• 제목/요약/키워드: Detection agent

Search Result 461, Processing Time 0.027 seconds

Loop-mediated Isothermal Amplification assay for Detection of Candidatus Liberibacter Asiaticus, a Causal Agent of Citrus Huanglongbing

  • Choi, Cheol Woo;Hyun, Jae Wook;Hwang, Rok Yeon;Powell, Charles A
    • The Plant Pathology Journal
    • /
    • v.34 no.6
    • /
    • pp.499-505
    • /
    • 2018
  • Huanglongbing (HLB, Citrus greening disease) is one of the most devastating diseases that threaten citrus production worldwide. Although HLB presents systemically, low titer and uneven distribution of these bacteria within infected plants can make reliable detection difficult. It was known loop-mediated isothermal amplification (LAMP) method has the advantages of being highly specific, rapid, efficient, and laborsaving for detection of plant pathogens. We developed a new LAMP method targeting gene contained tandem repeat for more rapid and sensitive detection of Candidatus Liberibacter asiaticus (CLas), putative causal agent of the citrus huanglongbing. This new LAMP method was 10 folds more sensitive than conventional PCR in detecting the HLB pathogen and similar to that of real-time PCR in visual detection assay by adding SYBR Green I to mixture and 1% agarose gel electrophoresis. Positive reactions were achieved in reaction temperature 57, 60 and $62^{\circ}C$ but not $65^{\circ}C$. Although this LAMP method was not more sensitive than real-time PCR, it does not require a thermocycler for amplification or agarose gel electrophoresis for resolution. Thus, we expect that this LAMP method shows strong promise as a reliable, rapid, and cost-effective method of detecting the CLas in citrus and can be applied for rapid diagnosis is needed.

Distributed Intrusion Detection System of Multi-Web Cluster Group for Safe E-Business Model (안전한 E-Business 모델을 위한 다중 웹 클러스터 그룹의 분산 침입 탐지 시스템)

  • Lee, Kee-Jun;Jung, Chai-Yeoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1049-1052
    • /
    • 2001
  • 고가용 E-Business모델을 위해 구축된 나중 웹 클러스터 모델은 구조적 특성상 내부 시스템 노드들이 노출되어 있으며, 불법적인 3자에 의한 고의적인 방해와 공격으로 정상적인 작업수행이 불가능할 가능성을 지고 있다. 따라서 구성된 시스템 노드들을 보호하고 불법적인 사용자로부터의 정보유출과 부당한 서비스 요구를 효과적으로 대응할 수 있는 보안 시스템이 필요하나 제안한 분산 침입 탐지 시스템은 불법적인 침입을 탐지하기 위하여 일차적으로 Detection Agent를 이용한 작업요구 패킷의 검사를 수행하려, 이후 작업이 진행되었을 때 Monitoring Agent를 동하여 작업과정을 관찰하며 허용되지 않는 자원의 접근 및 요구가 발생하였을 때, 다른 시스템 노트와의 긴밀한 협조작업을 동해 침입여부를 판단한다.

  • PDF

A Study on the Broadcasting Statistics using the Wireless Internet Phones (무선 인터넷폰을 이용한 방송통계 시스템)

  • 김형교;강민구;박구만;송관호
    • Journal of Broadcast Engineering
    • /
    • v.7 no.1
    • /
    • pp.66-75
    • /
    • 2002
  • In this paper, a new wireless internet service for TV is proposed using the detection of a mobile agent of each mobile company Especially. new broadcasting programs like as music charts. quiz games can be serried by a mobile internet phone. In this proposed system, all mobile protocols( WAP, ME. W3C) are supported by one server based on the mobile agent detection of URL over the existed wire and wireless internees.

Design and realization of Network 105 with Management Agent(M/A) through SSL/TLS Protocol (SSL/TLS를 이용한 Management Agent(M/A) 구조상의 Network IDS설계 및 구현)

  • 정숙희;김행욱;강진석;강흥식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.541-543
    • /
    • 2002
  • 정보기술의 발전은 디지털 혁명의 근간이 되고 있는 반면, 정보유출ㆍ파괴ㆍ변조 등의 역기능 또한 내포하기 때문에 이러한 정보화의 역기능에 대한 신속한 탐지 및 능동적인 대응이 절실히 요구되고 있는 실정이다. 그러나 기존의 시스템은 침입에 대한 차단을 중심으로 운영되어 왔고, 침입탐지 시스템이라 할지라도 불법 침입에 대한 대응이 단지 경고나 보고 수준에 머물고 있어 능동적인 대응이 없다는 단점이 있다. 따라서 본 논문에서는 리눅스 시스템에서 실시간 침입탐지 시스템인 NIDS를 설계 구현하고, 동일 네트워크 망에서의 여러 호스트들을 통합적으로 관리하기 위하여 M/A 시스템을 설계ㆍ구현하였다. 여기서 NIDS와 M/A 시스템간의 통신은 SSL/TLS 프로토콜을 기반으로 이루어진다. NIDS에서는 Detection Module과 Response Module을 분리하여 구현하였고, 커널 레벨에서 PCAP 라이브러리를 통해 캡쳐된 패킷이 Detection Module에 의해 침입이라 판단되면 Response Module에서 일정 수준의 대응이 가능하도록 구현하였다.

  • PDF

Compact, Wavelength-selectable, Energy-ratio Variable Nd:YAG Laser at Mid-ultraviolet for Chemical Warfare Agent Detection

  • Kim, Jae-Ihn;Cho, Ki Ho;Lee, Jae-Hwan;Ha, Yeon-Chul
    • Current Optics and Photonics
    • /
    • v.3 no.3
    • /
    • pp.243-247
    • /
    • 2019
  • We have developed a compact, wavelength-selectable, Q-switched Nd:YAG laser at mid ultraviolet for chemical warfare agent detection. The fundamental wave at 1064 nm is delivered by a pulsed solid state laser incorporating with a square-type Nd:YAG rod in a resonator closed by two crossed Porro prisms for environmental reliability. The output energy at 213 nm ($5{\omega}$) and 266 nm ($4{\omega}$) by ${\chi}^{(2)}$ process in the sequentially disposed BBO crystals are measured to be 6.8 mJ and 15.1 mJ, respectively. The output wavelength is selected for $5{\omega}$ and $4{\omega}$ by a motorized wavelength switch. The energy ratio of the $5{\omega}$ to the $4{\omega}$ is varied from 0.05 to 0.85 by controlling the phase matching temperature of the nonlinear crystal for sum-frequency generation without change of the output pulse parameters.

Experimental investigation of thermal/mechanical characteristics to the maximal efficiency for self-healing technique (치료효율 극대화를 위한 자가치료제의 열적/기계적 특성 연구)

  • 허광수;오진오;윤성호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.626-629
    • /
    • 2004
  • Recently, the self-healing technique is being investigated to repair the damaged polymeric composites by the use of microcapsules with the healing agent. This technique can obtains both the damage detection and the damage repair simultaneously over the converntional repairing techniques. In this study, the effects of the catalyst ratio to the healing agent and thermal characteristics to the mixtures of healing agent are investigated through single lap shear tests and DSC. The Healing agents such as DCPD, ENB, and their mixtures are considered and Grubb's catalyst is used as a catalst.

  • PDF

Design of Intrusion Detection System applying for data mining agent (데이터 마이닝 에이전트를 적용한 침입 탐지 시스템 설계)

  • 정종근;구제영;김용호;오근탁;이윤배
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.619-622
    • /
    • 2002
  • IDS has been studied mainly in the field of the detection derision and collecting of audit data. The detection decision should decide whether successive behaviors are intrusions or not , the collecting of audit data needs ability that collects precisely data for intrusion decision. Artificial methods such as rule based system and neural network are recently introduced in order to solve this problem. However, these methods have simple host structures and defects that can't detect transformed intrusion patterns. So, we propose the method using data mining agent that can retrieve and estimate the patterns and retrieval of user's behavior in the distributed different hosts.

  • PDF

Multimodal layer surveillance map based on anomaly detection using multi-agents for smart city security

  • Shin, Hochul;Na, Ki-In;Chang, Jiho;Uhm, Taeyoung
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.183-193
    • /
    • 2022
  • Smart cities are expected to provide residents with convenience via various agents such as CCTV, delivery robots, security robots, and unmanned shuttles. Environmental data collected by various agents can be used for various purposes, including advertising and security monitoring. This study suggests a surveillance map data framework for efficient and integrated multimodal data representation from multi-agents. The suggested surveillance map is a multilayered global information grid, which is integrated from the multimodal data of each agent. To confirm this, we collected surveillance map data for 4 months, and the behavior patterns of humans and vehicles, distribution changes of elevation, and temperature were analyzed. Moreover, we represent an anomaly detection algorithm based on a surveillance map for security service. A two-stage anomaly detection algorithm for unusual situations was developed. With this, abnormal situations such as unusual crowds and pedestrians, vehicle movement, unusual objects, and temperature change were detected. Because the surveillance map enables efficient and integrated processing of large multimodal data from a multi-agent, the suggested data framework can be used for various applications in the smart city.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.