• Title/Summary/Keyword: Device identification

Search Result 390, Processing Time 0.024 seconds

A Study on Concentration, Identification, and Reduction of Airborne Microorganisms in the Military Working Dog Clinic

  • Kim, Min-Ho;Baek, Ki-Ook;Park, Gyeong-Gook;Jang, Je-Youn;Lee, Jin-Hong
    • Safety and Health at Work
    • /
    • v.11 no.4
    • /
    • pp.517-525
    • /
    • 2020
  • Background: The study was planned to show the status of indoor microorganisms and the status of the reduction device in the military dog clinic. Methods: Airborne microbes were analyzed according to the number of daily patient canines. For identification of bacteria, sampled bacteria was identified using VITEK®2 and molecular method. The status of indoor microorganisms according to the operation of the ventilation system was analyzed. Results: Airborne bacteria and fungi concentrations were 1000.6 ± 800.7 CFU/m3 and 324.7 ± 245.8 CFU/m3. In the analysis using automated identification system, based on fluorescence biochemical test, VITEK®2, mainly human pathogenic bacteria were identified. The three most frequently isolated genera were Kocuria (26.6%), Staphylococcus (24.48%), and Granulicatella (12.7%). The results analyzed by molecular method were detected in the order of Kocuria (22.6%), followed by Macrococcus (18.1%), Glutamicibacter (11.1%), and so on. When the ventilation system was operated appropriately, the airborne bacteria and fungi level were significantly decreased. Conclusion: Airborne bacteria in the clinic tend to increase with the number of canines. Human pathogenic bacteria were mainly detected in VITEK®2, and relatively various bacteria were detected in molecular analysis. A decrease in the level of bacteria and fungi was observed with proper operation of the ventilation system.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Deep Learning-Based Algorithm for the Detection and Characterization of MRI Safety of Cardiac Implantable Electronic Devices on Chest Radiographs

  • Ue-Hwan Kim;Moon Young Kim;Eun-Ah Park;Whal Lee;Woo-Hyun Lim;Hack-Lyoung Kim;Sohee Oh;Kwang Nam Jin
    • Korean Journal of Radiology
    • /
    • v.22 no.11
    • /
    • pp.1918-1928
    • /
    • 2021
  • Objective: With the recent development of various MRI-conditional cardiac implantable electronic devices (CIEDs), the accurate identification and characterization of CIEDs have become critical when performing MRI in patients with CIEDs. We aimed to develop and evaluate a deep learning-based algorithm (DLA) that performs the detection and characterization of parameters, including MRI safety, of CIEDs on chest radiograph (CR) in a single step and compare its performance with other related algorithms that were recently developed. Materials and Methods: We developed a DLA (X-ray CIED identification [XCID]) using 9912 CRs of 958 patients with 968 CIEDs comprising 26 model groups from 4 manufacturers obtained between 2014 and 2019 from one hospital. The performance of XCID was tested with an external dataset consisting of 2122 CRs obtained from a different hospital and compared with the performance of two other related algorithms recently reported, including PacemakerID (PID) and Pacemaker identification with neural networks (PPMnn). Results: The overall accuracies of XCID for the manufacturer classification, model group identification, and MRI safety characterization using the internal test dataset were 99.7% (992/995), 97.2% (967/995), and 98.9% (984/995), respectively. These were 95.8% (2033/2122), 85.4% (1813/2122), and 92.2% (1956/2122), respectively, with the external test dataset. In the comparative study, the accuracy for the manufacturer classification was 95.0% (152/160) for XCID and 91.3% for PPMnn (146/160), which was significantly higher than that for PID (80.0%,128/160; p < 0.001 for both). XCID demonstrated a higher accuracy (88.1%; 141/160) than PPMnn (80.0%; 128/160) in identifying model groups (p < 0.001). Conclusion: The remarkable and consistent performance of XCID suggests its applicability for detection, manufacturer and model identification, as well as MRI safety characterization of CIED on CRs. Further studies are warranted to guarantee the safe use of XCID in clinical practice.

Wearable Sensing Device Design for Biological Monitoring (생체정보 모니터링을 위한 웨어러블 센싱 디바이스 디자인)

  • Lee, Jee Hyun;Lee, Eun Ji;Kim, Ji Eun;Kim, Yoolee;Cho, Sinwon
    • Journal of the Korean Society of Costume
    • /
    • v.65 no.1
    • /
    • pp.118-135
    • /
    • 2015
  • In recent years, smart clothing had been developed in order to better detect and monitor physical movement of the patient, so that such activities such as location identification and biometric recognition could be done. However, most of the sensing devices of smart clothing were limited to smart sensing sports clothing and the designs did not consider the physical characteristics and the behavior of the wearer. Therefore, this study aimed to create an open protection system by developing a wearable sensing device for health monitoring and location information. For this purpose, this study developed eleven types of wearable sensing design that could be commercially sold and worn by people who needed their biological information to be constantly monitored. The study conducted four tests in order to develop three types of sensing devices for various sensing wears. The purpose of this study was to expand the user rang of smart sensing wears, and provide a foundation for the development of distinctive wearable sensing devices reflecting the user. Furthermore, contribute to the design for the person subject to protection.

Effects of Simultaneous Bending and Heating on Characteristics of Flexible Organic Thin Film Transistors

  • Cho, S.W.;Kim, D.I.;Lee, N.E.
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.470-470
    • /
    • 2013
  • Recently, active materials such as amorphous silicon (a-Si), poly crystalline silicon (poly-Si), transition metal oxide semiconductors (TMO), and organic semiconductors have been demonstrated for flexible electronics. In order to apply flexible devices on the polymer substrates, all layers should require the characteristic of flexibility as well as the low temperature process. Especially, pentacene thin film transistors (TFTs) have been investigated for probable use in low-cost, large-area, flexible electronic applications such as radio frequency identification (RFID) tags, smart cards, display backplane driver circuits, and sensors. Since pentacene TFTs were studied, their electrical characteristics with varying single variable such as strain, humidity, and temperature have been reported by various groups, which must preferentially be performed in the flexible electronics. For example, the channel mobility of pentacene organic TFTs mainly led to change in device performance under mechanical deformation. While some electrical characteristics like carrier mobility and concentration of organic TFTs were significantly changed at the different temperature. However, there is no study concerning multivariable. Devices actually worked in many different kinds of the environment such as thermal, light, mechanical bending, humidity and various gases. For commercialization, not fewer than two variables of mechanism analysis have to be investigated. Analyzing the phenomenon of shifted characteristics under the change of multivariable may be able to be the importance with developing improved dielectric and encapsulation layer materials. In this study, we have fabricated flexible pentacene TFTs on polymer substrates and observed electrical characteristics of pentacene TFTs exposed to tensile and compressive strains at the different values of temperature like room temperature (RT), 40, 50, $60^{\circ}C$. Effects of bending and heating on the device performance of pentacene TFT will be discussed in detail.

  • PDF

Epidural Space Identification Device Using Air-filled Catheter (공기도관을 사용하는 경막외강 자동탐지기구)

  • 강재환;김현식;김경아;김상태;배진호;임승운;차은종
    • Journal of Biomedical Engineering Research
    • /
    • v.24 no.1
    • /
    • pp.9-13
    • /
    • 2003
  • An assist device was developed to identify the epidural space by continously monitoring the air-filled catheter pressure. The pressure signal appropriately amplified and filtered enabled to alarm the needle introduction into the epidural space by thresholding detection. Ten LEDs provided a visual change of catheter pressure before alarming for user convenience. Clinical trials were performed in 30 patients with 83% success rate at the first trial. When failed, the second trial was enough for successful anesthesia. The air volume introduced during each anesthesia was less than 1ml, causing side effects. Air filling of the catheter could also minimize infection possibility. Therefore, the present device guarantees safe anesthesia with user convenience.

User Authentication System Using USB Device Information (USB 장치 정보를 이용한 사용자 인증방안)

  • Lee, Jin-Hae;Jo, In-June;Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.276-282
    • /
    • 2017
  • Password-based authentication is vulnerable because of its low cost and convenience, but it is still widely used. In order to increase the security of the password-based user authentication method, the password is changed frequently, and it is recommended to use a combination of numbers, alphabets and special characters when generating the password. However, it is difficult for users to remember passwords that are difficult to create and it is not easy to change passwords periodically. Therefore, in this paper, we implemented a user authentication system that does not require a password by using the USB memory that is commonly used. Authentication data used for authentication is protected by USB data stored in USB memory using USB device information to improve security. Also, the authentication data is one-time and reusable.Based on this, it is possible to have the same security as the password authentication system and the security level such as certificate or fingerprint recognition.

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

Analysis of Network Log based on Hadoop (하둡 기반 네트워크 로그 시스템)

  • Kim, Jeong-Joon;Park, Jeong-Min;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.125-130
    • /
    • 2017
  • Since field control equipment such as PLC has no function to log key event information in the log, it is difficult to analyze the accident. Therefore, it is necessary to secure information that can analyze when a cyber accident occurs by logging the main event information of the field control equipment such as PLC and IED. The protocol analyzer is required to analyze the field control device (the embedded device) communication protocol for event logging. However, the conventional analyzer, such as Wireshark is difficult to process the data identification and extraction of the large variety of protocols for event logging is difficult analysis of the payload data based and classification. In this paper, we developed a system for Big Data based on field control device communication protocol payload data extraction for event logging of large studies.