• Title/Summary/Keyword: Anomaly

Search Result 2,230, Processing Time 0.023 seconds

Surgical Correction of Anomalous Right Superior Vena Cava[RSVC] into the Left Artium as an Isolated Anomaly - Report of a case - (우측 상대정맥의 좌심방으로 이상환류의 수술치험)

  • 백희종
    • Journal of Chest Surgery
    • /
    • v.25 no.12
    • /
    • pp.1455-1460
    • /
    • 1992
  • Anomalous drainage of the right superior vena cava into the left atrium is a very rare congenital cardiac anomaly. Recently a patient with this venous anomaly was surgically corrected and forms the basis of this report. Patient findings were as follows: The patient has no other symptom but cyanosis which prompted cardiac evaluation Chest PA and electrocariogram were usual. Cross-sectional echocardiogram showed normally connected heart without intracardiac defect, Inferior vena cava drained normally into right atrium and coronary sinus was not dilated. Contrast, given into the right atrium, appeared in the left atrium This rare venous anomaly was confirmed by surgery. Surgical correction consisted of division of superior vena cava above the junction of left atrium and reanastomosis into right atrial appendage. Postoperative digital subtracion angiography confirmed the successful repair. She has doing well for 6months since operation. Systemic venous anomalies without intracardiac defect are very rare. However this anomalies should be considered in the differential diagnosis of cyanosis. The successfully corrected case is reported and literature is reviewed.

  • PDF

Inheritance Anomaly using Behavior Equation in Concurrent Object-Oriented Programming Languages (병행객체지향 언어에서 행위 방정식을 이용한 상속 변칙)

  • Lee, Ho-Young;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.3
    • /
    • pp.587-595
    • /
    • 1999
  • The fundamental reason why inheritance anomaly occurs is that for a concurrent object, when synchronization code is not properly separated from the method code, the extension of code to produce a derived class may force the change of both the synchronization code and the method code in the super class, and inheritance is integrated inheritance in a simple and satisfactory way within a concurrent object-oriented language. The main emphasis on how to avoid or minimize inheritance anomaly. Therefore, in this paper we propose a new model, object model, and will minimizes the problem of inheritance anomaly found in concurrent object-oriented programming languages using Behavior Equation.

  • PDF

Studies on the Chain Anomaly Determination of Human Globins (사람 글로빈의 Chain Anomaly 결정에 관한 연구)

  • 노일협;최정숙
    • YAKHAK HOEJI
    • /
    • v.22 no.4
    • /
    • pp.233-237
    • /
    • 1978
  • We studied on the separation of $\alpha$- and $\beta$-chain globins, the conditions of paper electrophoresis and mobility of globins in paper electrophoresis to determine their chain anomaly. Acidic-acetone mothod of Wilson and Smith was found to be more effecient for separating $\alpha$- and $\beta$chain globions than trichloroacetic acid method of Hayashi. The conditions of paper electrophoresis were current of 20v/cm and 0.6mA/cm for three hours at room temperature. In paper electroporesis, the mobility of $\alpha$- -chain globin towards the cathode was greater than that of $\beta$-chain globin. The results showed tha tchain anomaly of $\alpha$- and $\beta$-chain globins can be determined by the method of paper electrophoresis.

  • PDF

Anomaly Removal for Efficient Conformance Test (효율적인 프로토콜 적합성 시험을 위한 변칙성 제거)

  • Lee, Hyeon-Cheol;Heo, Gi-Taek
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.750-757
    • /
    • 1999
  • The protocol conformance testing is to check whether an implementation of a protocol conforms to its specification. And it is important to improve the interoperability of protocol and the efficiency of cost. In general, protocol is composed of the control flow representing observable behaviors and the data flow representing internally used variables. Until now, research for generation of test suite has been realized only consideration the control flow of protocol or separation control flow from data flow. Case of considering control flow, contents of test was simple and definite. Length of test was short. But it was of little application, and it didn't manage each kind errors in data flow. Therefore, we must generate test case that can manage control and data flow. So, anomaly of variable must be removed for efficient conformance testing. Therefore in this dissertation, we proposed algorithm which can remove anomaly of variable for efficient conformance testing. And it showed that anomaly of variable was got rid of applying this algorithm to real protocol.

  • PDF

Study on Separating Underwater Earth Field Anomaly Generated by a Ship (함정에 의해 발생하는 수중 지자계 외란신호 분리방법에 대한 연구)

  • Lee, Kang-Jin;Yang, Chang-Seop;Jung, Hyun-Ju;Kim, Dong-Hun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.8
    • /
    • pp.1412-1417
    • /
    • 2007
  • Magnetic anomaly generated around a ship is mainly due to the permanent magnetization(PM) and induced magnetization (IM) remaining on the hull. It is very difficult to predict the direction and its magnitude of the permanent magnetization distributed over the hull, that is caused by mechanical or thermal stress. In this paper, an effective method is proposed to separate two components, the one produced by PM and the other by IM, from the underwater earth field signal distorted by the ferromagnetic material of the ship. The method can easily provide the two kinds of magnetic anomaly through exploiting experimental results and 3D electromagnetic field analyses even though the PM distribution on the hull is not known. To validate the proposed method, a model ship is manufactured and tested. The results would be of much help to basis research for securing safe navigation of a ship against dangerous factors in underwater.

Detection of 2002-2003 El Ni${\tilde{n}}$o Using EOS and OSMI Data

  • Lee, S.H.;Lim, H.S.;Kim, J.G.;Jun, J.N.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1413-1414
    • /
    • 2003
  • Interannual variability in the patterns of satellitederived pigment concentrations, sea-level height anomaly, sea surface temperature anomaly, and zonal wind anomaly are observed during the 2002-2003 El Ni${\tilde{n}}$o. The largest spatial extent of the phytoplankton bloom was recovery from El Ni${\tilde{n}}$o over the equatorial Pacific. The evolution towards a warm episode (El Ni${\tilde{n}}$o) started from spring of 2002 and continued during January 2003, while equatorial Sea Surface Temperature Anomaly (SSTA) remained greater than +1$^{\circ}$C in the central equatorial Pacific. The EOS (Earth Observing System) and OSMI (Ocean Scanning Multispectral Imager) data are used for detection of dramatic changes in the patterns of pigment concentration during El Ni${\tilde{n}}$o.

  • PDF

Hierarchical Correlation-based Anomaly Detection for Vision-based Mask Filter Inspection in Mask Production Lines (마스크 생산 라인에서 영상 기반 마스크 필터 검사를 위한 계층적 상관관계 기반 이상 현상 탐지)

  • Oh, Gunhee;Lee, Hyojin;Lee, Heoncheol
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.277-283
    • /
    • 2021
  • This paper addresses the problem of vision-based mask filter inspection for mask production systems. Machine learning-based approaches can be considered to solve the problem, but they may not be applicable to mask filter inspection if normal and anomaly mask filter data are not sufficient. In such cases, handcrafted image processing methods have to be considered to solve the problem. In this paper, we propose a hierarchical correlation-based approach that combines handcrafted image processing methods to detect anomaly mask filters. The proposed approach combines image rotation, cropping and resizing, edge detection of mask filter parts, average blurring, and correlation-based decision. The proposed approach was tested and analyzed with real mask filters. The results showed that the proposed approach was able to successfully detect anomalies in mask filters.

A Robust Bayesian Probabilistic Matrix Factorization Model for Collaborative Filtering Recommender Systems Based on User Anomaly Rating Behavior Detection

  • Yu, Hongtao;Sun, Lijun;Zhang, Fuzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4684-4705
    • /
    • 2019
  • Collaborative filtering recommender systems are vulnerable to shilling attacks in which malicious users may inject biased profiles to promote or demote a particular item being recommended. To tackle this problem, many robust collaborative recommendation methods have been presented. Unfortunately, the robustness of most methods is improved at the expense of prediction accuracy. In this paper, we construct a robust Bayesian probabilistic matrix factorization model for collaborative filtering recommender systems by incorporating the detection of user anomaly rating behaviors. We first detect the anomaly rating behaviors of users by the modified K-means algorithm and target item identification method to generate an indicator matrix of attack users. Then we incorporate the indicator matrix of attack users to construct a robust Bayesian probabilistic matrix factorization model and based on which a robust collaborative recommendation algorithm is devised. The experimental results on the MovieLens and Netflix datasets show that our model can significantly improve the robustness and recommendation accuracy compared with three baseline methods.

UFKLDA: An unsupervised feature extraction algorithm for anomaly detection under cloud environment

  • Wang, GuiPing;Yang, JianXi;Li, Ren
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.684-695
    • /
    • 2019
  • In a cloud environment, performance degradation, or even downtime, of virtual machines (VMs) usually appears gradually along with anomalous states of VMs. To better characterize the state of a VM, all possible performance metrics are collected. For such high-dimensional datasets, this article proposes a feature extraction algorithm based on unsupervised fuzzy linear discriminant analysis with kernel (UFKLDA). By introducing the kernel method, UFKLDA can not only effectively deal with non-Gaussian datasets but also implement nonlinear feature extraction. Two sets of experiments were undertaken. In discriminability experiments, this article introduces quantitative criteria to measure discriminability among all classes of samples. The results show that UFKLDA improves discriminability compared with other popular feature extraction algorithms. In detection accuracy experiments, this article computes accuracy measures of an anomaly detection algorithm (i.e., C-SVM) on the original performance metrics and extracted features. The results show that anomaly detection with features extracted by UFKLDA improves the accuracy of detection in terms of sensitivity and specificity.

Common Hepatic Artery Originating from Left Gastric Artery: A Rare Variant Encountered in Gastric Cancer Surgery

  • Choi, Chang In;Jeon, Tae Yong
    • Kosin Medical Journal
    • /
    • v.33 no.3
    • /
    • pp.463-467
    • /
    • 2018
  • The hepatic artery can have numerous variations. However, a common hepatic artery originating from the left gastric artery and the entire hepatic blood supply furnished by the left gastric artery is an extremely rare anomaly. We encountered this anomaly in a patient with advanced gastric cancer. A surgeon should recognize this image appearance and identify the anomaly. Without knowledge of this anomaly and given the strategy for extensive lesser sac dissection generally employed during gastric cancer surgery, a surgeon could easily inadvertently divide this vessel, resulting in critical liver damage. We report a case of common hepatic artery originating from left gastric artery and review of the literatures.