• Title/Summary/Keyword: Bio-security

Search Result 149, Processing Time 0.022 seconds

Reversible DNA Information Hiding based on Circular Histogram Shifting (순환형 히스토그램 쉬프팅 기반 가역성 DNA 정보은닉 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.67-75
    • /
    • 2016
  • DNA computing technology makes the interests on DNA storage and DNA watermarking / steganography that use the DNA information as a newly medium. DNA watermarking that embeds the external watermark into DNA information without the biological mutation needs the reversibility for the perfect recovery of host DNA, the continuous embedding and detecting processing, and the mutation analysis by the watermark. In this paper, we propose a reversible DNA watermarking based on circular histogram shifting of DNA code values with the prevention of false start codon, the preservation of DNA sequence length, and the high watermark capacity, and the blind detection. Our method has the following features. The first is to encode nucleotide bases of 4-character variable to integer code values by code order. It makes the signal processing of DNA sequence easy. The second is to embed the multiple bits of watermark into -order coded value by using circular histogram shifting. The third is to check the possibility of false start codon in the inter or intra code values. Experimental results verified the our method has higher watermark capacity 0.11~0.50 bpn than conventional methods and also the false start codon has not happened in our method.

Current status on global sweetpotato cultivation and its prior tasks of mass production (세계 고구마 재배현황 및 대량생산의 선결과제)

  • Kim, Ho Soo;Lee, Chan-Ju;Kim, So-Eun;Ji, Chang Yoon;Kim, Sung-Tai;Kim, Jin-Seog;Kim, Sangyong;Kwak, Sang-Soo
    • Journal of Plant Biotechnology
    • /
    • v.45 no.3
    • /
    • pp.190-195
    • /
    • 2018
  • Sweetpotato [Ipomoea batatas (L.) Lam] represents an attractive starch crop that can be used to facilitate solving global food and environmental problems in the $21^{st}$ century. It can be used as industrial bioreactors to produce various high value-added materials, including bio-ethanol, functional feed, antioxidants, as well as food resources. The non-profit Center for Science in the Public Interest (CSPI) announced sweetpotato as one of the ten 'super foods' for better health, since it contains high levels of low molecular weight antioxidants such as vitamin-C, vitamin-E and carotenoids, as well as dietary fiber and potassium. The United States Department of Agriculture (USDA) also reported that sweetpotato is the best bioenergy crop among starch crops on marginal lands, that does not affect food security. The Food and Agriculture Organization (FAO) estimated that world population in 2050 will be 9.7 billion, and require approximately 1.7 times more food than today. In this respect, sweetpotato will be a solution to solving problems such as food, energy, health, and environment facing the globe in the $21^{st}$ century. In this paper, the current status of resources, and cultivation of sweetpotato in the world was first described. Development of a new northern route of the sweetpotato and its prior tasks of large scale cultivation of sweetpotato, were also described in terms of global food security, and production of high-value added biomaterials.

Current Statues of Phenomics and its Application for Crop Improvement: Imaging Systems for High-throughput Screening (작물육종 효율 극대화를 위한 피노믹스(phenomics) 연구동향: 화상기술을 이용한 식물 표현형 분석을 중심으로)

  • Lee, Seong-Kon;Kwon, Tack-Ryoun;Suh, Eun-Jung;Bae, Shin-Chul
    • Korean Journal of Breeding Science
    • /
    • v.43 no.4
    • /
    • pp.233-240
    • /
    • 2011
  • Food security has been a main global issue due to climate changes and growing world population expected to 9 billion by 2050. While biodiversity is becoming more highlight, breeders are confronting shortage of various genetic materials needed for new variety to tackle food shortage challenge. Though biotechnology is still under debate on potential risk to human and environment, it is considered as one of alternative tools to address food supply issue for its potential to create a number of variations in genetic resource. The new technology, phenomics, is developing to improve efficiency of crop improvement. Phenomics is concerned with the measurement of phenomes which are the physical, morphological, physiological and/or biochemical traits of organisms as they change in response to genetic mutation and environmental influences. It can be served to provide better understanding of phenotypes at whole plant. For last decades, high-throughput screening (HTS) systems have been developed to measure phenomes, rapidly and quantitatively. Imaging technology such as thermal and chlorophyll fluorescence imaging systems is an area of HTS which has been used in agriculture. In this article, we review the current statues of high-throughput screening system in phenomics and its application for crop improvement.

Analysis of Research for the Actual State and Management of Automated Horticultural Facilities (경북지역 현대화 원예시설의 관리실태 조사분석)

  • 정현교;이기명;박규식
    • Journal of Bio-Environment Control
    • /
    • v.5 no.2
    • /
    • pp.174-186
    • /
    • 1996
  • This study was carried out in order to understand the plan, design, constructing and actual condition of management of modernized horticultural facilities in Kyungpook Province which had been constructed from 1992 to 1995 funded by Government support. The aim of this study is to provide reference data for success of the forth project. It was performed by making up a question about driving of project and management condition of equipment after constructing. The results obtained from this study are as follows: 1. 73.5% of facilities horticulture farmhouse recognized that the prospect of greenhouse is bright, but 92.5% of the farmhouse also recognised that they need technical consultation on protected horticulture farming. Therefore, technical educations would must be enhanced about foundation of greenhouse and cultivation technique. 2. The holding times of explanatory meetings, cause of understanding to farmhouse, were one or two times in greenhouse construction, and 62.5% of the farmhouse expressed the insufficiency at the explanation and educational data. For this reason, it was judged that the construction contract had been delayed more than 5 months in 49.3% of the farmhouse after the decision of project budget. 3. In constructing after a contract, the rates of construction delay is 53.4% and defect occurrence is 41.1%. The biggest reasons of construction delay was insufficiency of worker and materials supply. Each percentage is 29.1%. And the reason of defect occurrence is badness of machinery equipment(62.9% ). 4. In management of greenhouse, a pipe-constructed plastic film greenhouse changes plastic film every one and three years because of sticking dust on plastic film. It was needed to about in cleaning technique of coverings. Because that used 3-5 years only half of the expected life span. 5. The order of broken rating in the subsidiary equipment is like this lollop ventilator (42.8%), a general control system(33.3%) especially, in the case of a general control system, the rate of all family can control is 52.7%. so, it is time to develop easy control equipment which every one could use as soon as possible. 6. When choose heat generator as decide capacity, the most priority is the mount of heat generator the percent is 45.5% heat generator and as decide model, the private purchase's percent is 77.3%. It is higher than a public bidding heat generator the percent is 22.7% heat generator when it compare with a public bidding. In the case of $CO_2$ generator, using rate is only 19.0%. The using rate is very low, so it needs education how to use depends on the way of the subsidiary equipment. 7. In the case of seedlings, it is asked to use factory-processed seedling effectively. because it's difficult to get security of labors(58.8%), hoped crops (55.9%) access same crops(29.4%) much more and changing of crops depends on market situation. that is the main reason the lack of knowhow.

  • PDF

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication (실용적 뇌파 기반 사용자 인증을 위한 단일 채널 EEG 측정 장비를 통해 수집된 EEG 샘플의 점진적 제거 방법)

  • Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.383-395
    • /
    • 2017
  • Brainwave-based user authentication technology has advantages such as changeability, shoulder-surfing resistance, and etc. comparing with conventional biometric authentications, fingerprint recognition for instance which are widely used for smart phone and finance user authentication. Despite these advantages, brainwave-based authentication technology has not been used in practice because of the price for EEG (electroencephalography) collecting devices and inconvenience to use those devices. However, according to the development of simple and convenient EEG collecting devices which are portable and communicative by the recent advances in hardware technology, relevant researches have been actively performed. However, according to the experiment based on EEG samples collected by using a single-channel EEG measurement device which is the most simplified one, the authentication accuracy decreases as the number of channels to measure and collect EEG decreases. Therefore, in this paper, we analyze technical problems that need to be solved for practical use of brainwave-based use authentication and propose an incremental elimination method of collected EEG samples for each user to consist a set of EEG samples which are effective to authentication users.

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.

Gene flow from herbicide resistant genetically modified rice to conventional rice (Oryza sativa L.) cultivars

  • Han, Sung Min;Lee, Bumkyu;Won, Ok Jae;Hwang, Ki Seon;Suh, Su Jeoung;Kim, Chang-Gi;Park, Kee Woong
    • Journal of Ecology and Environment
    • /
    • v.38 no.4
    • /
    • pp.397-403
    • /
    • 2015
  • Rice (Oryza sativa L.) is an important feeding crop in Asia, and utilization of genetically modified (GM) rice is highly demanding. For co-existence of GM rice and non-GM rice, the proper confinement measures should be provided. Thus, we surveyed gene flow from herbicide resistant GM rice to the conventional rice cultivars in the field tests. Gene flow frequency decreased with increasing distance between the pollen donor and recipients and did not exceed more than 1% even at the nearest distance. In single recipient model plot, a maximum gene flow frequency was observed at the shortest distance and hybrid was detected up to 12 m from the pollen donor. The direction of gene was coincided with the dominant wind direction. Gene flow assessment to multiple recipient plots was conducted under the high raining season by chance, and abrupt decline of gene flow frequency and maximum distance were resulted. According to the survey results, current regulation for isolation distance is reasonable for environmental safety or for general crop production. However, we suggest an alternative measure for GM rice cultivation that should be supplemented to overcome the out of estimation and in the environment asking higher security levels.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.