• Title/Summary/Keyword: 식별기술

Search Result 2,107, Processing Time 0.029 seconds

모색발현 유전자의 DNA Marker를 이용한 쇠고기 품종 판별

  • Sin, Seong-Cheol;Chae, Ji-Seon;Kim, Hye-Jeong;Choe, Eun-Ju;Kim, Hui-Seon;Kim, Hyeon-Seok;Jeong, Ui-Ryong;Jeong, Gu-Yong
    • Proceedings of the Korean Society for Food Science of Animal Resources Conference
    • /
    • 2004.05a
    • /
    • pp.172-176
    • /
    • 2004
  • 본 연구는 축우의 모색발현을 조절하는 MCIR, MGF 및 TYRP1 3종류의 모색 유전자를 이용하여 한우육 판별기술을 개발하고자 PCR-RFLP 기법으로 이들 모색유전자 좌위의 대립유전자를 검출하고 각 품종 간 RFLP 유전자형 출현빈도를 비교 분석하였다. MCIR 유전자의 RFLP 유전자형 출현빈도에서 한우는 e/e과 E+/e형이 출현되었고 이외의 다른 유전자형의 출현은 전혀 인정되지 않았다. 그러나, Holstein종 젖소는 $E^D/E^D$$E^D/e$ 2종류의 유전자형 그리고 Angus종에서는 $E^D/E^D$, $E^D/E^++$$E^D/e$ 3종류의 유전자형이 각각 출현하여 한우와 이들 두 품종간의 MCIR유전자형 출현빈도에 뚜렷한 차이가 인정되었다. MGF 유전자의 RFLP 유전자형 출현빈도에서 한우는 R/r과 r/r형이 각각 25%와 75%로 rr형의 출현율이 비교적 높았으며 Holstein종과 Angus 종은 R/r형이 100% 출현했으며, Charolais 종은 rr형이 100% 출현하였고 이외의 다른 유전자형은 인정되지 않았으며 Hereford종은 RR형이 80% 그리고 R/r형이 20%의 출현율을 보여 RR형의 출현율이 매우 높아 한우와 Holstein 및 육우 품종간의 MGF 유전자형 출현빈도에 명백한 차이가 인정되었다. 따라서, 소 모색관련 MCIR과 MGF 유전자의 품종 특이적 PCR-RFLP 유전자형은 한우육과 국내산 Hostein 젖소육 및 도입육우 품종을 식별하는데 매우 유용한 DNA marker로 이용될 수 있음이 확인되었다.

  • PDF

GIS Application for 1-1-9 Caller Location Information System (GIS를 이용한 신고자 위치표시 시스템 개발)

  • Hahm, Chang-Hahk;Jeong, Jae-Hu;Ryu, Joong-Hi;Kim, Eung-Nam
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.8 no.1 s.15
    • /
    • pp.97-103
    • /
    • 2000
  • The main purpose of 1-1-9 Caller Location Information System is to identify and display the precise location of emergency incidents such as natural or man - made fires, medical emergencies and accidents. The state - of- the - art technologies such as Am (Automatic Number Identification), GIS(Geographical Information System) and GPS (Global Positioning System) were applied and integrated in the system for efficient and effective location identification. It displays a radius of 25M, 50M and 100M on the map after location identification. The system can also provide the shortest path to an incident location from a fire station or a fire engine. In case of a fire breakout in or near a building, the attribute information of the building, called a building attribute card, is displayed along with the map location. The system then matches the information with the fire situation and sends an alert to a responsible fire station by phone or fax in order to help promptly react to the problem. An attribute card includes the critical information of a premise such as building's location, number of stories, floor plans, capacity, construction history, indoor fire detection and Prevention facilities, etc.

  • PDF

Non-destructive Inspection of Construction Joints of Concrete Structures Using the Radar and the Infrared Thermography Method (레이더법과 적외선법을 이용한 콘크리트 시공 이음부 공극의 비파괴검사)

  • Park, Seok-Kyun
    • Journal of the Korea Concrete Institute
    • /
    • v.15 no.3
    • /
    • pp.425-432
    • /
    • 2003
  • The joint treatment of concrete is one of the technical problems in concrete constructions. Joints created with concrete constructions result in serious weakness in the aspects of both structural and water-barrier function. The radar and the infrared thermography method have been used for the non-destructive inspection of several construction joints of concrete structures in this study. The advantages and limitations of these methods are investigated for non-destructive inspection on construction joints of concrete columns. It can be shown that the detecting precision of construction joints using these methods is improved if radar analysis is carried out with a simulation analysis. In case of the infrared thermography method, the shape of construction joints can be also detected when heating is performed before testing. As the result, it has been verified that the construction joints, difficult to be detected by visual inspection, could be inspected effectively in broad areas at short period of time when these two methods are applied.

Fake Face Detection System Using Pupil Reflection (동공의 반사특징을 이용한 얼굴위조판별 시스템)

  • Yang, Jae-Jun;Cho, Seong-Won;Chung, Sun-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.645-651
    • /
    • 2010
  • Recently the need for advanced security technologies are increasing as the occurrence of intelligent crime is growing fastly. Previous liveness detection methods are required for the improvement of accuracy in order to be put to practical use. In this paper, we propose a new fake image detection method using pupil reflection. The proposed system detects eyes based on multi-scale Gabor feature vector in the first stage, and uses template matching technique in oreder to increase the detection accuracy in the second stage. The template matching plays a role in determining the allowed eye area. The infrared image that is reflected in the pupil is used to decide whether or not the captured image is fake. Experimental results indicate that the proposed method is superior to the previous methods in the detection accuracy of fake images.

Improved variable bits M-ary QT conflict resolution algorithm for discrete m-bits recognition in RFID system (RFID 시스템에서 불연속 m-bits 인식을 위한 개선된 가변비트 M-ary QT 충돌해소 알고리즘)

  • Kim, Kwan-woong;Kim, Byun-gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1887-1894
    • /
    • 2016
  • In the RFID system, the reader transmits a query message to tags in order to identify a unique ID of tags within its detection range. The procedures for arbitrating a collision is essential because the multiple tags can response simultaneously in the same to the query of the Reader. This procedure is known as conflict resolution algorithm and it is a key technology in the RFID system. In this paper, we proposed a variable bits M-ary QT algorithm based on Manchester coding techniques. The proposed algorithm use the location information of the collision bits in the reader and tags. The proposed algorithm can reduce the number of the query-response cycle because it is capable of recognizing discontinuous bits and a variable number of bits. From computer simulation, the proposed method give better performance than the conventional M-ary QT techniques in terms of response, recognition efficiency, communication overhead.

A Semantic Similarity Measure for Retrieving Software Components (소프트웨어 부품의 검색을 위한 의미 유사도 측정)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1443-1452
    • /
    • 1996
  • In this paper, we propose a semantic similarity measure for reusable software components, which aims to provide the automatic classification process of reusable to be stored in the structure of a software library, and to provide an efficient retrieval method of the software components satisfying the user's requirements. We have identified the facets to represent component characteristics by extracting information from the component descriptions written in a natural language, composed the software component identifiers from the automatically extracted terms corresponding to each facets, and stored them which the components in the nearest locations according to the semantic similarity of the classified components. In order to retrieve components satisfying user's requirements, we measured a semantic similarity between the queries and the stored components in the software library. As a result of using the semantic similarity to retrieve reusable components, we could not only retrieve the set of components satisfying user's queries. but also reduce the retrieval time of components of user's request. And we further improve the overall retrieval efficiency by assigning relevance ranking to the retrieved components according to the degree of query satisfaction.

  • PDF

A Study on the Importance of Risk Factors for Effective Risk Management in the Pre-Project Planning Phase of the Development Projects (국내개발사업 사전기획단계에서의 효율적 리스크 관리를 위한 리스크 인자 중요도에 관한 연구)

  • Shin Kyu-Ho;Kim Jae-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.3 no.2 s.10
    • /
    • pp.75-86
    • /
    • 2002
  • The construction market is diversely changing because social environmental factors are rapidly transforming. Therefore, Construction projects are becoming complex and diverse. Furthermore, the risk being inherent in construction projects are increasing, and now people are considering about the risk management of construction projects in successfully handling the risk factor. The purpose of this study is first to comprehend the preparation of basic references for objective and systematic identification, categorization, and analysis of risk. Secondly it is to find the principle elements within the risk factors identified and categorized around planning process. Finally it is to manage objectively on the planning process, which forms a lot of uncertainty, in order to accentuate the importance about the risk of pre-planning process stage

A Development of the Operational Architecture of a Low Altitude Air Defense Automation System (저고도 방공자동화체계의 운용아키덱처 개발)

  • Son, Hyun-Sik;Kwon, Yong-Soo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.31-45
    • /
    • 2008
  • This paper describes a development of the operational architecture of a low altitude air defense automation system using a systems engineering approach. The future battlefield is changing to new system of systems that command and control by the network based BM/C4I. Also, it is composed of various sensors and shooters in an single theater. Future threats may be characterized as unmanned mewing bodies that the strategic effect is great such as UAVs, cruise missiles or tactical ballistic missiles. New threats such as low altitude stealth cruise missiles may also appear. The implementation of a low altitude air defense against these future threats is required to complex and integrated approach based on systems engineering. In this view, this work established an operational scenario and derived operational requirements by identifying mission and future operational environments. It is presented the operational architecture of the low altitude air defense automation system by using the CORE 5.0.

Hash-based Pattern Matching System for Detection Performance (침입탐지시스템 탐지성능 향상 위한 해시기반 패턴 매칭 시스템)

  • Kim, Byung-Hoon;Ha, Ok-Hyun;Shin, Jae-Chul
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.21-27
    • /
    • 2009
  • In the environment of development of network bandwidth and intrusion technology there is limit to the pattern analysis of all massed packets through the existing pattern matching method by the intrusion detection system. To detect the packets efficiently when they are received fragmented, it has been presented the matching method only the pattern of packets consisting with the operation system such as Esnort. Pattern matching performance is improved through the use of NMAP, the basic mechanism od Esnort, by scanning the operation system of the same network system and appling pattern match selectively scanned information and the same operation system as the received packets. However, it can be appeared the case of disregarding the receivied packets depending on the diversity of the kind of operation systems and recognition mistake of operation system of nmap. In this paper, we present and verify the improved intrusion detection system shortening the pattern matching time by the creation of hashy table through the pattern hash of intrusion detection system independently with the users system environment .in the state of flux.

  • PDF

Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models (공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델)

  • Kim, Nam-Jeong;Kong, Mun-Soo;Lee, Gang-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.17-27
    • /
    • 2017
  • Recently, as cyber attacks have been activated, many such attacks have come into contact with various media. Research on security engineering and reverse engineering is active, but there is a lack of research that integrates them and applies attack systems through cost effective attack engineering. In this paper, security - enhanced information systems are developed by security engineering and reverse engineering is used to identify vulnerabilities. Using this vulnerability, we compare and analyze lifecycle models that construct or remodel attack system through attack engineering, and specify structure and behavior of each system, and propose more effective modeling. In addition, we extend the existing models and tools to propose graphical attack specification models that specify attack methods and scenarios in terms of models such as functional, static, and dynamic.