• Title/Summary/Keyword: Bypass Technique

Search Result 230, Processing Time 0.021 seconds

Resternotomy for Recurrent Aortic Aneurysm Adherent to the Sternum Under Deep Hypothermic Circulatory Arrest (흉골에 접한 재발성 대동맥류에서 초저체온 순환정지하에서의 흉골재절개)

  • Kim, Sang-Heon;Kim, Young-Hak;Kim, Hyuck;Chung, Won-Sang;Kang, Jung-Ho;Jee, Heng-Ok;Lee, Chul-Bum
    • Journal of Chest Surgery
    • /
    • v.37 no.1
    • /
    • pp.108-111
    • /
    • 2004
  • Reoperation on the recurrent aortic aneurysm adjuvent to sternum remains a challenging problem in regard to the risk of the massive hemorrhage at the time of resternotomy resulting from inadvertent entry into the aneurysmal sac. The cardiopulmonary bypass technique of femoral cannulation and deep hypothermic circulatory arrest can provide a safe resternotomy. The left ventricle is likely to distend due to lack of contraction with ventricular fibrillation during core cooling. To prevent ventricular distention during core cooling, sufficient venous drainage is mandatory, We report a technique in which deep hypothermic circulatory arrest is achieved before resternotomy without left ventricular distention by active venous drainage using centrifugal pump.

Endovascular Aortic Balloon Clamping for Various Heart Disease (대동맥 내 풍선 차단법을 이용한 여러 가지 심장수술)

  • Choi, Jin-Ho;Park, Pyo-Won
    • Journal of Chest Surgery
    • /
    • v.41 no.1
    • /
    • pp.61-67
    • /
    • 2008
  • Background: Conventional ascending aortic cross clamping is often limited. This study was carried out to evaluate the safety and efficacy of an endovascular aortic clamping technique with an intraaortic balloon catheter. Material and Method: From April 2004 to January 2007, surgery with endoaortic clamping was performed in seven patients. A retrograde access perfusion (RAP) catheter was used in six patients and a Pruitt's balloon catheter in two patients. The indication for the operation was a retrosternal pseudoaneurysm of the aortic root in six patients, diffuse calcification of the ascending aorta with aortic regurgitation in 2 patients and an atrial septal defect in one patient. Five patients had at least two prior cardiac surgeries. Result: Successful insertion of the catheter and endoaortic clamping was achieved in all patients. Conclusion: The endovascular aortic clamping technique with a balloon catheter was a useful alternative method for patients in whom conventional cardiac surgery was limited.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

A Study on Machine Learning Based Anti-Analysis Technique Detection Using N-gram Opcode (N-gram Opcode를 활용한 머신러닝 기반의 분석 방지 보호 기법 탐지 방안 연구)

  • Kim, Hee Yeon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.181-192
    • /
    • 2022
  • The emergence of new malware is incapacitating existing signature-based malware detection techniques., and applying various anti-analysis techniques makes it difficult to analyze. Recent studies related to signature-based malware detection have limitations in that malware creators can easily bypass them. Therefore, in this study, we try to build a machine learning model that can detect and classify the anti-analysis techniques of packers applied to malware, not using the characteristics of the malware itself. In this study, the n-gram opcodes are extracted from the malicious binary to which various anti-analysis techniques of the commercial packers are applied, and the features are extracted by using TF-IDF, and through this, each anti-analysis technique is detected and classified. In this study, real-world malware samples packed using The mida and VMProtect with multiple anti-analysis techniques were trained and tested with 6 machine learning models, and it constructed the optimal model showing 81.25% accuracy for The mida and 95.65% accuracy for VMProtect.

A Study on the play of Allegory in the 1970s - Focusing on Lee Kang-baek's Early Works - (1970년대 알레고리극 희곡 연구 - 이강백의 초기 작품을 중심으로 -)

  • Lee, Jong-Rak
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.113-122
    • /
    • 2019
  • In the 1970s, under the tyrannical regulation and censorship of the Yushin regime, realistic dramatization techniques were forced to reveal their limitations. Choosing the 'allegory' technique, a double-meaning narrative structure, Lee Kang-baek sets up virtual spaces or unrealistic figures, both of which lack 'realism'. Lee Kang-baek has allergic the illusion of detadiscourse, the diaspora character, and the universality of 'Political Unconsciousness'. So it's linked to the perception of history in the 1960s. This creates a semantic network of public and casual perception of history. This was a 'bypass' strategy which more clearly disclose the violent politics. Therefore Lee Kang-baek's play shows the desperate situation of the diaspora character being oppressed by detadiscourse, and the desire of the author who can never give up on freedom of expression, though under that oppression. Furthermore, it was an attempt to acquire a timeless universality and symbolism about human freedom and liberation through the Allegory play technique.

Microsurgical treatment of distal middle cerebral artery aneurysm: A single-center review

  • Taehoon Jang;Sung-Tae Kim;Jin Lee;Won-Hee Lee;Keun-Soo Lee;Se-Young Pyo;Junghae Ko;Hangwoo Lee;Yeong Gyun Jeong
    • Journal of Cerebrovascular and Endovascular Neurosurgery
    • /
    • v.26 no.1
    • /
    • pp.37-45
    • /
    • 2024
  • Objective: To review the characteristics of distal middle cerebral artery (MCA) aneurysm treated by microsurgery, the detailed surgical options, and the clinical result. Methods: We retrospectively reviewed cerebral aneurysm in the M2 and M3 segments of the MCA surgically treated between January 2015 and December 2022. The demographic data, aneurysm-related findings, type of surgical approach, surgical technique, and clinical outcomes of the enrolled patients were analyzed. Results: Sixteen distal MCA aneurysms were treated with microneurosurgery (incidence, 1.0%; female, 12; mean age, 58.1 years; ruptured, three). Twelve aneurysms were in the M2 segment (insular segment), two aneurysms at the M2-M3 junction, and two aneurysms in the M3 segment (opercular segment). Twelve aneurysms were saccular (average size, 4.9 mm; multiplicity, 50%; average aneurysms, 3.0; partially thrombosed, 1; sidewall aneurysm, 2). Three aneurysms were fusiform, of which two were ruptured. Of the ruptured aneurysms, one was a ruptured dissecting aneurysm. The trans-sylvian and trans-sulcal approaches were used in fourteen and two patients, respectively. Neck clipping, wrap clipping, and surgical trapping were performed in twelve, one, and one patient, respectively. Proximal occlusion was performed in one patient. Bypass technique was required in two patients (neck clipping and proximal occlusion). The modified Rankin Score was 6 in the two patients with ruptured aneurysms. The remaining patients did not show further neurological deterioration after microneurosurgery. Conclusions: Distal MCA aneurysms had a high incidence of being diagnosed with multiple other aneurysms and were relatively non-saccular.

Vein Injury and Wound Complications Associated with Techniques of Saphenous Vein Harvest (복재정맥 수확방법에 따른 이식편의 손상과 수술창의 합병증의 빈도)

  • 최종범;박권재;양현웅;이삼윤;최순호
    • Journal of Chest Surgery
    • /
    • v.36 no.7
    • /
    • pp.504-509
    • /
    • 2003
  • Although arterial grafts are widely used due to the advantage of long-term patency in coronary bypass surgery, greater saphenous vein is still an important additional conduit. It was reported that preservation of the adventitia of vein graft and the adjacent tissues may bring the improved long-term graft patency. The aim of this study is to look for a harvest technique that can reduce vein injury and wound complications. Material and Method: In thirty-four patients that vein grafts were used for coronary bypass surgery, 50 harvest sites were included for the study. In 25 harvest sites in calf below knee (group 1), vein was exposed through a long incision and then clearly dissected from the adjacent tissue. Ten endoscopic vein harvests were performed in the thighs (group 2). Fifteen other vein grafts that were bluntly dissected were harvested from the thighs through three separate incisions (group 3). Result: Vein harvest time was longest in endoscopic harvest group (44.7$\pm$9.8 minutes) and shortest in group 3 (24.2$\pm$5.9 minutes) (p=0.000). Most avulsion injuries of vein branches happened in the endoscopic group. Sequential grafting numbers per vein were 1.72$\pm$0.98 with thigh vein graft and 1.16$\pm$0.37 with calf vein (p=0.02). Swelling of foot and/or leg, which was the most common wound complication after vein harvest, was most commonly presented in group 1 (20/25 sites; p=0.000). Tingling, the most common neurologic complication, was also most prevalent in group 1 (7/25 sites; p=0.013). The risk factor of the wound complication was vein harvest from calf, and the vein harvest technique was not a risk for wound complication. Conclusion: Vein harvest technique through three separate incisions from thigh presented shorter harvest time and less vein injury and wound complication compared with the endoscopic harvest technique from thigh or the harvest through a long incision from calf.

Total Arterial 011-Pump Coronary Revascularization with Multiple Y Arterial Composite Grafts (다중 복합 Y 동맥 이식편(Multiple Y Composite Craft)을 이용한 완저너 동맥 무인공 심폐바이패스 관상동맥우회술)

  • Kim Do-kyun;Lee Kyo Jgon;Joo Hyun Chul;Li Gyjong;Ahn Jiyoung;shim Yungee;Yoo Kyung Jong
    • Journal of Chest Surgery
    • /
    • v.38 no.8 s.253
    • /
    • pp.551-556
    • /
    • 2005
  • Background: Complete arterial off-pump coronary artery bypass grafting (OPCAB) by sequential anastomoses with one or two arterial grafts provides favorable outcomes. However, problems of insufficient graft length, hypopefusion, kinking of graft, and unfavorable course of graft may be encountered. To solve these problems, we have used different technique with multiple arterial Y composite graft to allow end-to-side rather than sequential anastomoses and evaluated the results of this method. Material and Method: Between February 2003 and October 2004, If patients underwent total arterial OPCAB using multiple arterial V composite grafts with left internal mammary artery (LIMA), radial artery (RA), and right internal mammary artery (RIMA). We divided RA into multiple segments by number of distal target site after measuring of individual proper length and constructed arterial composite graft. One of segments was sutured end-to-side to LIMA and other segment was sutured end-to-side to the previously constructed radial graft. Postoperative graft patency was evaluated in 6f patients by multi-slice computed tomegraphy. Result: An average of $2.5\pm0.6$ arteries and $3.7pm0.7$ distal anastomoses per patient were done. There was no perioperative myocardial infarction, clinical hypoperfusion syndromes, and operative mortality. Postoperative mean CK-MB level was $17.4pm29.7\;IU/L.$Overall graft patency was $99.1\%\;(214/216)(LIMA:\;100\%,\;RA:\;98.4\%,\;RIMA:\;100\%).$ Conclusion: This technique allows total arterial OPCAB without technical problems and provides excellent early clinical results and graft patency. We believe that this technique is more convenient in the obtuse marginal area compared to sequential technique, and helpful in patients who require complex arterial grafting.

Arterial Switch Operation: The Technical Modification of Coronary Reimplantation and Risk Factors for Operative Death (동맥전환술: 판상돔맥이식 수기변형과 수술사망의 위험인자)

  • 성시찬;이형두;김시호;조광조;우종수;이영석
    • Journal of Chest Surgery
    • /
    • v.37 no.3
    • /
    • pp.235-244
    • /
    • 2004
  • Anatomic correction of the transposition of the great arteries (TGA) or Taussig-Bing anomaly by means of the arterial switch operation is now accepted as the therapeutic method of choice. This retrospective study was conducted to evaluate the risk factors for operative deaths and the efficacy of technical modification of the coronary transfer. 85 arterial switch operations for TGA or Taussig-Bing anomaly which were performed by one surgeon from 1994 to July 2002 at Dong-A university hospital were included in this retrospective study Multivariate analysis of perioperative variables for operative mortality including technical modification of the coronary transfer was peformed. Overall postoperative hospital mortality was 20.0% (17/85). The mortality before 1998 was 31.0% (13/42), but reduced to 9.3% (4/43) from 1998. The mortality in the patients with arch anomaly was 61.5% (8/13), but 12.5% (9/72) in those without arch anomaly. In patients who underwent an open coronary reimplantation technique, the operative mortality was 28.1% (18/64), but 4.8% (1/21) in patients undergoing a technique of reimplantation coronary buttons after neoarotic reconstruction. Risk factors for operative death from multivariated analysis were cardiopulmonary bypass time ($\geq$ 250 minutes), aortic cross-clamping time ($\geq$ 150 minutes), aortic arch anomaly, preoperative event, and open coronary reimplantation technique. Operative mortality has been reduced with time. Aortic arch anomaly and preoperative events were important risk factors for postoperative mortality. However atypical coronary artery patterns did not work as risk factors. We think that the technical modification of coronary artery transfer played an important role in reducing the postoperative mortality of arterial switch operation.

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.