• Title/Summary/Keyword: 범죄 기록

Search Result 66, Processing Time 0.024 seconds

An Analysis of Relationship Between Word Frequency in Social Network Service Data and Crime Occurences (소셜 네트워크 서비스의 단어 빈도와 범죄 발생과의 관계 분석)

  • Kim, Yong-Woo;Kang, Hang-Bong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.229-236
    • /
    • 2016
  • In the past, crime prediction methods utilized previous records to accurately predict crime occurrences. Yet these crime prediction models had difficulty in updating immense data. To enhance the crime prediction methods, some approaches used social network service (SNS) data in crime prediction studies, but the relationship between SNS data and crime records has not been studied thoroughly. Hence, in this paper, we analyze the relationship between SNS data and criminal occurrences in the perspective of crime prediction. Using Latent Dirichlet Allocation (LDA), we extract tweets that included any words regarding criminal occurrences and analyze the changes in tweet frequency according to the crime records. We then calculate the number of tweets including crime related words and investigate accordingly depending on crime occurrences. Our experimental results demonstrate that there is a difference in crime related tweet occurrences when criminal activity occurs. Moreover, our results show that SNS data analysis will be helpful in crime prediction model as there are certain patterns in tweet occurrences before and after the crime.

Classification Model of Types of Crime based on Random-Forest Algorithms and Monitoring Interface Design Factors for Real-time Crime Prediction (실시간 범죄 예측을 위한 랜덤포레스트 알고리즘 기반의 범죄 유형 분류모델 및 모니터링 인터페이스 디자인 요소 제안)

  • Park, Joonyoung;Chae, Myungsu;Jung, Sungkwan
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.9
    • /
    • pp.455-460
    • /
    • 2016
  • Recently, with more severe types felonies such as robbery and sexual violence, the importance of crime prediction and prevention is emphasized. For accurate and prompt crime prediction and prevention, both a classification model of crime with high accuracy based on past criminal records and well-designed system interface are required. However previous studies on the analysis of crime factors have limitations in terms of accuracy due to the difficulty of data preprocessing. In addition, existing crime monitoring systems merely offer a vast amount of crime analysis results, thereby they fail to provide users with functions for more effective monitoring. In this paper, we propose a classification model for types of crime based on random-forest algorithms and system design factors for real-time crime prediction. From our experiments, we proved that our proposed classification model is superior to others that only use criminal records in terms of accuracy. Through the analysis of existing crime monitoring systems, we also designed and developed a system for real-time crime monitoring.

A Study on the Crime Prevention Smart System Based on Big Data Processing (빅데이터 처리 기반의 범죄 예방 스마트 시스템에 관한 연구)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.75-80
    • /
    • 2020
  • Since the Fourth Industrial Revolution, important technologies such as big data analysis, robotics, Internet of Things, and the artificial intelligence have been used in various fields. Generally speaking it is understood that the big-data technology consists of gathering stage for enormous data, analyzing and processing stage and distributing stage. Until now crime records which is one of useful big-sized data are utilized to obtain investigation information after occurring crimes. If crime records are utilized to predict crimes it is believed that crime occurring frequency can be lowered by processing big-sized crime records in big-data framework. In this research the design is proposed that the smart system can provide the users of smart devices crime occurrence probability by processing crime records in big-data analysis. Specifically it is meant that the proposed system will guide safer routes by displaying crime occurrence probabilities on the digital map in a smart device. In the experiment result for a smart application dealing with small local area it is showed that its usefulness is quite good in crime prevention.

범죄음성의 식별

  • 고도흥
    • Proceedings of the KSLP Conference
    • /
    • 2003.11a
    • /
    • pp.176-179
    • /
    • 2003
  • 범인의 음성을 녹취하여 본격적으로 컴퓨터를 이용하여 음향분석을 하는 것은 스펙트로그래프가 등장하는 1940년대 말 이전에는 없었다고 해도 과언이 아니다. 그러나 청지각적인 문제는 아마 수 백년 전부터 법정에서 논란이 있었을 것으로 추정한다. 영국에서는 이미 1660년에 법정에서 청지각적인 검사를 시행하였다는 기록이 있으며, 미국에서는 20세기 초엽에 플로리다 주에서 이미 청지각적인 증거를 법정에서 채택하였다는 기록이 있다. 오늘날 범죄음성에 대한 연구는 무고한 어린이의 유괴와 폭발물 설치협박 등과 같은 죄질이 무거운 범죄에 이용되기 때문에 문제가 심각한 실정이다. (중략)

  • PDF

A Study on Fuzzy Searching Algorithm and Conditional-GAN for Crime Prediction System (범죄예측시스템에 대한 퍼지 탐색 알고리즘과 GAN 상태에 관한 연구)

  • Afonso, Carmelita;Yun, Han-Kyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.149-160
    • /
    • 2021
  • In this study, artificial intelligence-based algorithms were proposed, which included a fuzzy search for matching suspects between current and historical crimes in order to obtain related cases in criminal history, as well as conditional generative adversarial networks for crime prediction system (CPS) using Timor-Leste as a case study. By comparing the data from the criminal records, the built algorithms transform witness descriptions in the form of sketches into realistic face images. The proposed algorithms and CPS's findings confirmed that they are useful for rapidly reducing both the time and successful duties of police officers in dealing with crimes. Since it is difficult to maintain social safety nets with inadequate human resources and budgets, the proposed implemented system would significantly assist in improving the criminal investigation process in Timor-Leste.

Created Time of File and Log Abusing Unreliable System Time and a Solution (시스템 시간을 악용한 신뢰할 수 없는 파일과 로그의 생성시간과 해결 방안)

  • Yoon, Se-Won;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.382-385
    • /
    • 2010
  • 컴퓨터가 우리 생활에 밀접하게 관련된 만큼 각종 범죄에서도 컴퓨터와 관련된 사건이 증가하고 있다. 범죄와 관련된 컴퓨터에서 법정에 제출하기 위해 증거를 분석하고 제출하는 과정을 디지털 포렌식이라 한다. 대표적인 포렌식으로는 사용자의 행위를 기록한 로그 분석이 있다. 반대로 증거 분석을 방해하는 과정을 안티 디지털 포렌식이라 한다. 본 논문에서는 시스템 시간을 변경해 로그 기록시간을 허위로 기록할 수 있는 가능성과 해결 방안을 알아본다.

  • PDF

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.

Crime Prediction Model based on Meteorological Changes and Discomfort Index (기상변화 및 불쾌지수에 따른 범죄발생 예측 모델)

  • Kim, JongMin;Kim, MinSu;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.89-95
    • /
    • 2014
  • This study analyzed a correlation between crime and meteorological changes and discomfort index of Seoul and p resented a prediction expression through the regression analysis. For data used in this study, crime data from Januar y 2008 to December 2012 of Seoul Metropolitan Police Agency and meteorological records and discomfort index recor ded in the Meteorological Agency through the portal sites were used. Based on this data, SPSS 18.0 was used for the regression analysis and the analysis of correlation between crime and meteorological changes and discomfort index and a prediction expression was derived through the analysis and the risk index was shown in 5 steps depending on predicted values obtained through the prediction expression derived. The risk index of 5 steps classified like this is considered to be used as important data for crime prevention activities.

A Study on the allowed range of viewing and copying right of criminal victim's investigation records (범죄 피해자의 수사기록 열람·등사권의 허용 범위에 관한 연구)

  • NAM, SEON MO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • In this study, I set the allowable range of viewing / copying rights of investigation records on criminal victims and bereaved families in the procedure of investigation. I tried to grasp the contents of the suspect's statement at an early stage and support it in order to cope appropriately Recently, the social consideration of people suffering from crime victims is expanding in fact. The scope of the investigation is set by the lawyer of the suspect in relation to the subordinate statute concerning the investigation and reading of the investigation record. In parallel, it is necessary to apply to the victim's lawyer or bereaved. This is a part that coincides with the purpose of certifying private rights such as browsing of litigation records to the victim and ultimately has a purpose related to the allowable range. Although it is the right to receive the investigation result at each stage, it is not used properly. Especially when distorted investigation progresses, if the suspect is not prosecuted, the victim may be in a state of regret. The important part can be summarized as the question of whether the investigation of the victim's lawyer is allowed to view and access the criminal records. This section has been reviewed with a focus on the current Act and its functional aspects should be emphasized and revised in accordance with the legal environment. These findings will contribute to ensuring victims' rights in the future. It is also used as an important resource in the legislative process, including the revision of the criminal procedure law.

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.