• Title/Summary/Keyword: Detection Key

Search Result 1,206, Processing Time 0.031 seconds

The Second-order Scattering of the Interaction of Pd Nanoparticles with Protein and Its Analytical Application

  • Guo, Xiaoyan;He, Baolin;Sun, Chuntao;Zhao, Yanxi;Huang, Tao;Liew, Kongyong;Liu, Hanfan
    • Bulletin of the Korean Chemical Society
    • /
    • v.28 no.10
    • /
    • pp.1746-1750
    • /
    • 2007
  • The second-order scattering (SOS) phenomenon of the interaction of Pd nanoparticles with protein was reported and a simple, sensitive, palladium nanoparticle-based assay for trace amount of protein with SOS technique was developed. The SOS intensities were significantly enhanced due to the interaction of Pd nanoparticles with bovine serum albumin (BSA) or human serum albumin (HSA) at pH 3.5 or 4.0, respectively. The maximum SOS peak appeared at 260/520 nm (λex/λem). The optimal experiment conditions, affecting factors and the influence of some coexisting substances were checked. The SOS intensity increased proportionally with the increase of Pd concentration below 3.0 × 10?5 mol·L?1, while declined gradually above 4.0 × 10?5 mol·L?1. BSA within the range of 0.01-2.6 μg·mL?1 and HSA of 0.01-1.7 μg·mL?1 can be detected with this method and the detection limits were 2.3 and 11.2 ng·mL?1, respectively. The method was successfully applied to the quantitative detection of total protein content in human serum samples with the maximum relative standard deviation (RSD) lower than 2.6% and the recoveries over the range of 99.5-100.5%.

Spoilage Lactic Acid Bacteria in the Brewing Industry

  • Xu, Zhenbo;Luo, Yuting;Mao, Yuzhu;Peng, Ruixin;Chen, Jinxuan;Soteyome, Thanapop;Bai, Caiying;Chen, Ling;Liang, Yi;Su, Jianyu;Wang, Kan;Liu, Junyan;Kjellerup, Birthe V.
    • Journal of Microbiology and Biotechnology
    • /
    • v.30 no.7
    • /
    • pp.955-961
    • /
    • 2020
  • Lactic acid bacteria (LAB) have caused many microbiological incidents in the brewing industry, resulting in severe economic loss. Meanwhile, traditional culturing method for detecting LAB are time-consuming for brewers. The present review introduces LAB as spoilage microbes in daily life, with focus on LAB in the brewing industry, targeting at the spoilage mechanism of LAB in brewing industry including the special metabolisms, the exist of the viable but nonculturable (VBNC) state and the hop resistance. At the same time, this review compares the traditional and novel rapid detection methods for these microorganisms which may provide innovative control and detection strategies for preventing alcoholic beverage spoilage, such as improvement of microbiological quality control using advanced culture media or different isothermal amplification methods.

Implementation of the ZigBee-based Homenetwork security system using neighbor detection and ACL (이웃탐지와 ACL을 이용한 ZigBee 기반의 홈네트워크 보안 시스템 구현)

  • Park, Hyun-Moon;Park, Soo-Hyun;Seo, Hae-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.35-45
    • /
    • 2009
  • In an open environment such as Home Network, ZigBee Cluster comprising a plurality of Ato-cells is required to provide intense security over the movement of collected, measured data. Against this setting, various security issues are currently under discussion concerning master key control policies, Access Control List (ACL), and device sources, which all involve authentication between ZigBee devices. A variety of authentication methods including Hash Chain Method, token-key method, and public key infrastructure, have been previously studied, and some of them have been reflected in standard methods. In this context, this paper aims to explore whether a new method for searching for neighboring devices in order to detect device replications and Sybil attacks can be applied and extended to the field of security. The neighbor detection applied method is a method of authentication in which ACL information of new devices and that of neighbor devices are included and compared, using information on peripheral devices. Accordingly, this new method is designed to implement detection of malicious device attacks such as Sybil attacks and device replications as well as prevention of hacking. In addition, in reference to ITU-T SG17 and ZigBee Pro, the home network equipment, configured to classify the labels and rules into four categories including user's access rights, time, date, and day, is implemented. In closing, the results demonstrates that the proposed method performs significantly well compared to other existing methods in detecting malicious devices in terms of success rate and time taken.

A Color-Reaction-Based Biochip Detection Assay for RIF and INH Resistance of Clinical Mycobacterial Specimens

  • Xue, Wenfei;Peng, Jingfu;Yu, Xiaoli;Zhang, Shulin;Zhou, Boping;Jiang, Danqing;Chen, Jianbo;Ding, Bingbing;Zhu, Bin;Li, Yao
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.1
    • /
    • pp.180-189
    • /
    • 2016
  • The widespread occurrence of drug-resistant Mycobacterium tuberculosis places importance on the detection of TB (tuberculosis) drug susceptibility. Conventional drug susceptibility testing (DST) is a lengthy process. We developed a rapid enzymatic color-reaction-based biochip assay. The process included asymmetric multiplex PCR/templex PCR, biochip hybridization, and an enzymatic color reaction, with specific software for data operating. Templex PCR (tem-PCR) was applied to avoid interference between different primers in conventional multiplex-PCR. We applied this assay to 276 clinical specimens (including 27 sputum, 4 alveolar lavage fluid, 2 pleural effusion, and 243 culture isolate specimens; 40 of the 276 were non-tuberculosis mycobacteria specimens and 236 were M. tuberculosis specimens). The testing process took 4.5 h. A sensitivity of 50 copies per PCR was achieved, while the sensitivity was 500 copies per PCR when tem-PCR was used. Allele sequences could be detected in mixed samples at a proportion of 10%. Detection results showed a concordance rate of 97.46% (230/236) in rifampicin resistance detection (sensitivity 95.40%, specificity 98.66%) and 96.19% (227/236) in isoniazid (sensitivity 93.59%, specificity 97.47%) detection with those of DST assay. Concordance rates of testing results for sputum, alveolar lavage fluid, and pleural effusion specimens were 100%. The assay provides a potential choice for TB diagnosis and treatment.

Extraction of Network Threat Signatures Using Latent Dirichlet Allocation (LDA를 활용한 네트워크 위협 시그니처 추출기법)

  • Lee, Sungil;Lee, Suchul;Lee, Jun-Rak;Youm, Heung-youl
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2018
  • Network threats such as Internet worms and computer viruses have been significantly increasing. In particular, APTs(Advanced Persistent Threats) and ransomwares become clever and complex. IDSes(Intrusion Detection Systems) have performed a key role as information security solutions during last few decades. To use an IDS effectively, IDS rules must be written properly. An IDS rule includes a key signature and is incorporated into an IDS. If so, the network threat containing the signature can be detected by the IDS while it is passing through the IDS. However, it is challenging to find a key signature for a specific network threat. We first need to analyze a network threat rigorously, and write a proper IDS rule based on the analysis result. If we use a signature that is common to benign and/or normal network traffic, we will observe a lot of false alarms. In this paper, we propose a scheme that analyzes a network threat and extracts key signatures corresponding to the threat. Specifically, our proposed scheme quantifies the degree of correspondence between a network threat and a signature using the LDA(Latent Dirichlet Allocation) algorithm. Obviously, a signature that has significant correspondence to the network threat can be utilized as an IDS rule for detection of the threat.

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.

A Defect Detection Algorithm of Denim Fabric Based on Cascading Feature Extraction Architecture

  • Shuangbao, Ma;Renchao, Zhang;Yujie, Dong;Yuhui, Feng;Guoqin, Zhang
    • Journal of Information Processing Systems
    • /
    • v.19 no.1
    • /
    • pp.109-117
    • /
    • 2023
  • Defect detection is one of the key factors in fabric quality control. To improve the speed and accuracy of denim fabric defect detection, this paper proposes a defect detection algorithm based on cascading feature extraction architecture. Firstly, this paper extracts these weight parameters of the pre-trained VGG16 model on the large dataset ImageNet and uses its portability to train the defect detection classifier and the defect recognition classifier respectively. Secondly, retraining and adjusting partial weight parameters of the convolution layer were retrained and adjusted from of these two training models on the high-definition fabric defect dataset. The last step is merging these two models to get the defect detection algorithm based on cascading architecture. Then there are two comparative experiments between this improved defect detection algorithm and other feature extraction methods, such as VGG16, ResNet-50, and Xception. The results of experiments show that the defect detection accuracy of this defect detection algorithm can reach 94.3% and the speed is also increased by 1-3 percentage points.

Methodology of Mapping Quantitative Trait Loci for Binary Traits in a Half-sib Design Using Maximum Likelihood

  • Yin, Zongjun;Zhang, Qin;Zhang, Jigang;Ding, Xiangdong;Wang, Chunkao
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.18 no.12
    • /
    • pp.1669-1674
    • /
    • 2005
  • Maximum likelihood methodology was applied to analyze the efficiency and statistical power of interval mapping by using a threshold model. The factors that affect QTL detection efficiency (e.g. QTL effect, heritability and incidence of categories) were simulated in our study. Daughter design with multiple families was applied, and the size of segregating population is 500. The results showed that the threshold model has a great advantage in parameters estimation and power of QTL mapping, and has nice efficiency and accuracy for discrete traits. In addition, the accuracy and power of QTL mapping depended on the effect of putative quantitative trait loci, the value of heritability and incidence directly. With the increase of QTL effect, heritability and incidence of categories, the accuracy and power of QTL mapping improved correspondingly.

Three-Party Key Exchange Protocol Providing User Anonymity based on Smartcards (사용자 익명성을 제공하는 스마트카드 기반 3자 참여 키 교환 프로토콜)

  • Choi, Jong-Seok;Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.388-395
    • /
    • 2009
  • Three-party authenticated key exchange protocol based on smartcards using XOR and hash function operation instead of the public key operation has been proposed in 2006. Recently, it is doing for research because of increasing interest in privacy. This paper pointed out that proposed three-party authenticated key exchange protocol in 2006 has some problems; it is user anonymity and slow wrong input detection, and then we proposed new one to overcome these problems.

A New Quinoline-Based Acylhydrazone for Highly Selective Fluorescence Recognition of Cu(II) and Sulfide in Aqueous Solution

  • Tang, Lijun;Zhou, Pei;Qi, Zhikai;Huang, Zhenlong;Zhao, Jia;Cai, Mingjun
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.8
    • /
    • pp.2256-2260
    • /
    • 2013
  • A new quinoline-based acylhydrazone (1) has been synthesized and applied as a fluorescent probe. Probe 1 exhibits high selectivity and sensitivity to $Cu^{2+}$ with fluorescence "ON-OFF" behavior in HEPES buffered (1‰ DMSO, HEPES 20 mM, pH = 7.4) solution. The on-site generated 1-$Cu^{2+}$ complex displays excellent selectivity to sulfide ions with fluorescence "OFF-ON" performance through copper displacement approach.