• Title/Summary/Keyword: 바코드

Search Result 477, Processing Time 0.029 seconds

Mobile Point-of-Sales System (모바일 판매 시점 관리 시스템)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.87-93
    • /
    • 2007
  • We propose a mobile point-of-sale system, which consists of only mobile information terminals and personal computers. The proposed system provides most of functionalities related with resource planning, adminstration and management, provided by medium-scale or large-scale POS systems, with additional functionalities, such as automatic information gathering and management through mobile interconnection, while eliminating the necessity of additional special-purpose devices, such as bar-code systems. The proposed system transmits order information through wireless and wired communication lines, thus allowing real-time sharing of order information among diverse information devices, such as mobile order receiving terminals, main server within stores, monitors and printers located in production lines. Also, the system is able to transfer such detail information produced within stores in real-time to the enterprise-level accounting, sales, logistics, personnel management system, which facilitate enterprise-wide management and administrative decision-making. No additional programs are required for mobile terminals. Order information received by such terminals are entered into databases through web server of main server and that information is again transferred to main server and production line printers. The proposed system can handle all the point-of-sale information and can provide almost of the POS functionalities by simply utilizing wireless internet, personal computers, and mobile terminals without installing specific-purpose peripheral devices. The proposed system can be widely applied to the small-scale stores and will contribute in reducing construction and maintenance cost required for point-of-sale management.

  • PDF

Development of Molecular Markers for the authentication of Zanthoxyli Pericarpium by the analysis of rDNA-ITS DNA barcode regions (rDNA-ITS DNA 바코드 부위 분석을 통한 산초(山椒) 기원종 감별용 유전자 마커 개발)

  • Kim, Wook Jin;Ji, Yunui;Lee, Young Mi;Kang, Young Min;Choi, Goya;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.30 no.3
    • /
    • pp.41-47
    • /
    • 2015
  • Objectives : Due to the morphological similarity of the pericarp and description of multi-species in National Pharmacopoeia of Korea and China, the Zanthoxylum Pericarpium is difficult to authenticate adulterant in species levels. Therefore, we introduced the sequence analysis of DNA barcode and identification of single nucleotide polymorphism(SNP) to establish a reliable tool for the distinction of Zanthoxylum Pericarpium from its adulterants. Methods : To analyze DNA barcode region, genomic DNA was extracted from twenty-four specimens of authentic Zanthoxylum species and inauthentic adulterant and the individual internal transcribed spacer regions (rDNA-ITS and ITS2) of nuclear ribosomal RNA gene were amplified using ITS1, ITS2-S2F, and ITS4 primer. For identification of species-specific sequences, a comparative analysis was performed using entire DNA barcode sequences. Results : In comparison of four Zanthoxylum ITS2 sequences, we identified 16, 4, 6, and 4 distinct species-specific nucleotides enough to distinguish Z. schinifolium, Z. bungeanum, Z. piperitum, and Z. simulans, respectively. The sequence differences were available genetic marker to discriminate four species. Futhermore, phylogenetic relationship revealed a clear classification between different Zanthoxylum species showing 4 different clusters. These results indicated that comparative analysis of ITS2 DNA barcode was an useful genetic marker to authenticate Zanthoxylum Pericarpium in species levels. Conclusions : The marker nucleotides, enough to distinguish Z. schinifolium, Z. piperitum, Z. bungeanum, and Z. simulans, were obtained at 30 SNP marker nucleotides from ITS2 sequences. These differences could be used to authenticate official Zanthoxylum Pericarpium from its adulterants as well as discriminating each four species.

Improvement of SNPs detection efficient by reuse of sequences in Genotyping By Sequencing technology (유전체 서열 재사용을 이용한 Genotyping By Sequencing 기술의 단일 염기 다형성 탐지 효율 개선)

  • Baek, Jeong-Ho;Kim, Do-Wan;Kim, Junah;Lee, Tae-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2491-2499
    • /
    • 2015
  • Recently, the most popular technique to determine the Genotype, genetic features of individual organisms, is the GBS based on SNP from sequences determined by NGS. As analyzing the sequences by the GBS, TASSEL is the most used program to identify the genotypes. But, TASSEL has limitation that it uses only the partial sequences that is obtained by NGS. We tried to improve the efficiency in use of the sequences in order to solve the limitation. So, we constructed new data sets by quality checking, filtering the unused sequences with error rate below 0.1% and clipping the sequences considering the location of barcode and enzyme. As a result, approximately over 17% of the SNP detection efficiency was increased. In this paper, we suggest the method and the applied programs in order to detect more SNPs by using the disused sequences.

Real-Time Construction Resource Monitoring using RFID/USN Inter-working System (RFID/USN 연동 시스템을 활용한 건설자원 실시간 모니터링 시스템)

  • Ryu, Jeoung-Pil;Kim, Hyoung-Kwan;Kim, Chang-Yoon;Kim, Chang-Wan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.90-94
    • /
    • 2007
  • Location tracking automation of resources in construction industry is one of the most important procedures to improve construction project performance and reduce the period of construction. Recently, location tracking technologies have proven to be effective in tracking construction materials and equipment in real time through the instrumentality of RFID (Radio Frequency Identification). By using wireless communication and inter-working system between RFID and USN, it is possible that construction engineers receive the location information of construction resources without additional efforts that move the RFID reader to read tags periodically. In the inter-working system, RFID reader delivers the acquired materials information to sensor node which is connected by serial interface. Then sensor node transmits the received data to the data aggregation terminal that is a sink node. The data aggregation terminal can transmit collected data to construction manager who is out of construction site using infrastructure such as CDMA(Code Division Multiple Access) network. The combination model of the two system and field test scenarios are presented in this paper.

  • PDF

A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division (키 분할을 이용한 Low-Cost RFID 시스템 상호 인증 방안에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.431-438
    • /
    • 2007
  • RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.

Adjustment of 1st order Level Network of Korea in 2006 (2006년 우리나라 1등 수준망 조정)

  • Lee, Chang-Kyung;Suh, Young-Cheol;Jeon, Bu-Nam;Song, Chang-Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.1
    • /
    • pp.17-26
    • /
    • 2008
  • The 1st order level network of Korea was adjusted simultaneously in 1987. After that, the 1 st order level network of Korea was adjusted simultaneously by National Geographic Information Institute in 2006. The levelling data were acquired by digital level with invar staff from 2001 through 2006. The 1st order level network consists of 36 level lines. Among them, 34 level lines comprise 11 level loops. Among 36 level lines, 4 level lines have fore & back error larger than the regulations for the 1st order levelling of NGII, Korea. Also, the closing error of 3 loops of level network exceed the regulation for the 1st order levelling of NGII. The standard error of fore and back leveling between bench marks(${\eta}_1$) are distributed between 0.2 $mm/{\surd}km$ and 1.7 $mm/{\surd}km$. The standard error of loop closing(${\eta}_2$) is 2.0 $mm/{\surd}km$. This result means that the 1st order level network of Korea qualifies for the high precision leveling defined by International Geodetic Association in 1948. As the result of the 1st order level network adjustment, the reference standard error($\hat{{\sigma}_0}$) of the level network was 1.8 $mm/{\surd}km$, which is twice as good as that of the 1st adjustment of level networks in 1987.

Trends in the development of discriminating between Angelica L. species using advanced DNA barcoding techniques (진보된 DNA barcoding 기술을 이용한 당귀(Angelica)속 식물의 기원 판별 기술에 관한 연구 동향)

  • Lee, Shin-Woo;Shin, Yong-Wook;Kim, Yun-Hee
    • Journal of Plant Biotechnology
    • /
    • v.48 no.3
    • /
    • pp.131-138
    • /
    • 2021
  • We reviewed current research trends for discriminating between species of the Angelica genus, a group of important medicinal plants registered in South Korea, China, and Japan. Since the registered species for medicinal purposes differ by country, they are often adulterated as well as mixed in commercial markets. Several DNA technologies have been applied to distinguish between species. However, one of the restrictions is insufficient single-nucleotide polymorphisms (SNPs) within the target DNA fragments; in particular, among closely-related species. Recently, amplification refractory mutation system (ARMS)-PCR and highresolution melting (HRM) curve analysis techniques have been developed to solve such a problem. We applied both technologies, and found they were able to discriminate several lines of Angelica genus, including A. gigas Nakai, A. gigas Jiri, A. sinensis, A. acutiloba Kitag, and Levisticum officinale. Furthermore, although the ITS region differs only by one SNP between A. gigas Nakai and A. gigas Jiri, both HRM and ARMS-PCR techniques were powerful enough to discriminate between them. Since both A. gigas Nakai and A. gigas Jiri are native species to South Korea and are very closely related, they are difficult to discriminate by their morphological characteristics. For practical applications of these technologies, further research is necessary with various materials, such as dried or processed materials (jam, jelly, juice, medicinal decoctions, etc.) in commercial markets.

Morphological Characteristics of Needle Leaves and Analysis of Abies species based on Chloroplast DNA Sequences (한국 전나무(Abies holophylla), 일본 전나무(A. firma, A. homolepis), 그리고 법정 보호 전나무의 잎 형태적 특성 및 엽록체 DNA 분석)

  • Ahn, Chang Ho;Choi, Yong Eui;Park, Wan Geun;Han, Jung Yeon;Kwak, Yoo Shin;Kim, Se Chang;Park, Chan Woo
    • Journal of Korean Society of Forest Science
    • /
    • v.108 no.2
    • /
    • pp.200-207
    • /
    • 2019
  • The aim of this study was to provide the basic information necessary to identify Korean fir (Abies holophylla), momi fir (A. firma), and Nikko fir (A. homolepis), and other fir trees planted in South Korea that are protected by law. Analysis of the morphological characteristics of the needles from each sample was investigated. The shape of the needle-leaf tip from A. holophylla was acute, whereas that from A. firma and A. homolepis was emarginate and that from the protected fir trees was obtuse. The number of stomata on the needles was not significantly different between A. holophylla and A. firma, and the number of stomata on the needles from A. homolepis and the protected fir trees were highly similar. In addition, the genetic differences among the Abies species were analyzed using the sequences of five chloroplast DNA regions-matK, atpF-atpH, rpoC2-rps2, rpoC1, and psbA-trnH.The atpF-atpH and psbA-trnH regions were useful for discriminating A. firma from the other species, but there were no differences among A. holophylla, A. homolepis, and the protected fir trees. The same chloroplast sequences were found in both A. holophylla and A. homolepis, which suggests that additional genetic studies might be necessary to identify the Abies species planted in both South Korea and Japan.

Fabrication and characteristics of TiO2 coating solution with silica-based inorganic binder (실리카 베이스 무기 바인더 기반의 TiO2 코팅액의 제조 및 특성 평가)

  • Kang, Woo-kyu;Kim, Hye-Jin;Kim, Jin-Ho;Hwang, Kwang-Taek;Jang, Gun-Eik
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.29 no.2
    • /
    • pp.71-76
    • /
    • 2019
  • Recently, the demand of labels for product management is increasing, as the automation system becomes more common. the development of functional labels which can be used in various environments has been rapidly proceeded. In the case of a printed circuit board, barcode labels with thermal and chemical stability are generally used due to a high temperature process around $300^{\circ}C$ and chemical cleaning in the manufacturing process. However, the yellowing phenomenon of labels that can lower the resolution of printed barcode image still needs to be prevented. In this study, we prepared a composite coating layer using a silica inorganic binder and a titanium dioxide white pigment, and developed a functional labels with thermal and chemical stability. The silica inorganic binder prepared by sol-gel process was confirmed to show excellent adhesion and abrasion resistance with the polyimide film. The white coating layer could be formed on the polyimide film with mixing the silica inorganic binder and titanium dioxide white pigment. The prepared coating layer showed excellent whiteness and glossiness above $400^{\circ}C$. The excellent chemical stability of the coating layer was also confirmed by the chemical treatment with acidic (pH 1.6) and basic (pH 13.6) cleaners.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.