• Title/Summary/Keyword: De-Identification

Search Result 371, Processing Time 0.036 seconds

Parental Selection Strategies in Plant Breeding Programs

  • Bertan, Ivandro;Carvalho, Fernando I. F. de;Oliveira, Antonio Costa de
    • Journal of Crop Science and Biotechnology
    • /
    • v.10 no.4
    • /
    • pp.211-222
    • /
    • 2007
  • Selection of the appropriate parents to be used in artificial crosses is one of the main decisions faced by plant breeders that will facilitate the exploitation of maximum genetic variability and production of superior recombinant genotypes. Several techniques have been used in aiding the identification of genotypes with promising and desirable agronomical traits for hybridization. In this way, the objective of the present review is to gather available information for the selection of parents based on different breeding designs and analytical tools showing their similarities and highlighting the main advantages and disadvantages of their use.

  • PDF

Proteomic Screening of Antigenic Proteins from the Hard Tick, Haemaphysalis longicornis (Acari: Ixodidae)

  • Kim, Young-Ha;Islam, Mohammad Saiful;You, Myung-Jo
    • Parasites, Hosts and Diseases
    • /
    • v.53 no.1
    • /
    • pp.85-93
    • /
    • 2015
  • Proteomic tools allow large-scale, high-throughput analyses for the detection, identification, and functional investigation of proteome. For detection of antigens from Haemaphysalis longicornis, 1-dimensional electrophoresis (1-DE) quantitative immunoblotting technique combined with 2-dimensional electrophoresis (2-DE) immunoblotting was used for whole body proteins from unfed and partially fed female ticks. Reactivity bands and 2-DE immunoblotting were performed following 2-DE electrophoresis to identify protein spots. The proteome of the partially fed female had a larger number of lower molecular weight proteins than that of the unfed female tick. The total number of detected spots was 818 for unfed and 670 for partially fed female ticks. The 2-DE immunoblotting identified 10 antigenic spots from unfed females and 8 antigenic spots from partially fed females. Matrix Assisted Laser Desorption Ionization-Time of Flight Mass Spectrometry (MALDI-TOF) of relevant spots identified calreticulin, putative secreted WC salivary protein, and a conserved hypothetical protein from the National Center for Biotechnology Information and Swiss Prot protein sequence databases. These findings indicate that most of the whole body components of these ticks are non-immunogenic. The data reported here will provide guidance in the identification of antigenic proteins to prevent infestation and diseases transmitted by H. longicornis.

Fintech Industry Invigoration by the De-identification and Linkage Reform of Personal Information (개인정보 비식별 조치와 결합 개선을 통한 핀테크 시장 활성화)

  • Oh, Won-Gyeom;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.340-343
    • /
    • 2016
  • The Korean government published the personal information de-identification guideline on June 2016, which were made by related government ministries. The guideline's objective is that the invigoration of Korean bigdata industry on personal information protection under the current laws. However, if there is some unreasonable method or process in the guideline, it can be an obstacle to bigdata analysis. This article will review the guideline to find defects in methods and processes of de-identification evaluation, de-identification support and data-linkage and then propose the best solutions to improve them. Lastly, this article will mention how these solutions can invigorate Fintech industry.

  • PDF

De-Identified Face Image Generation within Face Verification for Privacy Protection (프라이버시 보호를 위한 얼굴 인증이 가능한 비식별화 얼굴 이미지 생성 연구)

  • Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.201-210
    • /
    • 2023
  • Deep learning-based face verificattion model show high performance and are used in many fields, but there is a possibility the user's face image may be leaked in the process of inputting the face image to the model. Althoughde-identification technology exists as a method for minimizing the exposure of face features, there is a problemin that verification performance decreases when the existing technology is applied. In this paper, after combining the face features of other person, a de-identified face image is created through StyleGAN. In addition, we propose a method of optimizingthe combining ratio of features according to the face verification model using HopSkipJumpAttack. We visualize the images generated by the proposed method to check the de-identification performance, and evaluate the ability to maintain the performance of the face verification model through experiments. That is, face verification can be performed using the de-identified image generated through the proposed method, and leakage of face personal information can be prevented.

Extension of the Rotating Planar Waveguide Model to Formation of Interference Patterns in Optical Fibers

  • Pena-Garcia, Antonio;Perez-Ocon, Francisco;Jimenez, Jose Ramon
    • Journal of the Optical Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.128-131
    • /
    • 2011
  • After the successful extension of the rotating planar waveguide model to Wave Optics, where a clear identification between the angular velocity of one hypothetical waveguide and the phase differences between two points on the path of one bounded mode was found, an application of the model to explain the interference theory is presented. We demonstrate that, for two bounded modes to create an interference pattern, a constrain to the relative parameters among both is imposed by the fiber optics. This result, not reported in the literature up to date, provides a new horizon to understand the interaction light-light when propagated within optical fibers.

Structural damage identification of plates based on modal data using 2D discrete wavelet transform

  • Bagheri, A.;Ghodrati Amiri, G.;Khorasani, M.;Bakhshi, H.
    • Structural Engineering and Mechanics
    • /
    • v.40 no.1
    • /
    • pp.13-28
    • /
    • 2011
  • An effective method for detection linear flaws in plate structures via two-dimensional discrete wavelet transform is proposed in this study. The proposed method was applied to a four-fixed supported rectangular plate containing damage with arbitrary length, depth and location. Numerical results identifying the damage location are compared with the actual results to demonstrate the effectiveness of the proposed method. Also, a wavelet-based method presented for de-noising of mode shape of plate. Finally, the performance of the proposed method for de-noising and damage identification was verified using experimental data. Comparison between the location detected by the proposed method, and the plate's actual damage location revealed that the methodology can be used as an accessible and effective technique for damage identification of actual plate structures.

Classification of Plants into Families based on Leaf Texture

  • TREY, Zacrada Francoise;GOORE, Bi Tra;BAGUI, K. Olivier;TIEBRE, Marie Solange
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.205-211
    • /
    • 2021
  • Plants are important for humanity. They intervene in several areas of human life: medicine, nutrition, cosmetics, decoration, etc. The large number of varieties of these plants requires an efficient solution to identify them for proper use. The ease of recognition of these plants undoubtedly depends on the classification of these species into family; however, finding the relevant characteristics to achieve better automatic classification is still a huge challenge for researchers in the field. In this paper, we have developed a new automatic plant classification technique based on artificial neural networks. Our model uses leaf texture characteristics as parameters for plant family identification. The results of our model gave a perfect classification of three plant families of the Ivorian flora, with a determination coefficient (R2) of 0.99; an error rate (RMSE) of 1.348e-14, a sensitivity of 84.85%, a specificity of 100%, a precision of 100% and an accuracy (Accuracy) of 100%. The same technique was applied on Flavia: the international basis of plants and showed a perfect identification regression (R2) of 0.98, an error rate (RMSE) of 1.136e-14, a sensitivity of 84.85%, a specificity of 100%, a precision of 100% and a trueness (Accuracy) of 100%. These results show that our technique is efficient and can guide the botanist to establish a model for many plants to avoid identification problems.

Ambient Air Waste Sorting Facilities Could Be a Source of Antibiotic Resistant Bacteria

  • Calheiros, Ana;Santos, Joana;Ramos, Carla;Vasconcelos, Marta;Fernandes, Paulo
    • Microbiology and Biotechnology Letters
    • /
    • v.49 no.3
    • /
    • pp.367-373
    • /
    • 2021
  • The antimicrobial resistance of Staphylococcus spp. and Gram negative strains present in air samples from waste sorting facilities was assessed. Phenotypic studies have revealed a high percentage of strains of Staphylococcus spp. resistant to methicillin. Genotypically and by RT-PCR, it was found that the mecA gene usually associated with methicillin resistance was present in 8% of the Staphylococcus strains isolated. About 30% of the Gram negative strains from the same samples also displayed resistance to meropenem and 79% of these were resistant to multiple antibiotics from different classes, namely cephalosporins and β-lactams. The results suggest that in professional activities with high levels of exposure to biological agents, the quantification and identification of the microbial flora in the work environment, with the determination of the presence of potential agents displaying multi-resistances is of relevance to the risk assessment. The personal protection of workers is particularly important relevance in these cases, since many of the strains that exhibit multi-resistance are potential opportunistic agents.

A hybrid identification method on butterfly optimization and differential evolution algorithm

  • Zhou, Hongyuan;Zhang, Guangcai;Wang, Xiaojuan;Ni, Pinghe;Zhang, Jian
    • Smart Structures and Systems
    • /
    • v.26 no.3
    • /
    • pp.345-360
    • /
    • 2020
  • Modern swarm intelligence heuristic search methods are widely applied in the field of structural health monitoring due to their advantages of excellent global search capacity, loose requirement of initial guess and ease of computational implementation etc. To this end, a hybrid strategy is proposed based on butterfly optimization algorithm (BOA) and differential evolution (DE) with purpose of effective combination of their merits. In the proposed identification strategy, two improvements including mutation and crossover operations of DE, and dynamic adaptive operators are introduced into original BOA to reduce the risk to be trapped in local optimum and increase global search capability. The performance of the proposed algorithm, hybrid butterfly optimization and differential evolution algorithm (HBODEA) is evaluated by two numerical examples of a simply supported beam and a 37-bar truss structure, as well as an experimental test of 8-story shear-type steel frame structure in the laboratory. Compared with BOA and DE, the numerical and experimental results show that the proposed HBODEA is more robust to detect the reduction of stiffness with limited sensors and contaminated measurements. In addition, the effect of search space, two dynamic operators, population size on identification accuracy and efficiency of the proposed identification strategy are further investigated.

Trends in Data Privacy Protection Technologies with Enhanced Utilization (활용성 강화 데이터 프라이버시 보호 기술 동향)

  • Kim, J.Y.;Jho, N.S.;Chang, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.