• 제목/요약/키워드: Fingerprint Identification

Search Result 214, Processing Time 0.027 seconds

APPLICATION OF WIFI-BASED INDOOR LOCATION MONITORING SYSTEM FOR LABOR TRACKING IN CONSTRUCTION SITE - A CASE STUDY in Guangzhou MTR

  • Sunkyu Woo;Seongsu Jeong;Esmond Mok;Linyuan Xia;Muwook Pyeon;Joon Heo
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.869-875
    • /
    • 2009
  • Safety is a big issue in the construction sites. For safe and secure management, tracking locations of construction resources such as labors, materials, machineries, vehicles and so on is important. The materials, machineries and vehicles could be controlled by computer, whereas the movement of labors does not have fixed pattern. So, the location and movement of labors need to be monitored continuously for safety. In general, Global Positioning System(GPS) is an opt solution to obtain the location information in outside environments. But it cannot be used for indoor locations as it requires a clear Line-Of-Sight(LOS) to satellites Therefore, indoor location monitoring system could be a convenient alternative for environments such as tunnel and indoor building construction sites. This paper presents a case study to investigate feasibility of Wi-Fi based indoor location monitoring system in construction site. The system is developed by using fingerprint map of gathering Received Signal Strength Indication(RSSI) from each Access Point(AP). The signal information is gathered by Radio Frequency Identification (RFID) tags, which are attached on a helmet of labors to track their locations, and is sent to server computer. Experiments were conducted in a shield tunnel construction site at Guangzhou, China. This study consists of three phases as follows: First, we have a tracking test in entrance area of tunnel construction site. This experiment was performed to find the effective geometry of APs installation. The geometry of APs installation was changed for finding effective locations, and the experiment was performed using one and more tags. Second, APs were separated into two groups, and they were connected with LAN cable in tunnel construction site. The purpose of this experiment was to check the validity of group separating strategy. One group was installed around the entrance and the other one was installed inside the tunnel. Finally, we installed the system inner area of tunnel, boring machine area, and checked the performance with varying conditions (the presence of obstacles such as train, worker, and so on). Accuracy of this study was calculated from the data, which was collected at some known points. Experimental results showed that WiFi-based indoor location system has a level of accuracy of a few meters in tunnel construction site. From the results, it is inferred that the location tracking system can track the approximate location of labors in the construction site. It is able to alert the labors when they are closer to dangerous zones like poisonous region or cave-in..

  • PDF

Application of DNA Test for Individual Traceability in Hanwoo (Korean Cattle) (한우의 개체 추적 검증을 위한 유전자 감식 기법 활용 연구)

  • 이학교;전광주;공홍식;오재돈;최일신;김종대;조창연;윤두학;신형두
    • Food Science of Animal Resources
    • /
    • v.24 no.1
    • /
    • pp.8-14
    • /
    • 2004
  • Identification of animals has been made with an ear tag with dummy code, and blood typing has been used for paternity and individual identification in live animals. As various genetic markers are for different cattle breeds vary, the discrete genetic markers are necessary to identify Hanwoo. A total of 740 progeny testing Hanwoo were used to identify Hanwoo specific markers. To examine traceability of individuals by using breed specific genetic codes, four animal were randomly sampled, and traced from live animals to post-slaughter processing stages. The candidate genetic makers used in the study were 16 DNA microsatellites which were identified in romosomes 1 and 14. The number of alleles of those DNA microsatellites ranged from a minimum of 3 to maximum of 12. The heterozygote frequency ranged from 0.022 to 0.824. Effective number of alleles for each DNA microsatellites were 3 to 6. Six selected candidate genetic markers were able ti trace individual cattle with an 100% confidence level.

EST Analysis system for panning gene

  • Hur, Cheol-Goo;Lim, So-Hyung;Goh, Sung-Ho;Shin, Min-Su;Cho, Hwan-Gue
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2000.11a
    • /
    • pp.21-22
    • /
    • 2000
  • Expressed sequence tags (EFTs) are the partial segments of cDNA produced from 5 or 3 single-pass sequencing of cDNA clones, error-prone and generated in highly redundant sets. Advancement and expansion of Genomics made biologists to generate huge amount of ESTs from variety of organisms-human, microorganisms as well as plants, and the cumulated number of ESTs is over 5.3 million, As the EST data being accumulate more rapidly, it becomes bigger that the needs of the EST analysis tools for extraction of biological meaning from EST data. Among the several needs of EST analyses, the extraction of protein sequence or functional motifs from ESTs are important for the identification of their function in vivo. To accomplish that purpose the precise and accurate identification of the region where the coding sequences (CDSs) is a crucial problem to solve primarily, and it will be helpful to extract and detect of genuine CD5s and protein motifs from EST collections. Although several public tools are available for EST analysis, there is not any one to accomplish the object. Furthermore, they are not targeted to the plant ESTs but human or microorganism. Thus, to correspond the urgent needs of collaborators deals with plant ESTs and to establish the analysis system to be used as general-purpose public software we constructed the pipelined-EST analysis system by integration of public software components. The software we used are as follows - Phred/Cross-match for the quality control and vector screening, NCBI Blast for the similarity searching, ICATools for the EST clustering, Phrap for EST contig assembly, and BLOCKS/Prosite for protein motif searching. The sample data set used for the construction and verification of this system was 1,386 ESTs from human intrathymic T-cells that verified using UniGene and Nr database of NCBI. The approach for the extraction of CDSs from sample data set was carried out by comparison between sample data and protein sequences/motif database, determining matched protein sequences/motifs that agree with our defined parameters, and extracting the regions that shows similarities. In recent future, in addition to these components, it is supposed to be also integrated into our system and served that the software for the peptide mass spectrometry fingerprint analysis, one of the proteomics fields. This pipelined-EST analysis system will extend our knowledge on the plant ESTs and proteins by identification of unknown-genes.

  • PDF

Scalable Fingerprinting Scheme based on Angular Decoding for LCCA Resilience (선형결합 공모공격에 강인한 각도해석 기반의 대용량 핑거프린팅)

  • Seol, Jae-Min;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.713-720
    • /
    • 2008
  • Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous research works are based on ACC (anti-collusion code) for identifying each user, however, ACC are shown to be resilient to average and median attacks, but not to LCCA and cannot support large number of users. In this paper, we propose a practical SACC (scalable anti-collusion code) scheme and its angular decoding strategy to support a large number of users from basic ACC (anti-collusion code) with LCCA (linear combination collusion attack) robustness. To make a scalable ACC, we designed a scalable extension of ACC codebook using a Gaussian distributed random variable, and embedded the resulting fingerprint using human visual system based watermarking scheme. We experimented with standard test images for colluder identification performance, and our scheme shows good performance over average and median attacks. Our angular decoding strategy shows performance gain over previous decoding scheme on LCCA colluder set identification among large population.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

Development of Special Asset Management System Using RFID (RFID를 이용한 특수 자산 관리 시스템 개발)

  • Han, Sang-Hoon;Min, Jang-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.33-41
    • /
    • 2011
  • RFID technology is already used in the various application fields such as identification card, traffic card and etc. Many RFID application systems using UHF have been developed in the field of asset management, logistics and security. Because a human being can make mistakes, we need the system that can efficiently manage the special assets such as small arms, jewelry and medicine and can monitor them in real time. In this paper, we proposed a special assets management system to keep assets in safe custody, to monitor their safety status in real time and to manage distribution channels and history of those assets. The developed system is called Smart Cabinet because it has cabinet's form. Smart Cabinet integrates such technologies as RFID, smart card, fingerprint recognition, several sensors and LCD display in order to provide the functions for special asset management. Those functions include condition monitoring of assets, traceability management, distribution channels and security logs, which are to interact with a management server. The article demonstrated the potentiality of RFID by presenting special asset management solutions dedicated to guns and medicine management, and also showed the effectiveness and possibility of those solutions.

Proteomic Approach to Aging Research

  • Kim, Dong-Su
    • Proceedings of the Korean Society of Life Science Conference
    • /
    • 2000.06a
    • /
    • pp.9-10
    • /
    • 2000
  • The aging process is multifactorial and results from the combined effects of inherited(genetic) and acquired factors including life style, food habits, physical activity, and diseases. That give rise to the various approaches in aging. We are trying to study biological changes with aging, In detail we are focused on gene and protein function accompanied by normal or abnormal aging process, especially our efforts are aimed at revealing the functional relationship of proteins in aging as a final product of gene. We expect that proteomic approach to the study of protein function involved in aging should give us variety of integrated data to understand biological changes of long lived lives, We have applied expression proteomics to rat liver bred in dietary restriction or in at libitum to elucidate the effects of food habit on aging. Expression proteomics shows us protein profile in a selected tissue or cells as a whole and gives us the information about protein expression level, posttranslational modification and degenerative modification of expressed proteins. Comparative analysis of young and old rat liver by two dimensional gels shows that gene expression of several proteins was down regulated in old rats and some protein expression level is increased with aging. Dietary restriction slows down these changes of gene expression and in some proteins there's no difference in protein expression level at same ages in comparison with rats bred in at libitum. About forty protein was identified by peptide mass fingerprint with MALDI-TOF and rest of the protein of interest is in the course of identification, Also we are trying to make mitochondrial and cytosolic proteom reference map. These suborganelle proteom map will gives us the information about low abundance proteins and cellular localization of proteins. Proteomics is a growing methodology to study biological system. High throughput qualitative and qualitative aspect of this approach will gives us large amount of integrated information and speed up our understanding about biological system

  • PDF

User Authentication System Using USB Device Information (USB 장치 정보를 이용한 사용자 인증방안)

  • Lee, Jin-Hae;Jo, In-June;Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.276-282
    • /
    • 2017
  • Password-based authentication is vulnerable because of its low cost and convenience, but it is still widely used. In order to increase the security of the password-based user authentication method, the password is changed frequently, and it is recommended to use a combination of numbers, alphabets and special characters when generating the password. However, it is difficult for users to remember passwords that are difficult to create and it is not easy to change passwords periodically. Therefore, in this paper, we implemented a user authentication system that does not require a password by using the USB memory that is commonly used. Authentication data used for authentication is protected by USB data stored in USB memory using USB device information to improve security. Also, the authentication data is one-time and reusable.Based on this, it is possible to have the same security as the password authentication system and the security level such as certificate or fingerprint recognition.

Identification and Pharmacological Analysis of High Efficacy Small Molecule Inhibitors of EGF-EGFR Interactions in Clinical Treatment of Non-Small Cell Lung Carcinoma: a Computational Approach

  • Gudala, Suresh;Khan, Uzma;Kanungo, Niteesh;Bandaru, Srinivas;Hussain, Tajamul;Parihar, MS;Nayarisseri, Anuraj;Mundluru, Hema Prasad
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.18
    • /
    • pp.8191-8196
    • /
    • 2016
  • Inhibition of EGFR-EGF interactions forms an important therapeutic rationale in treatment of non-small cell lung carcinoma. Established inhibitors have been successful in reducing proliferative processes observed in NSCLC, however patients suffer serious side effects. Considering the narrow therapeutic window of present EGFR inhibitors, the present study centred on identifying high efficacy EGFR inhibitors through structure based virtual screening strategies. Established inhibitors - Afatinib, Dacomitinib, Erlotinib, Lapatinib, Rociletinib formed parent compounds to retrieve similar compounds by linear fingerprint based tanimoto search with a threshold of 90%. The compounds (parents and respective similars) were docked at the EGF binding cleft of EGFR. Patch dock supervised protein-protein interactions were established between EGF and ligand (query and similar) bound and free states of EGFR. Compounds ADS103317, AKOS024836912, AGN-PC-0MXVWT, GNF-Pf-3539, SCHEMBL15205939 were retrieved respectively similar to Afatinib, Dacomitinib, Erlotinib, Lapatinib, Rociletinib. Compound-AGN-PC-0MXVWT akin to Erlotinib showed highest affinity against EGFR amongst all the compounds (parent and similar) assessed in the study. Further, AGN-PC-0MXVWT brought about significant blocking of EGFR-EGF interactions in addition showed appreciable ADMET properties and pharmacophoric features. In the study, we report AGN-PC-0MXVWT to be an efficient and high efficacy inhibitor of EGFR-EGF interactions identified through computational approaches.

Attendance Check System based on Smartphone using QR code (QR코드를 활용한 스마트폰 기반 출석체크 시스템)

  • Park, Sunju
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.2
    • /
    • pp.325-334
    • /
    • 2014
  • There are management and price problems that have been caused by requirement of RFID reader, Fingerprint Identification System and Clicker for the construct of automatic attendance system to check the students' attendance accurately and quickly. Therefore, in the thesis, we developed smartphone based attendance check system by utilizing Wi-Fi and the smartphones that has been already built without using additional equipments and establishing construction of system additionally. It recognizes date, time, location and the seat number in classroom if a student logs the attendance chocking application in and it also allows students to get lecture feedback and check attendance by taking quizzes and questionnaires that are related to the lecture. As a result, by applying the attendance check system, instructors state that it is convenient since the app allows instructors to communicate with students though the quizzes and questionnaires. Especially, the instructors state that it is convenient because the results of the quizzes, questionnaires and attendance can be downloaded it the from of Excel files.