• Title/Summary/Keyword: Unique identification information

Search Result 141, Processing Time 0.026 seconds

Review of Karst Research in the Republic of Korea

  • Ryu, Han-Sun;Park, Sangwook;Lee, Jin-Yong;Kim, Heejung
    • Journal of the Korean earth science society
    • /
    • v.43 no.4
    • /
    • pp.481-489
    • /
    • 2022
  • Various types of karst topographies are found worldwide. Owing to their global distribution, karst areas have been extensively studied by scientists who investigate new discoveries by linking the characteristics of karst topographies with their own research fields. However, there have been only a few studies on karsts in the Republic of Korea, and little research exists on their hydrogeology. Fragmentary studies have been conducted on the hydrochemical characteristics of groundwater in limestone areas, the causes of high arsenic concentrations in groundwater, and the hydraulic conductivity of limestone areas. Research on hydrogeological characterization and flow mechanisms in these areas has only began recently. Identification and the proper management of available groundwater resources in karst (limestone) areas is essential as their unique geological characteristics render it difficult to construct reservoirs or dams at appropriate scales. We have reviewed prior work on karsts in the Republic of Korea to provide information that supports water resource security in the karst areas, to improve the understanding of the equitable use of water resources, and to identify the best management practices for groundwater resource resilience improvement.

Identification of long non-coding RNA-mRNA interactions and genome-wide lncRNA annotation in animal transcriptome profiling

  • Yoon-Been Park;Jun-Mo Kim
    • Journal of Animal Science and Technology
    • /
    • v.65 no.2
    • /
    • pp.293-310
    • /
    • 2023
  • Protein-translated mRNA analysis has been extensively used to determine the function of various traits in animals. The non-coding RNA (ncRNA), which was known to be non-functional because it was not encoded as a protein, was re-examined as it was studied to actually function. One of the ncRNAs, long non-coding RNA (lncRNA), is known to have a function of regulating mRNA expression, and its importance is emerging. Therefore, lncRNAs are currently being used to understand the traits of various animals as well as human diseases. However, studies on lncRNA annotation and its functions are still lacking in most animals except humans and mice. lncRNAs have unique characteristics of lncRNAs and interact with mRNA through various mechanisms. In order to make lncRNA annotations in animals in the future, it is essential to understand the characteristics of lncRNAs and the mechanisms by which lncRNAs function. In addition, this will allow lncRNAs to be used for a wider variety of traits in a wider range of animals, and it is expected that integrated analysis using other biological information will be possible.

The Role of Social Capital and Identity in Knowledge Contribution in Virtual Communities: An Empirical Investigation (가상 커뮤니티에서 사회적 자본과 정체성이 지식기여에 미치는 역할: 실증적 분석)

  • Shin, Ho Kyoung;Kim, Kyung Kyu;Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.53-74
    • /
    • 2012
  • A challenge in fostering virtual communities is the continuous supply of knowledge, namely members' willingness to contribute knowledge to their communities. Previous research argues that giving away knowledge eventually causes the possessors of that knowledge to lose their unique value to others, benefiting all except the contributor. Furthermore, communication within virtual communities involves a large number of participants with different social backgrounds and perspectives. The establishment of mutual understanding to comprehend conversations and foster knowledge contribution in virtual communities is inevitably more difficult than face-to-face communication in a small group. In spite of these arguments, evidence suggests that individuals in virtual communities do engage in social behaviors such as knowledge contribution. It is important to understand why individuals provide their valuable knowledge to other community members without a guarantee of returns. In virtual communities, knowledge is inherently rooted in individual members' experiences and expertise. This personal nature of knowledge requires social interactions between virtual community members for knowledge transfer. This study employs the social capital theory in order to account for interpersonal relationship factors and identity theory for individual and group factors that may affect knowledge contribution. First, social capital is the relationship capital which is embedded within the relationships among the participants in a network and available for use when it is needed. Social capital is a productive resource, facilitating individuals' actions for attainment. Nahapiet and Ghoshal (1997) identify three dimensions of social capital and explain theoretically how these dimensions affect the exchange of knowledge. Thus, social capital would be relevant to knowledge contribution in virtual communities. Second, existing research has addressed the importance of identity in facilitating knowledge contribution in a virtual context. Identity in virtual communities has been described as playing a vital role in the establishment of personal reputations and in the recognition of others. For instance, reputation systems that rate participants in terms of the quality of their contributions provide a readily available inventory of experts to knowledge seekers. Despite the growing interest in identities, however, there is little empirical research about how identities in the communities influence knowledge contribution. Therefore, the goal of this study is to better understand knowledge contribution by examining the roles of social capital and identity in virtual communities. Based on a theoretical framework of social capital and identity theory, we develop and test a theoretical model and evaluate our hypotheses. Specifically, we propose three variables such as cohesiveness, reciprocity, and commitment, referring to the social capital theory, as antecedents of knowledge contribution in virtual communities. We further posit that members with a strong identity (self-presentation and group identification) contribute more knowledge to virtual communities. We conducted a field study in order to validate our research model. We collected data from 192 members of virtual communities and used the PLS method to analyse the data. The tests of the measurement model confirm that our data set has appropriate discriminant and convergent validity. The results of testing the structural model show that cohesion, reciprocity, and self-presentation significantly influence knowledge contribution, while commitment and group identification do not significantly influence knowledge contribution. Our findings on cohesion and reciprocity are consistent with the previous literature. Contrary to our expectations, commitment did not significantly affect knowledge contribution in virtual communities. This result may be due to the fact that knowledge contribution was voluntary in the virtual communities in our sample. Another plausible explanation for this result may be the self-selection bias for the survey respondents, who are more likely to contribute their knowledge to virtual communities. The relationship between self-presentation and knowledge contribution was found to be significant in virtual communities, supporting the results of prior literature. Group identification did not significantly affect knowledge contribution in this study, inconsistent with the wealth of research that identifies group identification as an important factor for knowledge sharing. This conflicting result calls for future research that examines the role of group identification in knowledge contribution in virtual communities. This study makes a contribution to theory development in the area of knowledge management in general and virtual communities in particular. For practice, the results of this study identify the circumstances under which individual factors would be effective for motivating knowledge contribution to virtual communities.

  • PDF

A Study on Standardization of Copyright Collective Management for Digital Contents (디지털콘덴츠 집중관리를 위한 표준화에 관한 연구)

  • 조윤희;황도열
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.301-320
    • /
    • 2003
  • The rapidly increasing use of the Internet and advancement of the communication network, the explosive growth of digital contents from personal home pages to professional information service the emerging file exchange service and the development of hacking techniques . these are some of the trends contributing to the spread of illegal reproduction and distribution of digital contents, thus threatening the exclusive copyrights of the creative works that should be legally protected Accordingly, there is urgent need for a digital copyright management system designed to provide centralized management while playing the role of bridge between the copyright owners and users for smooth trading of the rights to digital contents, reliable billing, security measures, and monitoring of illegal use. Therefore, in this study, I examined the requirements of laws and systems for the introduction of the centralized management system to support smooth distribution of digital contents, and also researched on the current status of domestic and international centralized management system for copyrights. Furthermore, 1 tried to provide basic materials for the standardization of digital contents copyright management information through the examination of the essential elements of the centralized digital contents management such as the system for unique identification the standardization for data elements, and the digital rights management (DHM) .

On Pattern Kernel with Multi-Resolution Architecture for a Lip Print Recognition (구순문 인식을 위한 복수 해상도 시스템의 패턴 커널에 관한 연구)

  • 김진옥;황대준;백경석;정진현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.2067-2073
    • /
    • 2001
  • Biometric systems are forms of technology that use unique human physical characteristics to automatically identify a person. They have sensors to pick up some physical characteristics, convert them into digital patterns, and compare them with patterns stored for individual identification. However, lip-print recognition has been less developed than recognition of other human physical attributes such as the fingerprint, voice patterns, retinal at blood vessel patterns, or the face. The lip print recognition by a CCD camera has the merit of being linked with other recognition systems such as the retinal/iris eye and the face. A new method using multi-resolution architecture is proposed to recognize a lip print from the pattern kernels. A set of pattern kernels is a function of some local lip print masks. This function converts the information from a lip print into digital data. Recognition in the multi-resolution system is more reliable than recognition in the single-resolution system. The multi-resolution architecture allows us to reduce the false recognition rate from 15% to 4.7%. This paper shows that a lip print is sufficiently used by the measurements of biometric systems.

  • PDF

Design and Implementation of a Digital Contents Service System based on the Identification System (식별체계기반의 전자원문 연계시스템 설계 및 구현)

  • Lee, Sang-Hwan;Sin, Dong-Goo;Kim, Jae-Soo;Choi, Jin-Young;Jeong, Taek-Yeong
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.3
    • /
    • pp.15-29
    • /
    • 2004
  • With the rapid growth of information technology and the internet. the physical contents are transformed into digital contents at a fast rate. With the change. accessing the digital contents, toe service methods and the identifier used for the digital contents are not systematic and limited for use. The DOI identifier system used for the URN is also limited to academic journals or magazines and are not adequately applicable for non-academic journal or digital contents. Therefore. we have developed a unique identifier based on the analysis made on the system adopted by foreign digital contents service institutes. two types of academic journals 3 types of non-academic journals owned by KISTI that can be adopted by non-academic journals. The identifier is to be used to design and implement a digital contents service system.

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code (개선된 해시함수와 CRC 코드 기반의 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Yun, Tae-Jin;Lee, Chang-Hee;Lee, Jae-Kang;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.132-139
    • /
    • 2012
  • In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.

Authorship Attribution Framework Using Survival Network Concept : Semantic Features and Tolerances (서바이벌 네트워크 개념을 이용한 저자 식별 프레임워크: 의미론적 특징과 특징 허용 범위)

  • Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1013-1021
    • /
    • 2020
  • Malware Authorship Attribution is a research field for identifying malware by comparing the author characteristics of unknown malware with the characteristics of known malware authors. The authorship attribution method using binaries has the advantage that it is easy to collect and analyze targeted malicious codes, but the scope of using features is limited compared to the method using source code. This limitation has the disadvantage that accuracy decreases for a large number of authors. This study proposes a method of 'Defining semantic features from binaries' and 'Defining allowable ranges for redundant features using the concept of survival network' to complement the limitations in the identification of binary authors. The proposed method defines Opcode-based graph features from binary information, and defines the allowable range for selecting unique features for each author using the concept of a survival network. Through this, it was possible to define the feature definition and feature selection method for each author as a single technology, and through the experiment, it was confirmed that it was possible to derive the same level of accuracy as the source code-based analysis with an improvement of 5.0% accuracy compared to the previous study.

Development of an efficient method of radiation characteristic analysis using a portable simultaneous measurement system for neutron and gamma-ray

  • Jin, Dong-Sik;Hong, Yong-Ho;Kim, Hui-Gyeong;Kwak, Sang-Soo;Lee, Jae-Geun;Jung, Young-Suk
    • Analytical Science and Technology
    • /
    • v.35 no.2
    • /
    • pp.69-81
    • /
    • 2022
  • The method of measuring and classifying the energy category of neutrons directly using raw data acquired through a CZT detector is not satisfactory, in terms of accuracy and efficiency, because of its poor energy resolution and low measurement efficiency. Moreover, this method of measuring and analyzing the characteristics of low-energy or low-activity gamma-ray sources might be not accurate and efficient in the case of neutrons because of various factors, such as the noise of the CZT detector itself and the influence of environmental radiation. We have therefore developed an efficient method of analyzing radiation characteristics using a neutron and gamma-ray analysis algorithm for the rapid and clear identification of the type, energy, and radioactivity of gamma-ray sources as well as the detection and classification of the energy category (fast or thermal neutrons) of neutron sources, employing raw data acquired through a CZT detector. The neutron analysis algorithm is based on the fact that in the energy-spectrum channel of 558.6 keV emitted in the nuclear reaction 113Cd + 1n → 114Cd + in the CZT detector, there is a notable difference in detection information between a CZT detector without a PE modulator and a CZT detector with a PE modulator, but there is no significant difference between the two detectors in other energy-spectrum channels. In addition, the gamma-ray analysis algorithm uses the difference in the detection information of the CZT detector between the unique characteristic energy-spectrum channel of a gamma-ray source and other channels. This efficient method of analyzing radiation characteristics is expected to be useful for the rapid radiation detection and accurate information collection on radiation sources, which are required to minimize radiation damage and manage accidents in national disaster situations, such as large-scale radioactivity leak accidents at nuclear power plants or nuclear material handling facilities.

Blockchain-based Smart Meter Authentication Protocol in Smart Grid Environment (스마트 그리드 환경에서 블록체인 기반 스마트 미터 인증 프로토콜)

  • Jonghyun Kim;Myeonghyun Kim;Youngho Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.41-54
    • /
    • 2023
  • Smart grid that supports efficient energy production and management is used in various fields and industries. However, because of the environment in which services are provided through open networks, it is essential to resolve trust issues regarding security vulnerabilities and privacy preservation. In particular, the identification information of smart meter is managed by a centralized server, which makes it vulnerable to security attacks such as device stolen, data forgery, alteration, and deletion. To solve these problems, this paper proposes a blockchain based authentication protocol for a smart meter. The proposed scheme issues an unique decentralized identifiers (DIDs) for individual smart meter through blockchain and utilizes a random values based on physical unclonable function (PUF) to strengthen the integrity and reliability of data. In addition, we analyze the security of the proposed scheme using informal security analysis and AVISPA simulation, and show the efficiency of the proposed scheme by comparing with related work.