• Title/Summary/Keyword: flow information

Search Result 5,726, Processing Time 0.034 seconds

Clinical Value of Real Time Elastography in Patients with Unexplained Cervical Lymphadenopathy: Quantitative Evaluation

  • Fu, Ying;Shi, Yun-Fei;Yan, Kun;Wang, Yan-Jie;Yang, Wei;Feng, Guo-Shuang
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.13
    • /
    • pp.5487-5492
    • /
    • 2014
  • Ultrasonography is non-invasive and can give useful clues in the diagnosis of cervical lymphadenopathy, However, differential diagnosis is difficult in some situations even combined with color Doppler imaging. The present study was conducted to evaluate the clinical value of real time elastography in patients with unexplained cervical lymphadenopathy using a quantitative method. From May 2011 to February 2012, 39 enlarged lymph nodes from 39 patients with unexplained cervical lymphadenopathy were assessed. All the patients were examined by both B-mode ultrasound, color Doppler flow imaging and elastography. The method of analyzing elasto-graphic data was the calculation of the 10 parametres ("mean", "sd", "area%", "com", "kur", "ske", "con", "ent", "idm", "asm") offered by the software integrated into the Hitachi system. The findings were then correlated with the definitive tissue diagnosis obtained by lymph node dissection or biopsy. Final histology revealed 10 cases of metastatic lymph nodes, 11 cases of lymphoma, 12 cases of tuberculosis and 6 cases of nonspecific lymphadenitis. The significant distinguishing features for conventional ultrasound were the maximum short diameter (p=0.007) and absent of echogenic hilum (p=0.0293). The diagnostic accuracy was 43.6% (17/39 cases) and there were 17 patients with equivocal diagnosis. For elastography, "mean" (p=0.003), "area%" (p=0.009), "kurt" (p=0.0291), "skew" (p=0.014) and "cont" (p=0.012) demonstrated significant differences between groups. With 9 of the 17 patients with previous equivocal diagnoses (52.9%) definite and correct diagnoses could be obtained. The diagnostic accuracy for conventional ultrasound combined elastography was 69.2% (27/39 cases). There were differences in the diagnostic sensitivity of the two methods (p=0.0224). Ultrasound combined with elastography demonstrated higher rates of conclusive and accurate diagnoses in patients with unexplained cervical lymphadenopathy than conventional ultrasound. The quantitative program showed good correlation with the pathology of different lymph node diseases.

Evaporation Heat Transfer and Pressure Drop of R-404A at Low Flow Rates in 9.5 mm O.D. Smooth and Microfin Tubes (낮은 유량에서 외경 9.5 mm 평활관과 마이크로핀관 내 R-404A 증발 열전달 및 압력 손실)

  • Kim, Nae-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.27-36
    • /
    • 2018
  • A significant amount of studies were performed on evaporation heat transfer and pressure drop in microfin tubes. Most studies, however, focused on the refrigerants used in air-conditioners or heat pumps, and very limited information is available on R-404A, which is used in low temperature refrigeration. In this study, the evaporation heat transfer and pressure drop characteristics of R-404A in a 9.5 mm O.D. microfin tube were investigated for the mass flux range from $80kg/m^2s$ and $200kg/m^2s$. A smooth tube of the same outer dimeter was also tested for comparison. The results showed that the heat transfer enhancement ratio of the microfin tube increased with increasing mass flux and the heat flux decreased. The relative contribution of the convective heat transfer and the heat flux on total heat transfer was attributed to the observed trend. The pressure drops of the microfin tube were slightly (maximum 28%) larger than those of the smooth tube. Existing correlations do not adequately predict the measured heat transfer coefficients of pressure drops, probably due to the test range of the present study, which is outside of the existing correlations.

A Research on the Probabilistic Calculation Method of River Topographic Factors (하천 지형인자의 확률론적 산정 방식 연구)

  • Choo, Yeon-Moon;Ma, Yun-Han;Park, Sang-Ho;Sue, Jong-Chal;Kim, Yoon-Ku
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.509-516
    • /
    • 2020
  • Since the 1960s, many rivers have been polluted and destroyed due to river repair projects for economic development and the covering of small rivers due to urbanization. Many studies have analyzed rivers using measured river topographic factors, but surveying is not easy when the flow rate changes rapidly, such as during a flood. In addition, the previous research has been mainly about the cross section of a river, so information on the longitudinal profile is insufficient. This research used informational entropy theory to obtain an equation that can calculate the average river slope, river slope, and river longitudinal elevation for a river basin in real time. The applicability was analyzed through comparison with measured data of a river's characteristic factors obtained from a river plan. The parameters were calculated using informational entropy theory, nonlinear regression analysis, and actual data. The longitudinal elevation entropy equation for each stream was then calculated, and so was the average river slope. All of the values were over 0.96, so it seems that reliable results can be obtained when calculating river characteristic factors.

Hierarchical Internet Application Traffic Classification using a Multi-class SVM (다중 클래스 SVM을 이용한 계층적 인터넷 애플리케이션 트래픽의 분류)

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.7-14
    • /
    • 2010
  • In this paper, we introduce a hierarchical internet application traffic classification system based on SVM as an alternative overcoming the uppermost limit of the conventional methodology which is using the port number or payload information. After selecting an optimal attribute subset of the bidirectional traffic flow data collected from the campus, the proposed system classifies the internet application traffic hierarchically. The system is composed of three layers: the first layer quickly determines P2P traffic and non-P2P traffic using a SVM, the second layer classifies P2P traffics into file-sharing, messenger, and TV, based on three SVDDs. The third layer makes specific classification of the entire 16 application traffics. By classifying the internet application traffic finely or coarsely, the proposed system can guarantee an efficient system resource management, a stable network environment, a seamless bandwidth, and an appropriate QoS. Also, even a new application traffic is added, it is possible to have a system incremental updating and scalability by training only a new SVDD without retraining the whole system. We validate the performance of our approach with computer experiments.

A Study on the Traffic Improvement at an Approach Area of Busan Harbor (부산항 제1항로 진입 해역의 통항 개선에 관한 연구)

  • Lee, Yun-Sok;Jung, Min;Song, Chae-Uk;Park, Jin-Soo;Park, Young-Soo;Cho, Ik-Soon
    • Journal of Navigation and Port Research
    • /
    • v.31 no.5 s.121
    • /
    • pp.345-351
    • /
    • 2007
  • In approaching sea area of Busan harbour, there are many traffic vessels and external forces such as strong seasonal wind and lateral flow are existed. Since the area caused the risk of navigation and ship operators feel hard to enter/depart on Busan port, we carried our the evaluation of traffic risk and propriety at Busan no.1 fairway. In order to assess the safety in the fairway, we analyzed ship's traffic stream based on the marine traffic survey and evaluated the traffic safety of present Traffic Separation Schemes(TSS) and suggest TSS in the research using full mission ship-handling simulators. As a result, the suggested TSS has an effect on improving the traffic safety. In addition, this paper was to suggest the dredging area of depth of water, the passage of towing vessels and control of warships for preventing of maritime accidents in the Busan no.1 fairway.

Evaluation of Cardiac Function Analysis System Using Magnetic Resonance Images

  • Tae, Ki-Sik;Suh, Tae-Suk;Choe, Bo-Young;Lee, Hyoung-Koo;Shinn, Kyung-Sub;Jung, Seung-Eun;Lee, Jae-Moon
    • Progress in Medical Physics
    • /
    • v.10 no.3
    • /
    • pp.159-168
    • /
    • 1999
  • Cardiac disease is one of the leading causes of death in Korea. In quantitative analysis of cardiac function and morphological information by three-dimensional reconstruction of magnetic resonance images, left ventricle provides an important role functionally and physiologically. However, existing procedures mostly rely on the extensive human interaction and are seldom evaluated on clinical applications. In this study, we developed a system which could perform automatic extraction of enpicardial and endocardial contour and analysis of cardiac function to evaluate reliability and stability of each system comparing with the result of ARGUS system offered 1.5T Siemens MRI system and manual method performed by clinicians. For various aspects, we investigated reliability of each system by compared with left ventricular contour, end-diastolic volume (EDV), end-systolic volume (ESV), stock volume (SV), ejection fraction (EF), cardiac output (CO) and wall thickness (WT). When comparing with manual method, extracted results of developed process using minimum error threshold (MET) method that automatically extracts contour from cardiac MR images and ARGUS system were demonstrated as successful rate 90% of the contour extraction. When calculating cardiac function parameters using MET and comparing with using correlation coefficients analysis method, the process extracts endocardial and epicardial contour using MET, values from automatic and ARGUS method agreed with manual values within :t 3% average error. It was successfully demonstrated that automatic method using threshold technique could provide high potential for assessing of each parameters with relatively high reliability compared with manual method. In this study, the method developed in this study could reduce processing time compared with ARGUS and manual method due to a simple threshold technique. This method is useful for diagnosis of cardiac disease, simulating physiological function and amount of blood flow of left ventricle. In addition, this method could be valuable in developing automatic systems in order to apply to other deformable image models.

  • PDF

A Study on the Feasibility Improvement of the Real Estate Development by Using Project Financing Analytical Method in Korea (PF대출 분석기법을 활용한 부동산개발사업 사업성 평가 개선 연구)

  • Seo, Jeong-Jin
    • Journal of Cadastre & Land InformatiX
    • /
    • v.44 no.2
    • /
    • pp.209-230
    • /
    • 2014
  • There are three forms of REITs company in Korea that was first introduced in 2002. Each REITs have been listed on the KRX, its characteristics are different, but it is classified as a REITs company in all events. REITs current methods are applied uniformly manner that does not reflect the characteristics of the individual. REITs some, that is not seen unlike legislative intent, it is delisted, such as generating an investment loss of investors. In this study it is an object of the invention from the point of view of REITs business validity, to draw up operational support aggressive plans of the scheme. By improving the PF assesment system, to improve the relevance of REIT business and presenting policy direction to the activation of REITs. Through the sophistication of real estate finance utilizing REITs, policy for proper investment of general investors REITs funds were listed with the smooth flow must be realized. The results of this study, it can be utilized as basic data for policy to reflect the real estate policy for activation of the indirect financial investments.

Analyzing Spatial Pattern by moving Factors of out-migration people Related moving to the Provinces of Capital Region Firms (수도권 유출인구의 공간적 패턴분석 및 이동영향 요인 분석 - 수도권 기업의 지방이전과 관련하여 -)

  • Hong, Ha-Yeon;Lee, Kil-Jae
    • Journal of Cadastre & Land InformatiX
    • /
    • v.44 no.2
    • /
    • pp.155-175
    • /
    • 2014
  • This study targets to recognize needs of spatial pattern analysis and to draw the relationship between relocation of Capital Region firms and population outflow in Capital Region through the regression analysis. The population outflow in Capital Region has moved to and around Yesan-gun and Asan-si. Also, such outflow is found to compose mostly one or two household members for their jobs. In addition to this study has analyzed to find effect factors through the Geographically Weighted Regression. The results of the analysis has confirmed that the most decisive factors affecting population flow from Capital Region to Chungcheongnam-do were population factors and transportation factors and others. Thus, the below policy implications could be derived and also may be applied toward Sejong City which are currently experiencing the relocating of Public sectors and new constructions. Firstly, the effect of Capital Region firms movement on population inflows could be better observed in small-scale towns like "kun" than larger-scale towns like "si.". On the other hand, people in Capital Region moved to larger-scale towns like "si" unlike the Capital Region firms. This difference implicates that people select their residence according to not only their jobs but also residential environment. Secondly, moving people from Capital Region to another region for their jobs are expected to appear more in a form of family units rather than individual units. Sejong city, where public organizations are being relocated, should recognize this particular Chungcheonnam-do phenomenon and be prepared to be more effectively used in perspectives of land use as well as urban planning.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.