• 제목/요약/키워드: Format Detection

Search Result 169, Processing Time 0.029 seconds

Development and Evaluation of an Immunochromatographic Assay for Screening Listeria spp. in Pork and Milk

  • Kim, Seong-Hee;Kim, Jin-Young;Han, Woong;Jung, Byeong-Yeal;Chuong, Pham-Due;Joo, Hae-Jin;Ba, Hoa-Van;Son, Won-Geun;Jee, Young-Heun;Yoon, Byoung-Su;Lee, Yong-Soon;Lim, Yoon-Kyu
    • Food Science and Biotechnology
    • /
    • v.16 no.4
    • /
    • pp.515-519
    • /
    • 2007
  • Rapid immunochromatographic assay (ICA) kits were developed using flagella-specific monoclonal antibodies (MAbs) and rabbit polyclonal antibodies for screening Listeria spp. in food. The establishment of different formats, MAb 2B1 as capture antibody and MAb 7A3 or rabbit polyclonal antibodies as detector antibody, was compared. The 2 formats of the ICA kit were shown to have specific reactions with Listeria and no cross-reactivity with any of the non-Listeria including Escherichia coli O157:H7 and Salmonella enteritidis. The detection limits of the ICA kit using the combination of gold-labeled MAb 7A3 and MAb 2B1 showed $1{\times}10^5$ and $1{\times}10^6\;CFU/0.1\;mL$ at 22 and $30^{\circ}C$, respectively. The other format of the ICA kit using the combination of gold-labeled rabbit polyclonal antibodies and MAb 2B1 showed $1{\times}10^6\;CFU/0.1\;mL$ at $22^{\circ}C$ but weak signal at 30 culture. The format utilizing MAb was more sensitive than the one using polyclonal antibodies for capture antibody. Samples contaminated with L. monocytogenes 4b culture (9-10, 5-6, and 1-2 CFU/mL) on pork and pasteurized milk were confirmed as positive results. Current data suggests that this ICA kit is a rapid, simple and effective tool to screen for Listeria spp. in food.

A Study on u-CCTV Fire Prevention System Development of System and Fire Judgement (u-CCTV 화재 감시 시스템 개발을 위한 시스템 및 화재 판별 기술 연구)

  • Kim, Young-Hyuk;Lim, Il-Kwon;Li, Qigui;Park, So-A;Kim, Myung-Jin;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.463-466
    • /
    • 2010
  • In this paper, CCTV based fire surveillance system should aim to development. Advantages and Disadvantages analyzed of Existing sensor-based fire surveillance system and video-based fire surveillance system. To national support U-City, U-Home, U-Campus, etc, spread the ubiquitous environment appropriate to fire surveillance system model and a fire judgement technology. For this study, Microsoft LifeCam VX-1000 using through the capturing images and analyzed for apple and tomato, Finally we used H.264. The client uses the Linux OS with ARM9 S3C2440 board was manufactured, the client's role is passed to the server to processed capturing image. Client and the server is basically a 1:1 video communications. So to multiple receive to video multicast support will be a specification. Is fire surveillance system designed for multiple video communication. Video data from the RGB format to YUV format and transfer and fire detection for Y value. Y value is know movement data. The red color of the fire is determined to detect and calculate the value of Y at the fire continues to detect the movement of flame.

  • PDF

Comparative Analysis of Screening Results from Various ELISA Formats Used for Detection of Anti-Erythropoietin Antibodies in Korean Patients

  • Ha, Sung-Kyu;Yang, Seung-Ju;Shin, Sug-Kyun;Jo, Young-Il;Baek, Kyung-Min;Hong, Seung-Hwa;Pack, Seung-Pil;Kim, Sung-Jo;Heo, Tae-Hwe
    • Biomolecules & Therapeutics
    • /
    • v.18 no.2
    • /
    • pp.184-190
    • /
    • 2010
  • Clinical cases of pure red cell aplasia (PRCA) have been reported during the recombinant human erythropoietin (EPO) therapy for the anemia patients. PRCA is a rare hematological disorder leading to a severe anemia due to an almost complete stop of red blood cell production. Antibody (Ab)-associated PRCA is caused by the EPO-neutralizing Abs that eliminate the biological activity of EPO. In order to detect anti-EPO Abs in human sera, we performed conventional ELISA, directly coated bridging ELISA, and streptavidin coated bridging ELISA, and compared their sensitivity and specificity. Some false positive results were obtained in the conventional ELISA. One positive sample was detected successfully by streptavidin coated bridging ELISA, which was not appeared in the directly coated bridging ELISA. In conclusion, streptavidin coated bridging ELISA was substantially sensitive and specific format and one out of sixty-eight serum samples was proved to be anti-EPO positive.

Implementation of An 1.5Gbit/s Wireless Data Transmission System at 300GHz Band (300GHz 대역 1.5Gbit/s 무선 데이터 전송 시스템 구현)

  • Lee, Won-Hui;Chung, Tae-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.1-6
    • /
    • 2011
  • In this paper, an 1.5Gbit/s wireless data transmission system using the carrier frequency of 300 GHz band was implemented. The RF front-end was composed of schottky diode sub-harmonic mixer, frequency tripler, and horn antennas for transmitter and receiver, respectively. The LO frequencies of sub-harmonic mixer are 150GHz for transmit chain and 156GHz for receive chain. The ASK(Amplitude Shift Keying) modulation was used in the transmitter and the envelope detection method was used in the heterodyne receiver. The conversion loss of sub-harmonic mixer and implementation system loss were measured to be 9.8dB and 1.2dB, respectively. The 1.5Gbit/s video signal with HD-SDI format was transmitted over wireless distance of 40cm without optical lens(4.2m with optical lens) and displayed on HDTV at the transmitted average output power of $20{\mu}W$.

A Design of Secure Audit/ Trace Module to Support Computer Forensics (컴퓨터 포렌식스를 지원하는 보안 감사/추적 모듈 설계)

  • 고병수;박영신;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.79-86
    • /
    • 2004
  • In general, operating system is offering the security function of OS level to support several web services. However, it is true that security side of OS level is weak from many parts. Specially, it is needed to audit/trace function in security kernel level to satisfy security more than B2 level that define in TCSEC(Trusted Computer System Evaluation Criteria). So we need to create audit data at system call invocation for this, and do to create audit data of equal format about almost event and supply information to do traceback late. This Paper Proposes audit/trace system module that use LKM(Loadable Kernel Module) technique. It is applicable without alteration about existing linux kernel to ensure safe evidence. It offers interface that can utilize external audit data such as intrusion detection system, and also offers safe role based system that is divided system administrator and security administrator These data will going to utilize to computer forensics' data that legal confrontation is Possible.

  • PDF

Design and Implementation of Multi-Sensor Interface System (다중 센서 인터페이스 시스템 설계 및 구현)

  • Mun, Myeong-Ju;Kim, Hyounkyoung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.515-523
    • /
    • 2015
  • The air traffic control service in the domestic airports and approach control centers is provided using data from flight plan and a variety of surveillance sensors such as SSR, ADS-B and MLAT, etc. The physical connection methods and data types of the sensors are various, as so using these data directly may cause a lot of cost in development and maintenance of air traffic control equipment. As a method for solving such a problem, we propose a system that can convert the data from the heterogeneous sensors to the unified format which can be processed by the air traffic control devices. In this paper, the analysis results for the physical characteristics and data formats of the typical surveillance sensors are described. Also, the system design and the system implementation result for the multi-sensor interface system to interoperate the sensors are explained in detail.

Network Time Protocol Extension for Wireless Sensor Networks (무선 센서 네트워크를 위한 인터넷 시각 동기 프로토콜 확장)

  • Hwang, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2563-2567
    • /
    • 2011
  • Advances in smart sensors, embedded systems, low-power design, ad-hoc networks and MEMS have allowed the development of low-cost small sensor nodes with computation and wireless communication capabilities that can form distributed wireless sensor networks. Time information and time synchronization are fundamental building blocks in wireless sensor networks since many sensor network applications need time information for object tracking, consistent state updates, duplicate detection and temporal order delivery. Various time synchronization protocols have been proposed for sensor networks because of the characteristics of sensor networks which have limited computing power and resources. However, none of these protocols have been designed with time representation scheme in mind. Global time format such as UTC TOD (Universal Time Coordinated, Time Of Day) is very useful in sensor network applications. In this paper we propose network time protocol extension for global time presentation in wireless sensor networks.

Security Check Scheduling for Detecting Malicious Web Sites (악성사이트 검출을 위한 안전진단 스케줄링)

  • Choi, Jae Yeong;Kim, Sung Ki;Min, Byoung Joon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.9
    • /
    • pp.405-412
    • /
    • 2013
  • Current web has evolved to a mashed-up format according to the change of the implementation and usage patterns. Web services and user experiences have improved, however, security threats are also increased as the web contents that are not yet verified combine together. To mitigate the threats incurred as an adverse effect of the web development, we need to check security on the combined web contents. In this paper, we propose a scheduling method to detect malicious web pages not only inside but also outside through extended links for secure operation of a web site. The scheduling method considers several aspects of each page including connection popularity, suspiciousness, and check elapse time to make a decision on the order for security check on numerous web pages connected with links. We verified the effectiveness of the security check complying with the scheduling method that uses the priority given to each page.

A Real-Time Spatial DSS for Security Camera Image Monitoring

  • Park, Young-Hwan;Lee, Ook
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.413-414
    • /
    • 1998
  • This paper presents a real-time Spatial Decision Support System(SDSS) for security camera image monitoring. Other SDSSs are not real-time systems, i.e., they show the images that are already transformed into data format such as virtual reality. In our system, the image is broadcasted in real-time since the purpose of the security camera needs to do it in real-time. With these real-time images, other systems do not add up anything more; the screen just shows the images from the camera. However in our system, we created a motion detection system so that the supervisor(Judge) of a sec.urity monitoring system does not have to pay attention to it constantly. In other words, we created a judge advising system for the supervisor of the security monitoring system. Most of small objects do not need the supervisor's attention since they could be birds, cats, dogs, etc. if they show up in the screen image. In this new system the system only report the unusual change to the supervisor by calculating the motion and size of objects in the screen. Thus the supervisor can be liberated from the 24-hour concentration duty; instead he/she can be only alerted when the real security threat such as a big moving object like an human intruder appears. Thus this system can be called a real-time Spatial DSS. The utility of this system is proved mathematically by using the concept of entropy. In other words, big objects like human intruders increase the entropy of the screen images significantly therefore the supervisor must be alerted. Thus by proving its utility of the system theoretically, we can claim that our new real-time SDSS is superior to others which do not use our technique.hnique.

  • PDF

Preventing ELF(Executable and Linking Format)-File-Infecting Malware using Signature Verification for Embedded Linux (임베디드 리눅스에서 서명 검증 방식을 이용한 악성 프로그램 차단 시스템)

  • Lee, Jong-Seok;Jung, Ki-Young;Jung, Daniel;Kim, Tae-Hyung;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.589-593
    • /
    • 2008
  • These days, as a side effect of the growth of the mobile devices, malwares for the mobile devices also tend to increase and become more dangerous. Because embedded Linux is one of the advanced OSes on mobile devices, a solution to preventing malwares from infecting and destroying embedded Linux will be needed. We present a scheme using signature verification for embedded Linux that prevents executallle-Infecting malwares. The proposed scheme works under collaboration between mobile devices and a server. Malware detection is delegated to the server. In a mobile device, only integrity of all executables and dynamic libraries is checked at kernel level every time by kernel modules using LSM hooks just prior to loading of executables and dynamic libraries. All procedures in the mobile devices are performed only at kernel level. In experiments with a mobile embedded device, we confirmed that the scheme is able to prevent all executable-Infecting malwares while minimizing damage caused by execution of malwares or infected files, power consumption and performance overheads caused by malware check routines.