• Title/Summary/Keyword: forensic analysis

Search Result 529, Processing Time 0.031 seconds

Complete mitochondrial genome of Nyctalus aviator and phylogenetic analysis of the family Vespertilionidae

  • Lee, Seon-Mi;Lee, Mu-Yeong;Kim, Sun-sook;Kim, Hee-Jong;Jeon, Hye Sook;An, Junghwa
    • Journal of Species Research
    • /
    • v.8 no.3
    • /
    • pp.313-317
    • /
    • 2019
  • Bats influence overall ecosystem health by regulating species diversity and being a major source of zoonotic viruses. Hence, there is a need to elucidate their migration, population structure, and phylogenetic relationship. The complete mitochondrial genome is widely used for studying the genome-level characteristics and phylogenetic relationship of various animals due to its high mutation rate, simple structure, and maternal inheritance. In this study, we determined the complete mitogenome sequence of the bird-like noctule (Nyctalus aviator) by Illumina next-generation sequencing. The sequences obtained were used to reconstruct a phylogenic tree of Vespertilionidae to elucidate the phylogenetic relationship among its members. The mitogenome of N. aviator is 16,863-bp long with a typical vertebrate gene arrangement, consisting of 13 protein-coding genes (PCGs), 22 transfer RNA genes, 2 ribosomal RNA genes, and 1 putative control region. Overall, the nucleotide composition is as follows: 32.3% A, 24.2% C, 14.3% G, and 29.2% T, with a slight AT bias (61.5%). The base composition of the 13 PCGs is as follows: 30.3% A, 13.4% G, 31.0% T, and 25.2% C. The phylogenetic analysis, based on 13 concatenated PCG sequences, infers that N. aviator is closely related to N. noctula with a high bootstrap value (100%).

Causes of local collapse of a precast industrial roof after a fire

  • Bruno Dal Lago;Paride Tucci
    • Computers and Concrete
    • /
    • v.31 no.5
    • /
    • pp.371-384
    • /
    • 2023
  • Precast roofing systems employing prestressed elements often serve as smart structural solutions for the construction of industrial buildings. The precast concrete elements usually employed are highly engineered, and often consist in thin-walled members, characterised by a complex behaviour in fire. The present study was carried out after a fire event damaged a precast industrial building made with prestressed beam and roof elements, and non-prestressed curved barrel vault elements interposed in between the spaced roof elements. As a consequence of the exposure to the fire, the main elements were found standing, although some locally damaged and distorted, and the local collapse of few curved barrel vault elements was observed in one edge row only. In order to understand and interpret the observed structural performance of the roof system under fire, a full fire safety engineering process was carried out according to the following steps: (a) realistic temperature-time curves acting on the structural elements were simulated through computational fluid dynamics, (b) temperature distribution within the concrete elements was obtained with non-linear thermal analysis in variable regime, (c) strength and deformation of the concrete elements were checked with non-linear thermal-mechanical analysis. The analysis of the results allowed to identify the causes of the local collapses occurred, attributable to the distortion caused by temperature to the elements causing loss of support in early fire stage rather than to the material strength reduction due to the progressive exposure of the elements to fire. Finally, practical hints are provided to avoid such a phenomenon to occur when designing similar structures.

Digital Forensic Technique Research through Messenger Analysis (메신저 사용정보 분석을 통한 디지털 포렌식 기법 연구)

  • Choi, Joon-Ho;Kwon, Hyuk-Don;Lee, Sang-Jin;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.45-48
    • /
    • 2007
  • 메신저는 인터넷을 통해 실시간으로 대화를 주고받을 수 있는 소프트웨어로서 사용률이 점차 증가하고 있는 추세이다. 메신저의 사용률이 증가함에 따라 메신저를 사이버 범죄의 하나의 도구로써 이용하는 사례가 발생하고 있다. 메신저가 사이버 범죄에 악용되는 사례가 늘어나면서 전 세계적으로 MSN Messenger, AOL Instant Messenger, ICQ와 같은 외산 메신저 소프트웨어 대한 포렌식 연구가 활발히 진행 되고 있다. 본 논문에서는 현재 국내에서 사용되고 있는 메신저에 대한 포렌식 기법 연구를 통하여 범죄 발생 당시 용의자들의 정보를 획득하고 이를 컴퓨터 범죄 수사에 활용하는 방안을 제시한다.

  • PDF

Rates and Mechanism of Adsorption of Transition Metal Ions on Polystyrene Resins Supported Diethylenetriamine (디에틸렌트리아민을 지지시킨 폴리스틸렌수지에 대한 전이금속이온의 흡착속도와 메카니즘)

  • Kim, Sun-Deuk;Shin, Yun-Yeol;Kim, Chang-Su
    • Analytical Science and Technology
    • /
    • v.12 no.6
    • /
    • pp.465-471
    • /
    • 1999
  • Chloromethylated polystyrene resins supported diethylenetriamine of linear and claw types have been prepared by the reaction of diethylenetriamine with chloromethylated polystyrene. The kinetics of adsorption of transition metal ions on polystyrene resins were measured by the limited-bath technique. This paper reports the results of the diffusion coefficients, entropies of activation, and free energies of activation. The ratedetermining step of the adsorption of transition metals on the resins is a process of diffusion through the particles.

  • PDF

Forensic Analysis recovery Program and Effective Re-build Deleted Internet History Data (복원 프로그램 동작분석과 삭제된 인터넷 접속기록의 효율적인 복원에 관한 연구)

  • Choi, Un-Young;Lee, Hee-Jo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.52-56
    • /
    • 2008
  • 컴퓨터 시스템을 대상으로 하거나 컴퓨터 시스템을 이용하는 범행의 상당수가 PC방에서 이루어지고 있다. 그러나 불특정 다수의 네티즌들이 이용하는 PC방은 관리상의 용이 등의 이유로 대부분 하드디스크 초기화 프로그램(복원)을 사용하고 있으며, 이와 같은 PC방의 관리 환경은 수사의 직접적인 목적인 증거수집 및 복구을 통하여 실체적 진실발견에 많은 어려움을 초래하고 있다. 본 논문에서는 이와 같은 복원 프로그램의 동작원리를 분석하고, 이를 바탕으로 인터넷 접속기록의 효율적인 복원 방법에 대한 논리적인 접근법을 제시하고, 프로그램 구현을 통한 정확한 디지털 증거수집의 실접근법을 제공한다.

  • PDF

Analysis of Threats Factor in IT Convergence Security (IT 융합보안에서의 위협요소 분석)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.49-55
    • /
    • 2010
  • As the developing of the information communication technology, more and more devices are with the capacity of communication and networking. The convergence businesses which communicate with the devices have been developing rapidly. The IT convergence communication is viewed as one of the next frontiers in wireless communications. In this paper, we analyze detailed security threats against M2M(Machine to Machine), intelligent vehicle, smart grid and u-Healthcare in IT convergence architecture. We proposed a direction of the IT convergence security that imbedded system security, forensic security, user authentication and key management scheme.

PCR Analysis of Four Length-Polmorphic Loci in Korea Population for Genotyping

  • Ryu, Jae-Song;Koo, Yoon-Mo;So, Jae-Seong
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.5 no.3
    • /
    • pp.169-173
    • /
    • 2000
  • On human chromoscomes, a short sequence of DNA is known to repeat a number of times. These are called variable number of tandem repeat (VNTR) or short tandem respeat (STR) which has a short core. VNTR and STR are used in the filed of forensic science, evolution, and anthropology. In this work, we examined allele frequencies of one VNTR (YNZ22) and three STRs (NeuR, D21S11, Humth01) in a korean population sample by polymerase chain reaction (RCP) followed by high-resolution polyacrylamide gel electro-phoresis (PAGE) with silver stain. Subsequently, the polymorphism information content (PIC) was calculated : the hifhest PIC was observed in the NeuR locus (0.95680) and lowest in the Humth01 locus (0.75809).

  • PDF

Analysis and response of Petya to Ransomware (랜섬웨어 Petya에 대한 분석과 대응방안)

  • Kim, Seon-Yong;Kim, Ki-Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.425-426
    • /
    • 2017
  • Ransomware has caused a lot of damage by attacking disks of government agencies, financial institutions and corporations. This has been exploited for monetary damages and Taking personal information. In this paper, we describe the NTFS. Also describe Petya as the example of Ransomware. We used forensic techniques to analyze post-infection status and describes the method for MBR area recovery.

  • PDF

Digital Forensic Analysis of the Window 8 Style UI based Facebook App (Window 8 Style UI 기반의 페이스북 앱에 대한 디지털 포렌식 분석)

  • Lee, ChanJin;Chung, Mokdong
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.466-469
    • /
    • 2014
  • 기존 Window8 Style 에 대한 디지털 포렌식 연구는 윈도우 기본 애플리케이션에 대해서만 진행되어 있는 상황이고, 다른 3rd party Style App 들에 대해서만 진행되어있는 상황이다. 본 논문에서는 Window8 Style UI 의 Instant Messengers 에 대해 디지털 포렌식 분석하고 이를 통해 범인의 행동 흐름 파악 및 증거확보 매커니즘을 제시하고자 한다. 본 논문은 기존의 Window8 의 접근방법을 토대로 하여, Style App 의 사용흔적이나 내용에 대해 확인하며, 시간정보, 이미지 등 각종 애플리케이션들을 다각적으로 분석한다. 본 논문에서 제안한 접근법은 개별 App 들에 대한 정보를 효율적이고 빠르게 분석하고 사건에 대한 정보를 제공함으로써 범죄수사과정에 도움이 될 것으로 기대된다.

Digital Forensic Analysis for New File System (신규 파일 시스템에 대한 디지털 포렌식 분석 필요성 연구)

  • Lee, Keun-Gi;Lee, Changhoon;Lee, Sangjin
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.1108-1110
    • /
    • 2012
  • 파일 시스템은 컴퓨터에서 파일이나 자료를 쉽게 발견 및 접근할 수 있도록 보관 또는 조직하는 체제를 가리키는 말이다. 기존에는 Windows에 사용되는 FAT(File Allocation Table) 파일 시스템과 NTFS(New Technology File System), Unix/Linux 등에서 주로 활용되는 ext계열 파일 시스템 등이 주된 분석 대상이었으나 스마트폰과 태블릿 PC, NAS(Network Attached Storage) 서버 등 다양한 IT기기가 보급되면서 이들 기기에서 사용되는 파일시스템을 추가적인 분석이 필요하다. 따라서 본 논문에서는 추가적으로 분석해야할 파일 시스템의 종류를 나열하고 각각의 특성을 서술하여 향후 추가 분석의 지침으로 활용하고자한다.