• Title/Summary/Keyword: Virtual invasion

Search Result 12, Processing Time 0.028 seconds

Image-Enhanced Endoscopy in Lower Gastrointestinal Diseases: Present and Future

  • Lee, Han Hee;Lee, Bo-In
    • Clinical Endoscopy
    • /
    • v.51 no.6
    • /
    • pp.534-540
    • /
    • 2018
  • From dye-assisted conventional chromoendoscopy to novel virtual chromoendoscopy, image-enhanced endoscopy (IEE) is continuously evolving to meet clinical needs and improve the quality of colonoscopy. Dye-assisted chromoendoscopy using indigo carmine or crystal violet, although slightly old-fashioned, is still useful to emphasize the pit patterns of the colonic mucosa and predict the histological structures of relevant lesions. Equipment-based virtual chromoendoscopy has the advantage of being relatively easy to use. There are several types of virtual chromoendoscopy that vary depending on the manufacturer and operating principle. IEE plays distinctive roles with respect to histologic characterization of colorectal polyps and prediction of the invasion depth of colorectal cancers. In addition, the newest models of IEE have the potential to increase adenoma and polyp detection rates in screening colonoscopy.

Virtual Non-Contrast Computer Tomography (CT) with Spectral CT as an Alternative to Conventional Unenhanced CT in the Assessment of Gastric Cancer

  • Tian, Shi-Feng;Liu, Ai-Lian;Wang, He-Qing;Liu, Jing-Hong;Sun, Mei-Yu;Liu, Yi-Jun
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.6
    • /
    • pp.2521-2526
    • /
    • 2015
  • Objective: The purpose of this study was to evaluate computed tomography (CT) virtual non-contrast (VNC) spectral imaging for gastric carcinoma. Materials and Methods: Fifty-two patients with histologically proven gastric carcinomas underwent gemstone spectral imaging (GSI) including non-contrast and contrast-enhanced hepatic arterial, portal venous, and equilibrium phase acquisitions prior to surgery. VNC arterial phase (VNCa), VNC venous phase (VNCv), and VNC equilibrium phase (VNCe) images were obtained by subtracting iodine from iodine/water images. Images were analyzed with respect to image quality, gastric carcinoma-intragastric water contrast-to-noise ratio (CNR), gastric carcinoma-perigastric fat CNR, serosal invasion, and enlarged lymph nodes around the lesions. Results: Carcinoma-water CNR values were significantly higher in VNCa, VNCv, and VNCe images than in normal CT images (2.72, 2.60, 2.61, respectively, vs 2.35, $p{\leq}0.008$). Carcinoma-perigastric fat CNR values were significantly lower in VNCa, VNCv, and VNCe images than in normal CT images (7.63, 7.49, 7.32, respectively, vs 8.48, p< 0.001). There were no significant differences of carcinoma-water CNR and carcinoma-perigastric fat CNR among VNCa, VNCv, and VNCe images. There was no difference in the determination of invasion or enlarged lymph nodes between normal CT and VNCa images. Conclusions: VNC arterial phase images may be a surrogate for conventional non-contrast CT images in gastric carcinoma evaluation.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

A Study on Methodology for Standardized Platform Design to Build Network Security Infrastructure (네트워크 보안 인프라 구성을 위한 표준화된 플랫폼 디자인 방법론에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.1
    • /
    • pp.203-211
    • /
    • 2012
  • Network security infrastructure is constantly developing based on the combination and blending of various types of devices. From the form of distributed control, the phased defense policy such as fire walls, virtual private communication network, invasion prevention system, invasion detection system, corporate security management, and TSM (Telebiometrics System Mechanism), now it consolidates security devices and solutions to be developed to the step of concentration and artificial intelligence. Therefore, this article suggests network security infrastructure design types concentrating security devices and solutions as platform types and provides network security infrastructure design selecting methodology, the foundational data to standardize platform design according to each situation so as to propose methodology that can realize and build the design which is readily applied and realized in the field and also can minimize the problems by controlling the interferences from invasion.

Implementation of Image-based Virtual Fence for Surveillance Area Setup (감시영역 설정을 위한 영상 기반 가상펜스 구현)

  • Kim, Jae-jun;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2145-2152
    • /
    • 2015
  • The existing CCTV has limitation such as problem on usage of the off-line type of recorded image for specific investigation, and requirement on interactive operator intervention for real-time surveillance. Therefore, it is required to develop the intelligent CCTV equipped with various functionalities in order to overcome drawbacks mentioned above. In this paper, implementation methods of image-based virtual fence were proposed by using the spline curves with supplied control for setup of surveillance area. In addition, pre-alarm region within the predefined distance was established with tangent and normal lines extracted from control points. The image-based virtual fence can be used for remote detection of intrusion and provision of real-time intrusion alarm, and can be expected to use in safety-related application areas including security and crime prevention.

Vulnerability Analysis on a VPN for a Remote Monitoring System

  • Kim Jung Soo;Kim Jong Soo;Park Il Jin;Min Kyung Sik;Choi Young Myung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.346-356
    • /
    • 2004
  • 14 Pressurized Water Reactors (PWR) in Korea use a remote monitoring system (RMS), which have been used in Korea since 1998. A Memorandum of Understanding on Remote Monitoring, based on Enhanced Cooperation on PWRs, was signed at the 10th Safeguards Review Meeting in October 2001 between the International Atomic Energy Agency (IAEA) and Ministry Of Science and Technology (MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an Internet system for Remote Monitoring. According to the Internet-based Virtual Private Network (VPN) applied to Remote Monitoring, the Korea Atomic Energy Research Institute (KAERI) came to an agreement with the IAEA, using a Member State Support Program (MSSP). Phase I is a Lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of Phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated System (SDIS) Server, IAEA Server and TCNC (Technology Center for Nuclear Control) Server. In each system, Virtual Private Network (VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS Server and VPN; TCNC Server and VPN; and IAEA Server and VPN) via penetration testing.

Civil Law Issues of Augmented Reality Game Company's Responsibility for Game Users and Game Servicing Area Parties (증강현실 게임 회사 측의 게임 이용자와 게임 서비스 지역 사회에 대한 민사 책임 연구)

  • Kim, Yunsoo
    • Journal of Korea Game Society
    • /
    • v.18 no.1
    • /
    • pp.63-72
    • /
    • 2018
  • Legal issues whether augmented reality(AR) game service companies are responsible for damages that their game users cause to the community and residents are occurring these days. These kind of damages affect not only game users but also third parties who do not play the AR game. This paper explores the recent cases and analyze the type of legal issues such as trespass, nuisance and unjust enrichment. To determine the necessity of regulating the AR game company, constitutional balancing test, causation, specificity and persistence of the damage and other various standards should be applied.

Evaluation of Computer-Assisted Quantitative Volumetric Analysis for Pre-Operative Resectability Assessment of Huge Hepatocellular Carcinoma

  • Tang, Jian-Hua;Yan, Fu-Hua;Zhou, Mei-Ling;Xu, Peng-Ju;Zhou, Jian;Fan, Jia
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.5
    • /
    • pp.3045-3050
    • /
    • 2013
  • Purpose: Hepatic resection is arguably the preferred treatment for huge hepatocellular carcinoma (H-HCC). Estimating the remnant liver volume is therefore essential. This study aimed to evaluate the feasibility of using computer-assisted volumetric analysis for this purpose. Methods: The study involved 40 patients with H-HCC. Laboratory examinations were conducted, and a contrast CT-scan revealed that 30 cases out of the participating 40 had single-lesion tumors. The remaining 10 had less than three satellite tumors. With the consensus of the team, two physicians conducted computer-assisted 3D segmentation of the liver, tumor, and vessels in each case. Volume was automatically computed from each segmented/labeled anatomical field. To estimate the resection volume, virtual lobectomy was applied to the main tumor. A margin greater than 1 cm was applied to the satellite tumors. Resectability was predicted by computing a ratio of functional liver resection (R) as (Vresected-Vtumor)/(Vtotal-Vtumor) x 100%, applying a threshold of 50% and 60% for cirrhotic and non-cirrhotic cases, respectively. This estimation was then compared with surgical findings. Results: Out of the 22 patients who had undergone hepatectomies, only one had an R that exceeded the threshold. Among the remaining 18 patients with non-resectable H-HCC, 12 had Rs that exceeded the specified ratio and the remaining 6 had Rs that were < 50%. Four of the patients who had Rs less than 50% underwent incomplete surgery due to operative findings of more extensive satellite tumors, vascular invasion, or metastasis. The other two cases did not undergo surgery because of the high risk involved in removing the tumor. Overall, the ratio of functional liver resection for estimating resectability correlated well with the other surgical findings. Conclusion: Efficient pre-operative resectability assessment of H-HCC using computer-assisted volumetric analysis is feasible.

Multilevel Precision-Based Rational Design of Chemical Inhibitors Targeting the Hydrophobic Cleft of Toxoplasma gondii Apical Membrane Antigen 1 (AMA1)

  • Vetrivel, Umashankar;Muralikumar, Shalini;Mahalakshmi, B;K, Lily Therese;HN, Madhavan;Alameen, Mohamed;Thirumudi, Indhuja
    • Genomics & Informatics
    • /
    • v.14 no.2
    • /
    • pp.53-61
    • /
    • 2016
  • Toxoplasma gondii is an intracellular Apicomplexan parasite and a causative agent of toxoplasmosis in human. It causes encephalitis, uveitis, chorioretinitis, and congenital infection. T. gondii invades the host cell by forming a moving junction (MJ) complex. This complex formation is initiated by intermolecular interactions between the two secretory parasitic proteins-namely, apical membrane antigen 1 (AMA1) and rhoptry neck protein 2 (RON2) and is critically essential for the host invasion process. By this study, we propose two potential leads, NSC95522 and NSC179676 that can efficiently target the AMA1 hydrophobic cleft, which is a hotspot for targeting MJ complex formation. The proposed leads are the result of an exhaustive conformational search-based virtual screen with multilevel precision scoring of the docking affinities. These two compounds surpassed all the precision levels of docking and also the stringent post docking and cumulative molecular dynamics evaluations. Moreover, the backbone flexibility of hotspot residues in the hydrophobic cleft, which has been previously reported to be essential for accommodative binding of RON2 to AMA1, was also highly perturbed by these compounds. Furthermore, binding free energy calculations of these two compounds also revealed a significant affinity to AMA1. Machine learning approaches also predicted these two compounds to possess more relevant activities. Hence, these two leads, NSC95522 and NSC179676, may prove to be potential inhibitors targeting AMA1-RON2 complex formation towards combating toxoplasmosis.