• Title/Summary/Keyword: 응용기술

Search Result 14,438, Processing Time 0.045 seconds

Introduction of List of Plant Diseases in Korea 6.1st Edition (2023 Revised Version) (한국식물병명목록 6.1판(2023 개정본))

  • Seon-Hee Kim;Jaehyuk Choi;Young-Joon Choi;Byeong-Yong Park;Su-Heon Lee;Gyoung Hee Kim;Hyun Gi Kong;Donggun Kim;Soonok Kim;Youngho Kim;Chang-Gi Back;Hee-Seong Byun;Jang Kyun Seo;Jun Myoung Yu;Ju-Yeon Yoon;Dong-Hyeon Lee;Seung-Yeol Lee;Seungmo Lim;Yongho Jeon;Jaeyong Chun;Insoo Choi;In-Young Choi;Hyo-Won Choi;Jin Sung Hong;Seung-Beom Hong
    • Research in Plant Disease
    • /
    • v.29 no.4
    • /
    • pp.331-344
    • /
    • 2023
  • More than a year has passed after the 6th edition of 'List of Plant Diseases in Korea (LPDK)' was published in April 2022. The 6.1st edition (2023) of List of Plant Diseases in Korea was made by correcting errors found in the 6th edition of list and adding new diseases reported after the 6th edition. There were 397 corrections from the 6th edition, most of which were simple spelling errors or minor issues. However, 12 diseases were deleted due to duplication or unclear literature proof, and 2 diseases had their diseases' common names changed. We added 158 diseases that were reported before 2021 but not included in the 6th edition, or reported after the 6th edition. After all, 146 diseases were added to the 6,534 diseases in the 6th edition, resulting in a total of 6,680 diseases in the 6.1st edition. Thirty host taxa were also added, increasing the number from 1,390 in the 6th edition to 1,420 in the 6.1st edition. Pathogens were also added to 62 taxa, from 2,400 in the 6th edition, bringing the total to 2,462 taxa in the 6.1st edition. Ultimately, the 6.1st edition (2023) of 'The List of Plant Diseases in Korea' contains 6,680 diseases caused by pathogens of 2,462 taxa on 1,420 hosts. The 6.1st edition is not printed as a book, but is provided through the online 'List of Plant Diseases in Korea' (https://genebank. rda.go.kr/kplantdisease.do).

Yearly Update of the List of Plant Diseases in Korea (6.2 Edition, 2024) (한국식물병명목록의 연간 현황 보고(6.2판, 2024년 개정본))

  • Jaehyuk Choi;Seon-Hee Kim;Young-Joon Choi;Gyoung Hee Kim;Ju-Yeon Yoon;Byeong-Yong Park;Hyun Gi Kong;Soonok Kim;Sekeun Park;Chang-Gi Back;Hee-Seong Byun;Jang Kyun Seo;Jun Myoung Yu;Dong-Hyeon Lee;Mi-Hyun Lee;Bong Choon Lee;Seung-Yeol Lee;Seungmo Lim;Yongho Jeon;Jaeyong Chun;Insoo Choi;In-Young Choi;Hyo-Won Choi;Jin Sung Hong;Seung-Beom Hong
    • Research in Plant Disease
    • /
    • v.30 no.2
    • /
    • pp.103-113
    • /
    • 2024
  • Since 2009, the Korean Society of Plant Pathology has established the Committee on Common Names of Plant Disease to systematically review and determine plant disease names and related terminologies. The committee published the 6th edition of the List of Plant Diseases in Korea (LPDK) in 2022, and the list has been made publicly accessible online. The online database has significantly enhanced user accessibility, expedited update processes, and improved interoperability with other databases. As a result, the 6.1 edition of the list was released by online LPDK in 2023, detailing new disease names added over the preceding year and revisions to existing names. Subsequently, in 2024, the 6.2 edition was published, encompassing 6,765 diseases caused by 2,503 pathogen taxa across 1,432 host species. The public release of the online database has, however, introduced several challenges and tasks. Addressing these issues necessitates the development of modern, standardized nomenclature guidelines and a robust system for the registration of new disease names. Open communication and collaboration among the diverse members of the Korean Society of Plant Pathology are required to ensure the reliability of the LPDK.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Development of Tuna Purse Seine Fishery in Korea and the Countries Concerned (한국(韓國) 및 관련각국((關聯各國)의 다랑어 선망어업(旋網漁業) 발달과정(發達過程))

  • Hyun, Jong-Su;Lee, Byoung-Gee;Kim, Hyoung-Seok;Yae, Young-Hee
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.4 no.1
    • /
    • pp.30-46
    • /
    • 1992
  • Korea's first exploratory tuna fishing was done with a used longliner in 1957. Then the commercial fishing has been made steady headway since the 1960's and grown up to one of major tuna fishing countries in 1970's. The tuna fishing aimed primarily at acquiring foreign currency, then tuna was exported directly from the overseas fishing base. Tuna, however, has been gradually favored by Koreans as high-proteined foods according to the growth of GNP since the 1970's. In 1980, the canned tuna began to be produced and sold at home. And so the demand of raw tuna for cannaries has steeply increased not only for home but also for abroad, and stimulated the development of tuna purse seine fishery. The author carried out a study on the development of tuna purse seine fishery in Korea and countries concerned-the United States and Japan-because it is recognized to be significant for the further development of this fishery. Just as purse seining was originated in the United States, so tuna purse seining was also pioneered by Californian fishermen in the west coastal waters of the United States (Eastern Pacific Ocean). They started to produce the canned tuna in the early 1900's, and the demand for raw tuna began to be increased rapidly. In those days, tuna was mostly caught by pole-and-line, but the catch amount was far away from the demand. To satisfy this demand, they began to try out fishing tuna by the use of purse seine which had been born in the eastern waters in the 1820's and applied to catch white fishes in the western waters of the United States in those days. Even though their trial was technically successful through severe trial and error, a new problem was raised on the management of tuna resource and the preservation of porpoise which was occassionally caught with tuna. Then the Inter-American Tropical Tuna Commission (IATTC) was established by countries neighboring to the United States in 1950 and they set up the Commission's Yellowfin Regulatory Area (CYRA) and regulated the annual quota for yellowfin. Then, American owners tried to send their seiners to the Western African waters to expand the fishing ground in 1967 and to the Centeral-Western Pacfic in 1974, and the fishing ground was widely expanded. The number of the United States' purse seiners amounted to about 150 in 1980, but the enthusiasm was gradually cooled thereafter and the number of seiner was decreased to 67 in 1986. The landing of tuna by purse seiners in the United States after 1980 maintains 200 thousands M/T or so with a little increase despite the decreasing of domestic seiners. This shows that the landing by foreign seiners are increasing, compared with the landing by domestic seiners are decreasing. In Japan, even though purse seining was introduced in 1880, they had fished tuna by longline and pole-and -line until the tuna purse seining was introduced from the United States again. In the 1960's, Japanese tuna seiners made the exploratory fishing in the South-western Pacific and West African waters with a limited success. In 1971, the government-funded research center "JARMRAC" conducted the exploratory fishing which extended to the Central American waters, the Asia-Pacific Region and the South-western Pacific. It had also much difficulties, till they improved the fishing gear adaptable to the new fishing condition in the South-western Pacific. Japanese government has begun to licence 32 single seiners and 7 group seiners since 1980 and their standard has lasted up to now. The catch in the Pacific Islands Region amounted to 160 thousands M/T in 1986. Korea's tuna purse seine fishery was originated in 1971 by Jedong Industrial Co., Ltd. with three used tuna purse seiners purchased from the United States, and they began to fish in the Eastern Pacific, but failed owing to the superannuation of vessel and the infancy of fishing technique. The second challenge was done by Dongwon Industrial Co., Ltd. in 1979, with one used seiner purchased from the United States, and started to fish in the Eastern Pacific. Even though the first trial was almost unsuccessful but they could obtain the noticeable success by removing the vessel to the South-western Pacific in 1980. This success stimulated the Korean entherprisers to take part in this fishery, and the number of Korean tuna purse seiners has been increased rapidly in accordance with the increased demand for raw tuna. The number of vessels actually at work amounted to 36 in 1990 and they operate in the South-western Pacific. The annual catch of tuna by purse seiners amounted to 170 thousands M/T in 1990 and ranked to one of the major tuna purse seining countries in the world.

  • PDF

Studies on the Virus in Silkworm Bombyx mori L. -Resistance to Virus Disease- (가잠 Virus에 관한 연구 -저항성에 관한 기초조사-)

  • 박광의;강석권
    • Journal of Sericultural and Entomological Science
    • /
    • v.9
    • /
    • pp.67-87
    • /
    • 1969
  • 1. Objectives and Importance. Many silkworms have been damaged by nuclear polyhedrosis virus diseases thoughout the country every year causing a decease in cocoon production by approximately ten per cent per year. The damage caused by the infections virus has occured in spite of complete disinfection. In this respect, it is well known it is impossible, at the present time, to protect the silkworm from these virus infections through chemical and physical control methods. Therefore, this author has attempted to solve this urgent problem from the view point of heredity and breeding, discovering the different resistances and heritabilities among 120 stains collected from throughout the country, and selecting the ones with highest resistance for the basic materials in the silkworm breeding. 2. Results of work 1) The strains with strong resistance to the nuclear polyhedrosis virus diseases are N$_4$, N$\sub$15/, N$\sub$48/, C$\sub$55/ and Em. the log ED$\sub$50/ values of them vary between 0.799 and 1.611. The susceptible strains are N$\sub$20/, C$\sub$62/, N$\sub$76/, N$\sub$79/ and C$\sub$108/, the log ED$\sub$50/ values of them vary between 5.159 and 7.258. (Reference Table 4) The Japanese strain with a log ED$\sub$50/, value of 3.770 is the strongest, followed by the Chinese strain with a log ED$\sub$50/ value of 3.564. The weakest is the European strain with a log ED$\sub$50/ value of 3.3381. The direction coefficient of the regression equation of the susceptibility varies between 0.1 and 0.6, the uniformness of the resistance of the preserved strains of this country is comparatively low. The hereditary henomena of the resistance of each strain and the conerete method of its application for silkworm breeding main the subjects for later studies. 2) The content of water and ash in silkworm has not been correlated with the capability for resistance to the virus diseases(Reference. Table 8). but it is very significantly correlated with mortality rate (in common reaning). In the case of the silkworms which have just completed the fourth moulting the content of water and ash is not related to the mortality rate. In the case of the silkworms which have just completed the third moulting, however, the water( +0.326) and ash (+0.362) registered a high significance. The ash content in the first ($\div$0.520) and second ($\div$0.386) moults is highly significant but water content in both cases is not significant (Reference Table 7). 3) The No. 205 strain proved to be the best in character among the various F$_1$ hybrids. No. 204 was very good in strength but a little lower in cocoon character than the control. No. 212 was a little low in coccon character and mortality was average, but the cocoon harvest was the best among all the varieties offered for (Reference Table 9). 4), In short, the above mentioned strains which are known to have strong resistance to the virus disease are expected to provide basic data for breeding strong varieties. It is proposed that continued research should be conducted on the characteristics of various strains for a satisfactory preservation of various characteristics.research should be conducted on the characteristics of various strains for a satisfactory preservation of various characteristics.

  • PDF

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Study on the Analysis of β-lactoglobulin and κ-casein Genotypes of Cattle using Polymerase Chain Reaction (PCR 기법을 이용한 축우의 β-lactoglobulin 및 κ-casein 유전자형 분석에 관한 연구)

  • Sang, Byung Chan;Ryoo, Seung Heui;Lee, Sang Hoon;Song, Chi Eun;Nam, Myung Soo;Chon, Byung Soon
    • Korean Journal of Agricultural Science
    • /
    • v.25 no.2
    • /
    • pp.216-224
    • /
    • 1998
  • This study was performed to offer the basic and applicable data for improvement of Korean cattle and dairy cattle, according to finding the genetic construction obtained from analysis of genetic polymorphisms of ${\beta}$-lactoglobulin and ${\kappa}$-casein loci related Korean cattle and Holstein cows using PCR-RFLP. Genomic DNA used in this study was prepared from the blood of 253 individuals of Korean cattle in Korean Native Cattle Improvement Center, NLCF, and the blood of 113 individuals of Holstein cows in National Livestock Research Institute. The results obtained are summarized as follows : 1. This study confirmed amplified products of 530bp and 262bp fragments obtained from the amplification of ${\beta}$-lactoglobulin and ${\kappa}$-casein loci in Korean cattle and Holstein breed by PCR. 2. The ${\beta}$-lactoglobulin AA genotype showed 153bp and 109bp fragments, and ${\beta}$-lactoglobulin AB genotype showed 153bp, 109bp, 79bp and 74bp fragments, and BB genotype showed 109bp, 79bp and 74bp fragments in amplified products of ${\beta}$-lactoglobulin loci with the restricted enzyme digestion of Hae III. 3. The ${\kappa}$-casein AA genotype showed a 530bp fragment, and ${\kappa}$-casein AB genotype showed 530bp, 344bp and 186bp fragments, and BB genotype showed 344bp and 186bp fragments in amplified products of ${\kappa}$-casein loci with the restricted enzyme digestion of Taq I. 4. On ${\beta}$-lactoglobulin genotypes and gene frequencies, Korean cattle were 6.72%, 26.09% and 67.19% for AA, AB and BB genotypes, and ${\beta}$-lactoglobulin A and B alleles were 0.197 and 0.803, and Holstein were 35.40%, 56.64% and 7.96% for AA, AB and BB genotypes, and ${\beta}$-lactoglobulin A and B alleles were 0.637 and 0.363, respectively. 5. On ${\kappa}$-casein genotypes and gene frequencies, Korean cattle were 46.25%, 39.13% and 14.62% for AA, AB and BB genotypes, and ${\kappa}$-casein A and B alleles were 0.658 and 0.342, and Holstein were 60.18% and 38.94% and 0.88% for AA, AB and BB genotypes, and ${\kappa}$-casein A and B alleles were 0.796 and 0.204, respectively. 6. As a consequence, the gene frequency was 0.197 and 0.803 for ${\beta}$-lactoglobulin A and B alleles, and 0.658 and 0.342 for ${\kappa}$-casein A and B alleles in Korea cattle, but was 0.637 and 0.363 for ${\beta}$-lactoglobulin A and B alleles, and 0.796 and 0.204 for ${\kappa}$-casein A and B alleles in Holstein, respectively.

  • PDF