• Title/Summary/Keyword: and variety identification

Search Result 442, Processing Time 0.038 seconds

Criteria in ′Landscape and Memory′ as Sense of Place for the Sustainable Development of Korean Mountainous Landscape

  • Jino Kwon;Shin, Joon-Hwan;Park, Myoung-Sub
    • The Korean Journal of Quaternary Research
    • /
    • v.17 no.2
    • /
    • pp.85-99
    • /
    • 2003
  • Since the experience of major landscape change during last half of the century due to war and rapid urbanization, the traditional character has been weakened, and it is necessary for a reconsideration to improve the landscape for the future. To review these relationships, the importance of a comprehensive understanding of nature has been suggested. Therefore identification of a new concept based on the 'socio-cultural influence of landscape' and 'sense of place' which are related to peoples' previous experience, is required. Furthermore more practical definitions and criteria to reveal the relationship are necessary. Among the terms suggested to describe sense of place such as 'home', 'place identity', 'place-based meaning' and 'settlement identity' etc., the 'home' is selected to represent our surrounding landscape. For more practical classification of home landscape, additional terms are suggested and defined based on both the relationships between human beings and nature, and between memory derived from previous experience and shared values with in the community. The additional terms which are the most important in the role of landscape character related to humans' are; ⅰ) Personal Landscape: Landscape of an individual human, which derives from previous personal experience; involves distinguishable character for a given person, and it is emotional and flexible depending on circumstances. ⅱ) Ordinary Landscape: Landscape of the 'common interest' between members of a community, which is acceptable as a surrounding for everyday daily life, it produces the richness and variety of landscape. ⅲ) Kernel Landscape: Landscape of the 'common ground' which is acceptable to the majority members of the community, and it provides variety and stability for periods of time, and it could strongly represent community attitudes toward nature. ⅳ) Prototype Landscape: Landscape as the 'common denominator' of overall community from past to present and towards the future, which encompasses all the kernel landscape throughout history. It provides a sense of place, balances the homogeneity of character throughout overall communities. Some part of this can be shared throughout history to shape an overall sense of place. It can also represent short terms fashions. For a prototype landscape to reveal sense of place, there are a couple of points which we should underline the commencing point. Firstly, understanding the relationship between humans and nature should be based on a given character of surroundings. Secondly, reoccurring landscape elements which have sustained in history can lead to sense of place, and should be reviewed the influences between nature and humans.

  • PDF

Container BIC-code region extraction and recognition method using multiple thresholding (다중 이진화를 이용한 컨테이너 BIC 부호 영역 추출 및 인식 방법)

  • Song, Jae-wook;Jung, Na-ra;Kang, Hyun-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1462-1470
    • /
    • 2015
  • The container BIC-code is a transport protocol for convenience in international shipping and combined transport environment. It is an identification code of a marine transport container which displays a wide variety of information including country's code. Recently, transportation through aircrafts and ships continues to rise. Thus fast and accurate processes are required in the ports to manage transportation. Accordingly, in this paper, we propose a BIC-code region extraction and recognition method using multiple thresholds. In the code recognition, applying a fixed threshold is not reasonable due to a variety of illumination conditions caused by change of weather, lightening, camera position, color of the container and so on. Thus, the proposed method selects the best recognition result at the final stage after applying multiple thresholds to recognition. For each threshold, we performs binarization, labeling, BIC-code pattern decision (horizontal or vertical pattern) by morphological close operation, and character separation from the BIC-code. Then, each characters is recognized by template matching. Finally we measure recognition confidence scores for all the thresholds and choose the best one. Experimental results show that the proposed method yields accurate recognition for the container BIC-code with robustness to illumination change.

Transcriptional Regulation of a DNA Repair Gene in Saccharomyces cerevisiae

  • Jang, Yeon-Kyu;Sancar, Gwen-B.;Park, Sang-Dai
    • Proceedings of the Zoological Society Korea Conference
    • /
    • 1998.10b
    • /
    • pp.113-113
    • /
    • 1998
  • In Saccharomyces cerevisiae UV irradiation and a variety of chemical DNA -damaging agents induce the transcription of specific genes, including several involved in DNA repair. One of the best characterized of DNA -damage inducible genes is PHRI, which encodes the apoenzyme for DNA photolyase. Basal-level and damage-induced expression of PHRI require an upstream activation sequence, UASPHRI. Here we report the identification of the UlvIE6 gene of S. cerevisiae as a regulator of UASPHRl activity. Surprisingly, the effect of deletion of UME6 is growth phase dependent. In wild-type cells PHRI is induced in late exponential phase, concomitant with the initiation of glycogen accumulation that precedes the diauxic shift. Deletion of UNIE6 abolishes this induction, decreases the steady-state concentration of photolyase molecules and PHRI mRNA, and increases the UV sensitivity of a rad2 mutant. The results suggest that UM E6 contributes to the regulated expression of a subset of damage-responsive genes in yeast. Furthermore, the upstream repression sequence, URSPHRI, is required for repression and damage-induced expression of PHRl. Here we show identification of YER169W and YDR096W as putative regulators acting through $URS_{PHRI}$. These open reading frames were designated as RPHI (YERl69W) and RPH2 (YDR096W) indicating regulator of PHRI. Simultaneous disruption of both genes showed a synergistic effect, producing a four-fold increase in basal level expression and a similar decrease m the induction ratio following treatment of methyl methanesulfonate(MMS). Mutation of the sequence ($AG_4$) bound by Rphlp rendered the promoter of PHRI insensitive to changes in RPHI or RPH2 status. The data suggest that RPHI and RPH2 act as damage-responsive negative regulators of PHRI. Surprisingly, the sequence bound by Rphlp in vitro is found to be $AG_4$ which is identical to the consensus binding site for the regulators Msn2p and Msn4p involved in stress-induced expression. Deletion of MSN2 and MSN4 has little effect on the induction$.$ ratio following DNA damage. However, all deletions led to a significant decrease in basal-level and induced expression of PHRI. These results imply that MSN2 and MSN4 are positive regulators of P HRI but are not required for DNA damage repression. [Supported by grant from NIH]om NIH]

  • PDF

Development of Universal Primers for Phylogenetic Analysis and Species-specific Band Identification in the Genus Actinidia (다래나무속 식물의 분류 및 계통 특이밴드 탐색을 위한 범용 프라이머 개발)

  • 김성철;장기창;송은영;김공호;정용환;김미선;오순자;고석찬
    • Korean Journal of Plant Resources
    • /
    • v.17 no.2
    • /
    • pp.107-115
    • /
    • 2004
  • To develop universal primers for phylogenetic analysis and species-specific marker for breeding program of kiwifruit, eighteens primers were designed from kiwifruit genome-specific repeat sequences. Seven species including twenty two varieties collected from native eastern Asia were examined using 18 to 22 mer kiwifruit target(KT) primers. among eighteen primers, we selected seven primers for phylogenetic relationship. The genus Actinidia was divided into two large groups; group I,A. arguta, A. melanandra, A. kolomikta, and A. marcrosperma, characterized by the non-hair in fruits and loaves or a few pubescences only in young stage, which belongs to the section Leiocarpae, and group II, A. chinensis, A. deliciosa, and A. eriantha, characterized by a lot of hairs only in young fruit stage and with a lot of hairs or fuzzes in leaves and branches, which belongs to the section Stellatae. Group II especially belongs to the series Perfectae of the section Stellatae and was divided into two subgroups; subgroup I containing A. chinensis and A. deliciosa, and subgroup II containing A. eriantha. In contrast, the two species, A. chinensis and A. deliciosa, which are known to have common parents, were divided into two independent subgroups with 80% of a similarity value. On the other hand, we selected KT6F for variety specific bands, KT12E primers for 'Hayward' and 'Tomuri'. KT7F or KT12F primers were useful for analysis of inheritance pattern in kiwifruit cross-breeding. We suggest that these primers will be a powerful tool for elucidating phylogenetic relationship and selection of novelty kiwifruit in a breeding program.

Construction of a Microsatellite DNA Profile Database for Pear Cultivars and Germplasm (배 품종 및 유전자원에 대한 Microsatellite DNA 프로파일 데이터베이스 구축)

  • Hong, Jee-Hwa;Shim, Eun-Jo;Kwon, Yong-Sham
    • Horticultural Science & Technology
    • /
    • v.35 no.1
    • /
    • pp.98-107
    • /
    • 2017
  • A DNA profile database was constructed to investigate the genetic relatedness of 72 germplasm samples of Pyrus and related cultivars using microsatellite markers. Three P. pyrifolia, four P. commus, and one P. betulifolia cultivars with different morphological traits were screened using 387 pairs of microsatellite primers. A core set of 11 primer pairs was selected to obtain 133 polymorphic amplified fragments meeting three criteria: high polymorphism information contents (PIC), high repeatability, and distinct allele patterns. The number of alleles per locus ranged between 4 and 22. Average PIC was 0.743 (range: 0.557 - 0.879). Cluster analysis using the unweighted pair - group method with arithmetical average (UPGMA) separated the 72 pear cultivars and germplasm samples into four major groups: Chinese, European pears, and a cluster of 55 Asian pears that could be reclassify into two subcluster, I - $1^{st}$ and II - $2^{nd}$, according to pedigree information. Almost all of the cultivars were discriminated by 11 microsatellite marker genotypes. The microsatellite DNA profile database may be utilized as tool to verify distinctness, uniformity, and stability between candidate cultivar, and to verify in the distinctness of existing cultivars.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.

Development of an Reader Framework for Transparency in RFID Reader (RFID 리더 투명성 지원을 위한 리더 프레임워크 개발)

  • Baek, Sun-Jae;Moon, Mi-Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.404-412
    • /
    • 2011
  • More recently, variety RFID (Radio Frequency Identification) readers are produced by RFID equipment manufactures. Although a transmission standard instituted by EPCglobal is proposed for data transmission between the RFID readers and tags, other RFID reader protocols and the communication connection methods are be in use in other RFID companies. To replace or add the RFID readers of an RFID system, the developers should make changes to the core of the application and/or middleware. In this paper, we propose an RFID reader framework which can manage RFID readers without having to make changes the code of the application in environment with the growing number of heterogeneous RFID readers.This framework that sits on the layer between the RFID readers and the applications provides transparency to the RFID readers. Additionally, it can be used for monitoring the state and the property of all connected RFID, and for recording the RFID tag event logs and system logs. By using this framework, heterogeneous readers can be replaced and added without writing additional code in the applications. Consequently the readers can be easily managed and controlled by the RFID system administrator.

Architecture Description Model for Common IT Resource Identification in e-Government Systems (공동활용자원식별을 위한 전자정부 시스템 아키텍처 서술 방안)

  • Shin, Soo-Jeong;Choi, Young-Jin;Jung, Suk-Chun;Seo, Yong-Won
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.631-642
    • /
    • 2009
  • Although the Korean government is making great effort to prevent the redundancy in IT investment and efficiently allocate the IT budget, actual achievements are quite limited because of the variety of IT resources and different architecture description among organizations and projects. Thus, a standardized description model of the system architecture is strongly needed to identify the common resources and improve the efficiency of IT investment. Therefore, in this paper, we have developed the function-network matrix model which can be used as the basic template for a standard for architecture description of e-Government systems. The function-network matrix model integrates the function tiers and the network areas into a single unified framework, which enables the functionality of each component and the flow of information clearly visible. Moreover, we described the architectures of Korean e-government’s citizen service systems using our model, resulting in clear demonstration of the similarities and differences between different systems, and easy identification of the common resources. Using the architecture description model developed in this research, the consolidation of national IT resources can be promoted, and non-expert IT users can easily recognize the architecture of their systems. In addition, more efficient and systematic IT resource management can be achieved using our model.

A Study on Record Selection Strategy and Procedure in Dataset for Administrative Information (행정정보 데이터세트 기록의 선별 기준 및 절차 연구)

  • Cho, Eun-Hee;Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.19
    • /
    • pp.251-291
    • /
    • 2009
  • Due to the trend toward computerization of business services in public sector and the push for e-government, the volume of records that are produced in electronic system and the types of records vary as well. Of those types, dataset is attracting everyone's attention because it is rapidly being supplied. Even though the administrative information system stipulated as an electronic record production system is increasing in number, as it is in blind spot for records management, the system can be superannuated or the records can be lost in case new system is developed. In addition, the system was designed not considering records management, it is managed in an unsatisfactory state because of not meeting the features and quality requirements as records management system. In the advanced countries, they recognized the importance of dataset and then managed the archives for dataset and carried out the project on management systems and a preservation formats for keeping data. Korea also is carrying out the researches on an dataset and individual administrative information systems, but the official scheme has not been established yet. In this study the items for managing archives which should be reflected when the administrative information system is designed was offered in two respects - an identification method and a quality requirement. The major directions for this system are as follows. First, as the dataset is a kind of an electronic record, it is necessary to reflect this factor from the design step prior to production. Second, the system should be established integrating the strategy for records management to the information strategy for the whole organization. In this study, based on such two directions the strategies to establish the identification for dataset in a frame to push e-government were suggested. The problem on the archiving steps including preservation format and the management procedures in dataset archive does not included in the research contents. In line with this, more researches on those contents as well as a variety of researches on dataset are expected to be more actively conducted.