• Title/Summary/Keyword: 자동추적

Search Result 674, Processing Time 0.029 seconds

Benign Stricture of Esophagojejunostomy after Radical Total Gastrectomy (위전절제술 후 식도 공장 문합부 양성협착에 대한 고찰)

  • Oh, Seung-Jong;Baik, Yong-Hae;Hong, Seong-Kweon;Choi, Min-Gew;Heo, Jin-Seok;Noh, Jae-Hyung;Sohn, Tae-Sung;Kim, Yong-Il;Kim, Sung
    • Journal of Gastric Cancer
    • /
    • v.5 no.4 s.20
    • /
    • pp.246-251
    • /
    • 2005
  • Purpose: Benign anastomotic stricture after an esophagojejunostomy using EEA stapler following a radical total gastrectomy is one of the most serious complications. The purpose of this study is to evaluate the incidence risk factors, and treatment associated with benign stricture. Materials and Methods: From March 1998 to February 2001, 436 patients underwent an esophagojejunostomy with Roux-en-Y anastomosis using an EEA stapler followed by an endoscopy. Thirty three of the 436 patients(5.5%) developed an anastomotic stricture; included 24 of the 33 patients had a benign stricture. Nine patients with a malignant stricture were excluded. Results: The median age of the 436 patients was 57 years $(23{\sim}85\;years)$. Two hundred ninety two patients were male, and 144 patients were female. The median time to diagnosing the stricture was 1.5 months $(0.5{\sim}6months)$. There was no statistical significance in any of the risk factors, including the diameter of the stapling device, the status of adjuvant treatment, the status of reflux esophagitis, and a clinical history of diabetes and hypertension. The strictured patients were treated with balloon dilatation, one to three times, with symptom relief. Conclusion: There were no statistically significant risk factors. However, further study of the vascularity of anastomoses and benign strictures needs to be considered. In the anastomotic strictured patients endoscopic balloon dilatation appeared to be the first line of treatment.

  • PDF

Clinical Outcomes of Corrective Surgical Treatment for Esophageal Cancer (식도암의 외과적 근치 절제술에 대한 임상적 고찰)

  • Ryu Se Min;Jo Won Min;Mok Young Jae;Kim Hyun Koo;Cho Yang Hyun;Sohn Young-sang;Kim Hark Jei;Choi Young Ho
    • Journal of Chest Surgery
    • /
    • v.38 no.2 s.247
    • /
    • pp.157-163
    • /
    • 2005
  • Background: Clinical outcomes of esophageal cancer have not been satisfactory in spite of the development of surgical skills and protocols of adjuvant therapy. We analyzed the results of corrective surgical patients for esophageal cancer from January 1992 to July 2002. Material and Method: Among 129 patients with esophageal cancer, this study was performed in 68 patients who received corrective surgery. The ratio of sex was 59 : 9 (male : female) and mean age was $61.07\pm7.36$ years old. Chief complaints of this patients were dysphagia, epigastric pain and weight loss, etc. The locations of esophageal cancer were 4 in upper esophagus, 36 in middle, 20 in lower, 8 in esophagogastric junction. 60 patients had squamous cell cancer and 7 had adenocarcinoma, and 1 had malignant melanoma. Five patients had neoadjuvant chemotherapy. Result: The postoperative stage I, IIA, IIB, III, IV patients were 7, 25, 12, 17 and 7, respectively. The conduit for replacement of esophagus were stomach (62 patients) and colon (6 patients). The neck anastomosis was performed in 28 patients and intrathoracic anastomosis in 40 patients. The technique of anastomosis were hand sewing method (44 patients) and stapling method (24 patients). One of the early complications was anastomosis leakage (3 patients) which had only radiologic leakage that recovered spontaneously. The anastomosis technique had no correlation with postoperative leakage, which stapling method (2 patients) and hand sewing method (1 patient). There were 3 respiratory failures, 6 pneumonia, 1 fulminant hepatitis, 1 bleeding and 1 sepsis. The 2 early postoperative deaths were fulminant hepatitis and sepsis. Among 68 patients, 23 patients had postoperative adjuvant therapy and 55 paitents were followed up. The follow up period was $23.73\pm22.18$ months ($1\~76$ month). There were 5 patients in stage I, 21 in stage 2A, 9 in stage IIB, 15 in stage III and 5 in stage IV. The 1, 3, 5 year survival rates of the patients who could be followed up completely was $58.43\pm6.5\%,\;35.48\pm7.5\%\;and\;18.81\pm7.7\%$, respectively. Statistical analysis showed that long-term survival difference was associated with a stage, T stage, and N stage (p<0.05) but not associated with histology, sex, anastomosis location, tumor location, and pre and postoperative adjuvant therapy. Conclusion: The early diagnosis, aggressive operative resection, and adequate postoperative treatment may have contributed to the observed increase in survival for esophageal cancer patients.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Forward Security Protection Protocol of RFID System using New Key Generation Method (새로운 키 생성 방법을 통한 RFID시스템의 전방위보안성 보호 프로토콜)

  • Cho Jung-Hwan;Cho Jung-Sik;Yeo Sang-Soo;Kim Sung kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.19-21
    • /
    • 2005
  • 현대의 산업화 사회에서는 자동인식을 통해서 사람과 사물을 식별하고자 하는 연구들이 진행되고 있다. 그 대표적인 예로 바코드를 이용한 접촉식 판별기술이 있고, 라디오 주파수를 이용한 RFID(Radio Frequency Identification) 기술을 들 수 있다. RFID의 경우는 무선 주파수를 이용하기 때문에 대량의 사물을 동시에 인식 할 수 있다는 장점이 있다. 하지만. 어떠한 상황에서 리더의 요청에 응답을 하는 리더-태그 시스템이기 때문에 사용자의 프라이버시 침해 문제를 야기 할 수 있다. 사용자의 프라이버시 침해문제를 막기 위해서 많은 연구들이 진행되고 있다. 그 중에서, Miyako Ohkubo의 Hash체인을 이용한 프라이버시 보호 기법은 정보유출, 위치추적공격(Location Tracking Attack), 전방위보안성(Forward Security)과 같은 프라이버시 침해문제들로부터 사용자의 프라이버시를 보호 할 수 있는 프로토콜이다. 그러나 Hash함수를 태그에 구현하는 것은 현재까지는 불가능한 상황이다. 또, Martin Feldhofer의 AES(Advanced Encryption Standard)를 사용한 프로토콜은 실제로 태그에 구현 가능하면서 내부구조가 8bit인 AES를 사용함으로써 암호학적인 강도를 높였으나, 프라이버시 침해 문제에서 단점을 드러냈다. 이러한 단점을 보완한 AES기반에서의 개선된 RFID 프라이버시 보호 프로토콜은 실제적으로 태그에 구현 가능한 AES를 이용한 암호화 체인을 통해서 프라이버시 보호에 우수하면서 실제 사용이 가능한 프로토콜을 제안하였다[1]. 그러나, 이 프로토콜은 생성되는 키 값들이 물리적 공격을 통해서 노출이 되었을 때, 이전의 seed값과 키 값들이 노출 되는 단점이 있다. 본 논문에서는 이러한 문제들을 해결하고자 프라이버시보호에 새로운 키 생성 방법을 통한 강력한 프로토콜을 제안 한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분이 하루 세끼 식사를 규칙적으로 하고 있었으며 식사속도는 허겁지겁 빨리 섭취하는 경우가 남자는 $31.0\%$, 여자는 $21.4\%$로 나타났고 이들을 제외한 나머지 사람들은 보통 속도 혹은 충분한 시간을 가지고 식사를 하였다. 평소 식사량은 조금 적게 혹은 적당하게 섭취하는 사람이 대부분이었으며 남자가 여자보다는 배부르게 먹는 경 향이 유의적으로 높았다(p<0.05). 식사는 혼자 하는 경우가 남자

  • PDF

Development of the Algofithm for Gaussian Mixture Models based Traffic Accident Auto-Detection in Freeway (GMM(Gaussian Mixture Model)을 적용한 영상처리기법의 연속류도로 사고 자동검지 알고리즘 개발)

  • O, Ju-Taek;Im, Jae-Geuk;Yeo, Tae-Dong
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.3
    • /
    • pp.169-183
    • /
    • 2010
  • Image-based traffic information collection systems have entered widespread adoption and use in many countries since these systems are not only capable of replacing existing loop-based detectors which have limitations in management and administration, but are also capable of providing and managing a wide variety of traffic related information. In addition, these systems are expanding rapidly in terms of purpose and scope of use. Currently, the utilization of image processing technology in the field of traffic accident management is limited to installing surveillance cameras on locations where traffic accidents are expected to occur and digitalizing of recorded data. Accurately recording the sequence of situations around a traffic accident in a freeway and then objectively and clearly analyzing how such accident occurred is more urgent and important than anything else in resolving a traffic accident. Therefore, in this research, existing technologies, this freeway attribute, velocity changes, volume changes, occupancy changes reflect judge the primary. Furthermore, We pointed out by many past researches while presenting and implementing an active and environmentally adaptive methodology capable of effectively reducing false detection situations which frequently occur even with the Gaussian Mixture model analytical method which has been considered the best among well-known environmental obstacle reduction methods. Therefore, in this way, the accident was the final decision. Also, environmental factors occur frequently, and with the index finger situations, effectively reducing that can actively and environmentally adaptive techniques through accident final judgment. This implementation of the evaluate performance of the experiment road of 12 incidents in simulated and the jang-hang IC's real-time accident experiment. As a result, the do well detection 93.33%, false alarm 6.7% as showed high reliability.

Cable Fault Detection Improvement of STDR Using Reference Signal Elimination (인가신호 제거를 이용한 STDR의 케이블 고장 검출 성능 향상)

  • Jeon, Jeong-Chay;Kim, Taek-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.3
    • /
    • pp.450-456
    • /
    • 2016
  • STDR (sequence time domain reflectometry) to detect a cable fault using a pseudo noise sequence as a reference signal, and time correlation analysis between the reference signal and reflection signal is robust to noisy environments and can detect intermittent faults including open faults and short circuits. On the other hand, if the distance of the fault location is far away or the fault type is a soft fault, attenuation of the reflected signal becomes larger; hence the correlation coefficient in the STDR becomes smaller, which makes fault detection difficult and the measurement error larger. In addition, automation of the fault location by detection of phase and peak value becomes difficult. Therefore, to improve the cable fault detection of a conventional STDR, this paper proposes the algorithm in that the peak value of the correlation coefficient of the reference signal is detected, and a peak value of the correlation coefficient of the reflected signal is then detected after removing the reference signal. The performance of the proposed method was validated experimentally in low-voltage power cables. The performance evaluation showed that the proposed method can identify whether a fault occurred more accurately and can track the fault locations better than conventional STDR despite the signal attenuation. In addition, there was no error of an automatic fault type and its location by the detection of the phase and peak value through the elimination of the reference signal and normalization of the correlation coefficient.

Trend Properties and a Ranking Method for Automatic Trend Analysis (자동 트렌드 탐지를 위한 속성의 정의 및 트렌드 순위 결정 방법)

  • Oh, Heung-Seon;Choi, Yoon-Jung;Shin, Wook-Hyun;Jeong, Yoon-Jae;Myaeng, Sung-Hyon
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.3
    • /
    • pp.236-243
    • /
    • 2009
  • With advances in topic detection and tracking(TDT), automatic trend analysis from a collection of time-stamped documents, like patents, news papers, and blog pages, is a challenging research problem. Past research in this area has mainly focused on showing a trend line over time of a given concept by measuring the strength of trend-associated term frequency information. for detection of emerging trends, either a simple criterion such as frequency change was used, or an overall comparison was made against a training data. We note that in order to show most salient trends detected among many possibilities, it is critical to devise a ranking function. To this end, we define four properties(change, persistency, stability and volume) of trend lines drawn from frequency information, to quantify various aspects of trends, and propose a method by which trend lines can be ranked. The properties are examined individually and in combination in a series of experiments for their validity using the ranking algorithm. The results show that a judicious combination of the four properties is a better indicator for salient trends than any single criterion used in the past for ranking or detecting emerging trends.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

Applicability evaluation of radar-based sudden downpour risk prediction technique for flash flood disaster in a mountainous area (산지지역 수재해 대응을 위한 레이더 기반 돌발성 호우 위험성 사전 탐지 기술 적용성 평가)

  • Yoon, Seongsim;Son, Kyung-Hwan
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.4
    • /
    • pp.313-322
    • /
    • 2020
  • There is always a risk of water disasters due to sudden storms in mountainous regions in Korea, which is more than 70% of the country's land. In this study, a radar-based risk prediction technique for sudden downpour is applied in the mountainous region and is evaluated for its applicability using Mt. Biseul rain radar. Eight local heavy rain events in mountain regions are selected and the information was calculated such as early detection of cumulonimbus convective cells, automatic detection of convective cells, and risk index of detected convective cells using the three-dimensional radar reflectivity, rainfall intensity, and doppler wind speed. As a result, it was possible to confirm the initial detection timing and location of convective cells that may develop as a localized heavy rain, and the magnitude and location of the risk determined according to whether or not vortices were generated. In particular, it was confirmed that the ground rain gauge network has limitations in detecting heavy rains that develop locally in a narrow area. Besides, it is possible to secure a time of at least 10 minutes to a maximum of 65 minutes until the maximum rainfall intensity occurs at the time of obtaining the risk information. Therefore, it would be useful as information to prevent flash flooding disaster and marooned accidents caused by heavy rain in the mountainous area using this technique.

On-line Trajectory Optimization Based on Automatic Time Warping (자동 타임 워핑에 기반한 온라인 궤적 최적화)

  • Han, Daseong;Noh, Junyong;Shin, Joseph S.
    • Journal of the Korea Computer Graphics Society
    • /
    • v.23 no.3
    • /
    • pp.105-113
    • /
    • 2017
  • This paper presents a novel on-line trajectory optimization framework based on automatic time warping, which performs the time warping of a reference motion while optimizing character motion control. Unlike existing physics-based character animation methods where sampling times for a reference motion are uniform or fixed during optimization in general, our method considers the change of sampling times on top of the dynamics of character motion in the same optimization, which allows the character to effectively respond to external pushes with optimal time warping. In order to do so, we formulate an optimal control problem which takes into account both the full-body dynamics and the change of sampling time for a reference motion, and present a model predictive control framework that produces an optimal control policy for character motion and sampling time by repeatedly solving the problem for a fixed-span time window while shifting it along the time axis. Our experimental results show the robustness of our framework to external perturbations and the effectiveness on rhythmic motion synthesis in accordance with a given piece of background music.