• Title/Summary/Keyword: evidence information

Search Result 2,260, Processing Time 0.028 seconds

Multi-Level Fusion Processing Algorithm for Complex Radar Signals Based on Evidence Theory

  • Tian, Runlan;Zhao, Rupeng;Wang, Xiaofeng
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1243-1257
    • /
    • 2019
  • As current algorithms unable to perform effective fusion processing of unknown complex radar signals lacking database, and the result is unstable, this paper presents a multi-level fusion processing algorithm for complex radar signals based on evidence theory as a solution to this problem. Specifically, the real-time database is initially established, accompanied by similarity model based on parameter type, and then similarity matrix is calculated. D-S evidence theory is subsequently applied to exercise fusion processing on the similarity of parameters concerning each signal and the trust value concerning target framework of each signal in order. The signals are ultimately combined and perfected. The results of simulation experiment reveal that the proposed algorithm can exert favorable effect on the fusion of unknown complex radar signals, with higher efficiency and less time, maintaining stable processing even of considerable samples.

Evidence-Based Practice in Neurological Physical Therapy (1) -Applying EBP to Clinical Decision Making- (신경계물리치료에서의 근거중심실기(1) -임상의사결정과정에 EBP 적용하기-)

  • Lee, Moon-Kyu;Lim, Jae-Heon;Kim, Tae-Yoon
    • PNF and Movement
    • /
    • v.14 no.3
    • /
    • pp.157-176
    • /
    • 2016
  • Purpose: The purpose of this study was to share an experience about processes and lessons learned to execute evidence-based practice (EBP) in neurological physical therapy. Methods: The most important thing in applying EBP to practice is to search, find, and appraise the existing evidence. Many evidence databases are available, such as CENTRAL, PEDro, PUBMED, and EMBASE. However, the knowledge represented in these databases is not always perfect. The practice model is a set of processes to resolve client problems. Therapists should make hypothesis-focused decisions through EBP. Integrating clinical reasoning and evidence is most important when it comes to the execution of EBP. Results: The process of EBP consisted of following: coming up with clinical questions, followed by searching for, appraising, evaluating, and integrating evidence. To integrate EBP into practice, it is necessary to consider clinical expertise, patient value and preferences, as well as research wth the best evidence. We provided an example of a clinical case with a stroke patient to show how this process and framework concerning clinical reasoning through evidences can be integrateds. During this process, we also utilized information technology to improve EBP ability. Conclusion: We should recognize what manner of information is needed to resolve eash patient's problem, and we should search for this information efficiently. Then, we should judge the value of the information obtained as it applies, to the clinical setting.

Classifying Biomedical Literature Providing Protein Function Evidence

  • Lim, Joon-Ho;Lee, Kyu-Chul
    • ETRI Journal
    • /
    • v.37 no.4
    • /
    • pp.813-823
    • /
    • 2015
  • Because protein is a primary element responsible for biological or biochemical roles in living bodies, protein function is the core and basis information for biomedical studies. However, recent advances in bio technologies have created an explosive increase in the amount of published literature; therefore, biomedical researchers have a hard time finding needed protein function information. In this paper, a classification system for biomedical literature providing protein function evidence is proposed. Note that, despite our best efforts, we have been unable to find previous studies on the proposed issue. To classify papers based on protein function evidence, we should consider whether the main claim of a paper is to assert a protein function. We, therefore, propose two novel features - protein and assertion. Our experimental results show a classification performance with 71.89% precision, 90.0% recall, and a 79.94% F-measure. In addition, to verify the usefulness of the proposed classification system, two case study applications are investigated - information retrieval for protein function and automatic summarization for protein function text. It is shown that the proposed classification system can be successfully applied to these applications.

A study on procedures of search and seize in digital data

  • Kim, Woon Go
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.133-139
    • /
    • 2017
  • Today, the activities of individuals and corporations are dependent not only on digital technology but also on the future of society, which is referred to as the fourth industrial revolution. Since the traces that arise from the crimes that occur in the digital society are also inevitably developed into a society that should be found in the digital, the judicial dependence of judging by the digital evidence is inevitably increased in the criminal procedure. On the other hand, considering the fact that many users are using virtual shared computing resources of service providers considering the fact that they are being converted into a cloud computing environment system, searching for evidence in cloud computing resources is not related to crime. The possibility of infringing on the basic rights of the criminal procedure is increased, so that the ability of evidence of digital data which can be used in the criminal procedure is limited. Therefore, considering these two aspects of digital evidence, this point should be fully taken into account in judging the evidence ability in the post-seizure warrant issuance and execution stage as well as the pre-emptive control. There is a view that dictionary control is useless, but it needs to be done with lenient control in order to materialize post-modern control through judging ability of evidence. In other words, more efforts are needed than ever before, including legislation to ensure proper criminal procedures in line with the digital age.

A Survey of Evidence-Based Practice of Physical Therapist (물리치료사의 증거에 근거한 물리치료 실태조사)

  • Kwon, Mi-Ji
    • The Journal of Korean Physical Therapy
    • /
    • v.18 no.3
    • /
    • pp.23-36
    • /
    • 2006
  • Purpose: The purpose of this study was to describe physical therapists' self-reported: (1) attitudes and beliefs about evidence~based practice(EBP), (2) education, knowledge, and skills related to obtaining and evaluating evidence, (3) attention to the literature relevant to practice, (4) access to and availability of information and (5) perceptions of the barriers to evidence-based practice. Methods: Our study sample consisted of a random sample of 90 physical therapists in gwang-ju and junnam. Participants completed a questionnaire. Responses were summarized for each item, and logistic regression analyses were used to examine relationships among variables. Results: According to the respondents, the primary barrier to implementing EBP was lack of time. The results suggest they believe that the use of evidence in practice was necessary, that the literature is helpful to them in their practice and decision making, and that quality of patient care is better when evidence is used. Many of the beliefs, skills and behaviors we examined were related to the education courses and sex. The majority of the respondents had access to online information at home. Conclusion: They noted that they needed to increase the use of evidence in their daily practice.

  • PDF

A Study on the Providing the Integrity of Digital Evidence while Deleting the irrelevant File (디지털 이미지 증거에서 사건과 무관한 파일 삭제시 무결성 제공 방안 연구)

  • Kim, TaeKyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.111-116
    • /
    • 2019
  • The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.

A study of the preparation And procedures by Smartphone Mobile Forensic evidence collection and analysis (스마트폰 모바일 포렌식 증거 수집 분석을 위한 준비사항 및 절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.269-272
    • /
    • 2011
  • The lawsuit is being made on the smart phone. And recent is getting a lot of evidence for the smart phone data in a court of law. Thus, the evidence of illegal use smartphone for the extraction of data and evidence collection, forensic procedure is a need for research. In this paper, evidence of phone forensic procedure for the extraction of the data suggests. And, by collecting forensic evidence from smartphones ensure the integrity of digital evidence and how to solve the case investigated. With this study, smartphone forensic will be able to contribute to the development.

  • PDF

e-Forensic Tool Research for Obtaining Legal Evidence Ability of Digital Evidence by Intelligence Inspection (디지털 증거물의 법적능력 확보를 위한 정보감사용 e-Forensic 툴 연구)

  • Kim, Seungyong;Kim, Gyeongyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.267-275
    • /
    • 2017
  • This research is about the development of e-forensic tool that extract & analyze different forms of digital evidence that individuals come across in a disaster scene. The tool utilizes digital forensic techniques which makes the tool efficient in any disaster analysis situation. In order for the forensic evidence to be selected as legal evidence, the evidence needs to be proven that it is in its original state with no forgery involved. This is where the e-forensic tool comes in, as its ability to collect digital evidence during investigation has proven; that the tool can keep the evidence in its original state and increase the integrity by generating hash TAG and adding the forensic evidence to a password encoded file.

A Study on Improving the Legal System for the Expedited Preservation of Digital Evidence (디지털 증거의 긴급한 보전을 위한 법제 개선 연구)

  • Ro, Sohyong;Ji, Sungwoo
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.57-73
    • /
    • 2020
  • The proportion of digital evidence in criminal cases has increased, while at the same time, the spread of the Internet has made it easy to delete information that is stored in another place and thus, the Internet is being used to delete online criminal evidence. To respond quickly and effectively to cybercrime, 29 countries signed the Convention on Cybercrime in 2001 through the Council of Europe. Article 16 of the Convention relates to the expedited preservation of stored computer data and requires signatories to adopt legislative measures to enable its competent authorities to order expeditious preservation of specified computer data where there are grounds to believe that the data is particularly vulnerable to loss or modification. More than 60 countries have joined the Convention since 2001 and have made efforts to improve their legal system in line with it. The United States legislated 18 U.S.C. § 2703(f) to preserve electronic evidence pending the issuance of a court order. The German Code of Criminal Procedure §§ 94~95 allows prosecution authorities to seize evidence or issue production orders without court control in urgent circumstances. A custodian shall be obliged to surrender evidence upon a request that evidence be preserved, and non-compliance results in punishment. Japan legislated the Criminal Procedure Act § 197(3) and (4) to establish a legal base for requesting that electronic records that are stored by an ISP not be deleted. The Korean Criminal Procedure Act § 184 outlines procedures for the preservation of evidence but does not adequately address the expeditious preservation of digital evidence that may be vulnerable to deletion. This paper analyzes nine considerations, including request subjects, requirements, and cost reimbursement to establish directions to improve the legal system for the expedited preservation of digital evidence. A new method to preserve online digital evidence in urgent cases is necessary.

Design and Implementation of a Digital Evidence Management Model Based on Hyperledger Fabric

  • Jeong, Junho;Kim, Donghyo;Lee, Byungdo;Son, Yunsik
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.760-773
    • /
    • 2020
  • When a crime occurs, the information necessary for solving the case, and various pieces of the evidence needed to prove the crime are collected from the crime scene. The tangible residues collected through scientific methods at the crime scene become evidence at trial and a clue to prove the facts directly against the offense of the suspect. Therefore, the scientific investigation and forensic handling for securing objective forensic in crime investigation is increasingly important. Today, digital systems, such as smartphones, CCTVs, black boxes, etc. are increasingly used as criminal information investigation clues, and digital forensic is becoming a decisive factor in investigation and trial. However, the systems have the risk that digital forensic may be damaged or manipulated by malicious insiders in the existing centralized management systems based on client/server structure. In this paper, we design and implement a blockchain based digital forensic management model using Hyperledger Fabric and Docker to guarantee the reliability and integrity of digital forensic. The proposed digital evidence management model allows only authorized participants in a distributed environment without a central management agency access the network to share and manage potential crime data. Therefore, it could be relatively safe from malicious internal attackers compared to the existing client/server model.