• Title/Summary/Keyword: Related Tags

Search Result 138, Processing Time 0.022 seconds

Analysis of Expressed Sequence Tags of the Firefly, Pyrocoelia rufa

  • Lee, Kwang-Sik;Bae, Jin-Sik;Goo, Tae-Won;Kim, Sam-Eun;Kim, Jong-Gill;Sohn, Hung-Dae;Jin, Byung-Rae
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.1 no.2
    • /
    • pp.165-169
    • /
    • 2000
  • We have constructed cDNA library from the larvae whole body of the firefly, Pyrocoelia rufa. Single direct partial sequencing of anonymous cDNA clones was performed to obtain genetic information on the firefly, P. rufa, of which genetic information is currently not available. This expressed sequence tags (EST) analysis of the 54 clones (54%) showed significant homology to the known genes registered in GenBank. Of these clones, twenty-four were related to the known insect genes, but these clones were not matched to previously identified firefly genes. Putative functional categories of these clones showed that the next abundant genes were associated with energy metabolism.

  • PDF

Performance Analysis of FSA Algorithm for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 SFSA 알고리즘의 성능 분석)

  • Lim, In-Taek;Choi, Jin-Oh;Choi, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.563-566
    • /
    • 2008
  • In RFID system. when a variety of tags are present in the interrogation zone of a single reader at the same time, the system requires a multiple tag identification scheme that allows the reader to read data from the individual tags. Anti-collision algorithms required for the multiple tag identification are essential for the implementation of RFID system. This paper analyzed the performance of SFSA algorithm, which is easy to implement. According to the analytical results, the algorithm's performances are closely related with the number of tags and the frame size.

  • PDF

Expressed sequence tags (ESTs) analysis of Acanthamoeba healyi

  • Kong, Hyun-Hee;Hwang, Mee-Yeul;Kim, Hyo-Kyung;Chung, Dong-Il
    • Parasites, Hosts and Diseases
    • /
    • v.39 no.2
    • /
    • pp.151-160
    • /
    • 2001
  • Randomly selected 435 clones from Acanthamoeba healyi cDNA library were sequenced and a total of 387 expressed sequence tags (ESTs) had been generated. Based on the results of BLAST search, 130 clones (34.4%) were identified as the genes enconding surface Proteins , enzymes for DNA, energy Production or other metabolism, kinases and phosphatases, protease, proteins for signal transduction, structural and cytoskeletal proteins, cell cycle related proteins, transcription factors, transcription and translational machineries, and transporter proteins. Most of the genes (88.5%) are newly identified in the genus Acanthamoeba. Although 15 clones matched the genes of Acanthamoeba located in the public databases, twelve clones were actin gene which was the most frequently expressed gene in this study. These ESTs of Acanthamoeba would give valuable information to study the organism as a model system for biological investigations such as cytoskeleton or cell movement, signal transduction, transcriptional and translational regulations. These results would also provide clues to elucidate factors for pathogenesis in human granulomatous amoebic encephalitis or keratitis by Acanthamoeba.

  • PDF

Design and Implementation of Tag Clustering System for Efficient Image Retrieval in Web2.0 Environment (Web2.0 환경에서의 효율적인 이미지 검색을 위한 태그 클러스터링 시스템의 설계 및 구현)

  • Lee, Si-Hwa;Lee, Man-Hyoung;Hwang, Dae-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1169-1178
    • /
    • 2008
  • Most of information in Web2.0 is constructed by users and can be classified by tags which are also constructed and added by users. However, as we known, referring by the related works such as automatic tagging techniques and tag cloud's construction techniques, the research to be classified information and resources by tags effectively is to be given users which is still up to the mark. In this paper, we propose and implement a clustering system that does mapping each other according to relationships of the resource's tags collected from Web and then makes the mapping result into clusters to retrieve images. Tn addition, we analyze our system's efficiency by comparing our proposed system's image retrieval result with the image retrieval results searched by Flickr website.

  • PDF

An Authentication Protocol for the Security of RFID Tags and Readers using Random Number (난수를 이용한 RFID 태그와 리더의 보안 인증 프로토콜)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.229-233
    • /
    • 2012
  • A RFID system is a technology for detecting information on an object through wireless communication between a tag on the object and a reader, and its applications are being expanded to various areas. Because of its wireless communication, however, there are many vulnerabilities in security. Until now, many studies have been executed in order to solve problems related to the security and stability of RFID. In order to resolve vulnerabilities in existing security methods for privacy protection, this study proposed an authentication protocol that uses hash values received from tags and random numbers. When the proposed protocol was implemented, it was safe from various types of attacks between tag and reader and between reader and DB. Furthermore, compared to recently proposed protocols, it could implement a RFID system with enhanced security and less computation in tags.

Analysis of Expressed Sequence Tags Generated from the Posterior Silkgland cDNA Clones of Antheraea yamamai (천잠 후부 견사선 유래 발현 유전자 꼬리표 작성 및 분석)

  • 윤은영;구태원;강석우;이혜원;황재삼;김호락
    • Journal of Life Science
    • /
    • v.10 no.2
    • /
    • pp.188-195
    • /
    • 2000
  • In order to understand molecular events during silk synthesis and provide genetic resources for molecular breeding, we had analyzed the cDNA library constructed from the posterior silkgland of Antheraea yamamai and partially sequenced 276 randomly selected genes from the cDNA library. Database comparisons of the expressed sequence tags (ESTs) revealed that 26 non-redundant clones showed a high similarity with previously identified genes. Among them, 17 clones exhibited a homology with previously identified insect genes and 9 clones were identical to genes that were previously identified from other organisms. A functional categorization showed that silk synthesis-defense- or stress-related genes, as well as genes involved in the metabolic pathways and in the transcriptional or translational apparatus are represented. In this report, the clone (AY479) which had high similarity with fibroin from A. pernyi was particularly analyzed in detail. The AY479 clone was carboxyl terminal region of fibroin. The 472 bp cDNA has 123 amino acids that shared 85% homology with the fibroin from A. pernyi and its deduced peptide had unique feature, that is, sites of alanine rich residues.

  • PDF

Improved RFID Authentication Protocol using Hash Lock (해쉬락을 이용한 개선된 RFID 인증 프로토콜)

  • Bae Woo-Sik;Jang Gun-Oh;Han Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.635-641
    • /
    • 2006
  • On the wireless-communication between Electronic Tag of RFID system and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash-lock related algorithm. This paper has presented the comparison and analysis of the established hash-lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real-time and every session. The algorithm suggested is able to make RFID wireless authentication system offer a several of usefulness and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses just the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' action with time based.

  • PDF

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Monte Carlo Localization for Mobile Robots Under REID Tag Infrastructures (RFID 태그에 기반한 이동 로봇의 몬테카를로 위치추정)

  • Seo Dae-Sung;Lee Ho-Gil;Kim Hong-Suck;Yang Gwang-Woong;Won Dae-Hee
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.47-53
    • /
    • 2006
  • Localization is a essential technology for mobile robot to work well. Until now expensive sensors such as laser sensors have been used for mobile robot localization. We suggest RFID tag based localization system. RFID tag devices, antennas and tags are cheap and will be cheaper in the future. The RFID tag system is one of the most important elements in the ubiquitous system and RFID tag will be attached to all sorts of goods. Then, we can use this tags for mobile robot localization without additional costs. So, in this paper, the smart floor using passive RFID tags is proposed and, passive RFID tags are mainly used for identifying mobile robot's location and pose in the smart floor. We discuss a number of challenges related to this approach, such as tag distribution (density and structure), typing and clustering. When a mobile robot localizes in this smart floor, the localization error mainly results from the sensing range of the RFID reader, because the reader just ran know whether a tag is in the sensing range of the sensor. So, in this paper, we suggest two algorithms to reduce this error. We apply the particle filter based Monte Carlo localization algorithm to reduce the localization error. And with simulations and experiments, we show the possibility of our particle filter based Monte Carlo localization in the RFID tag based localization system.

A Tag Clustering and Recommendation Method for Photo Categorization (사진 콘텐츠 분류를 위한 태그 클러스터링 기법 및 태그 추천)

  • Won, Ji-Hyeon;Lee, Jongwoo;Park, Heemin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.1-13
    • /
    • 2013
  • Recent advance and popularization of smart devices and web application services based on cloud computing have made end-users to directly produce and, at the same time, consume the image contents. This leads to demands of unified contents management services. Thus, this paper proposestag clustering method based on semantic similarity for effective image categorization. We calculate the cost of semantic similarity between tags and cluster tags that are closely related. If tags are in a cluster, we suppose that images with them are also in a same cluster. Furthermore, we could recommend tags for new images on the basis of initial clusters.