• Title/Summary/Keyword: Card Identification

Search Result 117, Processing Time 0.029 seconds

Classification Activity Thoughts of Elementary Sixth Grade Pupils about Artificial and Natural Stimulus (초등학교 6학년의 인공자극과 자연자극에 대한 분류 사고)

  • Choi, Hyun-Dong;Yang, Il-Ho;Kwon, Chi-Soon
    • Journal of The Korean Association For Science Education
    • /
    • v.26 no.1
    • /
    • pp.40-48
    • /
    • 2006
  • The purpose of this study was to investigate 6th grade pupil's thoughts during classification activities. Two suitable tools in classification activity achievement were developed to achieve this purpose. The first was an artificial stimulus card in which the attribute was prominent; and the other a natural stimulus card in which the attribute was less prominent. Participants of the study were 8 6th grade pupils from D elementary school in Yeongdeungpo-gu, Seoul. Data were collected from interviews with the pupils, the pupil's recordings of classification, the investigator's observation of pupil's actions, and video recordings of the pupil's subject classification process. Results found in this study were as following. First, when doing classification 6th grade pupils considered attribute observation, attribute estimation, preliminary inspection, criteria selection, and sample identification. Second, 6th grade pupil classification thought process was found to be repetitive, passing through the steps of attribute observation, attribute estimation, preliminary inspection, criteria selection, and lastly, sample identification. Third, 6th grade pupils took advantage of cognitive economic efficiency. Study findings also revealed guidance for the teaching and learning of scientific classification. First, once teachers understand the classification thought process of students, more effective classification guidance will be possible. Second, it is necessary that guidance fit each step of the classification thought process.

Molecular identification of coagulase-negative staphylococci by rpoB sequence typing (rpoB 염기서열 분석을 이용한 응고효소 음성 포도알세균 분자 동정)

  • Seong, Won-Jin;Kim, Danil;Kim, Eun-Kyung;Ko, Dae-Sung;Ro, Younghye;Kim, Jae-Hong;Kwon, Hyuk-Joon
    • Korean Journal of Veterinary Research
    • /
    • v.58 no.1
    • /
    • pp.51-55
    • /
    • 2018
  • Bovine mastitis (BM) has resulted in enormous economic loss in the dairy industry and coagulase-negative staphylococci (CNS) have caused subclinical BM. Although VITEK 2 GP ID card (VITEK 2) has been used for CNS identification, the probability of identification varies. The rpoB sequence typing (RSTing) method has been used for molecular diagnosis and epidemiology of bacterial infections. In this study, we undertook RSTing of CNS and compared the results with those of VITEK2 and 16S rRNA gene sequencing. As compared VITEK2, the molecular-based methods were more reliable for species identification; moreover, RSTing provided more molecular epidemiological information than that from 16S rRNA gene sequencing.

Serological grouping of $\beta$-hemolytic streptococci by a coagglutination technique (Coagglutination에 의한 $\beta$-용혈성 연쇄구균의 혈청군 동정)

  • Chong, Yun-Sop;Yoon, Yang-Sook;Kim, Yoon-Chung;Lee, Sam-Uel Y.;Kim, Sung-Kwang;Lee, Byung-Soo;Kim, Joo-Deuk
    • The Journal of the Korean Society for Microbiology
    • /
    • v.14 no.1
    • /
    • pp.11-15
    • /
    • 1979
  • Identification of group A $\beta$-phemolytic streptococci is very important to provide an appropriate preventive measure of possible rheumatic fever and acute glomerulonephritis. For such purpose bacitracin susceptibility of streptococci because of its simplity has been most widely used despite of its occasional faulty results. Recently, a coagglutination technique was advocated using streptococcal group specific antibodies adsorbed to protein A-containing staphylococci. This study was conducted to evaluate the coagglutination technique using reagents prepared by ourselves. The specificity, reproducibility and stability were ascertained and the following results were obtained. 1. The identification by coagglutination technique using our own reagent gave the same results compared with the Lancefield precipitation technique. The result also agreed with the Phadebact grouping. 2. There were no variation in group A and B identification due to lot difference. However, there were a few discrepant results in group C and G identification which was conducted in different days with different lots of our reagent. 3. The stability of our reagents was less satisfactory compared to the commercial product. An effort to improve the stability was considered necessary. 4. For coagglutination, it was found convenient to use supernatant of Todd-Hewitt broth incubated for 24 hours. Both parafin-ringed slide glass and RPR card gave comparable results and the former could be used when the latter is not available.

  • PDF

A Study of Mobile Patient Identification System Using EM4095 (EM4095를 이용한 모바일 의료환자인식 시스템 연구)

  • Jo, Heung-Kuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2337-2342
    • /
    • 2010
  • There is a vast field of application for RFID(Radio Frequency IDentification) technology. In the case of hospitals, RFID can be used for organizing patient data. Generally, patient data has been handled with medical cards. In order to look up data about a patient, the medical card would have to be found first, within a lot of other medical cards, by hand or with a computer. This is a very inconvenient system. Also, if the card is searched by the name of the patient, fatal medical accidents may occur in cases of mix-ups. If remote RFID Tag monitoring systems are applied in this case, the patient data would be accessible in the hospital. This article will discuss the grafting of RFID systems and wireless data communicating technology. The EM4095 chip, which uses 125KHz carrier waves was used in this study. And a Bluetooth module was added for wireless data communication. The ATMEGA128 microcomputer was used to control the RFID system and wireless module. A LCD monitor was connected to the extension port for nurses to view patient data, and also, the same information was displayed on PC monitors for doctors to see. The circuit was designed to consume minimal amounts of electricity for portability, and to transmit Tag ID's in environments with a lot of noise. The article is concluded with a diagram of the whole system, and performance of each data transmitting section has been analyzed.

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF

Design of SPMR using URN based UCI with RFID (RFID와 UCI 기반의 URN을 활용한 SPMR 설계)

  • Jang, Doc-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.291-297
    • /
    • 2007
  • Linking patient's medical records throughout country is required to get patient's accurate information which is helpful for doctor to diagnosis patient's symptoms more exactly. With shortening of time and preventing of retest, patient can be survived or alleviate suffering. Purpose of this paper is to design combined identification system linking patient's RFID card with medical digitalized Chart to share patient's information between the hospitals. With research and review of pre-studied related identification system, standardization, and UCI-RFID linkage study, SPMR(sharing patient's medical record) has been designed for doctors to make a medical treatment properly at the right time and alleviate patient's pain. SPMR(sharing patient's medical record) which will take information needed and pay for information usage to related hospitals has been designed for doctors to make a medical treatment properly at the right time and alleviate patient's pain.

  • PDF

Improved Application Test Data Range Selection Method in a Non-Personal Information Identification Environment (개인정보 비식별 환경에서의 개선된 응용프로그램 테스트 데이터 범위 선정 방법)

  • Baek, Song-yi;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.823-834
    • /
    • 2020
  • In the past, when the personal information leakage incident of the three card companies, the computer program development was followed by the same strict electronic financial supervision regulations as the operating environment. However, when developing a computerized program, the application data is being verified with the integrity of the test data being compromised because the identification of the scope of conversion of the test data associated with the application is unclear. Therefore, in this paper, we proved by presenting a process and algorithm for selecting a range of sufficient test data conversion targets associated with a specific application.

Image Support and Wood Identification of Wood Crafts (IV) - Focusing on Stationery articles - (목공예품의 이미지 제공 및 수종분석 (IV) - 문구류를 중심으로 -)

  • Kim, Sa-Ick
    • Journal of the Korea Furniture Society
    • /
    • v.28 no.3
    • /
    • pp.233-247
    • /
    • 2017
  • Woodcraft activities have an inseparable relationship with our daily life, and it is a field that needs to be continued because of the value of education for the growing students. The interest in woodworking from childhood to old age is rapidly expanding nowadays, therefore this study has been done to provide images to those who are engaged in woodcraft business and also those who are interested in this field. If we look at the use of wood in our daily life, We can classify it into Architecture, Civil engineering, Furniture, Musical Instrument, Packaging, Recreational instrument, Exercise instrument, Stationery, Daily commodity, and Industrial use. Among them, We examined kinds of stationery and which type of woods were used. As a result of classifying 101 stationery products in 22 countries, stationery materials using wood can be used for Business cards, Envelope houses, Box houses, Pen holders, Locker plates, Stationery baskets, Book holders, Stamps, Paper knives, Bookmarks, and Photo frames. It was found various wooden stationery are made in USA, Japan, UK, Canada etc. And the most frequently used species are hardwoods such as Walnut (Juglans regia), Maple (Acer spp.), Cherry (Prunus serotina), Birch (Betula spp.), Mahogany (Swietenia macrophylla), Tulip (Liriodendron tulipifera Linnaeus), Bubinga (Guibourtia tessmannii J. Leonard), Wenge (Milletia laurentii De. wild), Cocobolo (Dallbergia cultrata Grah), Zebrawood (Microberlinia brazzavillensis A. Chev.) and Ebony (Diospyros spp.).

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Change of Recognition Range According to Modulation Index of the 13.56MHz RFID Type B System (13.56MHz RFID Type B 시스템에서 변조지수에 따른 인식거리의 변화)

  • Kim, Yong-Hee;Yang, Woon-Geun;Yoo, Hong-Jun
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.119-122
    • /
    • 2005
  • In this paper, we investigated the recognition range according to modulation index for the ISO(International Standards Organization) 14443 13.56MHz contactless Type B RFID(Radio Frequency IDentification) system. We measured recognition range with changing modulation index step by step from 5% to 24% where we used 4 samples of Type B transponder with different resonance frequencies between 13.838MHz and 17.200MHz. While gradually increasing a distance in vertical direction from the center of the reader antenna, we measured the distance where the transponder's PUPI(Pseudo Unique PICC(Proximity IC Card) Identifier) is recognized continuously during 10 seconds and the distance where the transponder's PUPI is recognized at least two times during 5 seconds. From the measurement results, we found that the best recognition ranges were achieved when the reader had modulation index between 11% and 14%.

  • PDF