• Title/Summary/Keyword: 도로 모니터링

Search Result 1,491, Processing Time 0.034 seconds

Monitoring Hazards to Verify the Safety of Plant-Based Meat Alternatives (식물성 대체육의 안전성 검증을 위한 위해요소 모니터링)

  • Ayeong Ma;Eun Sung Shin;Seon-A Son;Tai-Sun Shin;Hyun-Jung Chung
    • Journal of Food Hygiene and Safety
    • /
    • v.39 no.2
    • /
    • pp.83-94
    • /
    • 2024
  • The proportion of plant-based meat alternative (PBMA) consumers has recently increased in Korea. This is due to several reasons including protecting the environment, satisfying preferences, maintaining health, and improving eating habits. Accordingly, many companies produce and sell alternative meat using various materials. Alternative meats are classified into plant (such as soybeans and wheat), seaweed, insect, and cultured meats, depending on the raw materials used in manufacturing. PBMA is sold after undergoing processes such as grinding, seasoning, and molding. Therefore, monitoring the presence of any hazardous elements during this process is essential. Accordingly, in this study, we analyzed the harmful components of nine domestically distributed PBMA that are most easily accessible to consumers. After extracting fat from the samples and analyzing the rancidity level, samples F, G, and I were highly rancid. Trace amounts of aflatoxin were detected in samples A and B, but confirmed to be within the range. Cd and Pb were not detected in any sample. We hope that this study will help establish methods to ensure the safety of domestically sold PBMA.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

A Study on the Improvement of the Effectiveness of Feedback of Government Performance Evaluation (정부업무평가의 환류 효용성 제고방안에 관한 연구)

  • Yuiryong Jung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.541-550
    • /
    • 2024
  • The aim of this study is to find a way to improve the effectiveness of feedback that can contribute to the development of government work evaluation through comparison of systems between Korea and the United States. To this end, this study compared and analyzed the cases of Korea and the United States in relation to the feedback system of political affairs evaluation. In the case of the United States, it was confirmed that it was linked to a relatively high level of the learning dimension of the feedback system of achieving and improving policy goals, while in Korea, such linkage was segmented and controlled. In the case of Korea, it was confirmed that the government work evaluation system was in power, and its purpose was to improve policies and to control the evaluation target rather than learning for it. In the case of the United States, it is noteworthy that the autonomy of its own ministries is guaranteed as much as possible, the clarity and achievement of the goals presented by the ministries are prioritized, and the feedback also has a support and learning system as a regular system, not an ex post system. It is necessary to focus on policy improvement that can be linked to the achievement of policy goals in government work evaluation. It is also necessary to take a quarterly monitoring system, but to transform the ex post evaluation system into a learning and supportive system that can achieve policy goals, not control.

Analysis and Prevalence of Azaspiracid Toxins in Imported Shellfish in Korea (국내 수입산 패류에서의 azaspiracid 독소 분석 및 발생수준)

  • Hyojin Kwon;Seonghwan Moon;Sungeun Park;Seongwon Hwang;Daseul Yeo;Yuan Zhang;Danbi Yoon;Md. Iqbal Hossain;Gyung Jin Bahk;Kwang-Sik Choi;Jihyun Lee;Changsun Choi
    • Journal of Food Hygiene and Safety
    • /
    • v.39 no.5
    • /
    • pp.456-462
    • /
    • 2024
  • Azaspiracids (AZAs) are a group of shellfish toxins that cause azaspiracid shellfish poisoning (AZP). They have been detected in mussels (Mytilus edulis) and oysters (Crassostrea gigas) in the Netherlands, Ireland, Italy, France, and the United Kingdom. In this study, we aimed to develop a method for the simultaneous detection of AZAs using ultra-high-performance liquid chromatography-tandem mass spectrometry (UHPLC-MS/MS). Simultaneous analyses of AZA-1, AZA-2, AZA-3, AZA-4, and AZA-5 were conducted according to AOAC ISO 17025 guidelines. Between 2020 and 2023, 467 imported shellfish were purchased from retail and wholesale markets in Korea. However, none of the samples tested positive for AZA-1, AZA-3, AZA-4, or AZA-5. Only two Arca avellana imported from Russia were positive for AZA-2 above the limit of detection (LOD) but below the limit of quantification (LOQ), with concentrations of 0.68 and 0.71 ng/g, respectively. This study found that the prevalence of AZA-2 was very low in shellfish imported into Korea.

Discussion on Detection of Sediment Moisture Content at Different Altitudes Employing UAV Hyperspectral Images (무인항공 초분광 영상을 기반으로 한 고도에 따른 퇴적물 함수율 탐지 고찰)

  • Kyoungeun Lee;Jaehyung Yu;Chanhyeok Park;Trung Hieu Pham
    • Economic and Environmental Geology
    • /
    • v.57 no.4
    • /
    • pp.353-362
    • /
    • 2024
  • This study examined the spectral characteristics of sediments according to moisture content using an unmanned aerial vehicle (UAV)-based hyperspectral sensor and evaluated the efficiency of moisture content detection at different flight altitudes. For this purpose, hyperspectral images in the 400-1000nm wavelength range were acquired and analyzed at altitudes of 40m and 80m for sediment samples with various moisture contents. The reflectance of the sediments generally showed a decreasing trend as the moisture content increased. Correlation analysis between moisture content and reflectance showed a strong negative correlation (r < -0.8) across the entire 400-900nm range. The moisture content detection model constructed using the Random Forest technique showed detection accuracies of RMSE 2.6%, R2 0.92 at 40m altitude and RMSE 2.2%, R2 0.95 at 80m altitude, confirming that the difference in accuracy between altitudes was minimal. Variable importance analysis revealed that the 600-700nm band played a crucial role in moisture content detection. This study is expected to be utilized in efficient sediment moisture management and natural disaster prediction in the field of environmental monitoring in the future.

Fabrication and Characterization of Lactate Oxidase-catalase-mitochondria Electrode (젖산 산화효소-카탈라아제-미토콘드리아 전극 제작 및 특성 분석)

  • Ke Shi;Keerthi Booshan Manikandan;Young-Bong Choi;Chang-Joon Kim
    • Korean Chemical Engineering Research
    • /
    • v.62 no.3
    • /
    • pp.238-245
    • /
    • 2024
  • The lactate electrode can be utilized either as an electrode for lactate sensor to monitor the patient's health status, stress level, and athlete's fatigue in real time or lactate fuel cell. In this study, we fabricated a high-performance electrode composed of lactate oxidase, catalase, and mitochondria, and investigated the surface analysis and electrochemical properties of this electrode. Carbon paper modified with single-walled carbon nanotubes (CP-SWCNT) had significantly improved electrical conductivity compared to before modification. The electrode to which lactate oxidase, catalase, and mitochondria were attached (CP-SWCNT-LOx-Cat-Mito) produced a higher current than the electrode to which lactate oxidase and catalase were attached. The amount of reduction current produced by the bilirubin oxidase (BOD)-attached electrode (CP-SWCNT-BOD) was greatly affected by the presence or absence of oxygen in the electrolyte. The fuel cell composed of CP-SWCNT-LOx-Cat-Mito (anode) and CP-SWCNT-BOD (cathode) produced maximum power (29 ㎼/cm2) at a discharge current density of 133 ㎂/cm2. From this study, we had proved that mitochondria is essential for improving lactate sensor and fuel cell performance.

Computer Vision Approach for Phenotypic Characterization of Horticultural Crops (컴퓨터 비전을 활용한 토마토, 파프리카, 멜론 및 오이 작물의 표현형 특성화)

  • Seungri Yoon;Minju Shin;Jin Hyun Kim;Ho Jeong Jeong;Junyoung Park;Tae In Ahn
    • Journal of Bio-Environment Control
    • /
    • v.33 no.1
    • /
    • pp.63-70
    • /
    • 2024
  • This study explored computer vision methods using the OpenCV open-source library to characterize the phenotypes of various horticultural crops. In the case of tomatoes, image color was examined to assess ripeness, while support vector machine (SVM) and histogram of oriented gradients (HOG) methods effectively identified ripe tomatoes. For sweet pepper, we visualized the color distribution and used the Gaussian mixture model for clustering to analyze its post-harvest color characteristics. For the quality assessment of netted melons, the LAB (lightness, a, b) color space, binary images, and depth mapping were used to measure the net patterns of the melon. In addition, a combination of depth and color data proved successful in identifying flowers of different sizes and distances in cucumber greenhouses. This study highlights the effectiveness of these computer vision strategies in monitoring the growth and development, ripening, and quality assessment of fruits and vegetables. For broader applications in agriculture, future researchers and developers should enhance these techniques with plant physiological indicators to promote their adoption in both research and practical agricultural settings.

A Methodology of XAI-Based Network Features Extraction for Rapid IoT Botnet Behavior Analysis (신속한 IoT 봇넷 행위분석을 위한 XAI 기반 네트워크 특징 추출 방법론)

  • Doyeon Kim;Chungil Cha;Kyuil Kim;Heeseok Kim;Jungsuk Song
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1037-1046
    • /
    • 2024
  • The widespread adoption of the Internet of Things (IoT) has enhanced efficiency and convenience across various fields, but it has also led to a surge in security threats. Among these, IoT botnets are particularly concerning as they can rapidly infect a large number of devices and launch various types of attacks, making them a significant security threat. In IoT environments where implementing security measures on individual devices is challenging, establishing a security monitoring system for real-time detection and response is essential to mitigate the risks posed by botnets. In the field of security monitoring, it is crucial not only to detect botnets but also to analyze their detailed behaviors to devise effective countermeasures. Security experts devote considerable effort to analyzing the payloads of detected threats to understand botnet behavior and develop appropriate responses. However, analyzing all threats manually is time-consuming and costly. To address this, our study proposes an XAI-based network feature extraction methodology to enhance the effectiveness of IoT botnet behavior analysis. This study proposes a practical security monitoring methodology for IoT botnet behavior analysis and response, consisting of three steps: 1) BPE and TF-IDF based payload feature extraction, 2) XAI-based feature importance analysis, and 3) visualization of decision rationale based on feature importance. This approach provides security experts with intuitive visual evidence of IoT attacks and reduces analysis time, contributing to faster decision-making and response strategy development in security monitoring.

Development of core nursing skill evaluation protocol for simulation practice using the Delphi technique (델파이 기법을 이용한 시뮬레이션 실습용 핵심간호술 평가 프로토콜 개발)

  • Kuemju Park;Jeong-ha Yang
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.5
    • /
    • pp.125-132
    • /
    • 2024
  • This study was conducted to establish a core nursing skill evaluation protocol for simulation practice. The expert panel that participated in the study consisted of a total of 20 nurse educators with experience in simulation practice. The first step of the investigation was to construct questionnaire items. Based on various literature, the questions were derived by one fundamentals nursing professor and one adult nursing professor who participated in this study. The second stage was the first Delphi survey by a group of experts and was conducted from September 11 to September 27, 2023, and the third stage, the second Delphi survey, was conducted from October 16 to October 27, 2023. Data were analyzed for mean, standard deviation, content validity ratio, convergence, and stability using SPSS/WIN 28.0. As a result of the survey, 'measurement of vital signs' consisted of 15 questions, 'pain management' had 10 questions, 'peripheral oxygen saturation measurement and electrocardiogram monitoring' had 11 questions, and 'oxygen therapy using nasal cannula' had 10 questions. The protocol developed in this study will be useful basic data for nursing educators or clinical experts to evaluate core nursing skills in clinical and simulated situations.

Comparison of Soil Physicochemical Properties According to the Sensitivity of Forest Soil to Acidification in the Republic of Korea (우리나라 산림토양의 산성화 민감도평가와 그에 따른 토양 이화학적 특성 비교분석)

  • Lee, Ah Lim;Koo, Namin
    • Journal of Korean Society of Forest Science
    • /
    • v.109 no.2
    • /
    • pp.157-168
    • /
    • 2020
  • The sensitivity of forest soil to acidification in the Republic of Korea (ROK) was evaluated based on pHH2O, cation exchange capacity (CEC), and base saturation (BS). Sensitivity to acidification was categorized into three grades: adequate level (AL, pH ≧ 4.2, CEC ≧ 15cmol/kg, BS ≧ 15%), caution level (CL, at least one indicator is below AL), and severe Level (SL, all three indicators are below AL). Soil samples were collected from the 65 stationary monitoring plots (40 × 40 ㎢), distributed throughout ROK. Only 19% of soil samples were classified as AL, while 66% and 15% were CL and SL, respectively. The median of pHH2O, CEC, BS, and Ca/Al indicator in AL soils was pH 4.64, 20.7cmol/kg, 29%, and 6.3, respectively. Moreover, BCex (K+, Mg2+, Ca2+) and available phosphorus (AP) concentration compared with a threshold value and molar ratio of BCex and AP to total nitrogen (TN) was high. This indicates that AL soils have a good nutrient condition. The molar Ca/Al ratio, an indicator for toxicity of exchangeable aluminum (Alex), was more than 1, indicating no negative impact of Alex on plant growth. On the contrary, the median of pHH2O, CEC, and BS in SL soils was pH 4.02, 13.2cmol/kg, and 10%, respectively. The Ca/Al index was less than 0.6, which indicates that negative impacts of Alex on plants were high. Furthermore, both the concentration of BCex in SL soils and the BCex/TN ratio were the lowest among the three acidity degrees. This shows that SLsoils can be degraded by soil acidification compared with less acidic soils.