• Title/Summary/Keyword: Association ID

Search Result 207, Processing Time 0.027 seconds

Phylogenetic Analysis, Morphology and Pathogenicity of Penicillium spp. associated with Blue Mold of Apple in Korea (사과푸른곰팡이병에 관여하는 Penicillium의 계통분석, 형태 및 병원성)

  • Sang, Hyun-Kyu;Choi, Young-Phil;Yu, Seung-Hun
    • Korean Journal of Agricultural Science
    • /
    • v.37 no.3
    • /
    • pp.341-350
    • /
    • 2010
  • Blue mold is the most important postharvest disease of apples in Korea. Apple fruits with blue mold symptoms were collected from storages in different locations in Korea and were investigated for their association with Penicillium species. A total of sixty five isolates of Penicillium were sampled from the collected apples. Based on DNA sequence analysis of ${\beta}$-tublin gene and ITS and lsu rDNA (ID region) and morphological characteristics, they were identified as P. crustosum, P. expansum, P. italicum, P. solitum and P. sp.. P. sp. which is closely related to P. hirsutum is a new species, not reported before. P. expansum (35%) was predominant species followed by P. crustosum. The phylogenetic tree inferred from combined ${\beta}$-tublin and ID region sequence showed good correlation with species that are defined by morphological characteristics. In pathogenicity test, apples were wound-inoculated with conidial suspension and incubated at $20-22^{\circ}C$. The most severe and destructive species was P. expansum. The species caused a decayed area 42-50mm in diameter after 8-10days. Decayed area caused by P. crustosum and P. sp. was 26-32mm and 20-26mm, respectively. This is the first record of P. crustosum, P. italicum and P. sp. from apple in Korea.

A Study on Improvement Methods for Encrytion and Authentication in Batt le Field Management System(C4I) (전장관리체계(C4I)에서의 암호 및 인증방법 개선 방안에 관한연구)

  • Lee, Won Man;Koo, Woo Kwon;Park, Tae Hyeong;Lee, Dong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.39-50
    • /
    • 2012
  • Battlefield management systems are operated by the Public Key Infrastructure (PKI) and cryptographic equipment is distributed through the personal delivery to the enemy has deodorizing prone to structure. In addition, Per person each battlefield management system (C4I) encryption key operate and authentication module to manage multiple encryption so, encryption key operating is restrictions. Analysis of the problems of this public key infrastructure(PKI), Identity-Based Cryptosystem(IBC) and Attribute-Based Cryptosystem(ABC) to compare construct the future of encrypt ion and authentication system were studied. Authentication method for the connection between the system that supports data encryption and secure data communication, storage, and communication scheme is proposed.

A Study on Secure Model based Virtualization for Web Application Security (웹 어플리케이션 보안을 위한 가상화 기반 보안 모델)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.27-32
    • /
    • 2014
  • Utilization of web application has been widely spread and complication in recent years by the rapid development of network technologies and changes in the computing environment. The attack being target of this is increasing and the means is diverse and intelligent while these web applications are using to a lot of important services. In this paper, we proposed security model using virtualization technology to prevent attacks using vulnerabilities of web application. The request information for query in a database server also can be recognized by conveying to the virtual web server after ID is given to created session by the client request and the type of the query is analyzed in this request. VM-Master module is constructed in order to monitor traffic between the virtual web servers and prevent the waste of resources of Host OS. The performance of attack detection and resource utilization of the proposed method is experimentally confirmed.

New Technologies in Low Pollution Swine Diets : Diet Manipulation and Use of Synthetic Amino Acids, Phytase and Phase Feeding for Reduction of Nitrogen and Phosphorus Excretion and Ammonia Emission - Review -

  • Lenis, Nico P.;Jongbloed, Age W.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.12 no.2
    • /
    • pp.305-327
    • /
    • 1999
  • In the paper insight is given in the legislation policy to restrain environmental pollution by pig husbandry, focused on The Netherlands (Mineral Accounting System). Besides, nutritional measures are presented to reduce environmental pollution by lowering excretion of N and P, emphasizing (multi) phase feeding, the use of low protein, synthetic amino acids supplemented diets, phytase and its effect on phosphorus and calcium digestibility, its interaction with phytic acid and proteins, and the environmental impact of the use of phytase in pig diets. Also, nutritional means are indicated to reduce ammonia volatilization from pig operations. It is concluded that nutrition management can substantially contribute to reduction of N and P excretion by pigs, mainly by lowering dietary protein levels, (multi) phase feeding and the use of microbial phytase, and that the use of phytase on a large scale in The Netherlands has a tremendous environmental impact. In 20 years the excretion of P in growing-finishing pigs has more than halved. Ammonia emission from manure of pigs can be reduced substantially by lowering dietary protein content, but also by including additional non-starch polysaccharides in the diet. A very promising method to reduce ammonia emission is to manipulate dietary cation-anion difference, e.g. by adding acidifying salts to the diet, which will lower pH of urine substantially. Further research is desirable. This also applies to determining dietary factors influencing the odour release from manure. Finally, some speculation on the future of pig farming from an environmental viewpoint is presented.

Study on the Attributive Channel Theory of Herbal Medicine by the Pharmacodynamic Research of 1-131 Labelled Hesperetin (Hesperetin의 I-131 표지 및 생체(生體) 분포(分布) 분석(分析)을 통한 귀경(歸經) 연구)

  • Kim, Sung-Kyu;Ham, In-Hye;Bu, Young-Min;Kim, Ho-Cheol;Cho, Jung-Hyuck;Choi, Ho-Young
    • The Korea Journal of Herbology
    • /
    • v.23 no.1
    • /
    • pp.117-125
    • /
    • 2008
  • Objectives : This study was to verify the Attributive Channel theory of herbal medicine. Methods : [$^{131}I$]iodohesperetin was synthesized, separated, and refined from hesperetin, the major component of Citrus species, followed by observing the biodistribution in an organism of C57 BL/6 mice with and without Lewis Lung Carcinoma. Results : Iodohesperetin 27.5 mg was obtained through column cliromatography after a reaction with 50 mg of Hesperitin and 8 mg of Nal. The radiochemical yield of [$^{131}I$]iodohesperetin synthesis was 25 % when checked with Radio TLC chromatography. [131I]iodohesperetin was most largely distributed in the stomach, lung and liver of C57BL/6 mouse. The highest %ID/g in stomach was 40 min, in lung and liver was 20 min after injection. The % ID/g of tumor tissue was comparable with that of blood. Conclusions : The fact that [$^{131}I$]iodocurcumin was most largely distributed in the stomach, lung and liver was related with the Attributive Channel theory. And there was no significant finding related to tumor cells.

  • PDF

Design and implementation of access control systems using decentralized identifier technology (탈중앙화 신원증명을 이용한 출입통제 시스템의 설계 및 구현)

  • Lee, Sang-Geun;Kim, Do-Hyeong;Jung, Soon-Ki
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.37-46
    • /
    • 2021
  • Decentralized Identifier (DID) technology is a technology that uses blockchain technology to prove an individual's identity through information owned by the individual rather than through a central system. In this paper, we would like to present an access control system using decentralized identifier technology. The access control system using decentralized identifier technology (DID access control system) is a system that allows users to verify their identity from the DID blockchain server through their smartphone (mobile employee ID) and access when they are confirmed to be registered in the access control system. Through this, access control can be managed only by verifying identification with smartphones (mobile employee ID) and DID blockchain servers without having to store information to prove an individual's identity in the access control system.

Development of novel microsatellite markers to analyze the genetic structure of dog populations in Taiwan

  • Lai, Fang-Yu;Lin, Yu-Chen;Ding, Shih-Torng;Chang, Chi-Sheng;Chao, Wi-Lin;Wang, Pei-Hwa
    • Animal Bioscience
    • /
    • v.35 no.9
    • /
    • pp.1314-1326
    • /
    • 2022
  • Objective: Alongside the rise of animal-protection awareness in Taiwan, the public has been paying more attention to dog genetic deficiencies due to inbreeding in the pet market. The goal of this study was to isolate novel microsatellite markers for monitoring the genetic structure of domestic dog populations in Taiwan. Methods: A total of 113 DNA samples from three dog breeds-beagles (BEs), bichons (BIs), and schnauzers (SCs)-were used in subsequent polymorphic tests applying the 14 novel microsatellite markers that were isolated in this study. Results: The results showed that the high level of genetic diversity observed in these novel microsatellite markers provided strong discriminatory power. The estimated probability of identity (P(ID)) and the probability of identity among sibs (P(ID)sib) for the 14 novel microsatellite markers were 1.7×10-12 and 1.6×10-5, respectively. Furthermore, the power of exclusion for the 14 novel microsatellite markers was 99.98%. The neighbor-joining trees constructed among the three breeds indicated that the 14 sets of novel microsatellite markers were sufficient to correctly cluster the BEs, BIs, and SCs. The principal coordinate analysis plot showed that the dogs could be accurately separated by these 14 loci based on different breeds; moreover, the Beagles from different sources were also distinguished. The first, the second, and the third principal coordinates could be used to explain 44.15%, 26.35%, and 19.97% of the genetic variation. Conclusion: The results of this study could enable powerful monitoring of the genetic structure of domestic dog populations in Taiwan.

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Development of Urban Object Identification System for Urban Facilities Managment (도시시설관리를 위한 도시공간객체식별자 시스템 개발)

  • Lee, Sang-Hoon;Na, Joon-Yeop
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2009.04a
    • /
    • pp.299-301
    • /
    • 2009
  • 최근 유비쿼터스 기술을 도시 인프라에 적용하는 u-City 개발연구가 활발히 진행되고 있다. u-City에서의 시설관리는 실시간으로 도시내 시설물의 위치 및 상태정보를 모니터링하고 필요에 따라 지능적인 제어가 요구된다. 이를 구현하기 위해서는 기존 도시정보시스템에서 이용되던 GIS도면 혹은 대장에 의한 관리방식에서 벗어나 관리대상의 상태를 원격에서 직접 관리할 수 있는 체계가 필요하다. 이미 '지능형국토정보기술혁신사업'을 통하여 시설물 뿐만 아니라 부재와 센서의 상태파악을 원거리에서 효율적으로 하기 위하여 도시공간객체식별자(UOID:Urban Object IDentifier)를 제안하였다. 본 연구에서는 UOID의 효율적인 부여와 관리를 위한 DBMS기반의 시스템을 개발하였다. 본 시스템을 통해 관리자는 UOID의 생성, 수정, 소멸 등의 이력을 시간정보와 함께 관리할 수 있다. 또한, 3차원 도시객체모델과 함께 UOID를 관리하여, ID를 이용하여 좀 더 직관적인 도시시설 관리가 가능토록 하였다. 향후, 개발될 UOID시스템은 도시공간정보플랫폼에 적용되어 도시 내에 발생하는 모든 이벤트를 효과적으로 관리할 수 있는 식별자가 될 것이다.

  • PDF