• Title/Summary/Keyword: Detection techniques

Search Result 2,649, Processing Time 0.032 seconds

Role of Barium Swallow in Diagnosing Clinically Significant Anastomotic Leak following Esophagectomy

  • Roh, Simon;Iannettoni, Mark D.;Keech, John C.;Bashir, Mohammad;Gruber, Peter J.;Parekh, Kalpaj R.
    • Journal of Chest Surgery
    • /
    • v.49 no.2
    • /
    • pp.99-106
    • /
    • 2016
  • Background: Barium swallow is performed following esophagectomy to evaluate the anastomosis for detection of leaks and to assess the emptying of the gastric conduit. The aim of this study was to evaluate the reliability of the barium swallow study in diagnosing anastomotic leaks following esophagectomy. Methods: Patients who underwent esophagectomy from January 2000 to December 2013 at our institution were investigated. Barium swallow was routinely done between days 5-7 to detect a leak. These results were compared to clinically determined leaks (defined by neck wound infection requiring jejunal feeds and or parenteral nutrition) during the postoperative period. The sensitivity and specificity of barium swallow in diagnosing clinically significant anastomotic leaks was determined. Results: A total of 395 esophagectomies were performed (mean age, 62.2 years). The indications for the esophagectomy were as follows: malignancy (n=320), high-grade dysplasia (n=14), perforation (n=27), benign stricture (n=7), achalasia (n=16), and other (n=11). A variety of techniques were used including transhiatal (n=351), McKeown (n=35), and Ivor Lewis (n=9) esophagectomies. Operative mortality was 2.8% (n=11). Three hundred and sixty-eight patients (93%) underwent barium swallow study after esophagectomy. Clinically significant anastomotic leak was identified in 36 patients (9.8%). Barium swallow was able to detect only 13/36 clinically significant leaks. The sensitivity of the swallow in diagnosing a leak was 36% and specificity was 97%. The positive and negative predictive values of barium swallow study in detecting leaks were 59% and 93%, respectively. Conclusion: Barium swallow is an insensitive but specific test for detecting leaks at the cervical anastomotic site after esophagectomy.

Development of an Accuracy-improved Vision Inspection System for BGA Solder Ball (정확도를 향상시킨 BGA 솔더볼 외관검사 기법 개발)

  • Huh, Kyung-Moo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.6
    • /
    • pp.80-85
    • /
    • 2010
  • BGA 409 chip currently the most as a visual inspection of the exterior inspection is conducted. Human depending on visual inspection of the exterior inspection of the current state of testers, depending on how the test results because the change is difficult to expect reliable results. Therefore, the challenges of visual inspection of BGA solder balls to improve the visual inspection technique was developed. However, BGA solder ball size of the microstructure and the characteristics of the distinction between hard test the accuracy of the fall orientation error has a problem. In this paper BGA solder balls exterior inspection of the accuracy to improve the edge detection algorithm, the complement of features and only the comparison proposed a pattern-matching techniques, based on the characteristics of spatial configuration of the area by improving the standard error of the orientation proposed improvements.

Study on production process of graphite for biological applications of 14C-accelerator mass spectrometry

  • Ha, Yeong Su;Kim, Kye-Ryung;Cho, Yong-Sub;Choe, Kyumin;Kang, Chaewon
    • Journal of Radiopharmaceuticals and Molecular Probes
    • /
    • v.6 no.1
    • /
    • pp.20-26
    • /
    • 2020
  • Accelerator mass spectrometry (AMS) is a powerful detection technique with the exquisite sensitivity and high precision compared with other traditional analytical techniques. Accelerator mass spectrometry can be widely applied in the technique of radiocarbon dating in the fields of archeology, geology and oceanography. The ability of accelerator mass spectrometry to measure rare 14C concentrations in microgram and even sub-microgram amounts suggests that extension of 14C-accelerator mass spectrometry to biomedical field is a natural and attractive application of the technology. Drug development processes are costly, risky, and time consuming. However, the use of 14C-accelerator mass spectrometry allows absorption, distribution, metabolism and excretion (ADME) studies easier to understand pharmacokinetics of drug candidates. Over the last few decades, accelerator mass spectrometry and its applications to preclinical/clinical trials have significantly increased. For accelerator mass spectrometry analysis of biological samples, graphitization processes of samples are important. In this paper, we present a detailed sample preparation procedure to apply to graphitization of biological samples for accelerator mass spectrometry.

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

Advanced peri-implantitis cases with radical surgical treatment

  • McCrea, Shane J.J.
    • Journal of Periodontal and Implant Science
    • /
    • v.44 no.1
    • /
    • pp.39-47
    • /
    • 2014
  • Purpose: Peri-implantitis, a clinical term describing the inflammatory process that affects the soft and hard tissues around an osseointegrated implant, may lead to peri-implant pocket formation and loss of supporting bone. However, this imprecise definition has resulted in a wide variation of the reported prevalence; ${\geq}10%$ of implants and 20% of patients over a 5- to 10-year period after implantation has been reported. The individual reporting of bone loss, bleeding on probing, pocket probing depth and inconsistent recording of results has led to this variation in the prevalence. Thus, a specific definition of peri-implantitis is needed. This paper describes the vast variation existing in the definition of peri-implantitis and suggests a logical way to record the degree and prevalence of the condition. The evaluation of bone loss must be made within the concept of natural physiological bony remodelling according to the initial peri-implant hard and soft tissue damage and actual definitive load of the implant. Therefore, the reason for bone loss must be determined as either a result of the individual osseous remodelling process or a response to infection. Methods: The most current Papers and Consensus of Opinion describing peri-implantitis are presented to illustrate the dilemma that periodontologists and implant surgeons are faced with when diagnosing the degree of the disease process and the necessary treatment regime that will be required. Results: The treatment of peri-implantitis should be determined by its severity. A case of advanced peri-implantitis is at risk of extreme implant exposure that results in a loss of soft tissue morphology and keratinized gingival tissue. Conclusions: Loss of bone at the implant surface may lead to loss of bone at any adjacent natural teeth or implants. Thus, if early detection of peri-implantitis has not occurred and the disease process progresses to advanced peri-implantitis, the compromised hard and soft tissues will require extensive, skill-sensitive regenerative procedures, including implantotomy, established periodontal regenerative techniques and alternative osteotomy sites.

A Survey on Oil Spill and Weather Forecast Using Machine Learning Based on Neural Networks and Statistical Methods (신경망 및 통계 기법 기반의 기계학습을 이용한 유류유출 및 기상 예측 연구 동향)

  • Kim, Gyoung-Do;Kim, Yong-Hyuk
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.1-8
    • /
    • 2017
  • Accurate forecasting enables to effectively prepare for future phenomenon. Especially, meteorological phenomenon is closely related with human life, and it can prevent from damage such as human life and property through forecasting of weather and disaster that can occur. To respond quickly and effectively to oil spill accidents, it is important to accurately predict the movement of oil spills and the weather in the surrounding waters. In this paper, we selected four representative machine learning techniques: support vector machine, Gaussian process, multilayer perceptron, and radial basis function network that have shown good performance and predictability in the previous studies related to oil spill detection and prediction in meteorology such as wind, rainfall and ozone. we suggest the applicability of oil spill prediction model based on machine learning.

Reconfiguration Problems in VLSI and WSI Cellular Arrays (초대규모 집적 또는 웨이퍼 규모 집적을 이용한 셀룰러 병렬 처리기의 재구현)

  • 한재일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.10
    • /
    • pp.1553-1571
    • /
    • 1993
  • A significant amount of research has focused on the development of highly parallel architectures to obtain far more computational power than conventional computer systems. These architectures usually comprise of a large number of processors communicating through an interconnection network. The VLSI (Very Large Scale Integration) and WSI (Wafer Scale Integration) cellular arrays form one important class of those parallel architectures, and consist of a large number of simple processing cells, all on a single chip or wafer, each interconnected only to its neighbors. This paper studies three fundamental issues in these arrays : fault-tolerant reconfiguration. functional reconfiguration, and their integration. The paper examines conventional techniques, and gives an in-depth discussion about fault-tolerant reconfiguration and functional reconfiguration, presenting testing control strategy, configuration control strategy, steps required f4r each reconfiguration, and other relevant topics. The issue of integrating fault tolerant reconfiguration and functional reconfiguration has been addressed only recently. To tackle that problem, the paper identifies the relation between fault tolerant reconfiguration and functional reconfiguration, and discusses appropriate testing and configuration control strategy for integrated reconfiguration on VLSI and WSI cellular arrays.

  • PDF

A Study on IEEE 1149.1 TAP Test Methodology for Minimum Area Overhead (최소 오버헤드를 갖는 IEEE 1149.1 TAP 테스트 기법에 관한 연구)

  • 김문준;장훈
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.11
    • /
    • pp.61-68
    • /
    • 2004
  • Today almost all chips have IEEE 1149.1 tap controller inside. Recently the circuit is embedded in the chips for other functional objectives. Hence a CED technique for testing and monitoring the IEEE 1149.1 tap controller had been proposed. This paper studies the optimal CED test technique on the IEEE 1149.1 tap controller. There are duplication, parity prediction, and hybrid techniques. The hybrid technique shows the best result on the area overhead. This means that the hybrid technique is perfectly adequate for the IEEE 1149.1 tap controller to be applied to test with the optimal area overhead and can be used widely in the field. Furthermore, we made more reduction from the previous method resulting in less area overhead.

Packer Identification Using Adaptive Boosting Algorithm (Adaptive Boosting을 사용한 패커 식별 방법 연구)

  • Jang, Yun-Hwan;Park, Seong-Jun;Park, Yongsu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.169-177
    • /
    • 2020
  • Malware analysis is one of the important concerns of computer security, and advances in analysis techniques have become important for computer security. In the past, the signature-based method was used to detect malware. However, as the percentage of packed malware increased, it became more difficult to detect using the conventional method. In this paper, we propose a method for identifying packers of packed programs using machine learning. The proposed method parses the packed program to extract specific PE information that can identify the packer and identifies the packer using the Adaptive Boosting algorithm among the machine learning models. To verify the accuracy of the proposed method, we collected and tested 391 programs packed with 12 types of packers and found that the packers were identified with an accuracy of about 99.2%. In addition, we presented the results of identification using PEiD, a signature-based PE identification tool, and existing machine learning method. The proposed method shows better performance in terms of accuracy and speed in identifying packers than existing methods.

Digital image watermarking techniques using multiresolution wavelet transform in Sequency domain (다해상도 웨이브렛 변환을 사용한 주파수 영역에서의 디지털 영상 워터마킹 기법)

  • 신종홍;연현숙;지인호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.2074-2084
    • /
    • 2001
  • la this paper, a new digital watermarking algorithm using wavelet transform in frequency domain is suggested. The wavelet coefficients of low frequency subband are utilized to embed the watermark, After the original image is transformed using discrete wavelet transform, their coefficients are transformed into efficient1y in Sequency domain. DCT and FFT transforms are utilized in this processing. Watermark image of general image format is transformed using DCT and the hiding watermark into wavelet coefficients is equally distributed in frequency domain. Next, these wavelet coefficients are performed with inverse transform. The detection process of watermark is performed with reverse direction to insertion process. In this paper, we developed core watermark technologies which are a data hiding technology to hide unique logo mark which symbolizes the copyright and a robust protection technology to protect logo data from external attack like as compression, filtering, resampling, cropping. The experimental results show that two suggested watermarking technologies are invisible and robust.

  • PDF