• Title/Summary/Keyword: 식별방법

Search Result 2,309, Processing Time 0.035 seconds

A study on oil-contaminated fingerprints developing (유지문 현출법에 관한 연구)

  • Choi, Mi-Jung;Park, Won-Seok;Kim, Man-Ki;Jeon, Chung-Hyun;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.23 no.1
    • /
    • pp.89-96
    • /
    • 2010
  • In general, three types of fingerprints could be found at the crime scene: visible, plastic, and latent fingerprints. Examples of visible fingerprint include those made by blood, paint or ink. Plastic fingerprint are made from an impression of the finger on soft material as soap, wax, etc. Latent fingerprint are those of the invisible one to the human eye. Oil-contaminated fingerprints remained in the evidence, that are contaminated with the soybean oil, engine oil, lubricating oil or grease. Oil-contaminated fingerprints are special types of fingerprint evidence but the research for developing method regarding oil-contaminated fingerprints is a few. In this study, ultraviolet light source was employed for untreated oil-contaminated prints and the freeze-dry method with liquid nitrogen for freeze oil residue on the surfaces with sequence of developing oil-contaminated fingerprints with black and magnetic powders, cyanoacrylate (CA) fuming, Basic Yellow 40. The types of oil chosen for the experiment were soybean oil, LSA oil, engine oil and material surfaces selected for the experiment were glass, plastic aluminum plates. The aims of this study were to determine the appropriate developing methods for oil-contaminated fingerprints.

A Forecast Method of Marine Traffic Volume through Time Series Analysis (시계열 분석을 통한 해상교통량 예측 방안)

  • Yoo, Sang-Rok;Park, Young-Soo;Jeong, Jung-Sik;Kim, Chul-Seong;Jeong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.6
    • /
    • pp.612-620
    • /
    • 2013
  • In this study, time series analysis was tried, which is widely applied to demand forecast of diverse fields such as finance, economy, trade, and so on, different from previous regression analysis. Future marine traffic volume was forecasted on the basis of data of the number of ships entering Incheon port from January 1996 to June 2013, through courses of stationarity verification, model identification, coefficient estimation, and diagnostic checking. As a result of prediction January 2014 to December 2015, February has less traffic volume than other months, but January has more traffic volume than other months. Also, it was found out that Incheon port was more proper to ARIMA model than exponential smoothing method and there was a difference of monthly traffic volume according to seasons. The study has a meaning in that future traffic volume was forecasted per month with time series model. Also, it is judged that forecast of future marine traffic volume through time series model will be the more suitable model than prediction of marine traffic volume with previous regression analysis.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

A Study on the Reduction of Common Words to Classify Causes of Marine Accidents (해양사고 원인을 분류하기 위한 공통단어의 축소에 관한 연구)

  • Yim, Jeong-Bin
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.109-118
    • /
    • 2017
  • The key word (KW) is a set of words to clearly express the important causations of marine accidents; they are determined by a judge in a Korean maritime safety tribunal. The selection of KW currently has two main issues: one is maintaining consistency due to the different subjective opinion of each judge, and the second is the large number of KW currently in use. To overcome the issues, the systematic framework used to construct KW's needs to be optimized with a minimal number of KW's being derived from a set of Common Words (CW). The purpose of this study is to identify a set of CW to develop the systematic KW construction frame. To fulfill the purpose, the word reduction method to find minimum number of CW is proposed using P areto distribution function and Pareto index. A total of 2,642 KW were compiled and 56 baseline CW were identified in the data sets. These CW, along with their frequency of use across all KW, are reported. Through the word reduction experiments, an average reduction rate of 58.5% was obtained. The estimated CW according to the reduction rates was verified using the Pareto chart. Through this analysis, the development of a systematic KW construction frame is expected to be possible.

An Analysis Method of User Preference by using Web Usage Data in User Device (사용자 기기에서 이용한 웹 데이터 분석을 통한 사용자 취향 분석 방법)

  • Lee, Seung-Hwa;Choi, Hyoung-Kee;Lee, Eun-Seok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.189-199
    • /
    • 2009
  • The amount of information on the Web is explosively growing as the Internet gains in popularity. However, only a small portion of the information on the Web is truly relevant or useful to the user. Thus, offering suitable information according to user demand is an important subject in information retrieval. In e-commerce, the recommender system is essential to revitalize commercial transactions, raise user satisfaction and loyalty towards the information provider. The existing recommender systems are mostly based on user data collected at servers, so user data are dispersed over several servers. Therefore, web servers that lack sufficient user behavior data cannot easily infer user preferences. Also, if the user visits the server infrequently, it may be hard to reflect the dynamically changing user's interest. This paper proposes a novel personalization system analyzing the user preference based on web documents that are accessed by the user on a user device. The system also identifies non-content blocks appearing repeatedly in the dynamically generated web documents, and adds weight to the keywords extracted from the hyperlink sentence selected by the user. Therefore, the system establishes at an early stage recommendation strategies for the web server that has little user data. Also, user profiles are generated rapidly and more accurately by identifying the information blocks. In order to evaluate the proposed system, this study collected web data and purchase history from users who have current purchase activity. Then, we computed the similarity between purchase data and the user profile. We confirm the accuracy of the generated user profile since the web page containing the purchased item has higher correlation than other item pages.

The implementation of cable path and overfill visualization based on cable occupancy rate in the Shipbuilding CAD (조선 CAD에서 선박의 Cable 점유율을 기반으로 Cable 경로 및 Overfill 가시화 구현)

  • Kim, Hyeon-Jae;Kim, Bong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.740-745
    • /
    • 2016
  • Cables are installed for tens of thousands of connections between various pieces of equipment to operate and control a commercial ship. The correct shortest-route data is necessary since these are complicated cable installations. Therefore, an overfill interval commonly exists in the shortest paths for cables as estimated by Dijkstra's algorithm, even if this algorithm is generally used. It is difficult for an electrical engineer to find the overfill interval in 3D cable models because the occupancy rate data exist in a data sheet unlinked to three-dimensional (3D) computer-aided design (CAD). The purpose of this study is to suggest a visualization method that displays the cable path and overfill interval in 3D CAD. This method also provides various color visualizations for different overfill ranges to easily determine the overfill interval. This method can reduce cable-installation man-hours from 7,000 to 5,600 thanks to a decreased re-installation rate, because the cable length calculation's accuracy is raised through fast and accurate reviews based on 3D cable visualization. As a result, material costs can also be reduced.

Rearing and Innoculation Condition of Nd hybrid Silkworms for Paecilomyces tenuipes Production (Paecilomyces tenuipes 생산을 위한 나용교잡종 누에 사육 및 균 접종 조건)

  • Choi, Ji-Young;Kim, Sam-Eun;Kim, Jong-Gill;Nam, Sung-Hee;Yoon, Hyung-Joo;Choi, Young-Cheol
    • Journal of Sericultural and Entomological Science
    • /
    • v.48 no.1
    • /
    • pp.16-20
    • /
    • 2006
  • To shorten the labor cost for the production of the fungus, Paecilomyces tenuipies, uncocooning mutant hybrid silkworms as a host was used. The yield of P. tenuipies was reduced when Nd (uncocooning mutant) was used as a host because Nd was smaller than the hybrid Baegokjam that has been used as a typical host. To increase the host weight, Nd was crossed with Jam l23 or Jam 124, and resulted in not only greater weighter but also higher yield of P. tenuipies. The optimum temperature for rearing Nd hybrid silkworms was $3^{\circ}C$ higher than standard temperature of rearing silkworms to increase the naked pupation rate. The optimum time for the infection of P. tenuipies was 12 h at $28.5^{\circ}C$ and 95% R.H., when $1{\times}10^7spores/ml$ of P. tenuipies were sprayed on the surface of the silkworm. The conditions were applicable to both spring-rearing and autumn-rearing.

Possibility about Application and Interpretation of Surface Nondestructive X-ray Diffraction Method for Cultural Heritage Samples by Material (유형별 문화재 시료의 비파괴 표면 X-선 회절분석법 적용과 해석 가능성)

  • Moon, Dong Hyeok;Lee, Myeong Seong
    • Journal of the Mineralogical Society of Korea
    • /
    • v.32 no.4
    • /
    • pp.287-301
    • /
    • 2019
  • Preservation of the original form is the principle for conservation, management and utilization of cultural heritages. Thus, non-destructive analysis of these samples are important field of the conservation science. In this study, examined the applicability of nondestructive surface X-ray diffraction analysis (ND-XRD) for cultural heritage by materials (rock specimen, jade stone, pigment painted specimen, earthen artifact, metal artifact). In result, all type of sample is recorded suitable X-ray diffraction patterns for identifying mineral composition in case of surface condition with adequate particle size and arrangement. And diffraction pattern is reflected surface information than matrix. Therefore, ND-XRD is thought to be applicable not only mineral identification but also interpretation of manufacturing technique and alteration trend about layered sample (in horizontally or vertically). Whereas some exceptional diffraction patterns were recorded due to overlapping information on specific crystal planes. It caused by skip the sample treatment (powdering and randomly orientation). It could be advantageously used for mineral identification, such as preferred orientation of clay minerals. In contrast, irregular diffraction pattern caused by single crystalline effect is required careful evaluation.

An Improved Horizontal Correlation Analysis Using Collision Characteristics on Lookup Table Based Scalar Multiplication Algorithms (참조 테이블 기반 스칼라 곱 알고리즘에 대한 충돌 특성을 이용한 향상된 수평상관분석)

  • Park, Dongjun;Lee, Sangyub;Cho, Sungmin;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.179-187
    • /
    • 2020
  • The FBC(Fixed-Base Comb) is a method to efficiently operate scalar multiplication, a core operation for signature generations of the ECDSA(Elliptic Curve Digital Signature Algorithm), utilizing precomputed lookup tables. Since the FBC refers to the table depending on the secret information and the values of the table are publicly known, an adversary can perform HCA(Horizontal Correlation Analysis), one of the single trace side channel attacks, to reveal the secret. However, HCA is a statistical analysis that requires a sufficient number of unit operation traces extracted from one scalar multiplication trace for a successful attack. In the case of the scalar multiplication for signature generations of ECDSA, the number of unit operation traces available for HCA is significantly fewer than the case of the RSA exponentiation, possibly resulting in an unsuccessful attack. In this paper, we propose an improved HCA on lookup table based scalar multiplication algorithms such as FBC. The proposed attack improves HCA by increasing the number of unit operation traces by determining such traces for the same intermediate value through collision analysis. The performance of the proposed attack increases as more secure elliptic curve parameters are used.

Seismic Performance of Special Shear Wall Structural System with Effectively Reduced Reinforcement Detail (완화된 단부 배근상세를 갖는 특수전단벽 구조시스템의 내진성능평가)

  • Chun, Young-Soo;Lee, Ki-Hak;Lee, Hyo-Won;Park, Young-Eun;Song, Jin-Kyu
    • Journal of the Korea Concrete Institute
    • /
    • v.25 no.3
    • /
    • pp.271-281
    • /
    • 2013
  • The current seismic design code prescribes that a structural wall should be designed as a special shear wall when the building height is more than 60 m and its seismic design category is classified as D. However, the use of a special shear wall has a negative effect on constructability and economic efficiency. In the present study, the seismic performance of a special shear wall and a special shear wall with relaxed reinforcement detail was evaluated through a cyclic reversal loading test. The specimens were constructed to measure the results of the experimental variable regarding the reinforcement details of the special boundary element. Next, the seismic performances of a special shear wall structural system and that of a special shear wall structural system with relaxed reinforcement detail was evaluated by methods proposed in the FEMA P695. The cyclic reversal loading test results of this study showed that the performance of the shear wall with relaxed reinforcement detail was almost similar to the performance of a special shear wall and has the performance which requested from standard. The results of the seismic evaluation showed that all special shear walls with relaxed reinforcement detail are satisfied with the design code and seismic performance.