• Title/Summary/Keyword: Card Identification

Search Result 117, Processing Time 0.025 seconds

Identification of Novel Psychrotolerant Bacterial Strain and Production of $\beta-Galactosidase$ (새로운 저온 내성세균의 동정과 $\beta-Galactosidase$ 생산)

  • Park, Jeong-Woon;Yoo, Jae-Soo;Roh, Dong-Hyun
    • Korean Journal of Microbiology
    • /
    • v.42 no.1
    • /
    • pp.40-46
    • /
    • 2006
  • Galactose joined to glucose by a $\beta(1\rightarrow4)$ glycosidic bond makes lactose and this disaccharide is rich in milk. It is known that lacotse is hydrolyzed to each monomeric sugar by either lactase in human or $\beta-galactosidase$ in bacteria. Ingestion of milk by lactase-deficient persons causes a temporary diarrhea and subsequent chronic diarrhea results in colitis with chronic inflammation. We isolated a $\beta-galactosidase$ producing psycrotolerant strain AS-20 from near cattle shed and investigated the growth at various temperature conditions. Whereas Escherichia coli strains did not grow at $10^{\circ}C$, the AS-20 strain could grow well at this low temperature and showed optimal growth at $30^{\circ}C$. The isolated strain was identified as 97% Hafnia alvei by biochemical properties. This strain could ferment glucose, lacotse, maltose, mannitol, xylose, ONPG, rhamanose and L-arabinose, and decarboxylate lysin and ornithine. To confirm the identity of isolated strain we amplified 16S rDNA by PCR and searched similarity of the 1426 bp DNA sequcence with Genbank database. The strain AS-20 showed 99% similarity with Hafnia alvei. The activity of $\beta-galactosidase$ was 1.5 times higher when the cell was grown at 10 or $20^{\circ}C$ than at $30^{\circ}C$. The highest enzyme activity of AS-20 was also much higher than that of E. coli, which was grown at $30^{\circ}C$.

Isolation Frequency of Candida species from Clinical Specimens (임상검체에서 Candida spp.에 대한 분리빈도)

  • Shin, Hyun-Sung;Park, Youn-Bo;Shin, Du-Sik
    • The Korean Journal of Mycology
    • /
    • v.38 no.2
    • /
    • pp.146-151
    • /
    • 2010
  • A total of 167,955 microorganisms were isolated from 366,661 clinical specimens. Among them, 6,517 strains of the Candida spp. were isolated from the department of laboratory medicine in "C" hospital from Jan. 1, 2005 to Dec. 31, 2009. All clinical specimens were reviewed by the medical records of patients with Candida by the method of retrospectiveness. From this, we got the some isolated pure cultured yeasts. We identified these yeast by the identification kit system of VITEKII and VITEKII-ID-YST card. The isolation frequencies of Candida spp. were as follows. 56.4%,of C. albicans, 17.7% C tropicalis, 10.7% C glabrata and 9.5% C parapsilosis. The isolated frequency of Candida spp. in 2009 was 1.9 times higher than that in 2005. The clinical materials showing over 10.0% isolation rate were in sputum (30.1%), random urine (25.0%), 15.8% blood (15.8%) and catheterized urine (13.5%) in Candida spp.. The clinical department of showing over 7.0% isolation rate were in pulmonary medicine (20.5%), renal medicine (11.0%), infection disease medicine (10.4%), critical care medicine (10.0%), hematooncology (9.6%), general surgery (7.5%) and gastrointestinal medicine (7.4%) in Candida spp.. In monthly analysis, Candida spp. were most friquency isolated in July (10.6%), but lowest one in February (6.1%). Candida spp. were most frequently isolated in patient of over 50 years old (16.7-40.1%) than those isolated from the patients under the age of 0-49 (1.3-7.5%).

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

Military Entrance Control System Using Military Insignia UHF RFID Tags (군 계급장 UHF RFID 태그를 이용한 군 보안출입관리 시스템)

  • Nam, Seahyeon;Chung, You Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.966-971
    • /
    • 2013
  • This paper introduces development of a Military Entrance Control System using the developed military insignia UHF RFID tags. Generally, in the military entrance control system, the security identification (ID) card with HF RFID tag can be used, to increase the security level, the developed insignia UHF RFID tags are used in the enforced military entrance control system. The general metal insignias, have been worn on a hat or on the shoulder pads of a military uniforms, are simulated and developed as UHF RFID insignia tags. The military entrance control system can manage the name, rank, address (information of military personnel), time and date of entrance and the history of entrance of the security area.

Design of Biometrics System Using ECG Lead III Signals (심전도 신호의 리드 III 파형을 이용한 바이오인식)

  • Min, Chul-Hong;Kim, Tae-Seon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.6
    • /
    • pp.43-50
    • /
    • 2011
  • Currently, conventional security methods including IC card or password type method are quickly switched into biometric security systems in various applications and the electrocardiogram (ECG) has been considered as one of novel biometrics way. However, conventional ECG based biometrics used lead II signal which conventionally used for formulaic signal to heart disease diagnosis and it is not suitable for biometrics since it is rather difficult to find consistent features for heart disease patents. To overcome this problem, we developed new biometrics system using ECG lead III signals. For wave extraction, signal peak points are extracted through AAV algorithm. For feature selection, extracted waves are categorized into one of four wave types and total twenty two features including number of vertices, wave shapes, amplitude information and interval information are extracted based on their wave types. Experimental results for thirty-six people showed 100% specificity, 95.59% sensitivity and 99.17% of overall identification accuracy.

The Mutual Authentication and Operation Methodology for an Enhanced Security and Operation of the IDL (국제통용운전면허증의 보안성과 운용성 강화를 위한 상호인증 및 운용 기법에 관한연구)

  • Jeon, Sang-Hoon;Jun, Moon-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.188-202
    • /
    • 2009
  • In the modern world, where the number of people moving from country to country is sharply increasing, domestic and international driver's licenses are easily fabricated or forged, and distinguishing if a driver's license is legitimate or not is often a difficult task. Furthermore, this would require different countries to mutually share and administer the driving records of individuals, making it a much more complex task (Added to it is the complicated matter of countries having to mutually share and administer the driving records of individuals.) However, the authenticity and security of a driver's license has become the first priority since driver's licenses are also used as identification cards in most countries, thus requiring measures to prevent inappropriate uses arising from theft and embezzlement. In this paper, we propose the mutual authentication mechanism which, can provide enhanced security and efficient operation that is administration of personal information contained within ISO Compliant Driving licence(IDL).

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

Identification of rare coding variants associated with Kawasaki disease by whole exome sequencing

  • Kim, Jae-Jung;Hong, Young Mi;Yun, Sin Weon;Lee, Kyung-Yil;Yoon, Kyung Lim;Han, Myung-Ki;Kim, Gi Beom;Kil, Hong-Ryang;Song, Min Seob;Lee, Hyoung Doo;Ha, Kee Soo;Jun, Hyun Ok;Choi, Byung-Ok;Oh, Yeon-Mok;Yu, Jeong Jin;Jang, Gi Young;Lee, Jong-Keuk;The Korean Kawasaki Disease Genetics Consortium,
    • Genomics & Informatics
    • /
    • v.19 no.4
    • /
    • pp.38.1-38.7
    • /
    • 2021
  • Kawasaki disease (KD) is an acute pediatric vasculitis that affects genetically susceptible infants and children. To identify coding variants that influence susceptibility to KD, we conducted whole exome sequencing of 159 patients with KD and 902 controls, and performed a replication study in an independent 586 cases and 732 controls. We identified five rare coding variants in five genes (FCRLA, PTGER4, IL17F, CARD11, and SIGLEC10) associated with KD (odds ratio [OR], 1.18 to 4.41; p = 0.0027-0.031). We also performed association analysis in 26 KD patients with coronary artery aneurysms (CAAs; diameter > 5 mm) and 124 patients without CAAs (diameter < 3 mm), and identified another five rare coding variants in five genes (FGFR4, IL31RA, FNDC1, MMP8, and FOXN1), which may be associated with CAA (OR, 3.89 to 37.3; p = 0.0058- 0.0261). These results provide insights into new candidate genes and genetic variants potentially involved in the development of KD and CAA.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.