• Title/Summary/Keyword: Forensic Data

Search Result 371, Processing Time 0.021 seconds

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity

  • Shahabi, Cyrus;Kim, Seon Ho;Nocera, Luciano;Constantinou, Giorgos;Lu, Ying;Cai, Yinghao;Medioni, Gerard;Nevatia, Ramakant;Banaei-Kashani, Farnoush
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.1-22
    • /
    • 2014
  • Recent technological advances provide the opportunity to use large amounts of multimedia data from a multitude of sensors with different modalities (e.g., video, text) for the detection and characterization of criminal activity. Their integration can compensate for sensor and modality deficiencies by using data from other available sensors and modalities. However, building such an integrated system at the scale of neighborhood and cities is challenging due to the large amount of data to be considered and the need to ensure a short response time to potential criminal activity. In this paper, we present a system that enables multi-modal data collection at scale and automates the detection of events of interest for the surveillance and reconnaissance of criminal activity. The proposed system showcases novel analytical tools that fuse multimedia data streams to automatically detect and identify specific criminal events and activities. More specifically, the system detects and analyzes series of incidents (an incident is an occurrence or artifact relevant to a criminal activity extracted from a single media stream) in the spatiotemporal domain to extract events (actual instances of criminal events) while cross-referencing multimodal media streams and incidents in time and space to provide a comprehensive view to a human operator while avoiding information overload. We present several case studies that demonstrate how the proposed system can provide law enforcement personnel with forensic and real time tools to identify and track potential criminal activity.

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

Research on Advanced Methods for Data Extraction from Corrupted OOXML Files (손상된 OOXML 파일에서의 데이터 추출 고도화 방안 연구)

  • Jiyun Kim;Minsoo Kim;Woobeen Park;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.193-206
    • /
    • 2024
  • In tandem with the advancements in the digital era, the significance of digital data has escalated, necessitating an increased focus on digital forensics investigations. However, the process of collecting and analyzing digital evidence faces significant challenges, such as the unidentifiability of damaged files due to issues like media corruption and anti-forensic techniques. Moreover, the technological limitations of existing tools hinder the recovery of damaged files, posing difficulties in the evidence collection process. This paper aims to propose solutions for the recovery of corrupted MS Office files commonly used in digital data creation. To achieve this, we analyze the structure of MS Office files in the OOXML format and present a novel approach to overcome the limitations of current recovery tools. Through these efforts, we aim to contribute to enhancing the quality of evidence collection in the field of digital forensics by efficiently recovering and identifying damaged data.

A review of ground camera-based computer vision techniques for flood management

  • Sanghoon Jun;Hyewoon Jang;Seungjun Kim;Jong-Sub Lee;Donghwi Jung
    • Computers and Concrete
    • /
    • v.33 no.4
    • /
    • pp.425-443
    • /
    • 2024
  • Floods are among the most common natural hazards in urban areas. To mitigate the problems caused by flooding, unstructured data such as images and videos collected from closed circuit televisions (CCTVs) or unmanned aerial vehicles (UAVs) have been examined for flood management (FM). Many computer vision (CV) techniques have been widely adopted to analyze imagery data. Although some papers have reviewed recent CV approaches that utilize UAV images or remote sensing data, less effort has been devoted to studies that have focused on CCTV data. In addition, few studies have distinguished between the main research objectives of CV techniques (e.g., flood depth and flooded area) for a comprehensive understanding of the current status and trends of CV applications for each FM research topic. Thus, this paper provides a comprehensive review of the literature that proposes CV techniques for aspects of FM using ground camera (e.g., CCTV) data. Research topics are classified into four categories: flood depth, flood detection, flooded area, and surface water velocity. These application areas are subdivided into three types: urban, river and stream, and experimental. The adopted CV techniques are summarized for each research topic and application area. The primary goal of this review is to provide guidance for researchers who plan to design a CV model for specific purposes such as flood-depth estimation. Researchers should be able to draw on this review to construct an appropriate CV model for any FM purpose.

Comparison of data mining algorithms for sex determination based on mastoid process measurements using cone-beam computed tomography

  • Farhadian, Maryam;Salemi, Fatemeh;Shokri, Abbas;Safi, Yaser;Rahimpanah, Shahin
    • Imaging Science in Dentistry
    • /
    • v.50 no.4
    • /
    • pp.323-330
    • /
    • 2020
  • Purpose: The mastoid region is ideal for studying sexual dimorphism due to its anatomical position at the base of the skull. This study aimed to determine sex in the Iranian population based on measurements of the mastoid process using different data mining algorithms. Materials and Methods: This retrospective study was conducted on 190 3-dimensional cone-beam computed tomographic (CBCT) images of 105 women and 85 men between the ages of 18 and 70 years. On each CBCT scan, the following 9 landmarks were measured: the distance between the porion and the mastoidale; the mastoid length, height, and width; the distance between the mastoidale and the mastoid incision; the intermastoid distance (IMD); the distance between the lowest point of the mastoid triangle and the most prominent convex surface of the mastoid (MF); the distance between the most prominent convex mastoid point (IMSLD); and the intersecting angle drawn from the most prominent right and left mastoid point (MMCA). Several predictive models were constructed and their accuracy was compared using cross-validation. Results: The results of the t-test revealed a statistically significant difference between the sexes in all variables except MF and MMCA. The random forest model, with an accuracy of 97.0%, had the best performance in predicting sex. The IMSLD and IMD made the largest contributions to predicting sex, while the MMCA variable had the least significant role. Conclusion: These results show the possibility of developing an accurate tool using data mining algorithms for sex determination in the forensic framework.

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.

Patterns of Cancer in Kurdistan - Results of Eight Years Cancer Registration in Sulaymaniyah Province-Kurdistan-Iraq

  • Khoshnaw, Najmaddin;Mohammed, Hazha A;Abdullah, Dana A
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.18
    • /
    • pp.8525-8531
    • /
    • 2016
  • Background: Cancer has become a major health problem associated with high mortality worldwide, especially in developing countries. The aim of our study was to evaluate the incidence rates of different types of cancer in Sulaymaniyah from January-2006 to January-2014. The data were compared with those reported for other middle east countries. Materials and Methods: This retrospective study depended on data collected from Hiwa hospital cancer registry unit, death records and histopathology reports in all Sulaymaniyah teaching hospitals, using international classification of diseases. Results: A total of 8,031 cases were registered during the eight year period, the annual incidence rate in all age groups rose from 38 to 61.7 cases/100,000 population/year, with averages over 50 in males and 50.7 in females. The male to female ratio in all age groups were 0.98, while in the pediatric age group it was 1.33. The hematological malignancies in all age groups accounted for 20% but in the pediatric group around half of all cancer cases. Pediatric cancers were occluding 7% of total cancers with rates of 10.3 in boys and 8.7 in girls. The commonest malignancies by primary site were leukemia, lymphoma, brain, kidney and bone. In males in all age groups they were lung, leukaemia, lymphoma, colorectal, prostate, bladder, brain, stomach, carcinoma of unknown primary (CUP) and skin, while in females they were breast, leukaemia, lymphoma, colorectal, ovary, lung, brain, CUP, and stomach. Most cancers were increased with increasing age except breast cancer where decrease was noted in older ages. High mortality rates were found with leukemia, lung, lymphoma, colorectal, breast and stomach cancers. Conclusions: We here found an increase in annual cancer incidence rates across the period of study, because of increase of cancer with age and higher rates of hematological malignancies. Our study is valuable for Kurdistan and Iraq because it provides more accurate data about the exact patterns of cancer and mortality in our region.

Yet Another BGP Archive Forensic Analysis Tool Using Hadoop and Hive (하둡과 하이브를 이용한 BGP 아카이브 데이터의 포렌직 분석 툴)

  • Lee, Yeonhee;Lee, YoungSeok
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.541-549
    • /
    • 2015
  • A large volume of continuously growing BGP data files can raise two technical challenges regarding scalability and manageability. Due to the recent development of the open-source distributed computing infrastructure, Hadoop, it becomes feasible to handle a large amount of data in a scalable manner. In this paper, we present a new Hadoop-based BGP tool (BGPdoop) that provides the scale-out performance as well as the extensible and agile analysis capability. In particular, BGPdoop realizes a query-based BGP record exploration function using Hive on the partitioned BGP data structure, which enables flexible and versatile analytics of BGP archive files. From the experiments for the scalability with a Hadoop cluster of 20 nodes, we demonstrate that BGPdoop achieves 5 times higher performance and the user-defined analysis capability by expressing diverse BGP routing analytics in Hive queries.

Accuracy of an equation for estimating age from mandibular third molar development in a Thai population

  • Verochana, Karune;Prapayasatok, Sangsom;Janhom, Apirum;Mahasantipiya, Phattaranant May;Korwanich, Narumanas
    • Imaging Science in Dentistry
    • /
    • v.46 no.1
    • /
    • pp.1-7
    • /
    • 2016
  • Purpose: This study assessed the accuracy of age estimates produced by a regression equation derived from lower third molar development in a Thai population. Materials and Methods: The first part of this study relied on measurements taken from panoramic radiographs of 614 Thai patients aged from 9 to 20. The stage of lower left and right third molar development was observed in each radiograph and a modified Gat score was assigned. Linear regression on this data produced the following equation: Y=9.309+1.673 mG+0.303S (Y=age; mG=modified Gat score; S=sex). In the second part of this study, the predictive accuracy of this equation was evaluated using data from a second set of panoramic radiographs (539 Thai subjects, 9 to 24 years old). Each subject's age was estimated using the above equation and compared against age calculated from a provided date of birth. Estimated and known age data were analyzed using the Pearson correlation coefficient and descriptive statistics. Results: Ages estimated from lower left and lower right third molar development stage were significantly correlated with the known ages (r=0.818, 0.808, respectively, $P{\leq}0.01$). 50% of age estimates in the second part of the study fell within a range of error of ${\pm}1year$, while 75% fell within a range of error of ${\pm}2years$. The study found that the equation tends to estimate age accurately when individuals are 9 to 20 years of age. Conclusion: The equation can be used for age estimation for Thai populations when the individuals are 9 to 20 years of age.

An improved extraction technique of executable file from physical memory by analyzing file object (파일 오브젝트 분석 기반 개선된 물리 메모리 실행 파일 추출 방법)

  • Kang, Youngbok;Hwang, Hyunuk;Kim, Kibom;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.861-870
    • /
    • 2014
  • According to the intelligence of the malicious code to extract the executable file in physical memory is emerging as an import researh issue. In previous physical memory studies on executable file extraction which is targeting running files, they are not extracted as same as original file saved in disc. Therefore, we need a method that can extract files as same as original one saved in disc and also can analyze file-information loaded in physical memory. In this paper, we provide a method that executable file extraction by analyzing information of Windows kernel file object. Also we analyze the characteristic of physical memory loaded file data from the experiment and we demonstrate superiority because the suggested method can effectively extract more of original file data than the existing method.