• Title/Summary/Keyword: involution

Search Result 168, Processing Time 0.028 seconds

Serial Ultrasonographic Evaluation of Postpartum Uterine Involution in Miniature Schnauzer Dogs

  • Yeo, Woon-Chang;Kim, Bang-Sil;Yun, Chang-Jin;Park, Chul-Ho;Kim, Jung-Bae;Moon, Jin-San;Suh, Guk-Hyun;Oh, Ki-Seok;Son, Chang-Ho
    • Journal of Embryo Transfer
    • /
    • v.22 no.4
    • /
    • pp.229-234
    • /
    • 2007
  • This study was undertaken to determine the normal appearance of the postpartum uterine involution. Postpartum changes in uterine shape, architecture, echogenicity and diameter were monitored with ultrasonography in 8 Miniature Schnauzer dogs. Vaginal discharge was observed visually during the 3 weeks of postpartum. A large amount of viscous dark green discharge changed progressively to a small amount of transparent discharge. In the uterine shape, the transverse images were crescent or polygonal at the beginning, but became circular after 16 days. At postpartum day 24, the longitudinal images of placental and interplacental sites were similar to each other The echogenicity of uterine structure was clearly distinguishable among the hyperechoic serous membrane, hypochoic myometrium, hyperechoic endometrium, and anechoic uterine contents during the first week postpartum, but afterward the interluminal boundaries and echogenicity became obscure gradually. In addition, the anechoic substance of the endometrial cavity was not observed after postpartum day 28. In the uterine diameter, the diameter of placental sites decreased markedly from 24 mm at the first day postpartum to 13 mm at day 7, and the diameter of interplacental sites decreased from 15 mm at postpartum day 1 to 10 mm at day 7. At postpartum day 65, the uterus (6.4 mm) changed little and had a uniform homogenous echo, and thus it was confirmed that uterine involution was completed at that time in Miniature Schnauzer dogs.

A Study on the i-YOLOX Architecture for Multiple Object Detection and Classification of Household Waste (생활 폐기물 다중 객체 검출과 분류를 위한 i-YOLOX 구조에 관한 연구)

  • Weiguang Wang;Kyung Kwon Jung;Taewon Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.135-142
    • /
    • 2023
  • In addressing the prominent issues of climate change, resource scarcity, and environmental pollution associated with household waste, extensive research has been conducted on intelligent waste classification methods. These efforts range from traditional classification algorithms to machine learning and neural networks. However, challenges persist in effectively classifying waste in diverse environments and conditions due to insufficient datasets, increased complexity in neural network architectures, and performance limitations for real-world applications. Therefore, this paper proposes i-YOLOX as a solution for rapid classification and improved accuracy. The proposed model is evaluated based on network parameters, detection speed, and accuracy. To achieve this, a dataset comprising 10,000 samples of household waste, spanning 17 waste categories, is created. The i-YOLOX architecture is constructed by introducing the Involution channel convolution operator and the Convolution Branch Attention Module (CBAM) into the YOLOX structure. A comparative analysis is conducted with the performance of the existing YOLO architecture. Experimental results demonstrate that i-YOLOX enhances the detection speed and accuracy of waste objects in complex scenes compared to conventional neural networks. This confirms the effectiveness of the proposed i-YOLOX architecture in the detection and classification of multiple household waste objects.

ANTI-LINEAR INVOLUTIONS ON A G-VECTOR BUNDLE

  • Kim, Sung-Sook;Shin, Joon-Kook
    • Communications of the Korean Mathematical Society
    • /
    • v.14 no.1
    • /
    • pp.211-216
    • /
    • 1999
  • We study the anti-linear involutions on a real algebraic vector bundle with bundle with a compact real algebraic group action.

  • PDF

Secure group communication protocol using a cellular automata (셀룰러 오토마타를 이용한 안전한 그룹 통신 프로토콜)

  • 이준석;박영호;이경현
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.27-31
    • /
    • 2003
  • 본 논문은 그름 멤버들간의 안전한 통신을 위한 그룹키 관리(Group key management)에 대한 새로운 방법을 제안한다. 제안된 방식은 선형 셀룰러 오토마타를 이용해서 생성된 involution 특성을 갖는 기본 암호 프리미티브를 이용하여 비밀 공유키를 생성한다. 제안된 방식은 공모에 대한 위협을 근본적으로 방지할 수 있는 특징을 가지고 있다.

  • PDF

Immunity of the Buffalo Mammary Gland during Different Physiological Stages

  • Dang, A.K.;Kapila, Suman;Tomar, Parveen;Singh, Charan
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.20 no.8
    • /
    • pp.1174-1181
    • /
    • 2007
  • To study the immunity of the buffalo mammary gland during involution and around parturition and compare it with the mastitic mammary gland, milk samples were collected from 9 Murrah buffaloes during the above critical periods. SCC of buffalo milk increased significantly (p<0.01) by day 21 of involution and one week prepartum. SCC was significantly higher around parturition but became normal at 14 days postpartum. Phagocytic activity (PA) and phagocytic index (PI) of the buffalo milk neutrophils decreased as the duration of the dry period increased. Elevated levels of immunoglobulins at calving improved the PA and PI, but the lowest PA of 18.8% and PI of 1.75 were recorded at 7 days postpartum. Buffaloes suffering from clinical mastitis had PA of 12.3% and PI of 1.46 that increased significantly (p<0.01) on the third day of treatment. Distance of teat from ground level was found to be minimum at one week before parturition. The investigation showed that in vitro phagocytic activity of buffalo neutrophils was weakest at one week postpartum.

256 bit Symmetric SPN Block cipher XSB (256 비트 대칭 SPN 블록 암호 XSB)

  • Cho, Gyeong-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.9-17
    • /
    • 2012
  • In this paper, we propose a SPN 256 bit block cipher so called XSB(eXtended SPN Block cipher) which has a symmetric structure in encryption and decryption. The proposed XSB is composed of the even numbers of N rounds where the first half of them, 1 to N/2-1 round, applies a pre-function and the last half of them, N/2+1 to N round, employs a post-function. Each round consists of a round key addition layer, a substiution layer, a byte exchange layer and a diffusion layer. And a symmetry layer is located in between the pre-function layer and the post-function layer. The symmetric layer is composed with a multiple simple bit slice involution S-Boxes. The bit slice involution S-Box symmetric layer increases difficult to attack cipher by Square attack, Boomerang attack, Impossible differentials cryptanalysis etc.

H-FUZZY SEMITOPOGENOUS PREOFDERED SPACES

  • Chung, S.H.
    • Communications of the Korean Mathematical Society
    • /
    • v.9 no.3
    • /
    • pp.687-700
    • /
    • 1994
  • Throughout this paper we will let H denote the complete Heyting algebra ($H, \vee, \wedge, *$) with order reversing involution *. 0 and 1 denote the supermum and the infimum of $\emptyset$, respectively. Given any set X, any element of $H^X$ is called H-fuzzy set (or, simply f.set) in X and will be denoted by small Greek letters, such as $\mu, \nu, \rho, \sigma$. $H^X$ inherits a structure of H with order reversing involution in natural way, by definding $\vee, \wedge, *$ pointwise (sam notations of H are usual). If $f$ is a map from a set X to a set Y and $\mu \in H^Y$, then $f^{-1}(\mu)$ is the f.set in X defined by f^{-1}(\mu)(x) = \mu(f(x))$. Also for $\sigma \in H^X, f(\sigma)$ is the f.set in Y defined by $f(\sigma)(y) = sup{\sigma(x) : f(x) = y}$ ([4]). A preorder R on a set X is reflexive and transitive relation on X, the pair (X,R) is called preordered set. A map $f$ from a preordered set (X, R) to another one (Y,T) is said to be preorder preserving (inverting) if for $x,y \in X, xRy$ implies $f(x)T f(y) (resp. f(y)Tf(x))$. For the terminology and notation, we refer to [10, 11, 13] for category theory and [7] for H-fuzzy semitopogenous spaces.

  • PDF

Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box (비트 슬라이스 대합 S-박스에 의한 대칭 SPN 블록 암호에 대한 차분 오류 공격)

  • Kang, HyungChul;Lee, Changhoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.105-108
    • /
    • 2015
  • In this paper, we propose a differential fault analysis on symmetric SPN block cipher with bitslice involution S-box in 2011. The target block cipher was designed using AES block cipher and has advantage about restricted hardware and software environment using the same structure in encryption and decryption. Therefore, the target block cipher must be secure for the side-channel attacks. However, to recover the 128-bit secret key of the targer block cipher, this attack requires only one random byte fault and an exhausted search of $2^8$. This is the first known cryptanalytic result on the target block cipher.