• Title/Summary/Keyword: Police Search

Search Result 59, Processing Time 0.028 seconds

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

Establishment of ITS Policy Issues Investigation Method in the Road Section applied Textmining (텍스트마이닝을 활용한 도로분야 ITS 정책이슈 탐색기법 정립)

  • Oh, Chang-Seok;Lee, Yong-taeck;Ko, Minsu
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.6
    • /
    • pp.10-23
    • /
    • 2016
  • With requiring circumspections using big data, this study attempts to develop and apply the search method for audit issues relating to the ITS policy or program. For the foregoing, the auditing process of the board of audit and inspection was converged with the theoretical frame of boundary analysis proposed by William Dunn as an analysis tool for audit issues. Moreover, we apply the text mining technique in order to computerize the analysis tool, which is similar to the boundary analysis in the concept of approaching meta-problems. For the text mining analysis, specific model we applied the antisymmetry-symmetry compound lexeme-based LDA model based on the Latent Dirichlet Allocation(LDA) methodologies proposed by David Blei. The several prime issues were founded through a case analysis as follows: lack of collection of traffic information by the urban traffic information system, which is operated by the National Police Agency, the overlapping problems between the Ministry of Land, Infrastructure and Transport and the Advanced Traffic Management System and fabrication of the mileage on digital tachograph.

An Activation Plan of Electronic Contract Real Estate

  • Youn, Sung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.175-182
    • /
    • 2016
  • In the 21st century knowledge and information society, Electronic Contracts made with the intention of electronic computer information networks are emerging as a new legal problem which can not be solved in the conventional legal system governing contracts. In other words, the indicator's decision determines the effect and formation of the contracts in the face-to-face or written contracts but electronic decision through computer information network is established the working process of electronic signals-electronic contracts are not only difficult to separate the decision-making process but questioned to be solved by the theory of the general legal action. Ministry of Transportation is scheduled to introduce real estate sales and lease contract using a variety of electronic devices such as computer, tablet PC, smart phones and so on without a paper contract. This system is conducted to global expansion of Seoul in demonstration zone on May 8, 2016 and will be implemented nationwide in the second half of 2017. Electronics contract Real estate has some benefits because made by linking electronic contract system and the electronic registration system - the economic effects discounts on various kinds of fees, the prevention from real estate fraud beforehand and the solution to the complexity of the process the seller and the buyer visits The Real estate agency. However, it has some problem- the disorder in the real estate contract market, the occurrence of the real estate agency accident and the author of the electronic real estate contracts have limited only to realtor. In this paper, I suggest the activation plan to search for establishment and effect of electronic contracts and declaration of intention in electronic depending on the Electronic Contract Real Estate system.

Design and Implementation of a Protocol for u-Safety Service (u-안심 서비스 프로토콜 설계 및 구현)

  • Cho, Byung Soon;Lee, Jae Min
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.117-128
    • /
    • 2013
  • u-safety service system inter-works with the diverse operation agencies, through CCTV network, such as the emergency call terminal with built-in GPS, the mobile communication network, u-safety service provider, relay system and CCTV control center. In the case of the emergency call, this service searches the location of caller in real time, and then continues to search the location of caller through the control of CCTV in the searched place, and can provide the several agencies like guardian, police office, fire station, hospitals, relief organizations and municipalities, with the diverse information necessary for the secure rescue through SMS and wired network. In this paper, a new protocol and specification for u-safety service relay system is designed and implemented. The effectiveness of presented protocol is verified by computer simulation. The designed protocol of u-safety service is applied to real 3GPP and 3GPP2 mobile communication networks to verify its performance.

Prediction-based Reversible Data Hiding Using Empirical Histograms in Images

  • Weng, Chi-Yao;Wang, Shiuh-Jeng;Liu, Jonathan;Goyal, Dushyant
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1248-1266
    • /
    • 2012
  • This paper presents a multilevel reversible data hiding method based on histogram shifting which can recover the original image losslessly after the hidden data has been extracted from the stego-image. The method of prediction is adopted in our proposed scheme and prediction errors are produced to explore the similarity of neighboring pixels. In this article, we propose two different predictors to generate the prediction errors, where the prediction is carried out using the center prediction method and the JPEG-LS median edge predictor (MED) to exploit the correlation among the neighboring pixels. Instead of the original image, these prediction errors are used to hide the secret information. Moreover, we also present an improved method to search for peak and zero pairs and also talk about the analogy of the same to improve the histogram shifting method for huge embedding capacity and high peak signal-to-noise ratio (PSNR). In the one-level hiding, our method keeps image qualities larger than 53 dB and the ratio of embedding capacity has 0.43 bpp (bit per pixel). Besides, the concept with multiple layer embedding procedure is applied for obtaining high capacity, and the performance is demonstrated in the experimental results. From our experimental results and analytical reasoning, it shows that the proposed scheme has higher PSNR and high data embedding capacity than that of other reversible data hiding methods presented in the literature.

Study on the distribution of crime in urban space - Gwangju metropolitan city from the perspective of the environmental criminology - (도시공간의 범죄분포특성에 관한 연구 - 환경범죄학의 관점에서 광주광역시를 대상으로 -)

  • Kim, Young-Hwan;Mun, Jeong-Min;Chang, Dong-Kuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.235-241
    • /
    • 2007
  • AThis research is rather on the crime occurrence of target area's space scope than on the approach to the cause of specific area's crime occurrence from the perspective of the environmental criminology emphasizing the crime prevention. By observing the composition of crime distribution, it is intended to search the strategies of crime prevention actually corresponded to the crime problems. For this, after segmenting the city into six sectors, targeting city crimes in Gwangju metropolitan city, in 2004, the basic materials about the crime frequency are analyzed through dividing the types on the base of the present state of crime occurrence, the types of crime, the locations of crime occurrence, the purposes of buildings, the types of intruders, the forms of intrusions. As a result of research. it is suggested that the activation method of community police activities is necessary for the prevention of community crime prevention.

  • PDF

A Study of Network Forensics related to Internet Criminal at UCC (UCC와 관련된 인터넷 범죄에 대한 네트워크 포렌식 연구)

  • Lee, Gyu-An;Park, Dea-Woo;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.143-151
    • /
    • 2008
  • 74% of Internet users use the UCC, and You Tube using firearms in a crime occurred. Internet crime occurred in the online, non-face transaction, anonymous, encapsulation. In this paper, we are studied a Network Forensic Way and a technique analyze an aspect criminal the Internet haying appeared at Internet UCC, and to chase. Study ID, IP back-tracking and position chase through corroborative facts collections of the UCC which used UCC search way study of the police and a public prosecutor and storage way and network forensic related to crimes of Internet UCC. Proof data encrypt, and store, and study through approach control and user authentication so that they are adopted to legal proof data through integrity verification after transmission and storages. This research via the Internet and criminal conspiracy to block the advance promotion, and for the criminal investigative agencies of the Internet will contribute to the advancement forensics research.

  • PDF

A Study on Fuzzy Searching Algorithm and Conditional-GAN for Crime Prediction System (범죄예측시스템에 대한 퍼지 탐색 알고리즘과 GAN 상태에 관한 연구)

  • Afonso, Carmelita;Yun, Han-Kyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.149-160
    • /
    • 2021
  • In this study, artificial intelligence-based algorithms were proposed, which included a fuzzy search for matching suspects between current and historical crimes in order to obtain related cases in criminal history, as well as conditional generative adversarial networks for crime prediction system (CPS) using Timor-Leste as a case study. By comparing the data from the criminal records, the built algorithms transform witness descriptions in the form of sketches into realistic face images. The proposed algorithms and CPS's findings confirmed that they are useful for rapidly reducing both the time and successful duties of police officers in dealing with crimes. Since it is difficult to maintain social safety nets with inadequate human resources and budgets, the proposed implemented system would significantly assist in improving the criminal investigation process in Timor-Leste.

A Study on Parking User's Perception for Vitalizing the Shared Parking in Residential Priority Parking Areas (거주자우선주차구역내 공유주차 활성화를 위한 이용자 의식 분석 연구)

  • Kim, Hee Sun;Oh, Seung Hoon;Kang, Tae Euk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.1
    • /
    • pp.45-53
    • /
    • 2019
  • As the urbanization progresses, the demand for parking in large cities surges compared with that for parking lots. However, the space for securing a parking lot in a large city is physically limited and a budget problem also arises. Therefore, a shared parking system that can utilize existing parking lots is becoming important. This study was carried out to analyze the parking area efficiently for the residents parking area. As a result of the questionnaire survey, it was the most frequent passage to work / commuting and business purposes. The most important factors in parking were 'Parking charge', 'Walking distance to the destination after parking', 'Parking lot searching time' Approximately 46 % of the respondents were female. As a result of the quantitative analysis of the factors influencing the potential use of the intention to use as a dependent variable, it was analyzed that the policy was effective to reduce the parking fee to less than 500 won per 10 minutes and take about 3-6 minutes to search.

A Study on the Algorithm Transparency Act and Right to Explanation - Focus on the Review of Algorithm Transparency Act -

  • Lee, Young-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.233-236
    • /
    • 2021
  • Recently, the Justice Party is pushing for legislation of a bill called the Algorithm Transparency Act. The bill is a revision to the Information and Communication Network Act proposed by Rep. Ryu Ho-jung on June 25, 2021, and aims to form a separate committee under the Korea Communications Commission to ask organizations operated for profit to search algorithms and explain the principles of arrangement. Currently, Korea treats algorithms as corporate secrets and does not disclose them, while the European Union (EU) implements the Personal Information Protection Regulations (GDPR) in relation to algorithm regulations. Therefore, this study summarizes the main contents of the Algorithm Transparency Act currently proposed to the National Assembly and reviews the current status of algorithm-related laws and systems in the European Union (EU) and the improvement of algorithm transparency.