• Title/Summary/Keyword: 증거기반

Search Result 347, Processing Time 0.023 seconds

AI Crime Prediction Modeling Based on Judgment and the 8 Principles (판결문과 8하원칙에 기반한 인공지능 범죄 예측 모델링)

  • Hye-sung Jung;Eun-bi Cho;Jeong-hyeon Chang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.99-105
    • /
    • 2023
  • In the 4th industrial revolution, the field of criminal justice is paying attention to Legaltech using artificial intelligence to provide efficient legal services. This paper attempted to create a crime prediction model that can apply Recurrent Neural Network(RNN) to increase the potential for using legal technology in the domestic criminal justice field. To this end, the crime process was divided into pre, during, and post stages based on the criminal facts described in the judgment, utilizing crime script analysis techniques. In addition, at each time point, the method and evidence of crime were classified into objects, actions, and environments based on the sentence composition elements and the 8 principles of investigation. The case summary analysis framework derived from this study can contribute to establishing situational crime prevention strategies because it is easy to identify typical patterns of specific crime methods. Furthermore, the results of this study can be used as a useful reference for research on generating crime situation prediction data based on RNN models in future follow-up studies.

A Text Mining-based Intrusion Log Recommendation in Digital Forensics (디지털 포렌식에서 텍스트 마이닝 기반 침입 흔적 로그 추천)

  • Ko, Sujeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.6
    • /
    • pp.279-290
    • /
    • 2013
  • In digital forensics log files have been stored as a form of large data for the purpose of tracing users' past behaviors. It is difficult for investigators to manually analysis the large log data without clues. In this paper, we propose a text mining technique for extracting intrusion logs from a large log set to recommend reliable evidences to investigators. In the training stage, the proposed method extracts intrusion association words from a training log set by using Apriori algorithm after preprocessing and the probability of intrusion for association words are computed by combining support and confidence. Robinson's method of computing confidences for filtering spam mails is applied to extracting intrusion logs in the proposed method. As the results, the association word knowledge base is constructed by including the weights of the probability of intrusion for association words to improve the accuracy. In the test stage, the probability of intrusion logs and the probability of normal logs in a test log set are computed by Fisher's inverse chi-square classification algorithm based on the association word knowledge base respectively and intrusion logs are extracted from combining the results. Then, the intrusion logs are recommended to investigators. The proposed method uses a training method of clearly analyzing the meaning of data from an unstructured large log data. As the results, it complements the problem of reduction in accuracy caused by data ambiguity. In addition, the proposed method recommends intrusion logs by using Fisher's inverse chi-square classification algorithm. So, it reduces the rate of false positive(FP) and decreases in laborious effort to extract evidences manually.

Analysis of Environmental Sustainability in South Korean Inland Windfarms (한국 육상풍력발전사업의 환경적 지속가능성 평가 연구 - 58개 환경영향평가서 사례에 대한 정량적 분석 -)

  • Jeong, Eunhae
    • Journal of Environmental Impact Assessment
    • /
    • v.31 no.1
    • /
    • pp.47-62
    • /
    • 2022
  • Wind power has been rapidly growing over last decade in the world as well as in South Korea as a feasible renewable energy source. Providing sustainable energy to all while securing environmental sustainability requires evidence based policy making and innovative solutions. Through analysis of 58 cases of South Korean Environmental Impact Assessment (EIA) Report, this paper seeks to identify answers to the following two questions. What are the key characteristics for inland windfarm? Is there a way of measuring environmental sustainability to compare each location to reduce negative environmental impact? Variables related to environmental sustainability of each windfarm case were collected from EIA report and the factor analysis of environmental variables was conducted to calculate the weight for each variable to build environmental sustainability index (ESI) to provide as evidence-based tools for decision making on the location of inland windfarm. 58 cases were categorized as three types 1) Mountain type 2) Ranch Type and 3) Coastal Type depending on their height and degree of naturalness. For analytical research, first, it was successfully calculated environmental sustainability of each windfarm case ranging from 1.04 (#33, Ranch type) to -1.44 (#55, Mountain type). Second, the analysis results showed that ranch type is most environmentally sustainable (Average ESI = 0.4551), followed by coastal type (Ave ESI = 0.3712) and lastly mountain type (Average ESI = -0.3457). These findings are consistent with the previous researches on inland windfarms and provides substantive policy implication on the renewable energy policies.

Systemic literature review on the impact of government financial support on innovation in private firms (정부의 기술혁신 재정지원 정책효과에 대한 체계적 문헌연구)

  • Ahn, Joon Mo
    • Journal of Technology Innovation
    • /
    • v.30 no.1
    • /
    • pp.57-104
    • /
    • 2022
  • The government has supported the innovation of private firms by intervening the market for various purposes, such as preventing market failure, alleviating information asymmetry, and allocating resources efficiently. Although the government's R&D budget increased rapidly in the 2000s, it is not clear whether the government intervention has made desirable impact on the market. To address this, the current study attempts to explore this issue by doing a systematic literature review on foreign and domestic papers in an integrated way. In total, 168 studies are analyzed using contents analysis approach and various lens, such as policy additionality, policy tools, firm size, unit of analysis, data and method, are adopted for analysis. Overlapping policy target, time lag between government intervention and policy effects, non-linearity of financial supports, interference between different polices, and out-dated R&D tax incentive system are reported as factors hampering the effect of the government intervention. Many policy prescriptions, such as program evaluation indices reflecting behavioral additionality, an introduction of policy mix and evidence-based policy using machine learning, are suggested to improve these hurdles.

The Impact of the Argument-based Modeling Strategy using Scientific Writing implemented in Middle School Science (중학교 과학수업에 적용한 글쓰기를 활용한 논의-기반 모델링 전략의 효과)

  • Cho, Hey Sook;Nam, Jeonghee
    • Journal of The Korean Association For Science Education
    • /
    • v.34 no.6
    • /
    • pp.583-592
    • /
    • 2014
  • The purpose of this study is to investigate the impact of argument-based modeling strategy using scientific writing on student's modeling ability. For this study, 66 students (three classes) from the 7th grade were selected and of these, 43 students (two classes) were assigned to two experimental groups while the other 23 students (one class) were assigned to comparative group. In the experimental groups, one group (22 students) was Argument-based multimodal Representation and Modeling (AbRM), and the other group (21 students) was Argument-based Modeling (AbM). Modeling ability consisted of identifying the problem, structuring of scientific concepts, adequacy of claim and evidence and index of multimodal representation. As for the modeling ability, AbRM group scored significantly higher than the other groups, AbM group was significantly higher than comparative group. The four sub-elements of modeling ability in the AbRM group was significantly higher than the other groups statistically and AbM group scored significantly higher than comparative group. From these results, the argument-based modeling strategy using scientific writing was effective on students' modeling ability. Students organized or expressed the model and evaluated or modified it through the process of argument-based modeling using scientific writing and the exchange of opinions with others by scientific language as argument and writing.

Motivated Reasoning as Obstacle of Scientific Thinking: Focus on the Cases of Next-Generation Researchers in the Field of Science and Technology (과학적 사고의 걸림돌 동기기반추론 -과학기술 분야 학문후속세대들의 사례를 중심으로-)

  • Shin, Sein;Lee, Jun-Ki;Ha, Minsu
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.5
    • /
    • pp.635-647
    • /
    • 2018
  • Motivated reasoning refers to biased reasoning that is affected by motivation to achieve a particular result or goal. In this study, we attempted a theoretical study on motivated reasoning that hinders the development of scientific thinking and empirical study on actual context of motivated reasoning in the research experiences of next-generation Korean researchers in the field of science and technology. To be specific, literature reviews were conducted to explore the psychological meaning of motivated reasoning and its negative impact on scientific thinking and science research. To understand the substantial meaning and context of motivated reasoning in the field of real science and technology research, we conducted in-depth interviews with eight graduate students and one young science and technology researcher. As a result of the literature reviews, we found out that motivated reasoning can interfere with the proper theory and data coordination, which is the core process of scientific thinking at the individual level. At the socio-cultural level, it can lead to cessation of constructing scientific knowledge and it can act as a mechanism in the process of using science for specific socio-cultural beliefs or purposes, thereby hindering the development of science and technology based on rationale and objective scientific thinking. Quantitative analysis with in-depth interview data showed that graduate students and the young researcher's experienced motivated reasoning results in trying to protect prior beliefs, make hasty conclusions, protecting socio-cultural belief or rationalizing decisions made by their community. Their motivated reasoning could become an obstacle in constructing valid science and technology knowledge through appropriate theory and evidence coordination. Based on these findings we discussed science education for improving scientific thinking.

The Voice Template based User Authentication Scheme Suitable for Mobile Commerce Platform (모바일 상거래 플랫폼에 적합한 음성 템플릿 기반의 사용자 인증 기법)

  • Yun, Sung-Hyun;Koh, Hoon
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.215-222
    • /
    • 2012
  • A smart phone has functions of both telephone and computer. The wide spread use of smart phones has sharply increased the demand for mobile commerce. The smart phone based mobile services are available anytime, anywhere. In commercial transactions, a digital signature scheme is used to make legally binding signature to prove both integrity of commercial document and verification of the signer. Smart phones are more risky compared with personal computers on the problems of how to protect privacy information. It's also easy to let proxy user to authenticate instead of the smart phone owner. In existing password or token based schemes, the ID is not physically bound to the owner. Thus, those schemes can not solve the problem of proxy authentication. To utilize the smart phone as the platform of mobile commerce, a study on the new type of authentication scheme is needed where the scheme should provide protocol to get legally binding signature and not to authenticate proxy user. In this paper, we create the mobile ID by using both the USIM and voice template of the smart phone owner. We also design and implement the user authentication scheme based on the mobile ID.

Using Cache Access History for Reducing False Conflicts in Signature-Based Eager Hardware Transactional Memory (시그니처 기반 이거 하드웨어 트랜잭셔널 메모리에서의 캐시 접근 이력을 이용한 거짓 충돌 감소)

  • Kang, Jinku;Lee, Inhwan
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.442-450
    • /
    • 2015
  • This paper proposes a method for reducing false conflicts in signature-based eager hardware transactional memory (HTM). The method tracks the information on all cache blocks that are accessed by a transaction. If the information provides evidence that there are no conflicts for a given transactional request from another core, the method prevents the occurrence of a false conflict by forcing the HTM to ignore the decision based on the signature. The method is very effective in reducing false conflicts and the associated unnecessary transaction stalls and aborts, and can be used to improve the performance of the multicore processor that implements the signature-based eager HTM. When running the STAMP benchmark on a 16-core processor that implements the LogTM-SE, the increased speed (decrease in execution time) achieved with the use of the method is 20.6% on average.

A Study of Legal Issues for Web Archiving (웹 아카이빙의 법.제도적 문제에 대한 고찰 - 웹 정보자원의 특성을 중심으로 -)

  • Kim, You-Seung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.3
    • /
    • pp.5-24
    • /
    • 2007
  • In terms of archiving. an importance of the Web is more increasing. Since the Internet has been popularized. many archivists have made efforts to preserve informational. cultural. and evidential values of the Web. Information resources on the Web raise archival issues that are significantly different from issues of preservation for tangible materials, because they are based on unique characteristics of the Web. One of issues is about a technical aspect which is based on technical architecture of Web. Another important issue is related to legal problems including copyright, authenticity and so on. In this context. it is essential to understand technical and legal characteristics of the Web. A purpose of this article is to review technical and legal aspects of Web archiving and to find an agenda for development of Web archiving.

The Research on the Recovery Techniques of Deleted Files in the XFS Filesystem (XFS 파일 시스템 내의 삭제된 파일 복구 기법 연구)

  • Ahn, Jae-Hyoung;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.885-896
    • /
    • 2014
  • The files in computer storages can be deleted due to unexpected failures or accidents. Some malicious users often delete data by himself for anti-forensics. If deleted files are associated with crimes or important documents in business, they should be recovered and the recovery tool is necessary. The recovery methods and tools for some filesystems such as NTFS, FAT, and EXT have been developed actively. However, there has not been any researches for recovering deleted files in XFS filesystem applied to NAS or CCTV. In addition, since the current related tools are based on the traditional signature detection methods, they have low recovery rates. Therefore, this paper suggests the recovery methods for deleted files based on metadata and signature detection in XFS filesystem, and verifies the results by conducting experiment in real environment.