• Title/Summary/Keyword: Security crime

Search Result 500, Processing Time 0.023 seconds

A Study on Accident Prediction Models for Chemical Accidents Using the Logistic Regression Analysis Model (로지스틱회귀분석 모델을 활용한 화학사고 사상사고 예측모형 개발 연구)

  • Lee, Tae-Hyung;Park, Choon-Hwa;Park, Hyo-Hyeon;Kwak, Dae-Hoon
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.72-79
    • /
    • 2019
  • Through this study, we developed a model for predicting chemical accidents lead to casualties. The model was derived from the logistic regression analysis model and applied to the variables affecting the accident. The accident data used in the model was analyzed by studying the statistics of past chemical accidents, and applying independent variables that were statistically significant through data analysis, such as the type of accident, cause, place of occurrence, status of casualties, and type of chemical accident that caused the casualties. A significance of p < 0.05 was applied. The model developed in this study is meaningful for the prevention of casualties caused by chemical accidents and the establishment of safety systems in the workplace. The analysis using the model found that the most influential factor in the occurrence of casualty in accidents was chemical explosions. Therefore, there is an urgent need to prepare countermeasures to prevent chemical accidents, specifically explosions, from occurring in the workplace.

Implementation of Real-time Video Surveillance System based on Multi-Screen in Mobile-phone Environment (스마트폰 환경에서의 멀티스크린 기반의 실시간 비디오 감시 시스템 개발)

  • Kim, Dae-Jin
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1009-1015
    • /
    • 2017
  • Recently, video surveillance is becoming more and more common as many camera are installed due to crime, terrorism, traffic and security. And systems that control cameras are becoming increasingly general. Video input from the installed camera is monitored by the multiscreen at the central control center, it is essential to simultaneously monitor multiscreen in real-time to quickly respond to situations or dangers. However, monitoring of multiscreen in a mobile environment such as a smart phone is not applied to hardware specifications or network bandwidth problems. For resolving these problems, in this paper, we propose a system that can monitor multiscreen in real-time in mobile-phone environment. We reconstruct the desired multiscreen through transcoding, it is possible to monitor continuously video streaming of multiple cameras, and to have the advantage of being mobile in mobile-phone environment.

Relationship between a Role Ambiguity·Conflict and Job Satisfaction, Job Performance on Role of Tourism Police Officers (관광경찰 역할에 대한 역할모호성·역할갈등과 업무만족, 업무수행도와의 관계)

  • Kim, Sang-Woon;Cho, Seung-A
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.1
    • /
    • pp.132-139
    • /
    • 2015
  • The tourism police force has been established on 16th October 2013 for foreign tourists' safety and security. The major roles of tourism police officers were provided a crime prevention patrol and maintenance of order in tourist destination, a clampdown on illegal activities for foreign tourists, a controlling for overcharging of restaurants accommodations taxi, an administrative guidance and controls on tourism industry and worker in union relative organ like the Ministry of Culture, Sports and Tourism local government. However, the roles of tourism police officers overlap the work of general police officers and work of tourism police officers need a cooperative business with relative organs. It is caused a role ambiguity conflict between tourism police officers and general police officers. The object of this study is to improve the tourism police system through investigate a perceived gap of role ambiguity conflict between tourism police officers and general police officers and influencing relationship of role ambiguity conflict between job Satisfaction and job Performance.

Research on Effective Scientific Investigation Methods with Regards to Explosion Accidents (폭발사고시 효과적인 과학수사 방법에 관한 연구)

  • Jun, Sang-Gun;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.72-87
    • /
    • 2006
  • Accidents and terrorist acts that utilize explosives have a great influence on society and thus require a prompt investigation for the arrest of the culprit. However, such investigations are often met with difficulties due to the vastness of the crime scene, restrictions on approaching the scene, fragility of the evidence, complexity of investigation, and the lack of expertise. In spite of such facts, scientific investigation regarding explosives have not been widely studied in Korea. Therefore, the focus of this research primarily concerns the effective scientific investigation methods in cases of accidents that involve chemical explosives. Although the a systematic investigation method is at the heart of scientific investigation in cases of explosive accidents, it is only at its rudimentary stage. Therefore, in this research, a systematic investigation method is put forth for the 'scene investigation, the documentation of the scene, and the collection and processing of evidence. Further, I have set forth a 'scene investigation check list' the ensure a thorough scene investigation and to promote an exhaustive evidence collection that would guarantee the admissibility of such evidence in court. The above efforts were aimed at simplifying the currently complicated investigation system. 1) In the future, a guidebook that can be generally applied to accidents involving explosives in Korea ught to be produced, a continual systematic education and integrated training excises for investigators ought to be established, laws that require additives in explosives ought to be instituted so that the type, components, and source of explosives can be identified, and lastly, a database that contain information on former explosion accidents, trends, and techniques of criminal activities that involve explosion accidents should be compiled.

  • PDF

Face Disguise Detection System Based on Template Matching and Nose Detection (탬플릿 매칭과 코검출 기반 얼굴 위장 탐지 시스템)

  • Yang, Jae-Jun;Cho, Seong-Won;Lee, Kee-Seong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.100-107
    • /
    • 2012
  • Recently the need for advanced security technologies are increasing as the occurrence of intelligent crime is growing fastly. Previous methods for face disguise detection are required for the improvement of accuracy in order to be put to practical use. In this paper, we propose a new disguise detection method using the template matching and Adaboost algorithm. The proposed system detects eyes based on multi-scale Gabor feature vector in the first stage, and uses template matching technique in oreder to increase the detection accuracy in the second stage. The template matching plays a role in determining whether or not the person of the captured image has sunglasses on. Adaboost algorithm is used to determine whether or not the person of the captured image wears a mask. Experimental results indicate that the proposed method is superior to the previous methods in the detection accuracy of disguise faces.

A Study on Forensic Integrity Proof Standard a Cellular Phone Confiscation Criminal Investigation (휴대폰 압수수색 표준절차와 포렌식 무결성 입증)

  • Lee, Gyu-An;Park, Dae-Woo;Shin, Young-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.512-519
    • /
    • 2008
  • The proof of a cellular phone used to a crime important data of a criminal investigation and legal judgment become. A lot of on a process use the file format that do not become that is kind of various cellular phones and model pipe, and collect criminal proof, and to analyze be difficult. Also, standardization is not made, and can be adopted on procedures from confiscation search processes regarding a cellular phone to integrity extractions of Forensic data in courts in the confiscation criminal investigation spots. Standardize confiscation search procedures of a cellular phone at these papers. Use a radio waves interception envelope and radio waves interception device for a movement which a security does integrity of criminal on-site cellular phone confiscation search data by standard procedures, and was devoted to. Analyze corroborative facts of a cellular phone seized, and verify integrity, and present problems regarding cellular phone confiscation search procedures and measures, and will contribute in development of Mobile Forensic through integrity damage experiment.

A Study on a Violence Recognition System with CCTV (CCTV에서 폭력 행위 감지 시스템 연구)

  • Shim, Young-Bin;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • With the increased frequency of crime such as assaults and sexual violence, the reliance on CCTV in arresting criminals has increased as well. However, CCTV, which should be monitored by human labor force at all times, has limits in terms of budget and man-power. Thereby, the interest in intelligent security system is growing nowadays. Expanding the techniques of an objects behavior recognition in previous studies, we propose a system to detect forms of violence between 2~3 objects from images obtained in CCTV. It perceives by detecting the object with the difference operation and the morphology of the background image. The determinant criteria to define violent behaviors are suggested. Moreover, provable decision metric values through measurements of the number of violent condition are derived. As a result of the experiments with the threshold values, showed more than 80% recognition success rate. A future research for abnormal behaviors recognition system in a crowded circumstance remains to be developed.

Fake Face Detection System Using Pupil Reflection (동공의 반사특징을 이용한 얼굴위조판별 시스템)

  • Yang, Jae-Jun;Cho, Seong-Won;Chung, Sun-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.645-651
    • /
    • 2010
  • Recently the need for advanced security technologies are increasing as the occurrence of intelligent crime is growing fastly. Previous liveness detection methods are required for the improvement of accuracy in order to be put to practical use. In this paper, we propose a new fake image detection method using pupil reflection. The proposed system detects eyes based on multi-scale Gabor feature vector in the first stage, and uses template matching technique in oreder to increase the detection accuracy in the second stage. The template matching plays a role in determining the allowed eye area. The infrared image that is reflected in the pupil is used to decide whether or not the captured image is fake. Experimental results indicate that the proposed method is superior to the previous methods in the detection accuracy of fake images.

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Implementation of Image-based Virtual Fence for Surveillance Area Setup (감시영역 설정을 위한 영상 기반 가상펜스 구현)

  • Kim, Jae-jun;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2145-2152
    • /
    • 2015
  • The existing CCTV has limitation such as problem on usage of the off-line type of recorded image for specific investigation, and requirement on interactive operator intervention for real-time surveillance. Therefore, it is required to develop the intelligent CCTV equipped with various functionalities in order to overcome drawbacks mentioned above. In this paper, implementation methods of image-based virtual fence were proposed by using the spline curves with supplied control for setup of surveillance area. In addition, pre-alarm region within the predefined distance was established with tangent and normal lines extracted from control points. The image-based virtual fence can be used for remote detection of intrusion and provision of real-time intrusion alarm, and can be expected to use in safety-related application areas including security and crime prevention.