• Title/Summary/Keyword: admissibility criteria

Search Result 5, Processing Time 0.019 seconds

Customized Configuration with Template and Options (맞춤구성을 위한 템플릿과 Option 기반의 추론)

  • 이현정;이재규
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.1
    • /
    • pp.119-139
    • /
    • 2002
  • In electronic catalogs, each item is represented as an independent unit while the parts of the item can be composed of a higher level of functionality. Thus, the search for this kind of product database is limited to the retrieval of most similar standard commodities. However, many industrial products need to configure optional parts to fulfill the required specifications. Since there are many paths in finding the required specifications, we need to develop a search system via the configuration process. In this system, we adopt a two-phased approach. The first phase finds the most similar template, and the second phase adjusts the template specifications toward the required set of specifications by the Constraint and Rule Satisfaction Problem approach. There is no guarantee that the most similar template can find the most desirable configuration. The search system needs backtracking capability, so the search can stop at a satisfied local optimal satisfaction. This framework is applied to the configuration of computers and peripherals. Template-based reasoning is basically the same as case-based reasoning. The required set of specifications is represented by a list of criteria, and matched with the product specifications to find the closest ones. To measure the distance, we develop a thesaurus of values, which can identify the meaning of numbers, symbols, and words. With this configuration, the performance of the search by configuration algorithm is evaluated in terms of feasibility and admissibility.

  • PDF

Limitations and Improvements of Adoption Criteria for Digital Forensic Evidence (디지털 포렌식 증거 채택 기준의 한계와 개선 방안)

  • Kim, Minsu
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.35-43
    • /
    • 2018
  • Currently, digital evidence takes judicial discretion in adopting it, which does not clarify the criteria for adoption, and it can shorten the analysis time of digital evidence with distributed processing techniques. However, due to the development of cryptographic techniques, there is a problem in that it is not suitable for the 48 hour limit of the warrant request. In this paper, we analyze the precedents for admissibility of evidence and the probative power in the civil/criminal proceedings, and discuss the need for objective and detailed adoption criteria to replace judicial discretion. In addition, we'd like to propose a preliminary application form for analysis of digital evidence as a problem for limit time for warrant claims from the perspective of forensics and a solution to the problem.

  • PDF

SUFFICIENT CONDITIONS FOR ANALYTIC FUNCTIONS TO BE STARLIKE OF RECIPROCAL ORDER

  • Shalu Yadav;V. Ravichandran
    • Honam Mathematical Journal
    • /
    • v.46 no.1
    • /
    • pp.120-135
    • /
    • 2024
  • A normalized analytic function f, defined on the unit disk 𝔻, is starlike of reciprocal order α > 1 if the real part of f(z)/(zf'(z)) is less than α for all z ∈ 𝔻. By utilizing the theory of differential subordination, we establish several sufficient conditions for analytic functions defined on 𝔻 to be starlike of reciprocal order. Additionally, we investigate the conditions under which the function f(z)/(zf'(z)) is subordinate to the function 1 + (α - 1)z. This subordination, in turn, is sufficient for the function f to be starlike of reciprocal order α > 1.

Priority Scheduling of Digital Evidence in Forensic (포렌식에서 디지털 증거의 우선순위 스케쥴링)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2055-2062
    • /
    • 2013
  • Digital evidence which is the new form of evidence to crime makes little difference in value and function with existing evidences. As time goes on, digital evidence will be the important part of the collection and the admissibility of evidence. Usually a digital forensic investigator has to spend a lot of time in order to find clues related to the investigation among the huge amount of data extracted from one or more potential containers of evidence such as computer systems, storage media and devices. Therefore, these evidences need to be ranked and prioritized based on the importance of potential relevant evidence to decrease the investigate time. In this paper we propose a methodology which prioritizes order in which evidences are to be examined in order to help in selecting the right evidence for investigation. The proposed scheme is based on Fuzzy Multi-Criteria Decision Making, in which uncertain parameters such as evidence investigation duration, value of evidence and relation between evidence, and relation between the case and time are used in the decision process using the aggregation function in fuzzy set theory.

Limitations of Spectrogram Analysis for Smartphone Voice Recording File Forgery Detection (스마트폰 음성 녹음 파일 위변조 검출을 위한 스펙트로그램 분석의 한계점)

  • Sangmin Han;Yeongmin Son;Jae Wan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.545-551
    • /
    • 2023
  • As digital information is readily available to everyone today, the adoption of digital evidence is increasing. However, it is virtually impossible to determine the authenticity of forgery in the case of a voice recording file that has gone through a sophisticated editing process along with the spread of various voice file editing tools. This study aims to prove that forgery, which is difficult to distinguish from the original file, is possible by using insertion, deletion, linking, and synthetic editing technologies in voice recording files. This study presents the difficulty of detecting forgery by encoding a forged voice file with the same extension as the original. In addition, it was shown that forgery detection is impossible if additional transition band deletion and secondary encoding are performed only for experiments in which features occurred. Through this, this study is expected to contribute to the establishment of more stringent evidence admissibility criteria for adopting voice recording files as digital evidence.