• Title/Summary/Keyword: abnormal events

Search Result 201, Processing Time 0.025 seconds

An Increased Proportion of Apoptosis in CD4+ T Lymphocytes Isolated from the Peripheral Blood in Patients with Stable Chronic Obstructive Pulmonary Disease

  • Ju, Jinyung
    • Tuberculosis and Respiratory Diseases
    • /
    • v.81 no.2
    • /
    • pp.132-137
    • /
    • 2018
  • Background: The pathophysiology of chronic obstructive pulmonary disease (COPD) includes inflammation, oxidative stress, an imbalance of proteases and antiproteases and apoptosis which has been focused on lately. Abnormal apoptotic events have been demonstrated in both epithelial and endothelial cells, as well as in inflammatory cells including neutrophils and lymphocytes in the lungs of COPD patients. An increased propensity of activated T lymphocytes to undergo apoptosis has been observed in the peripheral blood of COPD patients. Therefore, the apoptosis of T lymphocytes without activating them was investigated in this study. Methods: Twelve control subjects, 21 stable COPD patients and 15 exacerbated COPD patients were recruited in the study. The T lymphocytes were isolated from the peripheral blood using magnetically activated cell sorting. Apoptosis of the T lymphocytes was assessed with flow cytometry using Annexin V and 7-aminoactinomycin D. Apoptosis of T lymphocytes at 24 hours after the cell culture was measured so that the T lymphocyte apoptosis among the control and the COPD patients could be compared. Results: Stable COPD patients had increased rates of $CD4^+$ T lymphocyte apoptosis at 24 hours after the cell culture, more than the $CD4^+$ T lymphocyte apoptosis which appeared in the control group, while the COPD patients with acute exacerbation had an amplified response of $CD4^+$ T lymphocyte apoptosis as well as of $CD8^+$ T lymphocyte apoptosis at 24 hours after the cell culture. Conclusion: Stable COPD patients have more apoptosis of $CD4^+$ T lymphocytes, which can be associated with the pathophysiology of COPD in stable conditions.

A Study on the Proper Treatment Time of Electronic Moxibustion - Focusing on the Skin Safety - (전자뜸의 적정 시술시간에 대한 연구 -피부 안전성 중심-)

  • Park, So Yun;Hwang, Ji Yong;Lee, Byung Wook;Lee, Bong Hyo
    • Korean Journal of Acupuncture
    • /
    • v.35 no.1
    • /
    • pp.36-40
    • /
    • 2018
  • Objectives : Electronic moxibustion was developed to overcome the weakness of conventional moxibution. However, in spite of many benefits, it also can not be entirely free from the concern of burning. This study was performed to investigate the proper treatment time of electronic moxibustion. Methods : Male sprague-Dawley rats weighing about 350 g were used. Animals were anesthetized with sodium pentobarbital and shaved on the abdomen or back. The full charged-electronic moxibustion device was placed on the shaved site and it was observed if there happened any adverse event after treatment. Results : At the temperatures of 41, 43, and $45^{\circ}C$ there was no abnormal sign after moxibustion even in full time. However, at $47^{\circ}C$, the safe treatment time was 3 min. On the other hand, $49^{\circ}C$ produced diverse adverse events even in 1 min. Conclusions : Results of the present study suggest that the safe treatment time of electronic moxibustion is different according to the temperature. The most common adverse effect in this electronic moxibustion was the white spot and it is needed to observe whether there is any adverse event until 48 h after treatment.

Changes in Mitogen-activated Protein Kinase Activities During Acidification-induced Apoptosis in CHO Cells

  • Kim, Jin-Young;Jeong, Dae-Won;Roh, Sang-Ho;Min, Byung-Moo
    • International Journal of Oral Biology
    • /
    • v.30 no.3
    • /
    • pp.85-90
    • /
    • 2005
  • Homeostatic pH is very important for various cellular processes, including metabolism, survival, and death. An imbalanced-pH might induce cellular acidosis, which is involved in many abnormal events such as apoptosis and malignancy. One of several factors contributing to the onset of metabolic acidosis is the production of lactate and protons by lactate dehydrogenase (LDH) in anaerobic glycolysis. LDH is an important enzyme that catalyzes the reversible conversion of pyruvate to lactate. This study sought to examine whether decreases in extracellular pH induce apoptosis of CHO cells, and to elucidate the role of mitogen-activated protein kinases (MAPKs) in acidification-induced apoptosis. To test apoptotic signaling by acidification we used CHO dhfr cells that were sensitive to acidification, and CHO/anti-LDH cells that are resistant to acidification-induced apoptosis and have reduced LDH activity by stable LDH antisense mRNA expression. In the present study, cellular lactic acid-induced acidification and the role of MAPKs signaling in acidification-induced apoptosis were investigated. Acidification, which is caused by $HCO{_3}^-$-free conditions, induced apoptosis and MAPKs (ERK, JNK, and p38) activation. However, MAPKs were slightly activated in acidic conditions in the CHO/anti-LDH cells, indicating that lactic acid-induced acidification induces activation of MAPKs. Treatment with a p38 inhibitor, PD169316, increased acidification-induced apoptosis but apoptosis was not affected by inhibitors for ERK (U0126) or JNK (SP600125). Thus, these data support the hypothesis that activation of the p38 MAPK during acidification-induced apoptosis contributes to cell survival.

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.

A Wireless ECG monitoring System for Application in Life Emergency Event Detection and Analysis (긴급환자 상황인식 및 분석을 위한 무선 ECG모니터링 시스템)

  • Bhardwaj Sachin;Lee Dae-Seok;Chung Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.421-425
    • /
    • 2006
  • An ubiquitous healthcare system for the home care of elderly persons was designed and implemented using wireless sensor network technology. The wireless technology for home-care purpose gives new possibilities for monitoring of vital parameter with wearable biomedical sensors, and will give the patient the freedom to be mobile and still be under continuously monitoring and thereby to better quality of patient care. Emphasis is placed on recent advances in wireless ECG system for cardiac event monitoring with particular attention to arrhythmia detection in patient. This paper presents a diagnostic system for cardiac arrhythmias from ECG data, using wireless sensor technology. The system also provides an application for recording activities, events and potentially important medical symptoms. The hardware allows data to be transmitted wirelessly from on-body sensor to the base station and then to PC/PDA. Data is also transmitted to a back-end server for analysis using wireless internet connection. Experiments were conducted using the system for activity monitoring, exercise monitoring and medical screening tests and present preliminary data and results.

  • PDF

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

Optmized Design for Flood Mitigation at Sea Side Urban Basin (해안 도시유역의 수재해 저감설계 최적화 기법 연구)

  • Kim, Won Bum;Kim, Min Hyung;Son, kwang Ik;Jung, Woo Chang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.267-267
    • /
    • 2016
  • Extreme events, such as Winnie(1987), Rusa(2002), Maemi(2003) at sea-side urban area, resulted not only economic losses but also life losses. The Korean sea-side characterisitcs are so complicated thar the prediction of sea level rise makes difficult. Geomophologically, Korean pennisula sits on the rim of the Pacific mantle so the sea level is sensitive to the surges due to earth quake, typoon and abnormal climate changes. These environmetns require closer investigation for the preparing the inundatioin due to the sea level rise with customized prediction for local basin. The goal of this research is provide the information of inundation risk so the sea side urban basin could be more safe from the natural water disastesr.

  • PDF

Analysis of Microcystis Bloom in Daecheong Reservoir using ELCOM-CAEDYM (ELCOM-CAEDYM을 이용한 대청호 Microcystis Bloom 해석)

  • Chung, Se Woong;Lee, Heung Soo
    • Journal of Korean Society on Water Environment
    • /
    • v.27 no.1
    • /
    • pp.73-87
    • /
    • 2011
  • An abnormal mono-specific bloom of the cyanobacterium Microcystis aeruginosa had developed at a specific location (transitional zone, monitoring station of Hoenam) in Daecheong Reservoir from middle of July to early August, 2001. The maximum cell counts during the peak bloom reached 1,477,500 cells/mL, which was more than 6~10 times greater than those at other monitoring sites. The hypothesis of this study is that the timing and location of the algal bloom was highly correlated with the local environmental niche that was controled by physical processes such as hydrodynamic mixing and pollutant transport in the reservoir. A three-dimensional, coupled hydrodynamic and ecological model, ELCOM-CAEDYM, was applied to the period of development and subsequent decline of the bloom. The model was calibrated against observed water temperature profiles and water quality variables for different locations, and applied to reproduce the algal bloom event and justify the limiting factor that controled the Microcystis bloom at R3. The simulation results supported the hypothesis that the phosphorus loading induced from a contaminated tributary during several runoff events are closely related to the rapid growth of Microcystis during the period of bloom. Also the physical environments of the reservoir such as a strong thermal stratification and weak wind velocity conditions provided competitive advantage to Microcystis given its light adaptation capability. The results show how the ELCOM-CAEDYM captures the complex interactions between the hydrodynamic and biogeochemical processes, and the local environmental niche that is preferable for cyanobacterial species growth.

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.