• Title/Summary/Keyword: identity based

Search Result 2,344, Processing Time 0.031 seconds

Detection of viral hemorrhagic septicemia virus (VHSV) in wild marine fishes in the coastal region of Korea (우리 나라 연근해 자연산 해수 어종에서의 Viral Hemorrhagic Septicemia Virus (VHSV)의 검출)

  • Kim, Su-Mi;Park, Su-Il
    • Journal of fish pathology
    • /
    • v.17 no.1
    • /
    • pp.1-10
    • /
    • 2004
  • In order to analyse the detection of viral hemorrhagic septicemia virus (VHSV) in marine environment surrounding coastal region of Eastern and Southern sea of Korea, the pools of each organ sample of three fish were taken for virus assay from February to May in 2003. The samples comprised 42, taken from 9 species of marine fishes. The VHSV was detected from chub mackerel Scomber japonicus and striped mullet Mugil cephalus in epithelioma papulosum cyprini (EPC) cells. The identity of the virus was confirmed a reverse transcriptase-polymerase chain reaction (RT-PCR). VHSV has previously been reported from chub mackerel, but not from striped mullet. The new isolates was classified as a member of genogroup I (American type) of VHSV and was closely related to the VHSV KVHS'01-l based on comparisons of the partial nucleotide sequence of the glycoprotein (G) gene.

A Research on the Format for Romanization of Korean Personal Name (한국인명의 로마자표기 형식에 대한 연구)

  • Kim, Sung-Won;Kim, Jeong-Woo
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.199-222
    • /
    • 2012
  • Due to the increase of international business and activities, Koreans nowadays have higher needs to present their personal identity to the foreigners. In this process, the first requirement is to exchange personal names with foreigners. Therefore, the phonetic translation of Korean names into Roman alphabetic notation is frequently required, in order to deliver Korean personal names to the people who do not understand Korean alphabet. However, some confusions have been witnessed in the way of transforming Korean names into Roman (English) alphabet notation, due to the fact that there are many different ways to put Korean pronunciation into Roman (English) alphabet. This study examines different formats of Romanization of Korean personal names to find and suggest an optimal one. It first examines structures of and differences between Korean and Western personal names and usage patterns, reviews the issues surrounding Romanization of Korean personal names, and patternizes diverse Romanization formats currently used. Based on these examinations and consequent findings, I would like to suggest a format for the Romanization of Korean personal names which is considered to be the best.

Design of MBB System for provide Mobility continuity in Environment IPSec (IPSec 환경에서 연속적인 이동성 제공을 위한 MBB 시스템 설계)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.478-484
    • /
    • 2008
  • When a mobile node moves, MIPv6 operates an authentication process for the new connection. These kinds of frequent binding update and authentication processes cause much traffic and delay the service. To solve this problem, PMIPv6 provides a network-based mobility protocol in order to lessen the load on a mobile node. However, when it is moved from a domain to a domain or in a domain, there still lies a need fDr a new address, so MIPv6's demerit still exists. In IPsec, too, a new negotiation should be made when it is moved to WAN(Wide Area Network). This causes load to the mobile node. In this paper suggests MBB(Make Before Break) system to eliminate disconnections or delays resulted from the address change or renegotiation for security. When the mobile node receives a CoA address, IPsec negotiation gets operated. Its identity is authenticated by sending the identifier used for the prior negotiation to CN(Correspondent Node) through the BID message suggested. After that, negotiation Bets simplified that disconnections can be eliminated, and in the IPsec negotiation, the load on the mobile node can be lessened as well; moreover, two addresses are used for the communication simultaneously, so the probability of packet loss can be reduced.

A Study about the Experience of Xenophobia to Immigrant Workers in Korean Society : Grounded Theory Approach (이주노동자들의 한국 사회에서의 제노포비아 경험에 대한 연구 : 근거이론 접근)

  • Kim, Seo Young
    • Korean Journal of Social Welfare Studies
    • /
    • v.49 no.4
    • /
    • pp.31-63
    • /
    • 2018
  • The purpose of this study is to present substantive theory about the phenomenon of Xenopobia in Korea. This study approached the Grounded Theory. The study involved 18 migrant workers. The data were constructed by conducting in-depth interviews. Data were analyzed by Strauss and Corbin(2008) in the order of open coding, axial coding, and selective coding. The researcher presented a paradigm model based on 13 categories of open coding and analyzed the process, and the core category was 'The Life of Loss Identity because of Treated Enemy in the Future in Korea of Internal Contradiction'. Finally, the author discussed on the basis of the results of the research and made suggestions for mitigating the phenomenon of Xenophobia.

The three Ontological Characteristics of the Person with Emmanuel Mounier (엠마누엘 무니에의 '인격(personne)'의 세 가지 존재론적인 특성)

  • Lee, Myung-Gon
    • Journal of Korean Philosophical Society
    • /
    • v.137
    • /
    • pp.249-276
    • /
    • 2016
  • The thought of Emmanuel Mounier addresses the most important problems in human life. In this research we try to analyze the three ontological characteristics of 'Person'. First the person has an indefinable character and is not substitutable since he is the true self which is the inner and spiritual being constituting the self-consciousness of an individual. The person has his individuality precisely because he is an individual and his being sovereign in having his own world. Next, the person's individuality has an ontological solitude from his own perspective. Nevertheless, having essentially an existential openness since it receives the elements that compose his own world by relationship and communication between men, and being connected unremittedly, the person is paradoxical. Finally, the person appears as a dynamic thing that continues to create the new self-consciousness. And this dynamism of the person wants to proclaim its self identity while at the same time, aim for a "personification of society" based on the love of humanity. Because of this we can say that the thought of Emmanuel Mounier on the person may be a new type of "humanism" that can give light to the misery of modern society.

Elizabethkingia miricola BM10, a New Symbiotic Bacterium Isolated from the Hindgut of the Termite Reticulitermes speratus KMT001

  • LEE, Dongmin;KIM, Young-Kyoon;KIM, Yeong-Suk;KIM, Tae-Jong
    • Journal of the Korean Wood Science and Technology
    • /
    • v.47 no.6
    • /
    • pp.692-699
    • /
    • 2019
  • Elizabethkingia miricola BM10, a symbiotic bacterium, has been isolated from the hindgut of Reticulitermes speratus KMT001, a termite which occurs on Bukhan Mountain in Seoul, Korea. This strain demonstrated a symbiotic characteristic, in that it lacked endo-${\beta}$-1,4-glucanase activity, in a previous study. The major fatty acids of E. miricola BM10 were iso-$C_{15:0}$, iso-$C_{17:0}$ 3-OH, and summed feature 3 (iso-$C_{16:1}{\omega}7c/C_{16:1}{\omega}6c$). The content of iso-$C_{17:0}$ 3-OH was higher, while those of ECL 13.566, iso-$C_{17:11}{\omega}9c$, and summed feature 4 were lower than the other three type-strains of the Elizabethkingia genus. The 16S rRNA phylogenetic analysis confirmed that E. miricola BM10 is a new species. The whole genome of E. miricola BM10 was sequenced. The average nucleotide identity of strain BM10 as evaluated by pairwise comparison with E. anophelis R26, E. meningoseptica ATCC 13253, and E. miricola GTC 862 was shown to be 91.5%, 81.2%, and 94.29%, respectively. Based on our study results, E. miricola BM10 appears to represent a new strain of the genus Elizabethkingia.

Designer Baby Anna: Finding Right to the Body - Focused on Jodie Picoult's 『My Sister's Keeper』 - (맞춤형 아기 안나: 신체에 대한 권리를 찾아서 - 조디 피코의 『마이 시스터즈 키퍼』를 중심으로 -)

  • Kim, Myung-kyun;Kim, Dong-giun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.171-181
    • /
    • 2019
  • In this article, we examined designer babies and bioethics, and we reviewed how Anna argued that she had the rights to her body through trial with parents. No matter what purpose a cloned human or designer baby was born with, it is worth being respected as the birth itself. After learning the secrets of his birth in Jodie Picoult's My Sister's Keeper, which is based on a designer baby, Anna falls into confusion of identity and sues parents who decide to transplant organs regardless of Anna's will. Anna argues that she has the right to make decisions about her own body and that even her parents can't disregard her opinions. Scientists should stop their research if using biotechnology to reproduce humans, such as designer babies and cloned humans, can destroy the natural order.

Taxonomic reexamination of new species described by Léveillé in the serial papers of Decades plantarum novarum. II. New species currently treated as taxonomic synonyms of other species (Léveillé가 Decades plantarum novarum의 연속 논문에 기재한 한국산 신분류군에 대한 분류학적 검토 II. 신종으로 발표된 분류군 중 분류학적 이명으로 간주되고 있는 분류군)

  • Shin, Hyunchur;Kim, Young-Dong
    • Korean Journal of Plant Taxonomy
    • /
    • v.39 no.3
    • /
    • pp.143-169
    • /
    • 2009
  • To confirm the taxonomic identity of taxa described by $L{\acute{e}}veill{\acute{e}}$, H. H. A, a French plant taxonomist, in the serial papers of Decades plantarum novarum based on the collections of Fathers Faurie and Taquet from the Korean peninsula, we examined the numerous references that contained taxonomic opinions about $L{\acute{e}}veill{\acute{e}}^{\prime}s$ taxa. Among them, 146 taxa were confirmed as conspecific with other existing taxa. Of them, 79 taxa, including Ajuga devestita, were listed as a synonym of only one species. Sixty-seven taxa, including Bidens robertianifolia, were listed as synonyms of two or more species according to taxonomists. Eight taxa, including Aconitum coreanum, were considered illegitimate names because of later homonym, or other problems. Five taxa, including Rhododendron hallaisanense, were treated either as distinct or conspecific taxa depending on taxonomists.

Smart grid and nuclear power plant security by integrating cryptographic hardware chip

  • Kumar, Niraj;Mishra, Vishnu Mohan;Kumar, Adesh
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3327-3334
    • /
    • 2021
  • Present electric grids are advanced to integrate smart grids, distributed resources, high-speed sensing and control, and other advanced metering technologies. Cybersecurity is one of the challenges of the smart grid and nuclear plant digital system. It affects the advanced metering infrastructure (AMI), for grid data communication and controls the information in real-time. The research article is emphasized solving the nuclear and smart grid hardware security issues with the integration of field programmable gate array (FPGA), and implementing the latest Time Authenticated Cryptographic Identity Transmission (TACIT) cryptographic algorithm in the chip. The cryptographic-based encryption and decryption approach can be used for a smart grid distribution system embedding with FPGA hardware. The chip design is carried in Xilinx ISE 14.7 and synthesized on Virtex-5 FPGA hardware. The state of the art of work is that the algorithm is implemented on FPGA hardware that provides the scalable design with different key sizes, and its integration enhances the grid hardware security and switching. It has been reported by similar state-of-the-art approaches, that the algorithm was limited in software, not implemented in a hardware chip. The main finding of the research work is that the design predicts the utilization of hardware parameters such as slices, LUTs, flip-flops, memory, input/output blocks, and timing information for Virtex-5 FPGA synthesis before the chip fabrication. The information is extracted for 8-bit to 128-bit key and grid data with initial parameters. TACIT security chip supports 400 MHz frequency for 128-bit key. The research work is an effort to provide the solution for the industries working towards embedded hardware security for the smart grid, power plants, and nuclear applications.

A Scheme of Identity Authentication and Anomaly Detection using ECG and Beacon-based Blockchain (ECG와 비콘 기반의 블록체인을 이용한 신원 인증 및 이상징후 탐지 기법)

  • Kim, Kyung-Hee;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.69-74
    • /
    • 2021
  • With the recent development of biometric authentication technology, the user authentication techniques using biometric authentication are increasing. Various problems arised in certification techniques that use various existing methods such as ID/PW. Therefore, recently, a method of improving security by introducing biometric authentication as secondary authentication has been used. In this thesis, proposal of the user authentication system that can detect user identification and anomalies using ECGs that are extremely difficult to falsify through the electrical biometric signals from the heart among various biometric authentication devices is studied. The system detects user anomalies by comparing ECG data received from a wrist-mounted wearable device-type ECG measurement tool with identification and ECG data stored in blockchain form on the database and identifying the user's location through a beacon system.