technology consists of gathering stage for enormous data, analyzing and processing stage and distributing stage. Until now crime records which is one of useful big-sized data are utilized to obtain investigation information after occurring crimes. If crime records are utilized to predict crimes it is believed that crime occurring frequency can be lowered by processing big-sized crime records in big-data framework. In this research the design is proposed that the smart system can provide the users of smart devices crime occurrence probability by processing crime records in big-data analysis. Specifically it is meant that the proposed system will guide safer routes by displaying crime occurrence probabilities on the digital map in a smart device. In the experiment result for a smart application dealing with small local area it is showed that its usefulness is quite good in crime prevention.

Characteristics of the Mobility with Figurative Approach in Location based Games (위치기반게임의 이동성 반영 구조에 관한 문채적 접근: <패러랠 킹덤(Parallel Kingdom)>을 중심으로)

  • Kwon, Boh-Youn
    • Journal of Korea Game Society
    • /
    • v.15 no.2
    • /
    • pp.33-42
    • /
    • 2015
  • This study analyzes location based game focused on the figurative characteristics of mobility. The purpose of this analysis is to extend the understandings of game mobility from technical side toward rhetorical territory. Christian Metz's film theory is appropriate for analysis of the game which is visual and combinational text. According as research findings, structuralize 5-layered spatial maps. And this kind of multi-layering structure generates figurative operations. Adaptive mobility by metaphor, it reflects player's real world movement into the virtual space. Metonymy brings given mobility, it reflects character's movement through all of the virtual maps.

Applying CBR algorithm for cyber infringement profiling system (사례기반추론기법을 적용한 침해사고 프로파일링 시스템)

  • Han, Mee Lan;Kim, Deok Jin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1069-1086
    • /
    • 2013
  • Nowadays, web defacement becomes the utmost threat which can harm the target organization's image and reputation. These defacement activities reflect the hacker's political motivation or his tendency. Therefore, the analysis of the hacker's activities can give the decisive clue to pursue criminals. A specific message or photo or music on the defaced web site and the outcome of analysis will be supplying some decisive clues to track down criminals. The encoding method or used fonts of the remained hacker's messages, and hacker's SNS ID such as Twitter or Facebook ID also can help for tracking hackers information. In this paper, we implemented the web defacement analysis system by applying CBR algorithm. The implemented system extracts the features from the web defacement cases on zone-h.org. This paper will be useful to understand the hacker's purpose and to plan countermeasures as a IDSS(Investigation Detection Support System).

Washington on a New Watershed in Denuclearization on the Korean Peninsula: Rethinking Its Strategies toward North Korea's Nuclear Development (한반도 비핵화의 분수령에 선 미국 : 미 대북핵 정책에 대한 재고(再考))

  • Lim, Jiyoung
    • Strategy21
    • /
    • s.43
    • /
    • pp.273-302
    • /
    • 2018
  • 1980년대 북 핵개발을 처음 발견 이후, 미국은 북한의 비핵화라는 정책목적달성을 위해 다양한 정책을 사용해 왔지만 현재까지 실패하였다. 미국의 대북 정책 실패의 결과는 북핵 문제의 고착화 속에서, 평양의 핵무기 개발 가속화 야기로 한반도 및 미국을 핵위협 속에 놓이게 하였다. 특히, 지난 해, 북미간의 가열된 공격적 수사와 행동에 의한 한반도 위기설은 절정에 달하였다. 해결의 실마리가 보이지 않던 한반도의 갈등 및 위기는, 지난 4월에 열린 남북 정상회담을 통해 25년간의 핵위협의 굴레를 벗어날 기회를 다시 한번 맞이하게 되었다. 남북 정상회담 이후 이어질 북미 정상회담 등 향후 미국의 정책은 한반도 비핵화를 위한 중요한 분수령에 다시 한번 서있다. 하지만, 과거의 25년간의 역사는 다시 맞이한 '한반도의 봄'에 대한 낙관적 희망만을 주지 않는다. 과거, 양자적, 다자적 협상을 이룸에도 불구하고, 북핵 문제는 다시 위기에 접어드는 반복된 패턴과 사이클 속에 악화 되어 왔기 때문이다. 비핵화의 분수령에 있는 미 정부는 다시 한번 과거의 정책을 뒤돌아 보고, 남북 정상회담을 통해 어렵게 맞이한 기회를 결실로 이룰 수 있도록 어느 때 보다 신중한 노력이 필요하다. 최근 몇 달간 북핵 문제는 경이로운 속도로 진전을 보였지만, 한순간의 정책의 실패는 최근 보여진 진전의 속도 이상의 속도로 문제를 악화 시킬 수 있으며, 그 결과는 작년 여름과 겨울의 위기보다 더욱 심각 할 수 있음을 명심해야 한다. 이러한 점에서 이 보고서는 과거의 역사 및 이론적 분석을 통해 과거 미국의 북핵정책 실패 원인을 분석하고 정책을 제언하는데 그 목적이 있다. 과거 미 북핵 실패의 원인은 크게 3가지로 보인다. 먼저, 포괄적인 그리고 북한 정권의 특성에서 비롯된 북핵 개발의 모티브를 정확히 이해하는데 실패하여, 북한의 정책적 계산을 변화 시키는데 실패 하였다. 둘째, 북한 문제를 둘러싼 외부적 복잡성이 미북핵 정책실패를 야기하였다. 한반도 문제는 과거부터 다양한 국가들의 이해관계에 둘러 싸여 왔다. 북핵 문제도 남북 및 미국을 비롯 중국 등 주변국의 복잡성이 불확실성을 가중시켜 문제를 더욱 복잡하게 하였으며, 미국의 대북 협상의 영향력을 약화 시켰다. 셋째, 과거 누적된 두 국가간의 불신은 협상 이후 상대의 신뢰 있는 이행에 대한 불신을 야기하여 미국의 정책의 효과성을 저해하였다. 미국은 북핵 개발 모티브에 대한 포괄적 이해와 한국 및 중국과의 다자외교로 과거의 실패를 극복하고 25년간의 북핵문제의 고리를 끊어야 할 것이다.

Comparative Analysis of TOA and TDOA method for position estimation of mobile station (이동국 위치 추정을 위한 TOA와 TDOA방법의 비교 분석)

  • 윤현성;호인석;이장호;변건식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.167-172
    • /
    • 2000
  • This paper is aimed at developing an location tracking for mobile station employing currently available mobile communication network of cellular phone and PCS(Personal Communication System). When the location tracking of mobile stations is in services, the services such as Emergency-119, crime investigation, effective urban traffic management or the safety protection of Alzheimer's patients, ran be available. This paper is to track the mobile station in communication network in NLOS environment. To achieve reduction of the standard noise, Kalman filter is used. In terms of the distance, positions are located by using TOA and TDOA methods in the environment that removes NLOS bias in the measured data. And then smoothing method is used. to achieve reduction of the position error values

  • PDF

A Study on Fantasy Character Using the Mythical Image (신화 이미지를 차용한 Fantasy Character에 관한 연구)

  • Joo, Hae-Jeong;Kim, Chee-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.358-361
    • /
    • 2011
  • The image shown on movie is purposes information and communication. For smooth communication, It borrows the character was a mystery to we can free and various interpretations from the perspective of consumers. it's induce interest. Current images of Fantasy used in the magical world of myth and modern gives satisfaction to ours. And various characters have been developed. It is especially directed in the past is not a from. And it is emerged as a symbolic and abstract from. Aesthetics of beautiful things that has changed from the grotesque, dan to the development. Therefore, Legendary character of the past reflect the present era, and was dismantled in the original meaning. Therefore, it is the center of that change, Myths about the character of borrowers to recognize that communication through to be able to maximize the expected.

  • PDF

A Study on the insurance crime using a false hospitalization (허위입원을 이용한 보험범죄에 대한 연구)

  • Park, Hyung Sik;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.79-87
    • /
    • 2015
  • In order to clearly recognize illegality of insurance crime, declaring the provisions on insurance crime is preferable. An insurance fraud differentiated from Configuration Requirements of general fraud should be established And differentiation in accordance with the act type of insurance crime the degree of organizational involvement is required. Also the introduction of civil sanctions and creation of additional punishment provision about Organized insurance fraud are required. To notice duplicate insurance when sign up life insurance, the revision of the provisions is required. To limit unnecessary long-term hospitalization, hospitalization standard is required. Introduction of private investigator is required as a method for endowing with investigation to the staff of insurance companies. By providing information sharing laws between relevant agencies including insurance companies and law enforcement agencies, the foundation of information database, and the introduction of SNA Techniques in the IFAS,, you can detect Organized collusion crime.

A Study on Methods for Capacity Building of Fire Cause Investigation in Fire Stations (소방기관의 화재원인조사 역량 강화 방안에 관한 연구)

  • Lee, Eui-Pyeong
    • Fire Science and Engineering
    • /
    • v.25 no.5
    • /
    • pp.108-118
    • /
    • 2011
  • In this study, strengths related with fire investigation of fire stations are analyzed and methods for the capacity building of their fire cause investigation are suggested. The methods for capacity building of fire cause investigation suggested are focused on using potential and strengths of current fire fighting and enhancing internal capacity rather than reinforcing investigation personnel, organization, and equipment and ensuring investigation power. The methods suggested in this study are as follows. 1) Because fire investigation results are the basis of fire administration, fire marshals should change their awareness of the need of fire investigation; 2) A fire investigation system should be established to ensure statements of people concerned systematically; 3) A substantial system of fire cause investigation should be established to investigate fire scenes more than twice; 4) A substantial system of fire cause investigation should be established to use such materials as CCTV; 5) Extinguishing should be made in consideration of fire cause investigation and a scene preservation system after extinguishing should be established; 6) A fire investigation system should be established in connection with 119 first-aid and rescue teams and 7) Steps to raise the morale of fire investigation staff should be taken.

Comparative Study of US and Korean Legal System on the Privilege against Self-Incrimination through Forced Unlocking in Digital Era (디지털시대 강제해독에 따른 자기부죄 거부 권리에 관한 미국과 한국의 제도 비교 연구)

  • Lee, Ook;Jee, Myung Keun;Lee, Dong Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.235-241
    • /
    • 2017
  • With the coming of the digital era, encryption has become common in everyday life. Almost anyone can easily acquire encryption software and use it to prevent unwanted third parties from accessing one's private information. However, the spread of encryption has also seriously hindered law enforcement during the investigation of cybercrimes, which hides incriminating digital evidence in encrypted hard drives and files. Therefore, many countries have attempted to compel criminals to decrypt encrypted evidence and it has been inevitable to examine privilege against self-incrimination as basic right on the side of constitution. This study analyzed the past court decisions on the issue of compelled decryption in the US and whether the Government can compel a defendant to disclose his password in Korean legal system on the constitutional side. Finally, this study suggests an approach to create a legal procedure to make it a crime for a suspect or defendant to refuse to disclose his password to law enforcement for criminal cases in Korea.

Analyzing Past User History through Recovering Deleted $UsnJrnl file (삭제된 $UsnJrnl 파일 복구를 통한 과거 사용자 행위 확인)

  • Kim, Dong-Geon;Park, Seok-Hyeon;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • These days, digital forensic technologies are being used frequently at crime scenes. There are various electronic devices at the scene of the crime, and digital forensic results of these devices are used as important evidence. In particular, the user's action and the time when the action took place are critical. But there are many limitations for use in real forensics analyses because of the short cycle in which user actions are recorded. This paper proposed an efficient method for recovering deleted user behavior records and applying them to forensics investigations, then the proposed method is compared with previous methods. Although there are difference in recovery result depending on the storage, the results have been identified that the amount of user history data is increased from a minimum of 6% to a maximum of 539% when recovered user behavior was utilized to forensics investigation.