• Title/Summary/Keyword: Forensic Data

Search Result 369, Processing Time 0.026 seconds

Uncertainty Evaluation of the Analysis of 11-Nor-9-carboxy-${\Delta}^9$-tetrahydrocannabinol in Human Urine by GC/MS (GC/MS를 이용한 소변 중 대마 대사체 분석의 측정불확도 평가)

  • Kim, Jin-Young;Jeong, Jae-Chul;Suh, Sung-Ill;Suh, Yong-Jun;Lee, Jeong-Jik;Kim, Jong-Sang;In, Moon-Kyo
    • YAKHAK HOEJI
    • /
    • v.52 no.6
    • /
    • pp.480-487
    • /
    • 2008
  • We described an estimation of measurement uncertainty in quantitative analysis of 11-nor-9-carboxy-${\Delta}^9$-tetrahydrocannabinol (THCCOOH), the major metabolite of ${\Delta}^9$-tetrahydrocannabinol, in urine sample by solid-phase extraction (SPE) and GC/MS detection. The analytical results were compared and the different contributions to the uncertainty were evaluated. Inter-day and inter-person validation were performed using statistical analysis of several indicative factors. Measurement uncertainty associated with target analyte in real forensic samples was estimated using quality control (QC) data. Traceability of measurement was established through traceable standards, calibrated volumetric glassware and volume measuring device. The major factors of contribution to combined standard uncertainty, were calibration linearity, inter-day repeatability and inter-person reproducibility, while those associated with preparation of analytical standards and sampling volume were not so important considering the degree of contribution. Relative combined standard uncertainties associated with the described method was 12.05% for THCCOOH.

Generation of Forensic Evidence Data from Script (무선 WiGig 전송 연구)

  • Choi, Sang-hyeon;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.356-359
    • /
    • 2017
  • According to the plan of operation of the Ministry of Education, IWB (Interactive White Board) was distributed to one or two classrooms per school. Therefore, instead of the overhead projector (OHP) and the screen, the visual presenter and the IWB replaced the role. However, the development speed of the imaging device and the display device could not keep up, and the utilization was often lowered. In this study, we study to obtain a high resolution image using the camera of smartphone. It uses WiGig(Wireless Gigabit) technology to transmit the acquired high-resolution images to IWB or large-screen TV without delay in wireless communication. In addition, while the smartphone camera is equipped with a lens of a wide field of view(FOV), the microscope lens can be used to magnify and magnify a specific portion of a smartphone 400 times. As s result of this study it will be used as active material for real-time 400 times magnification in education and research field.

  • PDF

Souce Code Identification Using Deep Neural Network (심층신경망을 이용한 소스 코드 원작자 식별)

  • Rhim, Jisu;Abuhmed, Tamer
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.9
    • /
    • pp.373-378
    • /
    • 2019
  • Since many programming sources are open online, problems with reckless plagiarism and copyrights are occurring. Among them, source codes produced by repeated authors may have unique fingerprints due to their programming characteristics. This paper identifies each author by learning from a Google Code Jam program source using deep neural network. In this case, the original creator's source is to be vectored using a pre-processing instrument such as predictive-based vector or frequency-based approach, TF-IDF, etc. and to identify the original program source by learning by using a deep neural network. In addition a language-independent learning system was constructed using a pre-processing machine and compared with other existing learning methods. Among them, models using TF-IDF and in-depth neural networks were found to perform better than those using other pre-processing or other learning methods.

Two Helminthic Cases of Human Mummy Remains from Joseon-Period Graves in Korea

  • Oh, Chang Seok;Lee, Hyejin;Kim, Jieun;Hong, Jong Ha;Cha, Soon Chul;Chai, Jong-Yil;Ha, Cheol Min;Kang, Ryang-Ji;Lim, Do-Seon;Shin, Dong Hoon;Seo, Min
    • Parasites, Hosts and Diseases
    • /
    • v.59 no.2
    • /
    • pp.149-152
    • /
    • 2021
  • Our previous research on coprolite specimens from the mummies of Joseon Dynasty (1392-1910 CE) has revealed various species of parasite eggs. Herein, we added 2 new helminthic cases of human remains from Joseon-period graves in the Republic of Korea (Korea). The organic materials precipitated on the hip bones of 2 half-mummied cases (Goryeong and Gwangmyeong cases) were collected, rehydrated, and examined by a microscope. In the sample from Goryeong-gun (gun=County), ova of Trichuris trichiura, Clonorchis sinensis, and Metagonimus spp. were detected, and eggs of T. trichiura and A. lumbricoides were found from the sample of Gwangmyeong-si (si=City). By adding this outcome to the existing data pool, we confirm our previous estimates of Joseon-period parasite infection rates. The overall rates of A. lumbricoides, T. trichiura, and C. sinensis decreased dramatically from Joseon to the modern period. In Goryeong mummy specimen, we also found Metagonimus spp. eggs that has rarely been detected in archaeological samples so far.

Analysis on System Log of Huawei Smartphone (화웨이 스마트폰 시스템 로그에 대한 분석)

  • Park, Eunhu;Kim, Soram;Kim, Jongsung
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.9-17
    • /
    • 2018
  • Smartphone have become commonplace because they have the advantage of facilitating communication with others and making life easier. The smartphone's system log stores various data related to the user actions. Since 2015, Huawei has been growing rapidly, with its sales volume increasing and it was ranked second in the world in three years. The use of Huawei smartphones by many users means that Huawei smartphones are likely to be used to detect traces of criminal investigations, so we need to study system logs of Huawei smartphones. Therefore, in this paper, we analyze system log which is forensically meaningful for Huawei smartphone. We also propose how to use logs in forensic investigation.

Fourth molar: A retrospective study and literature review of a rare clinical entity

  • Bamgbose, Babatunde O.;Okada, Shunsuke;Hisatomi, Miki;Yanagi, Yoshinobu;Takeshita, Yohei;Abdu, Zahrau Saleh;Ekuase, Edugie J.;Asaumi, Jun-ichi
    • Imaging Science in Dentistry
    • /
    • v.49 no.1
    • /
    • pp.27-34
    • /
    • 2019
  • Purpose: The prevalence of supernumerary teeth has been reported to be between 0.1% and 3.8%. The aim of this study was to determine the prevalence, clinical significance, and associated pathologies of fourth molars based on a retrospective study and a literature review. Materials and Methods: A 5-year retrospective prevalence study was conducted at the Department of Oral Diagnosis and Dentomaxillofacial Radiology of Okayama University Hospital, Okayama, Japan. The study involved extracting data from the digital records of patients from January 1, 2013 through December 31, 2017. The sampling frame included all patients who had panoramic radiographs, cone-beam computed tomography (CT), and multislice CT images during the period under review. Results: A total of 26,721 cases were reviewed and 87 fourth molars were identified. The prevalence of fourth molars in the 5-year study at Okayama was calculated as 0.32%. The mean age of patients with a fourth molar was 30.43 years, and the male-to-female ratio was 1:0.98. The vast majority of cases were in the maxilla (92%) and had normal shapes(89.7%); furthermore, 82.8% of cases were unerupted. Conclusion: The prevalence of fourth molars in the study population was found to be 0.32%, and fourth molars occurred with approximately equal frequency in males and females. Fourth molars were more common in the maxilla and were predominantly unerupted and small.

Research on Mac OS X Physical Memory Analysis (Mac OS X 물리 메모리 분석에 관한 연구)

  • Lee, Kyeong-Sik;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.89-100
    • /
    • 2011
  • Physical memory analysis has been an issue on a field of live forensic analysis in digital forensics until now. It is very useful to make the result of analysis more reliable, because record of user behavior and data can be founded on physical memory although process is hided. But most memory analysis focuses on windows based system. Because the diversity of target system to be analyzed rises up, it is very important to analyze physical memory based on other OS, not Windows. Mac OS X, has second market share in Operating System, is operated by loading kernel image to physical memory area. In this paper, We propose a methodology for physical memory analysis on Mac OS X using symbol information in kernel image, and acquire a process information, mounted device information, kernel information, kernel extensions(eg. KEXT) and system call entry for detecting system call hooking. In additional to the methodology, we prove that physical memory analysis is very useful though experimental study.

A Study on Notary System for Web Postings Digital Evidences (웹 게시물 증거를 위한 공증 시스템 도입 연구)

  • Kim, Ah-Reum;Kim, Yeog;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.155-163
    • /
    • 2011
  • Rumor or abusive web postings in internet has become a social issue. Web postings may be proposed on evidence in form of a screenshot in libel suit, but a screenshot can be easily modified by computer programs. A person can make ill use of the screenshot which is modified deliberately original contents to opposite meaning in a lawsuit. That makes an innocent person to be punished because it can have difficulties to verify despite analyzing the server data. A screenshot of web postings is likely to fail to prove its authenticity and it is not able to reflect the fact. If notarization for web postings is offered, clear and convincing evidence can be submitted in a court. So, related techniques and policies should be established In this paper, we propose some technical and legal conditions and design for notarization and archive system of web postings for litigation.

Collection and Analysis of the Digital Evidence for Android and iOS Smart Phones (Android & iOS 기반 스마트폰의 디지털 증거 수집 및 분석)

  • Goo, Bon-Min;Kim, Ju-Young;Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.167-175
    • /
    • 2011
  • As recent emergence of smart phones, mobile services are growing in various forms. Many companies released smart phones of various operating systems such as Window Mobile, Android and iOS. Currently, most popular smart phone operating systems are Android and iOS. Due to the various features of these smart phone, they can be employed to various crimes. From the point of view of digital forensics, this paper analyzes the evidence data which needs to be collected in the smart phone, and implements the evidence analysis tool. By using this tool, it can reduce the time and effort for collecting and analyzing the evidence of the smart phone.

Influencing Effects of Job Stress, Professional Autonomy, Reciprocity on the Job Embeddedness of Comprehensive Nursing Care Unit Nurses (간호·간병통합서비스 병동 간호사의 직무 스트레스, 전문직 자율성, 호혜성이 직무착근도에 미치는 영향요인)

  • Park, Seon Ok;Park, Wanju
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2023
  • Purpose: The purpose of this study was to identify the influencing effects of job stress, professional autonomy, and reciprocity on the job embeddedness among comprehensive nursing care unit nurses. Methods: The participants in this study were 147 nurses who have worked for over 6 months in Comprehensive Nursing Care Unit. Data were collected from January 3 to January 31, 2022 from six general hospitals with more than 300 beds in three cities in G, G and P. Results: As the results of hierarchical regression analysis, job embeddedness was lower when nurses had clinical experiences for 1 to under 5 years (β=-.49, p<.001), 5 to under 10 years (β=-.27, p=.035), 10 to under 20 years (β=-.54, p<.001) compared to those who had clinical experiences for more than 20 years. Also, job embeddedness was higher when there was greater balance within team caregiving of reciprocality (β=.27, p<.001) and intrinsic reward (β=.22, p=.003), and lower role conflict (β =-.27, p<.001). Conclusion: The results of the study showed that job embededness would increase if the role conflict of comprehensive nursing care unit nurses reduces, if there was a culture that the members can make cooperative relationship with other health care professionals and, if there was an appropriate intrinsic reward depending on their work experience.