• Title/Summary/Keyword: Fingerprint Identification

Search Result 213, Processing Time 0.034 seconds

Application of DNA Test for Individual Traceability in Hanwoo (Korean Cattle) (한우의 개체 추적 검증을 위한 유전자 감식 기법 활용 연구)

  • 이학교;전광주;공홍식;오재돈;최일신;김종대;조창연;윤두학;신형두
    • Food Science of Animal Resources
    • /
    • v.24 no.1
    • /
    • pp.8-14
    • /
    • 2004
  • Identification of animals has been made with an ear tag with dummy code, and blood typing has been used for paternity and individual identification in live animals. As various genetic markers are for different cattle breeds vary, the discrete genetic markers are necessary to identify Hanwoo. A total of 740 progeny testing Hanwoo were used to identify Hanwoo specific markers. To examine traceability of individuals by using breed specific genetic codes, four animal were randomly sampled, and traced from live animals to post-slaughter processing stages. The candidate genetic makers used in the study were 16 DNA microsatellites which were identified in romosomes 1 and 14. The number of alleles of those DNA microsatellites ranged from a minimum of 3 to maximum of 12. The heterozygote frequency ranged from 0.022 to 0.824. Effective number of alleles for each DNA microsatellites were 3 to 6. Six selected candidate genetic markers were able ti trace individual cattle with an 100% confidence level.

EST Analysis system for panning gene

  • Hur, Cheol-Goo;Lim, So-Hyung;Goh, Sung-Ho;Shin, Min-Su;Cho, Hwan-Gue
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2000.11a
    • /
    • pp.21-22
    • /
    • 2000
  • Expressed sequence tags (EFTs) are the partial segments of cDNA produced from 5 or 3 single-pass sequencing of cDNA clones, error-prone and generated in highly redundant sets. Advancement and expansion of Genomics made biologists to generate huge amount of ESTs from variety of organisms-human, microorganisms as well as plants, and the cumulated number of ESTs is over 5.3 million, As the EST data being accumulate more rapidly, it becomes bigger that the needs of the EST analysis tools for extraction of biological meaning from EST data. Among the several needs of EST analyses, the extraction of protein sequence or functional motifs from ESTs are important for the identification of their function in vivo. To accomplish that purpose the precise and accurate identification of the region where the coding sequences (CDSs) is a crucial problem to solve primarily, and it will be helpful to extract and detect of genuine CD5s and protein motifs from EST collections. Although several public tools are available for EST analysis, there is not any one to accomplish the object. Furthermore, they are not targeted to the plant ESTs but human or microorganism. Thus, to correspond the urgent needs of collaborators deals with plant ESTs and to establish the analysis system to be used as general-purpose public software we constructed the pipelined-EST analysis system by integration of public software components. The software we used are as follows - Phred/Cross-match for the quality control and vector screening, NCBI Blast for the similarity searching, ICATools for the EST clustering, Phrap for EST contig assembly, and BLOCKS/Prosite for protein motif searching. The sample data set used for the construction and verification of this system was 1,386 ESTs from human intrathymic T-cells that verified using UniGene and Nr database of NCBI. The approach for the extraction of CDSs from sample data set was carried out by comparison between sample data and protein sequences/motif database, determining matched protein sequences/motifs that agree with our defined parameters, and extracting the regions that shows similarities. In recent future, in addition to these components, it is supposed to be also integrated into our system and served that the software for the peptide mass spectrometry fingerprint analysis, one of the proteomics fields. This pipelined-EST analysis system will extend our knowledge on the plant ESTs and proteins by identification of unknown-genes.

  • PDF

Scalable Fingerprinting Scheme based on Angular Decoding for LCCA Resilience (선형결합 공모공격에 강인한 각도해석 기반의 대용량 핑거프린팅)

  • Seol, Jae-Min;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.713-720
    • /
    • 2008
  • Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous research works are based on ACC (anti-collusion code) for identifying each user, however, ACC are shown to be resilient to average and median attacks, but not to LCCA and cannot support large number of users. In this paper, we propose a practical SACC (scalable anti-collusion code) scheme and its angular decoding strategy to support a large number of users from basic ACC (anti-collusion code) with LCCA (linear combination collusion attack) robustness. To make a scalable ACC, we designed a scalable extension of ACC codebook using a Gaussian distributed random variable, and embedded the resulting fingerprint using human visual system based watermarking scheme. We experimented with standard test images for colluder identification performance, and our scheme shows good performance over average and median attacks. Our angular decoding strategy shows performance gain over previous decoding scheme on LCCA colluder set identification among large population.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

Development of Special Asset Management System Using RFID (RFID를 이용한 특수 자산 관리 시스템 개발)

  • Han, Sang-Hoon;Min, Jang-Geun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.33-41
    • /
    • 2011
  • RFID technology is already used in the various application fields such as identification card, traffic card and etc. Many RFID application systems using UHF have been developed in the field of asset management, logistics and security. Because a human being can make mistakes, we need the system that can efficiently manage the special assets such as small arms, jewelry and medicine and can monitor them in real time. In this paper, we proposed a special assets management system to keep assets in safe custody, to monitor their safety status in real time and to manage distribution channels and history of those assets. The developed system is called Smart Cabinet because it has cabinet's form. Smart Cabinet integrates such technologies as RFID, smart card, fingerprint recognition, several sensors and LCD display in order to provide the functions for special asset management. Those functions include condition monitoring of assets, traceability management, distribution channels and security logs, which are to interact with a management server. The article demonstrated the potentiality of RFID by presenting special asset management solutions dedicated to guns and medicine management, and also showed the effectiveness and possibility of those solutions.

Proteomic Approach to Aging Research

  • Kim, Dong-Su
    • Proceedings of the Korean Society of Life Science Conference
    • /
    • 2000.06a
    • /
    • pp.9-10
    • /
    • 2000
  • The aging process is multifactorial and results from the combined effects of inherited(genetic) and acquired factors including life style, food habits, physical activity, and diseases. That give rise to the various approaches in aging. We are trying to study biological changes with aging, In detail we are focused on gene and protein function accompanied by normal or abnormal aging process, especially our efforts are aimed at revealing the functional relationship of proteins in aging as a final product of gene. We expect that proteomic approach to the study of protein function involved in aging should give us variety of integrated data to understand biological changes of long lived lives, We have applied expression proteomics to rat liver bred in dietary restriction or in at libitum to elucidate the effects of food habit on aging. Expression proteomics shows us protein profile in a selected tissue or cells as a whole and gives us the information about protein expression level, posttranslational modification and degenerative modification of expressed proteins. Comparative analysis of young and old rat liver by two dimensional gels shows that gene expression of several proteins was down regulated in old rats and some protein expression level is increased with aging. Dietary restriction slows down these changes of gene expression and in some proteins there's no difference in protein expression level at same ages in comparison with rats bred in at libitum. About forty protein was identified by peptide mass fingerprint with MALDI-TOF and rest of the protein of interest is in the course of identification, Also we are trying to make mitochondrial and cytosolic proteom reference map. These suborganelle proteom map will gives us the information about low abundance proteins and cellular localization of proteins. Proteomics is a growing methodology to study biological system. High throughput qualitative and qualitative aspect of this approach will gives us large amount of integrated information and speed up our understanding about biological system

  • PDF

User Authentication System Using USB Device Information (USB 장치 정보를 이용한 사용자 인증방안)

  • Lee, Jin-Hae;Jo, In-June;Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.276-282
    • /
    • 2017
  • Password-based authentication is vulnerable because of its low cost and convenience, but it is still widely used. In order to increase the security of the password-based user authentication method, the password is changed frequently, and it is recommended to use a combination of numbers, alphabets and special characters when generating the password. However, it is difficult for users to remember passwords that are difficult to create and it is not easy to change passwords periodically. Therefore, in this paper, we implemented a user authentication system that does not require a password by using the USB memory that is commonly used. Authentication data used for authentication is protected by USB data stored in USB memory using USB device information to improve security. Also, the authentication data is one-time and reusable.Based on this, it is possible to have the same security as the password authentication system and the security level such as certificate or fingerprint recognition.

Identification and Pharmacological Analysis of High Efficacy Small Molecule Inhibitors of EGF-EGFR Interactions in Clinical Treatment of Non-Small Cell Lung Carcinoma: a Computational Approach

  • Gudala, Suresh;Khan, Uzma;Kanungo, Niteesh;Bandaru, Srinivas;Hussain, Tajamul;Parihar, MS;Nayarisseri, Anuraj;Mundluru, Hema Prasad
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.18
    • /
    • pp.8191-8196
    • /
    • 2016
  • Inhibition of EGFR-EGF interactions forms an important therapeutic rationale in treatment of non-small cell lung carcinoma. Established inhibitors have been successful in reducing proliferative processes observed in NSCLC, however patients suffer serious side effects. Considering the narrow therapeutic window of present EGFR inhibitors, the present study centred on identifying high efficacy EGFR inhibitors through structure based virtual screening strategies. Established inhibitors - Afatinib, Dacomitinib, Erlotinib, Lapatinib, Rociletinib formed parent compounds to retrieve similar compounds by linear fingerprint based tanimoto search with a threshold of 90%. The compounds (parents and respective similars) were docked at the EGF binding cleft of EGFR. Patch dock supervised protein-protein interactions were established between EGF and ligand (query and similar) bound and free states of EGFR. Compounds ADS103317, AKOS024836912, AGN-PC-0MXVWT, GNF-Pf-3539, SCHEMBL15205939 were retrieved respectively similar to Afatinib, Dacomitinib, Erlotinib, Lapatinib, Rociletinib. Compound-AGN-PC-0MXVWT akin to Erlotinib showed highest affinity against EGFR amongst all the compounds (parent and similar) assessed in the study. Further, AGN-PC-0MXVWT brought about significant blocking of EGFR-EGF interactions in addition showed appreciable ADMET properties and pharmacophoric features. In the study, we report AGN-PC-0MXVWT to be an efficient and high efficacy inhibitor of EGFR-EGF interactions identified through computational approaches.

Attendance Check System based on Smartphone using QR code (QR코드를 활용한 스마트폰 기반 출석체크 시스템)

  • Park, Sunju
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.2
    • /
    • pp.325-334
    • /
    • 2014
  • There are management and price problems that have been caused by requirement of RFID reader, Fingerprint Identification System and Clicker for the construct of automatic attendance system to check the students' attendance accurately and quickly. Therefore, in the thesis, we developed smartphone based attendance check system by utilizing Wi-Fi and the smartphones that has been already built without using additional equipments and establishing construction of system additionally. It recognizes date, time, location and the seat number in classroom if a student logs the attendance chocking application in and it also allows students to get lecture feedback and check attendance by taking quizzes and questionnaires that are related to the lecture. As a result, by applying the attendance check system, instructors state that it is convenient since the app allows instructors to communicate with students though the quizzes and questionnaires. Especially, the instructors state that it is convenient because the results of the quizzes, questionnaires and attendance can be downloaded it the from of Excel files.

On Pattern Kernel with Multi-Resolution Architecture for a Lip Print Recognition (구순문 인식을 위한 복수 해상도 시스템의 패턴 커널에 관한 연구)

  • 김진옥;황대준;백경석;정진현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.2067-2073
    • /
    • 2001
  • Biometric systems are forms of technology that use unique human physical characteristics to automatically identify a person. They have sensors to pick up some physical characteristics, convert them into digital patterns, and compare them with patterns stored for individual identification. However, lip-print recognition has been less developed than recognition of other human physical attributes such as the fingerprint, voice patterns, retinal at blood vessel patterns, or the face. The lip print recognition by a CCD camera has the merit of being linked with other recognition systems such as the retinal/iris eye and the face. A new method using multi-resolution architecture is proposed to recognize a lip print from the pattern kernels. A set of pattern kernels is a function of some local lip print masks. This function converts the information from a lip print into digital data. Recognition in the multi-resolution system is more reliable than recognition in the single-resolution system. The multi-resolution architecture allows us to reduce the false recognition rate from 15% to 4.7%. This paper shows that a lip print is sufficiently used by the measurements of biometric systems.

  • PDF