• Title/Summary/Keyword: 바코드

Search Result 452, Processing Time 0.396 seconds

Species Identification and Molecular Phylogenetic Position of Korean Damselfishes (Pomacentridae: Chrominae) Based on DNA Bioinformation (DNA 생물정보를 이용한 한국산 자리돔과 어류의 분류 및 분자계통학적 위치)

  • Koh, Jeong Rack;Park, Yung Chul
    • Korean Journal of Ichthyology
    • /
    • v.19 no.4
    • /
    • pp.274-285
    • /
    • 2007
  • The subfamily Chrominae of damselfishes (Teleostei: Pomacentridae) includes the genus Chromis and Dascyllus. They are found throughout the tropical oceans and form a major component of coral reef communities. There are 5 species of the Chrominae currently recognized in Korea. This study was conducted to infer phylogenetic position of two Korean Chromis species and one Dascyllus species within general category of their each genus in worldwide level. This study also includes one species of Japanese Dascyllus. In the phylogenetic analysis, the Japanese D. aruanus grouped with D. aruanus previously reported from French Polynesia. Korean Chromis fumea grouped with Australian C. nitida and the p-distance value between the two species is relatively very low (0.047). Korean C. notatus grouped together with C. flavomaculata (New Caledonia). In the sequence analysis of some Korean and Japanese damselfishes, there was no sequence variation between D. melanurus (Jeju, Korea) and D. melanurus (Indo-Pacific), but the sequences of the two populations were different in only one nucleotide sites from that of D. melanurus in Indonesian Archipelago. The sequences of Dascyllus aruanus (Japan) were different in two nucleotide sites from it in French Polynesia. There were high difference between the sequences of two Korean species, Chromis fumea and Korean C. notatus. The variations among mitochondrial cytochrome b sequences indicate that the gene sequence could be used as DNA barcode for identification of local populations of D. aruaus and D. melanurus as well as species level.

Mechanization Measures for Sustainable Local Foods (지속 가능한 로컬 푸드를 위한 기계화 방안)

  • Kang, Mon-seok;Choi, Kyu-hong;Kim, Seong Min
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • /
    • pp.52-52
    • /
    • 2017
  • 연구목적: 생산자와 소비자의 물리적 사회적 거리가 가까워지고, 1일 유통체계 준수에 의한 높은 신선도 유지, 먹거리에 대한 생산자와 생산정보 공유에 의한 농산물 안전성 향상 등 여러 장점 때문에 늘어나고 있는 로컬 푸드의 지속발전을 모색하고자 로컬 푸드 참여농가의 농작업 어려움 조사 및 기계화 방안 제시 조사방법: 전북 완주군 소재 용진농협에서 운영 중인 로컬 푸드 직매장에 농산물을 공급하는 농업인 21인을 대상으로 2016년 11월에 로컬 푸드의 어려운 점, 주요 생산품목, 가장 힘든 농작업, 기계화가 시급한 농작업, 농기계 도입에 어려운 점, 의견 및 건의사항을 설문 조사 분석하였음 결과 및 고찰: 로컬 푸드 참여 농가들은 4~5개 품목을 소량 생산하고, 농가에서 수확 소포장 라벨 부착 후 매장에 직접 진열하고 있었음. 농협은 정선 선별기, 소형 도정기, 포장기, 바코드 기계 등을 설치하여 농가 공동이용, 안전성 신선도 관리 등 교육, 스마트폰 앱을 매장 재고 현황을 농업인에게 실시간으로 제공 등 지원하고 있음. 조사에 응한 농업인 21명 중 60대(13명) > 50대(5명) > 70대(3명)로 모두 50대 이상이었음. 어려운 점에 대한 물음에 대해서는 '판매가 어렵다'(45%) > '인력이 부족하다'(40%) > '생산비가 많이 든다'(8.5%) > 기타(6.5%) 순이었음. '인력부족'은 파종과 수확 시기에 노동력이 집중적으로 필요한 것에 기인하고, 경지 규모가 다소 큰 농가에서는 농사일을 전문으로 하는 외국인 노동자를 고용함으로 노동력 부족 문제를 해소하지만, 소규모 농가는 품삯을 주고 고용할 경우 오히려 적자이기 때문에 고되더라도 자체 노동력으로 해결하고 있는 것으로 조사되었음. 가장 힘든 작업은 수확(81%) > 파종 정식(19%)으로 수확이 절대적으로 힘든 작업이라고 응답하였고, 기계화가 시급한 작업은 수확(71%) > 파종 정식(29%)으로 응답하였음. 힘든 이유로는 적기에 수확을 끝내야 상품성을 인정받을 수 있기 때문에 단기간에 많은 노동력이 요구된다고 응답하였음. 농기계 도입에 어려운 원인으로는, '적합한 수확기계가 없다'(48%)와 '재배면적이 적어 필요성을 못 느낀다'(29%)가 대부분이었고, 이밖에 '가격이 비싸다'(10%), '기계 정확도가 떨어진다'(10%), '기계 조작이 어렵다'(5%)로 나타났음. 결론: 로컬 푸드 참여 농가를 대상으로 농작업 기계화 현황에 대하여 조사하였음. 로컬 푸드의 지속 발전을 위한 방안을 제시하면; 첫째, 중 소농을 위한 수확기 개발이 가장 시급한 것으로 조사되었고, 둘째, 농기계가 아니더라도 우선 힘든 일을 해소하면서 편하게 자세를 유지할 수 있는 작업 보조기구 또는 편이장비의 개발 보급이 필요함. 셋째, 농가의 영세성과 지역의 특성을 고려하여 기술센터 농기계임대사업이나 시군 보조사업을 통해서 소형 농기계, 농기구, 보조 및 편이장비 보급이 확대되어야 함.

  • PDF

Fabrication and characteristics of TiO2 coating solution with silica-based inorganic binder (실리카 베이스 무기 바인더 기반의 TiO2 코팅액의 제조 및 특성 평가)

  • Kang, Woo-kyu;Kim, Hye-Jin;Kim, Jin-Ho;Hwang, Kwang-Taek;Jang, Gun-Eik
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.29 no.2
    • /
    • pp.71-76
    • /
    • 2019
  • Recently, the demand of labels for product management is increasing, as the automation system becomes more common. the development of functional labels which can be used in various environments has been rapidly proceeded. In the case of a printed circuit board, barcode labels with thermal and chemical stability are generally used due to a high temperature process around $300^{\circ}C$ and chemical cleaning in the manufacturing process. However, the yellowing phenomenon of labels that can lower the resolution of printed barcode image still needs to be prevented. In this study, we prepared a composite coating layer using a silica inorganic binder and a titanium dioxide white pigment, and developed a functional labels with thermal and chemical stability. The silica inorganic binder prepared by sol-gel process was confirmed to show excellent adhesion and abrasion resistance with the polyimide film. The white coating layer could be formed on the polyimide film with mixing the silica inorganic binder and titanium dioxide white pigment. The prepared coating layer showed excellent whiteness and glossiness above $400^{\circ}C$. The excellent chemical stability of the coating layer was also confirmed by the chemical treatment with acidic (pH 1.6) and basic (pH 13.6) cleaners.

Real-Time Construction Resource Monitoring using RFID/USN Inter-working System (RFID/USN 연동 시스템을 활용한 건설자원 실시간 모니터링 시스템)

  • Ryu, Jeoung-Pil;Kim, Hyoung-Kwan;Kim, Chang-Yoon;Kim, Chang-Wan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • /
    • pp.90-94
    • /
    • 2007
  • Location tracking automation of resources in construction industry is one of the most important procedures to improve construction project performance and reduce the period of construction. Recently, location tracking technologies have proven to be effective in tracking construction materials and equipment in real time through the instrumentality of RFID (Radio Frequency Identification). By using wireless communication and inter-working system between RFID and USN, it is possible that construction engineers receive the location information of construction resources without additional efforts that move the RFID reader to read tags periodically. In the inter-working system, RFID reader delivers the acquired materials information to sensor node which is connected by serial interface. Then sensor node transmits the received data to the data aggregation terminal that is a sink node. The data aggregation terminal can transmit collected data to construction manager who is out of construction site using infrastructure such as CDMA(Code Division Multiple Access) network. The combination model of the two system and field test scenarios are presented in this paper.

  • PDF

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division (키 분할을 이용한 Low-Cost RFID 시스템 상호 인증 방안에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.431-438
    • /
    • 2007
  • RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.

Adjustment of 1st order Level Network of Korea in 2006 (2006년 우리나라 1등 수준망 조정)

  • Lee, Chang-Kyung;Suh, Young-Cheol;Jeon, Bu-Nam;Song, Chang-Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.1
    • /
    • pp.17-26
    • /
    • 2008
  • The 1st order level network of Korea was adjusted simultaneously in 1987. After that, the 1 st order level network of Korea was adjusted simultaneously by National Geographic Information Institute in 2006. The levelling data were acquired by digital level with invar staff from 2001 through 2006. The 1st order level network consists of 36 level lines. Among them, 34 level lines comprise 11 level loops. Among 36 level lines, 4 level lines have fore & back error larger than the regulations for the 1st order levelling of NGII, Korea. Also, the closing error of 3 loops of level network exceed the regulation for the 1st order levelling of NGII. The standard error of fore and back leveling between bench marks(${\eta}_1$) are distributed between 0.2 $mm/{\surd}km$ and 1.7 $mm/{\surd}km$. The standard error of loop closing(${\eta}_2$) is 2.0 $mm/{\surd}km$. This result means that the 1st order level network of Korea qualifies for the high precision leveling defined by International Geodetic Association in 1948. As the result of the 1st order level network adjustment, the reference standard error($\hat{{\sigma}_0}$) of the level network was 1.8 $mm/{\surd}km$, which is twice as good as that of the 1st adjustment of level networks in 1987.

Establishment of Hanwoo(Korean Cattle, Bos taurus, Linn.) Traceability System Using Radio Frequency Identification(RF-ID) (전자식별칩(RF-ID)을 이용한 한우 생산이력추적시스템 도입)

  • Seo, K. S.;Kim, S.;Lee, J.G.;Sohn, Y.G.;Salces, A.J.;Choi, T.J.
    • Journal of Animal Science and Technology
    • /
    • v.50 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • This study was conducted to develop a traceability system for systematic animal identifi- cation to increase efficiency of animal production, post production and processing to ensure that quality and sanitary meat products reach the consumers of the entire country. The new animal identification traceability system was designed for easy management, data collection and storage considering bar code, registration number and farm number.Specifically the system aimed 1) To provide standard radio frequency technology identification (RF-ID) for livestock management, standard of ear tag, microchip and ear tag identification equipment, 2) To guarantee meat product label thereby safeguarding the consumers 3) To give incentives to farmers for producing quality meat products and 4) To provide unified system for national livestock management.Results of the research which started in July 2003 which was used by several farmers’ cooperatives and Department Store revealed the feasibility of using the RF-ID system although much will be done to conform to global nomenclatures.

Design of Geo-fence-based Smart Attendance System (지오펜스 기반 스마트 출결시스템 설계)

  • Hong, Seong-Pyo;Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.496-502
    • /
    • 2020
  • The electronic attendance management system is being introduced and operated on a pilot basis by some universities and educational institutions. However, most of the related systems have installed and operated the existing barcode and magnetic card systems. Classroom attendance is managed by introducing RF cards, but it causes problems such as recognition distance (less than 5cm) and the need for a check process in which students have to read the card each time with a reader for attendance. Also, it is not possible to respond in real time to the situation of midterm (early leave, absence from the second lecture time, etc.) because it is used in the lecture time of one subject with the record checked once. In order to solve these problems, the various mobile attendance systems proposed to solve these problems are also unable to fundamentally solve problems such as interim attendance and proxy attendance because they check attendance using only the application of a smartphone. In this paper, we use geofencing technology, which is a positioning-based technology that detects the entry and exit of people, objects, etc. in areas separated by virtual boundaries. The proposed system solves the problem of intermediate attendance and alternate attendance by setting the student to automatically record the access record when entering and leaving the classroom set as a geofence with a smartphone. In addition, it also provides a function to prevent unintentional mistakes that occur through the smartphone by limiting some of the functions of the smartphone such as silence, vibration, and Internet use when entering the classroom.