• Title/Summary/Keyword: 식별 시스템

Search Result 2,555, Processing Time 0.027 seconds

Genetic Studies of Redcell Types for Individual Identification and Parentage Verification in Horse Breeds. (개체식별 및 친자판정을 위한 말의 적혈구항원형에 관한 연구)

  • 조길재;조병욱
    • Journal of Life Science
    • /
    • v.14 no.4
    • /
    • pp.696-701
    • /
    • 2004
  • The present study was carried out to investigate the redcell types of horse breeds. A total of 210 horses (73 Korean native horses, 118 crossbreed horses, and 19 Mongolian horses) were tested a redcell types by serological procedure, and their phenotypes and gene frequencies were estimated. The blood groups phenotypes observed with highest frequency were Aa (27.4%, 63.6%, 63.2%), Ca (97.3%, 94.9%, 89.5%), K- (97.3%, 99.2%, 84.2%), Pa (39.7%, 44.9%, 42.1%), and Ua (71.2%, 70.3%, 63.2%) in the Korean native horse, crossbreed horse, and Mongolian horse, respectively. In the D system and Q system, phenotypes observed with highest frequency were Dbcm/dghm (12.3%), Dbcm/cgm (14.4%), Dcgm/dghm (15.8%), and Qc (56.2%), Qabc (36.4%), Qc (31.6%) in the Korean native horse, crossbreed horse, and Mongolian horse, respectively Alleles observed with highest frequency were A- (0.287), Ca(0.827), Ddghm (0.226), K- (0.985), Pa (0.358), Qc (0.494), U-(0.529) in the Korean native horse, Aa (0.529), Ca (0.776), Dbcm (0.306), K- (0.995), P- (0.531), Q- (0.504), U- (0.548) in crossbreed horse, and Aa (0.421), Ca (0.895), Ddghm (0.421), K- (0.842), Pa (0.447), Qc (0.448), Ua (0.632) in Mongolian horse. Dcfgk and D- alleles were not detected in these horses. These results present basic information for estimating the genetic relationships between the Korean native horse, and developing a system for parentage verification and individual identification in these horses.

수삼 내부의 자기공명영상 특성

  • 손재룡;이강진;최동수;김기영;강석원;최규홍
    • Proceedings of the Korean Society of Postharvest Science and Technology of Agricultural Products Conference
    • /
    • 2003.10a
    • /
    • pp.151-152
    • /
    • 2003
  • 최근 NMR, MRI, x-선 등 전자파의 기술이 발전되면서 이들을 이용하여 내부품질을 검출하는 보다진보된 연구가 수행되고 있다. 관련 연구로는 자기공명영상을 이용하여 내공수삼 및 정상수삼의 내부를 촬영하여 T$_1$, T$_2$의 값을 측정하여 내부조직의 이상유무를 추정하였고, 또한 MRI에 의해 수삼의 내부품질 뿐만 아니라 연근 판정 가능성을 검토하는 등 많은 연구가 수행되고있다. 이 연구에서는 MRI 시스템을 이용하여 수삼의 내부단면 영상을 획득하여 내부결함 유무를 검출하고, 또한 동일한 수삼을 대상으로 홍삼 제조 후 내부품질의 변화 특성을 조사하고자 수행하였다. 공시재료는 충북 음성에 있는 인삼연초연구원에서 4~6년 근 된 수삼을 이용하였고, 시험 장비로는 국내 MRI 생산 전문 업체인 ISOL Tech. Co.에서 개발한 의료용 장비인 CHORUS 1.5T(자속밀도 1.5 Tesla)를 이용하였다. 슬라이스 두께/간격은 5mn/5mn, 촬영 단면수는 15장/시료, 영상영역(FOV)은 180mmx90mm, image size는 256$\times$128 pixels 그리고 TR/TE는 각각의 이완상수별로 500/13(Tl), 4,000/63(T2) 및 2,200/21(Pd)에 대한 단면영상을 얻었다. 5개의 수삼을 동시에 뇌두에서 뿌리 쪽으로 MR 단면영상을 획득하였다. 이완상수 T$_1$, T$_2$, Pd에 대해서 MR 영상을 획득하였으며, 총 15장의 단면 영상 중 내부 상태를 가장 잘 식별 할 수 있는 영상을 조사한 결과 T$_1$과 Pd에서 촬영한 영상에서는 내부상태가 잘 나타났으나, T$_2$에서 얻은 영상은 영상의 손실이 많이 발생되었다. 한편, T$_1$에 대해서 뇌두에서 뿌리쪽으로 가면서 각 위치에 따라 수삼 내부의 부패된 영상이 나타나 이에 대한 판정은 가능한 것으로 나타났다. 2000년도와 2001년도에 각각 수확.저장된 수삼을 부위별로 단면영상을 MRI로 측정하고, 그 시료를 인삼연초연구원(음성시험장)에서 홍삼으로 제조한 후 수삼 상태에서의 내부품질과 홍삼으로 제조된 후의 내부품질 변화를 조사하였다. 총 20본의 수삼을 MRI 시스템으로 영상을 획득하였고, 모든 시료에 대해서 내부조직의 상태를 관찰하였다. 수삼의 수분함량은 뇌두로부터 1cm부위를 절단하여 조사하였고, 수삼조직은 절단시 단면의 달관 조사에 의한 성적이며 홍삼품질은 제조삼의 조직상태를 절단하여 육안판별로 검사하였다. 총 20본의 수삼 중 정상은 16본 이었고, 이들은 홍삼으로 제조된 후 내공 내백 등이 혼재되어 나타났으며 정상수삼이 정상홍삼으로 나타난 경우는 5본이었고, 내백은 5본, 내공은 6본으로 조사되었다. 또한 수삼에서 4본은 썩은 부위가 포함되어있는 수삼이었는데 홍삼으로 제조되었을 때 3본은 내백으로 되었고 1 본은 수삼에서 썩은 부위가 1/4정도로 미미해서 홍삼 제조시 정상으로 나타났다. 일반적으로 홍삼 제조시 내공의 발생은 제조공정에서 나타나는 경우가 많으며, 내백의 경우는 홍삼으로 가공되면서 발생하는 경우가 있고, 인삼이 성장될 때 부분적인 영양상태의 불충분이나 기후 등에 따른 영향을 받을 수 있기 때문에 앞으로 이에 대한 많은 연구가 이루어져야할 것으로 판단된다.

  • PDF

Building a GIS Database for Analyzing the Integrated Information on Aquatic Ecosystem Health and Its Application (수생태계 건강성 통합정보 분석을 위한 GIS DB 구축 및 활용에 관한 연구)

  • Jo, Myung-Hee;Lee, Su-Hyung;Choi, Hee-Lak;Jang, Sung-Hyun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.189-203
    • /
    • 2013
  • The purpose of this study is to build a GIS database that can utilized to provide a multi-dimensional analysis of aquatic health ecosystem. Especially, it was to build a GIS database for comprehensive analysis using the aquatic ecosystem health. So we collected data on aquatic ecosystem health assessment, Korea Reach File(KRF), Stream Naturalness and Water Environmental Information System, and detailed analysis of the collected data was performed. In addition, the core objects were extracted from individual data and a related entity was derived by pulling out the items associated with thematic characteristics and classifying them. The establishment of GIS database makes it possible to support the decision making for the user to quickly understand the information of water environment. Therefore, the database will provide the information for the effective management on water environment.

A Study on the Method of High-Speed Reading of Postal 4-state Bar Code for Supporting Automatic Processing (우편용 4-state 바코드 고속판독 방법에 관한 연구)

  • Park, Moon-Sung;Kim, Hye-Kyu;Jung, Hoe-Kyung
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.285-294
    • /
    • 2001
  • Recently many efforts on the development of automatic processing system for delivery sequency sorting have been performed in ETRI, which requires the use of postal 4-state bar code system to encode delivery points. This paper addresses the issue on the extension of read range and the improvement of image processing method. For the improvement of image processing procedure, applied information acquisition method through basic two thresholds onto the horizontal axial line of gray image based on reference information of 4-state bar code symbology. Symbol values are computed after creating two threshold values based on the obtained information through search of horizontal axial values. The implementation result of 4-state bar code reader are obtained the symbol values within 30~60 msec (58,000~116,000 mail item/hour)without noise removal or image rotation in spite of the incline $\pm 45^{\circ}$.

  • PDF

An Automatic Identification System of Biological Resources based on 2D Barcode and UCC/EAN-128 (2차원 바코드와 UCC/EAN-128을 이용한 생물자원 자동인식시스템)

  • Chu, Min-Seok;Ryu, Keun-Ho;Kim, Jun-Woo;Kim, Hung-Tae;Han, Bok-Ghee
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.861-872
    • /
    • 2008
  • As rapid development of computing environment, field of automatic identification research which interoperates with various physical objects and digital information is making active progress. Although the automatic identification system is widely used in various industries, application of automatic identification system in the field of medical health doesn't reach other industry. Therefore research in medical health supplies such as medical equipment, blood, human tissues and etc is on progress. This paper suggests the application of automatic identification technology for biological resources which is core research material in human genome research. First of all, user environment requirements for the introduction of automatic identification technology are defined and through the experiments and research, barcode is selected as a suitable tag interface. Data Matrix which is 2D barcode symbology is chosen and data schema is designed based on UCC/EAN-128 for international defecto standard. To showapplicability of proposed method when applied to actual environment, we developed, tested and evaluated application as following methods. Experiments of barcode read time at 196 and 75 below zero which is actual temperature where biological resources are preserved resulted read speed of average of 1.6 second and the data schema satisfies requirements for the biological resources application. Therefore suggested method can provide data reliability as well as rapid input of data in biological resources information processing.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Simulating the Availability of Integrated GNSS Positioning in Dense Urban Areas (통합 GNSS 환경에서 도시공간 위성측위의 가용성 평가 시뮬레이션)

  • Suh, Yong-Cheol;Lee, Yang-Won
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.3
    • /
    • pp.231-238
    • /
    • 2007
  • This paper describes the availability of the forthcoming integrated GNSS(Global Navigation Positioning System) positioning that includes GPS(Global Positioning System), Galileo, and QZSS(Quasi-Zenith Satellites System). We built a signal propagation model that identifies direct, multipath, and diffraction signals, using the principles of specular reflection and ray tracing technique. The signal propagation model was combined with 3D GIS(three-dimensional geographic information system) in order to measure the satellite visibility and positioning error factors, such as the number of visible satellites, average elevation of visible satellites, optimized DOP(dilution of position) values, and the portion of multipath-producing satellites. Since Galileo and QZSS will not be fully operational until 2010, we used a simulation in comparing GPS and GNSS positioning for a $1km{\times}1km$ developed area in Shinjuku, Tokyo. To account for local terrain variation. we divided the target area into 40,000 $5m{\times}5m$ grid cells. The number of visible satellites and that of multipath-free satellites will be greatly increased in the integrated GNSS environment while the average elevation of visible satellites will be higher in the GPS positioning. Much decreased PDOP(position dilution of precision) values indicate the appropriate satellite/user geometry of the integrated GNSS; however, in dense urban areas, multipath mitigation will be more important than the satellite/user geometry. Thus, the efforts for applying current technologies of multipath mitigation to the future GNSS environment will be necessary.

A Study of SIL Allocation with a Multi-Phase Fuzzy Risk Graph Model (다단계 퍼지 리스크 그래프 모델을 적용한 SIL 할당에 관한 연구)

  • Yang, Heekap;Lee, Jongwoo
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.2
    • /
    • pp.170-186
    • /
    • 2016
  • This paper introduces a multi-phase fuzzy risk graph model, representing a method for determining for SIL values for railway industry systems. The purpose of this paper is to compensate for the shortcomings of qualitative determination, which are associated with input value ambiguity and the subjectivity problem of expert judgement. The multi-phase fuzzy risk graph model has two phases. The first involves the determination of the conventional risk graph input values of the consequence, exposure, avoidance and demand rates using fuzzy theory. For the first step of fuzzification this paper proposes detailed input parameters. The fuzzy inference and the defuzzification results from the first step will be utilized as input parameters for the second step of the fuzzy model. The second step is to determine the safety integrity level and tolerable hazard rate corresponding to be identified hazard in the railway industry. To validate the results of the proposed the multi-phase fuzzy risk graph, it is compared with the results of a safety analysis of a level crossing system in the CENELEC SC 9XA WG A0 report. This model will be adapted for determining safety requirements at the early concept design stages in the railway business.

Design and evaluation of a VPRS-based misbehavior detection scheme for VANETs (차량애드혹망을 위한 가변정밀도 러프집합 기반 부정행위 탐지 방법의 설계 및 평가)

  • Kim, Chil-Hwa;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1153-1166
    • /
    • 2011
  • Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose the variable precision rough sets based misbehavior detection scheme which detects false alert message and misbehaving nodes by observing their action after sending out the alert messages. In the proposed scheme, the alert information system, alert profile is constructed from valid actions of moving nodes in vehicular ad-hoc networks. Once a moving vehicle receives an alert message from another vehicle, it finds out the alert type from the alert message. When the vehicle later receives a beacon from alert raised vehicle after an elapse of time, then it computes the relative classification error by using variable precision rough sets from the alert information system. If the relative classification error is lager than the maximum allowable relative classification error of the alert type, the vehicle decides the message as false alert message. Th performance of the proposed scheme is evaluated as two metrics: correct ratio and incorrect ratio through a simulation.

Speech Activity Detection using Lip Movement Image Signals (입술 움직임 영상 선호를 이용한 음성 구간 검출)

  • Kim, Eung-Kyeu
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.289-297
    • /
    • 2010
  • In this paper, A method to prevent the external acoustic noise from being misrecognized as the speech recognition object is presented in the speech activity detection process for the speech recognition. Also this paper confirmed besides the acoustic energy to the lip movement image signals. First of all, the successive images are obtained through the image camera for personal computer and the lip movement whether or not is discriminated. The next, the lip movement image signal data is stored in the shared memory and shares with the speech recognition process. In the mean time, the acoustic energy whether or not by the utterance of a speaker is verified by confirming data stored in the shared memory in the speech activity detection process which is the preprocess phase of the speech recognition. Finally, as a experimental result of linking the speech recognition processor and the image processor, it is confirmed to be normal progression to the output of the speech recognition result if face to the image camera and speak. On the other hand, it is confirmed not to the output the result of the speech recognition if does not face to the image camera and speak. Also, the initial feature values under off-line are replaced by them. Similarly, the initial template image captured while off-line is replaced with a template image captured under on-line, so the discrimination of the lip movement image tracking is raised. An image processing test bed was implemented to confirm the lip movement image tracking process visually and to analyze the related parameters on a real-time basis. As a result of linking the speech and image processing system, the interworking rate shows 99.3% in the various illumination environments.