• Title/Summary/Keyword: Fingerprints

Search Result 371, Processing Time 0.025 seconds

Structure and Diversity of Arsenic-Resistant Bacteria in an Old Tin Mine Area of Thailand

  • Jareonmit, Pechrada;Sajjaphan, Kannika;Sadowsky, Michael J.
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.1
    • /
    • pp.169-178
    • /
    • 2010
  • The microbial community structure in Thailand soils contaminated with low and high levels of arsenic was determined by denaturing gradient gel electrophoresis. Band pattern analysis indicated that the bacterial community was not significantly different in the two soils. Phylogenetic analysis obtained by excising and sequencing six bands indicated that the soils were dominated by Arthrobacter koreensis and $\beta$-Proteobacteria. Two hundred and sixty-two bacterial isolates were obtained from arsenic-contaminated soils. The majority of the As-resistant isolates were Gramnegative bacteria. MIC studies indicated that all of the tested bacteria had greater resistance to arsenate than arsenite. Some strains were capable of growing in medium containing up to 1,500 mg/l arsenite and arsenate. Correlations analysis of resistance patterns of arsenite resistance indicated that the isolated bacteria could be categorized into 13 groups, with a maximum similarity value of 100%. All strains were also evaluated for resistance to eight antibiotics. The antibiotic resistance patterns divided the strains into 100 unique groups, indicating that the strains were very diverse. Isolates from each antibiotic resistance group were characterized in more detail by using the repetitive extragenic palindromic-PCR (rep-PCR) DNA fingerprinting technique with ERIC primers. The PCR products were analyzed by agarose gel electrophoresis. The genetic relatedness of 100 bacterial fingerprints, determined by using the Pearson product-moment similarity coefficient, showed that the isolates could be divided into four clusters, with similarity values ranging from 5-99%. Although many isolates were genetically diverse, others were clonal in nature. Additionally, the arsenic-resistant isolates were examined for the presence of arsenic resistance (ars) genes by using PCR, and 30% of the isolates were found to carry an arsenate reductase encoded by the arsC gene.

Monitoring the Ecology of Bacillus During Daqu Incubation, a Fermentation Starter, Using Culture-Dependent and Culture-Independent Methods

  • Yan, Zheng;Zheng, Xiao-Wei;Han, Bei-Zhong;Han, Jian-Shu;Nout, M.J. Robert;Chen, Jing-Yu
    • Journal of Microbiology and Biotechnology
    • /
    • v.23 no.5
    • /
    • pp.614-622
    • /
    • 2013
  • Daqu, a traditional fermentation starter, has been used to produce attractively flavored foods such as vinegar and Chinese liquor for thousands of years. Although Bacillus spp. are one of the dominant microorganisms in Daqu, more precise information is needed to reveal why and how Bacillus became dominant in Daqu, and next, to assess the impact of Bacillus sp. on Daqu and its derived products. We combined culture-dependent and culture-independent methods to study the ecology of Bacillus during Daqu incubation. Throughout the incubation, 67 presumptive Bacillus spp. isolates were obtained, 52 of which were confirmed by 16S rDNA sequencing. The identified organisms belonged to 8 Bacillus species: B. licheniformis, B. subtilis, B. amyloliquefaciens, B. cereus, B. circulans, B. megaterium, B. pumilus, and B. anthracis. A primer set specific for Bacillus and related genera was used in a selective PCR study, followed by a nested DGGE PCR targeting the V9 region of the 16S rDNA. Species identified from the PCR-DGGE fingerprints were related to B. licheniformis, B. subtilis, B. amyloliquefaciens, B. pumilus, B. benzoevorans, and B. foraminis. The predominant species was found to be B. licheniformis. Certain B. licheniformis strains exhibited potent antimicrobial activities. The greatest species diversity occurred at the Liangmei stage of Daqu incubation. To date, we lack sufficient knowledge of Bacillus distribution in Daqu. Elucidating the ecology of Bacillus during Daqu incubation would enable the impact of Bacillus on Daqu to be accessed, and the quality and stabilization of Daqu-derived products to be optimized.

Risk of DNA contamination through fingerprint brush, during the dusting of living persons and deceased (살아있는 사람과 사망한 사람의 지문을 채취하는 과정에서 지문 브러쉬의 DNA 오염 정도 연구)

  • Min, Hee Won;Hong, Sungwook
    • Analytical Science and Technology
    • /
    • v.29 no.2
    • /
    • pp.85-93
    • /
    • 2016
  • This study investigated the possibility of DNA contamination during fingerprint collection when using a fingerprint brush. Two kinds of brushes were selected: powdered brushes and neat (not powdered) brushes. The fingerprints were collected from the tips of all the fingers and near the wrists of both living and deceased persons using the two brushes. Both brushes were analyzed for the DNA contents and profiles. The results obtained confirmed the transfer of DNA onto both brushes, although the results showed that the powdered brushes carried more DNA compared with the neat brushes. More DNA was transferred onto the brushes used on deceased persons than onto the brushes used for living persons. Only partial DNA profiles were obtained from the brushes, which is due to the presence of other sources of DNA on the surfaces of the skin of both living and deceased persons. This phenomenon confirmed the DNA contamination during fingerprint collection when fingerprint brushes were used.

A Clustering File Backup Server Using Multi-level De-duplication (다단계 중복 제거 기법을 이용한 클러스터 기반 파일 백업 서버)

  • Ko, Young-Woong;Jung, Ho-Min;Kim, Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.657-668
    • /
    • 2008
  • Traditional off-the-shelf file server has several potential drawbacks to store data blocks. A first drawback is a lack of practical de-duplication consideration for storing data blocks, which leads to worse storage capacity waste. Second drawback is the requirement for high performance computer system for processing large data blocks. To address these problems, this paper proposes a clustering backup system that exploits file fingerprinting mechanism for block-level de-duplication. Our approach differs from the traditional file server systems in two ways. First, we avoid the data redundancy by multi-level file fingerprints technology which enables us to use storage capacity efficiently. Second, we applied a cluster technology to I/O subsystem, which effectively reduces data I/O time and network bandwidth usage. Experimental results show that the requirement for storage capacity and the I/O performance is noticeably improved.

A Study on the Optimum Composition of Rose Bengal Reagent using Phase Transfer Catalyst (상이동 촉매 기법(phase transfer catalyst)을 이용한 rose bengal 시약의 최적 조성에 관한 연구)

  • Oh, Soo-Jin;Cha, Won-Jin;Choi, Da-Woon;Hong, Sung-Wook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.245-252
    • /
    • 2018
  • The rose bengal reagent, based on the phase transfer catalysis technique, is a calcium-targeting reagent that forms an insoluble salt that does not dissolve in a neutral or basic solution. It is expected to be effective in developing a latent fingerprint in a wet sample. However, many previous studies did not observe the fluorescence of the developed fingerprints, nor were the proposed methods of producing the reagents the optimal develop conditions. The aim of this study was to investigate the optimum reagent composition of rose bengal by varying the concentration of rose bengal dye and phase transfer catalyst based on maximum emission fluorescence of rose bengal. As a result, it was confirmed that rose bengal and surfactant concentration were the most effective when 0.01M: 0.008M, respectively.

An Anonymous Fingerprinting Scheme with a Robust Asymmetry

  • Park, Jae-Gwi;Park, Ji-Hwan;Kouichi Sakurai
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.620-629
    • /
    • 2003
  • Fingerprinting schemes are techniques applied to protect the copyright on digital goods. These enable the merchants to identify the source of illegal redistribution. Let us assume the following situations connectedly happen: As a beginning, buyer who bought digital goods illegally distributed it, next the merchant who found it revealed identity of the buyer/traitor, then the goods is illegally distributed again. After this, we describe it as“The second illegal redistribution”. In most of anonymous fingerprinting, upon finding a redistributed copy, a merchant extracts the buyer's secret information from the copy and identifies a traitor using it. Thus the merchant can know the traitor's secret information (digital fingerprints) after identification step. The problem of the second illegal distribution is that there is a possibility of the merchant's fraud and the buyer's abuse: that is a dishonest employee of the merchant might just as well have redistributed the copy as by the buyer, or the merchant as such may want to gain money by wrongly claiming that the buyer illegally distributed it once more. The buyer also can illegally redistribute the copy again. Thus if the copy turns up, one cannot really assign responsibility to one of them. In this paper, we suggest solution of this problem using two-level fingerprinting. As a result, our scheme protects the buyer and the merchant under any conditions in sense that (1) the merchant can obtain means to prove to a third party that the buyer redistributed the copy. (2) the buyer cannot worry about being branded with infamy as a traitor again later if he never distribute it.

  • PDF

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF

A Study on Realization of System in Wireless Location Awareness Technology Using Ubiquitous Active RFID (Active RFID를 이용한 실내 무선 위치 인식 기반 스마트 센서 빌딩 구현에 관한 연구)

  • Jung, Chang Duk
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.83-93
    • /
    • 2006
  • This paper is wireless location awareness technology using RFID. We investigates the Location of the received Signal strength reported by RF Analyses of the data are performed to understand the underlying features of location fingerprints. The system is performed factors the extreme environmental Emit signal, which consists of a unique 5000 Terminals. The Location Service have become very popular in many service industries, purchasing and distribution logistics, industry, manufacturing companies and a parking place. The Technically optimal Solution would be the storage of Intelligence information in the most common form of electronic data-carrying device in use in everyday life is the smart card based upon a contact field (telephone smart card, bank cards). The method of an indoor positioning experiment system is compared using measured Location data and a charge of service. The result of research showed the following: first, to check out the mechanism between benefit of system installation and operation of Active RFID. Second, it contributed on indoor wireless location intelligence system efficiency.

  • PDF

Analysis of Residual Dental Materials Existing on the Teeth and Its Application to Individual Identification (치아에 잔존하는 치과재료의 성분분석을 통한 개인식별에의 응용)

  • 윤중교;최종훈;김종열
    • Journal of Oral Medicine and Pain
    • /
    • v.23 no.2
    • /
    • pp.193-209
    • /
    • 1998
  • In identifying bodies that are severely decayed or damaged, methods using fingerprints and various biochemical tests are known to have its limits. To overcome this, forensic odontological method which is based on the analysis of the cranium, tooth and dental restoration is used to enhance the accuracey of individual identification. For this reason, I have come to analysis of the dental materials that exists between the teeth that is perceived to have been previously restored and the one adjacent to it. By analyzing the constituents of gold crown-restored, non-precious metal-restored, gold inlay-restored and amalgam -restored teeth, and adjacent teeth using EDX(energy dispersive X-ray microanalysis) which was invented to analyze very small amount of elements, the nature of the restoration could be predicted and the results obtained were as follows. 1. Some of constitute of gold alloy was extracted from residual cement of gold crown restoration, but that was not extracted from the restored tooth and the one adjacent to it. 2. Some of constituents of non-precious metal alloy was extracted both in the residual cement on the tooth with no-precious metal restoration and in the tooth with the restoration itself. However, none of its constituents were found in the tooth adjacent to it. 3. Some of constituents of gold alloy were found in the residual cement of gold inlay, but they were not found in the restored tooth and the adjacent tooth. 4. Some of constituents of amalgam alloy were found both in tooth restored with amalgam and in the adjacent tooth. From the results obtained above, it is possible to utilize the data obtained from analyizing residual dental materials in a more effective way. This data compensates for the lost data due to any harm done to the restorations prior to individual identification and further enhances the accuracy. Therefore, it could be concluded that this process of analyzing residual dental materials could be beneficial to individual identification in the area of forensic odontoldogy.

  • PDF

Program Plagiarism Detection based on X-treeDiff+ (X-treeDiff+ 기반의 프로그램 복제 탐지)

  • Lee, Suk-Kyoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.4
    • /
    • pp.44-53
    • /
    • 2010
  • Program plagiarism is a significant factor to reduce the quality of education in computer programming. In this paper, we propose the technique of identifying similar or identical programs in order to prevent students from reckless copying their programming assignments. Existing approaches for identifying similar programs are mainly based on fingerprints or pattern matching for text documents. Different from those existing approaches, we propose an approach based on the program structur. Using paring progrmas, we first transform programs into XML documents by representing syntactic components in the programs with elements in XML document, then run X-tree Diff+, which is the change detection algorithm for XML documents, and produce an edit script as a change. The decision of similar or identical programs is made on the analysis of edit scripts in terms of program plagiarism. Analysis of edit scripts allows users to understand the process of conversion between two programs so that users can make qualitative judgement considering the characteristics of program assignment and the degree of plagiarism.