• Title/Summary/Keyword: Detection Process

Search Result 3,650, Processing Time 0.035 seconds

A Study of Traffic Incident Flow Characteristics on Korean Highway Using Multi-Regime (Multi-Regime에 의한 돌발상황 시 교통류 분석)

  • Lee Seon-Ha;kang Hee-Chan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.1 s.6
    • /
    • pp.43-56
    • /
    • 2005
  • This research has examined a time series analysis(TSA) of an every hour traffic information such as occupancy, a traffic flow, and a speed, a statistical model of a surveyed data on the traffic fundamental diagram and an expand aspect of a traffic jam by many Parts of the traffic flow. Based on the detected data from traffic accidents on the Cheonan-Nonsan high way and events when the road volume decreases dramatically like traffic accidents it can be estimated from the change of occupancy right after accidents. When it comes to a traffic jam like events the changing gap of the occupancy and the mean speed is gentle, in addition to a quickness and an accuracy of a detection by the time series analyse of simple traffic index is weak. When it is a stable flow a relationship between the occupancy and a flow is a linear, which explain a very high reliability. In contrast, a platoon form presented by a wide deviation about an ideal speed of drivers is difficult to express by a statical model in a relationship between the speed and occupancy, In this case the speed drops shifty at 6$\~$8$\%$ occupancy. In case of an unstable flow, it is difficult to adopt a statistical model because the formation-clearance Process of a traffic jam is analyzed in each parts. Taken the formation-clearance process of a traffic jam by 2 parts division into consideration the flow having an accident is transferred to a stopped flow and the occupancy increases dramatically. When the flow recovers from a sloped flow to a free flow the occupancy which has increased dramatically decrease gradually and then traffic flow increases according as the result analyzed traffic flow by the multi regime as time series. When it is on the traffic jam the traffic flow transfers from an impeded free flow to a congested flow and then a jammed flow which is complicated more than on the accidents and the gap of traffic volume in each traffic conditions about a same occupancy is generated huge. This research presents a need of a multi-regime division when analyzing a traffic flow and for the future it needs a fixed quantity division and model about each traffic regimes.

  • PDF

Development of Deep Learning Structure to Improve Quality of Polygonal Containers (다각형 용기의 품질 향상을 위한 딥러닝 구조 개발)

  • Yoon, Suk-Moon;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.493-500
    • /
    • 2021
  • In this paper, we propose the development of deep learning structure to improve quality of polygonal containers. The deep learning structure consists of a convolution layer, a bottleneck layer, a fully connect layer, and a softmax layer. The convolution layer is a layer that obtains a feature image by performing a convolution 3x3 operation on the input image or the feature image of the previous layer with several feature filters. The bottleneck layer selects only the optimal features among the features on the feature image extracted through the convolution layer, reduces the channel to a convolution 1x1 ReLU, and performs a convolution 3x3 ReLU. The global average pooling operation performed after going through the bottleneck layer reduces the size of the feature image by selecting only the optimal features among the features of the feature image extracted through the convolution layer. The fully connect layer outputs the output data through 6 fully connect layers. The softmax layer multiplies and multiplies the value between the value of the input layer node and the target node to be calculated, and converts it into a value between 0 and 1 through an activation function. After the learning is completed, the recognition process classifies non-circular glass bottles by performing image acquisition using a camera, measuring position detection, and non-circular glass bottle classification using deep learning as in the learning process. In order to evaluate the performance of the deep learning structure to improve quality of polygonal containers, as a result of an experiment at an authorized testing institute, it was calculated to be at the same level as the world's highest level with 99% good/defective discrimination accuracy. Inspection time averaged 1.7 seconds, which was calculated within the operating time standards of production processes using non-circular machine vision systems. Therefore, the effectiveness of the performance of the deep learning structure to improve quality of polygonal containers proposed in this paper was proven.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

Multi-Dimensional Analysis Method of Product Reviews for Market Insight (마켓 인사이트를 위한 상품 리뷰의 다차원 분석 방안)

  • Park, Jeong Hyun;Lee, Seo Ho;Lim, Gyu Jin;Yeo, Un Yeong;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.57-78
    • /
    • 2020
  • With the development of the Internet, consumers have had an opportunity to check product information easily through E-Commerce. Product reviews used in the process of purchasing goods are based on user experience, allowing consumers to engage as producers of information as well as refer to information. This can be a way to increase the efficiency of purchasing decisions from the perspective of consumers, and from the seller's point of view, it can help develop products and strengthen their competitiveness. However, it takes a lot of time and effort to understand the overall assessment and assessment dimensions of the products that I think are important in reading the vast amount of product reviews offered by E-Commerce for the products consumers want to compare. This is because product reviews are unstructured information and it is difficult to read sentiment of reviews and assessment dimension immediately. For example, consumers who want to purchase a laptop would like to check the assessment of comparative products at each dimension, such as performance, weight, delivery, speed, and design. Therefore, in this paper, we would like to propose a method to automatically generate multi-dimensional product assessment scores in product reviews that we would like to compare. The methods presented in this study consist largely of two phases. One is the pre-preparation phase and the second is the individual product scoring phase. In the pre-preparation phase, a dimensioned classification model and a sentiment analysis model are created based on a review of the large category product group review. By combining word embedding and association analysis, the dimensioned classification model complements the limitation that word embedding methods for finding relevance between dimensions and words in existing studies see only the distance of words in sentences. Sentiment analysis models generate CNN models by organizing learning data tagged with positives and negatives on a phrase unit for accurate polarity detection. Through this, the individual product scoring phase applies the models pre-prepared for the phrase unit review. Multi-dimensional assessment scores can be obtained by aggregating them by assessment dimension according to the proportion of reviews organized like this, which are grouped among those that are judged to describe a specific dimension for each phrase. In the experiment of this paper, approximately 260,000 reviews of the large category product group are collected to form a dimensioned classification model and a sentiment analysis model. In addition, reviews of the laptops of S and L companies selling at E-Commerce are collected and used as experimental data, respectively. The dimensioned classification model classified individual product reviews broken down into phrases into six assessment dimensions and combined the existing word embedding method with an association analysis indicating frequency between words and dimensions. As a result of combining word embedding and association analysis, the accuracy of the model increased by 13.7%. The sentiment analysis models could be seen to closely analyze the assessment when they were taught in a phrase unit rather than in sentences. As a result, it was confirmed that the accuracy was 29.4% higher than the sentence-based model. Through this study, both sellers and consumers can expect efficient decision making in purchasing and product development, given that they can make multi-dimensional comparisons of products. In addition, text reviews, which are unstructured data, were transformed into objective values such as frequency and morpheme, and they were analysed together using word embedding and association analysis to improve the objectivity aspects of more precise multi-dimensional analysis and research. This will be an attractive analysis model in terms of not only enabling more effective service deployment during the evolving E-Commerce market and fierce competition, but also satisfying both customers.

PRC Maritime Operational Capability and the Task for the ROK Military (중국군의 해양작전능력과 한국군의 과제)

  • Kim, Min-Seok
    • Strategy21
    • /
    • s.33
    • /
    • pp.65-112
    • /
    • 2014
  • Recent trends show that the PRC has stepped aside its "army-centered approach" and placed greater emphasis on its Navy and Air Force for a wider range of operations, thereby reducing its ground force and harnessing its economic power and military technology into naval development. A quantitative growth of the PLA Navy itself is no surprise as this is not a recent phenomenon. Now is the time to pay closer attention to the level of PRC naval force's performance and the extent of its warfighting capacity in the maritime domain. It is also worth asking what China can do with its widening naval power foundation. In short, it is time to delve into several possible scenarios I which the PRC poses a real threat. With this in mind, in Section Two the paper seeks to observe the construction progress of PRC's naval power and its future prospects up to the year 2020, and categorize time frame according to its major force improvement trends. By analyzing qualitative improvements made over time, such as the scale of investment and the number of ships compared to increase in displacement (tonnage), this paper attempts to identify salient features in the construction of naval power. Chapter Three sets out performance evaluation on each type of PRC naval ships as well as capabilities of the Navy, Air Force, the Second Artillery (i.e., strategic missile forces) and satellites that could support maritime warfare. Finall, the concluding chapter estimates the PRC's maritime warfighting capability as anticipated in respective conflict scenarios, and considers its impact on the Korean Peninsula and proposes the directions ROK should steer in response. First of all, since the 1980s the PRC navy has undergone transitions as the focus of its military strategic outlook shifted from ground warfare to maritime warfare, and within 30 years of its effort to construct naval power while greatly reducing the size of its ground forces, the PRC has succeeded in building its naval power next to the U.S.'s in the world in terms of number, with acquisition of an aircraft carrier, Chinese-version of the Aegis, submarines and so on. The PRC also enjoys great potentials to qualitatively develop its forces such as indigenous aircraft carriers, next-generation strategic submarines, next-generation destroyers and so forth, which is possible because the PRC has accumulated its independent production capabilities in the process of its 30-year-long efforts. Secondly, one could argue that ROK still has its chances of coping with the PRC in naval power since, despite its continuous efforts, many estimate that the PRC naval force is roughly ten or more years behind that of superpowers such as the U.S., on areas including radar detection capability, EW capability, C4I and data-link systems, doctrines on force employment as well as tactics, and such gap cannot be easily overcome. The most probable scenarios involving the PRC in sea areas surrounding the Korean Peninsula are: first, upon the outbreak of war in the peninsula, the PRC may pursue military intervention through sea, thereby undermining efforts of the ROK-U.S. combined operations; second, ROK-PRC or PRC-Japan conflicts over maritime jurisdiction or ownership over the Senkaku/Diaoyu islands could inflict damage to ROK territorial sovereignty or economic gains. The PRC would likely attempt to resolve the conflict employing blitzkrieg tactics before U.S. forces arrive on the scene, while at the same time delaying and denying access of the incoming U.S. forces. If this proves unattainable, the PRC could take a course of action adopting "long-term attrition warfare," thus weakening its enemy's sustainability. All in all, thiss paper makes three proposals on how the ROK should respond. First, modern warfare as well as the emergent future warfare demonstrates that the center stage of battle is no longer the domestic territory, but rather further away into the sea and space. In this respect, the ROKN should take advantage of the distinct feature of battle space on the peninsula, which is surrounded by the seas, and obtain capabilities to intercept more than 50 percent of the enemy's ballistic missiles, including those of North Korea. In tandem with this capacity, employment of a large scale of UAV/F Carrier for Kill Chain operations should enhance effectiveness. This is because conditions are more favorable to defend from sea, on matters concerning accuracy rates against enemy targets, minimized threat of friendly damage, and cost effectiveness. Second, to maintain readiness for a North Korean crisis where timely deployment of US forces is not possible, the ROKN ought to obtain capabilities to hold the enemy attack at bay while deterring PRC naval intervention. It is also argued that ROKN should strengthen its power so as to protect national interests in the seas surrounding the peninsula without support from the USN, should ROK-PRC or ROK-Japan conflict arise concerning maritime jurisprudence. Third, the ROK should fortify infrastructures for independent construction of naval power and expand its R&D efforts, and for this purpose, the ROK should make the most of the advantages stemming from the ROK-U.S. alliance inducing active support from the United States. The rationale behind this argument is that while it is strategically effective to rely on alliance or jump on the bandwagon, the ultimate goal is always to acquire an independent response capability as much as possible.

Effectiveness of stages-matched educational program for cervical cancer screening among adult women in a community (일개 지역사회 여성 주민의 자궁경부암 조기검진 수검에 관한 행동변화단계별 교육 프로그램의 효과)

  • Kim, Young-Bok
    • Korean Journal of Health Education and Promotion
    • /
    • v.24 no.5
    • /
    • pp.23-37
    • /
    • 2007
  • Background: Even though cervical cancer poses a significant global cancer burden, successful implementations for early detection offer an opportunity to prevent deaths and reduce the cancer burden. In Korea, cervical cancer is the most prevalent type of cancer among adult women, but it is one of the few cancers in which a consensus-approved screening test exists for early diagnosis, Pap test, that can be combined with highly efficacious treatment regimens for early-stage disease. Purpose: This study was carried out to identify the cognitive-behavioral factors associated with cervical cancer screening behavior among adult women, aged 40 to 59, and to develop tailored messages and to evaluate the effectiveness of stage-matched educational program. Method: A total of 283 women who aged 40 years or older was recruited in Seoul, from September, 1st to November, 14th, 2003. The intervention group (N=162) and the control group (N=121) were selected from five sub-districts in Seocho-gu, Seoul. Building on the TTM, a quasi-experimental study was conducted to test the effectiveness of stages-matched intervention addressed at the five stages of cervical cancer screening behavior. Women in the intervention group were randomly assigned to one of two conditions, internet or postal services. Results: In our results, 88.9% of participants had received a Pap test at least once in their life-time, and 65.4% had got it in the past two years. With regard to cognitive-behavioral factors, the stages-matched educational program increased attitude and process of change for cervical cancer screening. The percentage changed was the largest in maintenance stage. With regard to delivery methods for tailored messages, the print materials were more effective at increasing screening adherence than the e-mail. Whereas the postal service group showed remarkable the change of behavior stage, the internet service group did not. Also it was not shown any difference of the satisfaction with stages-matched educational program between internet and postal service groups. Conclusion: This study suggested that cervical cancer screening behavior could be changed by tailored messages which had developed with cognitive-behavioral factors. The stages-matched educational program was effective to promote the screening adherence for cervical cancer.

Caspase-3 Activation is Associated with Granulosa Cell Apoptosis during Follicular Atresia in Porcine Ovary (돼지 폐쇄난포내 과립세포의 자연세포사 시 캐스파제-3의 활성화)

  • Kim, Jong-Min;Chung, Jin-Yong;Kim, Ji-Young;Oh, Seung-Hoon;Song, Kang-Won;Do, Byoung-Rok;Kim, Sang-Soo;Jung, Jin;Lee, Chang-Joo;Yoon, Yong-Dal
    • Development and Reproduction
    • /
    • v.10 no.1
    • /
    • pp.1-7
    • /
    • 2006
  • Ovarian follicular atresia in mammals is finely regulated by gonadotropins and sex steroid hormones. It is well known that granulosa cell pyknosis is a common cytological feature of atretic follicles in the ovary. The present study hypothesized that granulosa cell pyknosis during follicular atresia might be related to apoptotic process and associated with caspase-3 activation. Healthy (normal) and atretic follicles were isolated from porcine ovaries based on macro-morphological criteria. Isolated follicles were either processed for histological observation or used for collection of granulosa cells by aspiration. Hoechst 33258 staining of the cells showed a significantly higher number of fragmented nuclei, a typical morphological feature of apoptotic cell, in granulosa cells from atretic follicles than those from healthy follicles. In addition, the rate of cell death was significantly higher in granulosa cells from atretic follicles than healthy follicles, as measured by flow-cytometric cell cycle analysis. In situ detection of apoptotic cells by TUNEL revealed that apoptosis was mostly restricted to granulosa cells in follicles. Theca cells were TUNEL-negative. Finally, it has been shown by caspase-3 activity assay that granulosa cells from atretic follicles retain a higher caspase-3 activity compared to healthy follicles. Taken together, it is suggested that granulosa cell degeneration during folliclar atresia occurs by caspase-3-dependent apoptotic fashion.

  • PDF

Fate and Transport of Cr(VI) Contaminated Groundwater from the Industrial Area in Daejeon (대전 산업단지 지하수의 6가 크롬 오염 및 확산 평가)

  • Chon, Chul-Min;Moon, Sang-Ho;Ahn, Joo-Sung;Kim, Yung-Sik;Won, Jong-Ho;Ahn, Kyoung-Hwan
    • Economic and Environmental Geology
    • /
    • v.40 no.4
    • /
    • pp.403-418
    • /
    • 2007
  • The objective of this research was to characterize the fate and transport of Cr(VI) contaminated groundwater in the Daejeon industrial area. Five subsidiary monitoring wells were newly installed and two existing wells were utilized for the investigation and the reduction process of Cr(VI) contaminated groundwater of the Daejeon(Mun-pyeong) national groundwater monitoring station. The Cr(VI) concentrations at the shallow aquifer well of the station were in the range of 3.2-4.5 mg/L indicating continuous contamination. However, Cr was not detected at the deep bedrock well and the other monitoring wells except MPH-1 and 3. The Cr(VI) concentrations of MPH-1 and MPH-3 were below the drinking water guideline value (0.05 mg/L). Therefore, the plume of the Cr(VI) contaminated groundwater was predicted to be confined within the narrow boundary around the station. The soluble/exchangeable Cr(VI) concentrations were below the detection limit in all core and slime samples taken from the five newly installed wells. Although the exact source of contamination was not directly detected in the study area, the spatial Cr(VI) distribution in groundwater and characteristics of the core samples indicated that the source and the dispersion range were confined within the 100 m area from the monitoring station. The contamination might be induced from the unlined landfill of industrial wastes which was observed during the installation of an subsidiary monitoring well. For the evaluation of the natural attenuation of Cr(VI), available reduction capacities of Cr(VI) with an initial concentration of 5 mg/L were measured in soil and aquifer materials. Dark-gray clay layer samples have high capacities of Cr(VI) reduction ranging from 58 to 64%, which is obviously related to organic carbon contents of the samples. The analysis of reduction capacities implied that the soil and aquifer materials controlled the dispersion of Cr(VI) contamination in this area. However, some possibilities of dispersion by the preferential flow cannot be excluded due to the limited numbers of monitoring wells. We suggest the removal of Cr(VI) contaminated groundwater by periodical pumping, and the continuous groundwater quality monitoring for evaluation of the Cr(VI) dispersion should be followed in the study area.

Evaluation of Cerebral Aneurysm with High Resolution MR Angiography using Slice Interpolation Technique: Correlation wity Digital Subtraction Angiography(DSA) and MR Angiography(MRA) (Slice Interpolation기법의 고해상도 자기공명혈관조영술을 이용한 뇌동맥류의 진단 : 디지탈 감산 혈관조영술과 자기공명 혈관조영술의 비교)

  • ;;;Daisy Chien;Gerhard Laub
    • Investigative Magnetic Resonance Imaging
    • /
    • v.1 no.1
    • /
    • pp.94-102
    • /
    • 1997
  • Purpose: There have been some efforts to diagnose intracranial aneurysm through a non-invasive method using MRA, although the process may be difficult when the lesion is less than 3mm. The present study prospectively compares the results of high resolution, fast speed slice interpolation MRA and DSA thereby examing the potentiality of primary non-invasive screening test. Materials and Methods: A total of 26 cerebral aneurysm lesions from 14 patients with subarachnoid hemorrhage from ruptured aneurysm (RA) and 5 patients with unruptured aneurysm(UA). In all subjects, MRA was taken to confirm the vessel of origin, definition of aneurysm neck and the relationship of the aneurysm to nearby small vessels, and the results were compared with the results of DSA. The images were obtained with 1.5T superconductive machine (Vision, Siemens, Erlangen, Germany) on 4 slabs of MRA using slice interpolation. The settings include TR/TE/FA=30/6.4/25, matrix $160{\times}512$, FOV $150{\times}200$, 7minutes 42 seconds of scan time, effective thickness of 0.7 mm and an entire thickness of 102. 2mm. The images included structures from foramen magnum to A3 portion of anterior cerebral artery. MIP was used for the image analysis, and multiplanar reconstruction (MPR) technique was used in cases of intracranial aneurysm. Results: A total of 26 intracranial aneurysm lesions from 19 patients with 2 patients having 3 lesion, 3 patients having 2 lesions and the rest of 14 patients having 1 lesion each were examined. Among those, 14 were RA and 12 were UA. Eight lesions were less than 2mm in size, 9 lesions were 3-5mm, 7 were 6-9mm and 2 were larger than IOmm. On initial exams, 25 out of 26 aneurysm lesions were detected in either MRA or DSA showing 96% sensitivity. Specificity cannot be estimated since there was no true negative of false positive findings. When MRA and MPR were used concurrently for the confirmation of size and shape, the results were equivalent to those of DSA, while in the confirmation of aneurysm neck and parent vessels, the concurrent use of MRA and MPR was far superior to the sole use of either MRA or DSA. Conclusion: High resolution MRA using slice interpolation technique showed equal results as those of DSA for the detection of intracranial aneurysm, and may be used as a primary non-invasive screening test in the future.

  • PDF