• Title/Summary/Keyword: Invasion Detection

Search Result 116, Processing Time 0.02 seconds

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Role of proteases, cytokines, and growth factors in bone invasion by oral squamous cell carcinoma

  • Son, Seung Hwa;Chung, Won-Yoon
    • International Journal of Oral Biology
    • /
    • v.44 no.2
    • /
    • pp.37-42
    • /
    • 2019
  • Oral squamous cell carcinoma (OSCC) is the most common oral malignancy and an increasing global public health problem. OSCC frequently invades the jaw bone. OSCC-induced bone invasion has a significant impact on tumor stage, treatment selection, patient outcome, and quality of life. A number of studies have shown that osteoclast-mediated bone resorption is a major step in the progression of bone invasion by OSCC; however, the molecular mechanisms involved in OSCC bone invasion are not yet clear. In this review, we present the clinical types of OSCC bone invasion and summarize the role of key molecules, including proteases, cytokines, and growth factors, in the sequential process of bone invasion. A better understanding of bone invasion will facilitate the discovery of molecular targets for early detection and treatment of OSCC bone invasion.

Distributed Intrusion Detection System for Safe E-Business Model (안전한 E-Business 모델을 위한 분산 침입 탐지 시스템)

  • 이기준;정채영
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.41-53
    • /
    • 2001
  • Multi-distributed web cluster model built for high availability E-Business model exposes internal system nodes on its structural characteristics and has a potential that normal job performance is impossible due to the intentional prevention and attack by an illegal third party. Therefore, the security system which protects the structured system nodes and can correspond to the outflow of information from illegal users and unfair service requirements effectively is needed. Therefore the suggested distributed invasion detection system is the technology which detects the illegal requirement or resource access of system node distributed on open network through organic control between SC-Agents based on the shared memory of SC-Server. Distributed invasion detection system performs the examination of job requirement packet using Detection Agent primarily for detecting illegal invasion, observes the job process through monitoring agent when job is progressed and then judges the invasion through close cooperative works with other system nodes when there is access or demand of resource not permitted.

  • PDF

Evaluation of Submucosal or Lymphovascular Invasion Detection Rates in Early Gastric Cancer Based on Pathology Section Interval

  • Kim, Young-Il;Kook, Myeong-Cherl;Choi, Jee Eun;Lee, Jong Yeul;Kim, Chan Gyoo;Eom, Bang Wool;Yoon, Hong Man;Ryu, Keun Won;Kim, Young-Woo;Choi, Il Ju
    • Journal of Gastric Cancer
    • /
    • v.20 no.2
    • /
    • pp.165-175
    • /
    • 2020
  • Purpose: The guidelines for pathological evaluation of early gastric cancer (EGC) recommend wider section intervals for surgical specimens (5-7 mm) than those for endoscopically resected specimens (2-3 mm). Studies in surgically resected EGC specimens showed not negligible lymph node metastasis risks in EGCs meeting the expanded criteria for endoscopic submucosal dissection (ESD). Materials and Methods: This retrospective study included 401 EGC lesions with an endoscopic size of ≤ 30 mm detected in 386 patients. Pathological specimens obtained by ESD or surgery were cut into 2-mm section intervals for reference. Submucosal or lymphovascular invasion (LVI) was evaluated arbitrarily in 4- or 6-mm section intervals. McNemar's tests compared the differences between submucosal and LVI. Results: Submucosal invasion was detected in 29.2% (117/401) and LVI in 9.5% (38/401) at 2-mm interval. The submucosal invasion detection rates in 4-mm intervals decreased to 88.0% or 90.6% (both P<0.001), while the LVI detection rates decreased to 86.8% or 57.9% (P=0.025 and P<0.001, respectively). In 6-mm intervals, the submucosal and LVI detection rates decreased further to 72.7-80.3% (P<0.001 for all three sets) and 55.3-63.2% (P<0.001 for all three sets), respectively. Among 150 out-of-indication cases at 2-mm interval, 4-10 (2.7%-6.7%) at 4-mm intervals, and 10-17 (6.7%-11.3%) at 6-mm intervals were misclassified as lesions meeting the curative resection criteria due to the underestimation of submucosal or LVI. Conclusions: After ESD, the 2-mm wide section interval was suitable for the pathological evaluation of focal submucosal or LVI. Thus, if an EGC lesion meets the expanded criteria for the ESD specimen pathological evaluation, it could be safely followed up.

Establishment and Application of Polymerase Spiral Reaction Amplification for Salmonella Detection in Food

  • Xu, Wenli;Gao, Jun;Zheng, Haoyue;Yuan, Chaowen;Hou, Jinlong;Zhang, Liguo;Wang, Guoqing
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.10
    • /
    • pp.1543-1552
    • /
    • 2019
  • Salmonella is a common zoonotic and foodborne pathogen that causes high morbidity and mortality in developing countries. In this study, we established and validated a polymerase spiral reaction (PSR) assay which targeted the conserved invasion gene (invA) of Salmonella by SYBR Green I indicator methods. Subsequently, assays for determination of the optimal conditions for optimal specificity and sensitivity of PSR were performed. We performed comprehensive evaluations using loop-mediated isothermal amplification (LAMP) and real-time PCR. A total number of 532 samples of daily food were analyzed by PSR. Twenty-seven bacterial strains were tested in the specificity assay, from which positive results were obtained only for 14-Salmonella strains. However, none of the 13 non-Salmonella strains was amplified. Similarly with LAMP and real-time PCR, the detection limit of the PSR assay was 50 CFU/ml. The PSR method was also successfully applied to evaluate the contamination with Salmonella in 532 samples of daily food, corroborating traditional culture method data. The novel PSR method is simple, sensitive, and rapid and provides new insights into the prevention and detection of foodborne diseases.

THE EFFECT OF GENISTEIN IN ORAL SQUAMOUS CELL CARCINOMA WITH RESPECT TO THE ANGIOGENESIS AND BASEMENT MEMBRANE INVASION (구강편평세포암종에서 신생혈관화와 기저막침습에 미치는 제니스타인의 효과)

  • Kim, Yong-Hun;Yun, Pil-Young;Myoung, Hoon;Kim, Myung-Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.28 no.6
    • /
    • pp.434-439
    • /
    • 2002
  • Oral squamous cell carcinoma (OSCC) is one of the most common head and neck cancers. OSCC generally has a poor prognosis due to its tendency towards a local invasion and subsequent metastasis, which is mediated by multiple proteolytic enzymes and angiogenesis. Soy products contain high levels of isoflavonoids, including the tyrosine kinase inhibitor, genistein, which has been identified as a potent inhibitor of cell proliferation and in vitro angiogenesis. The purpose of this in vitro study is to evaluate the anti-cancer effect of genistein with respect to the angiogenesis and basement membrane invasion in OSCC. The highly invasive OSCC cell line, HSC-3 cells were cultured in the presence of $10{\mu}M$ genistein for 24h. To evaluate the effects of genistein on the invasiveness and the gelatinolytic activity, in vitro invasion assay and zymography were performed. In order to evaluate the effect on the VEGF and bFGF mRNA expression, RT-PCR and northern hybridization reaction, and chemiluminescence detection were applied. The in vitro invasion assay showed that the genistein treatment reduced the cellular invasion through the artificial basement membrane and significant difference between the control group and the genistein treated group was shown in MMP-2 activity. Especially, the 62 kDa activated form of MMP-2 in the control group was 1.8 times higher than that in the genistein treated group. The results of the northern blot analyses indicated that VEGF mRNA expression in the genistein treated group was significantly down regulated. This study showed that genistein inhibits angiogenesis and reduces basement membrane invasion in OSCC. It seems to support the possibility of genistein as an anti-cancer agent.

Vestibular Schwannoma Atypically Invading Temporal Bone

  • Park, Soo Jeong;Yang, Na-Rae;Seo, Eui Kyo
    • Journal of Korean Neurosurgical Society
    • /
    • v.57 no.4
    • /
    • pp.292-294
    • /
    • 2015
  • Vestibular schwannoma (VS) usually present the widening of internal auditory canal (IAC), and these bony changes are typically limited to IAC, not extend to temporal bone. Temporal bone invasion by VS is extremely rare. We report 51-year-old man who revealed temporal bone destruction beyond IAC by unilateral VS. The bony destruction extended anteriorly to the carotid canal and inferiorly to the jugular foramen. On histopathologic examination, the tumor showed typical benign schwannoma and did not show any unusual vascularity or malignant feature. Facial nerve was severely compressed and distorted by tumor, which unevenly eroded temporal bone in surgical field. Vestibular schwannoma with atypical invasion of temporal bone can be successfully treated with combined translabyrinthine and lateral suboccipiral approach without facial nerve dysfunction. Early detection and careful dissection of facial nerve with intraoperative monitoring should be considered during operation due to severe adhesion and distortion of facial nerve by tumor and eroded temporal bone.

Imaging Assessment of Visceral Pleural Surface Invasion by Lung Cancer: Comparison of CT and Contrast-Enhanced Radial T1-Weighted Gradient Echo 3-Tesla MRI

  • Yu Zhang;Woocheol Kwon;Ho Yun Lee;Sung Min Ko;Sang-Ha Kim;Won-Yeon Lee;Suk Joong Yong;Soon-Hee Jung;Chun Sung Byun;JunHyeok Lee;Honglei Yang;Junhee Han;Jeanne B. Ackman
    • Korean Journal of Radiology
    • /
    • v.22 no.5
    • /
    • pp.829-839
    • /
    • 2021
  • Objective: To compare the diagnostic performance of contrast-enhanced radial T1-weighted gradient-echo 3-tesla (3T) magnetic resonance imaging (MRI) and computed tomography (CT) for the detection of visceral pleural surface invasion (VPSI). Visceral pleural invasion by non-small-cell lung cancer (NSCLC) can be classified into two types: PL1 (without VPSI), invasion of the elastic layer of the visceral pleura without reaching the visceral pleural surface, and PL2 (with VPSI), full invasion of the visceral pleura. Materials and Methods: Thirty-three patients with pathologically confirmed VPSI by NSCLC were retrospectively reviewed. Multidetector CT and contrast-enhanced 3T MRI with a free-breathing radial three-dimensional fat-suppressed volumetric interpolated breath-hold examination (VIBE) pulse sequence were compared in terms of the length of contact, angle of mass margin, and arch distance-to-maximum tumor diameter ratio. Supplemental evaluation of the tumor-pleura interface (smooth versus irregular) could only be performed with MRI (not discernible on CT). Results: At the tumor-pleura interface, radial VIBE MRI revealed a smooth margin in 20 of 21 patients without VPSI and an irregular margin in 10 of 12 patients with VPSI, yielding an accuracy, sensitivity, specificity, positive predictive value, negative predictive value, and F-score for VPSI detection of 91%, 83%, 95%, 91%, 91%, and 87%, respectively. The McNemar test and receiver operating characteristics curve analysis revealed no significant differences between the diagnostic accuracies of CT and MRI for evaluating the contact length, angle of mass margin, or arch distance-to-maximum tumor diameter ratio as predictors of VPSI. Conclusion: The diagnostic performance of contrast-enhanced radial T1-weighted gradient-echo 3T MRI and CT were equal in terms of the contact length, angle of mass margin, and arch distance-to-maximum tumor diameter ratio. The advantage of MRI is its clear depiction of the tumor-pleura interface margin, facilitating VPSI detection.

Study on Improved Detection Rule Formation via Information Leakage Malware Analysis (정보유출 악성코드 분석을 통한 개선된 탐지 규칙 제작 연구)

  • Park, Won-Hyung;Yang, Kyeong-Cheol;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2008
  • Not only the recent hacking techniques are becoming more malicious with the sophisticated technology but also its consequences are bringing more damages as the broadband Internet is growing rapidly. These may include invasion of information leakage, or identity theft over the internet. Its intent is very destructive which can result in invasion of information leakage, hacking, one of the most disturbing problems on the net. This thesis describes the technology of how you can effectively analyze and detect these kind of E-Mail malicious codes. This research explains how we can cope with malicious code more efficiently by detection method.

  • PDF

Modified Canny Edge Detection Algorithm for Detecting Subway Platform Screen Door Invasion (지하철 플랫폼 스크린 도어 침범 인식을 위한 변형된 캐니에지 검출 알고리듬)

  • Lee, Ha-Woon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.663-670
    • /
    • 2019
  • The modified Canny edge detection algorithm that can detect the boundary between screen door and platform in the subway is proposed in this paper. Generally, in the subway, the boundary line between the platform and the screen door is darker than the surrounding area. Therefore, an edge image is using the modified bottom-hat transform by considering its characteristics. Double thresholded images with strong edge and weak edge through double thresholding are obtained. An algorithm that detects the boundary invasion between the platform and the screen door is proposed by calculating the length by applying the Hough transform to the double thresholded image and comparing the boundary line length between when there is an object such as a person and when there is no object. In this paper, the results of the proposed modified Canny edge detection algorithm using two different input images according to camera height position are shown by computer simulation.