• Title/Summary/Keyword: open technique

Search Result 1,397, Processing Time 0.026 seconds

Abdominal-based adipocutaneous advancement flap for reconstructing inguinal defects with contraindications to standard reconstructive approaches: a simple and safe salvage reconstructive option

  • Schaffer, Clara;Haselbach, Daniel;Schiraldi, Luigi;Sorelius, Karl;Kalbermatten, Daniel F.;Raffoul, Wassim;di Summa, Pietro G.
    • Archives of Plastic Surgery
    • /
    • v.48 no.4
    • /
    • pp.395-403
    • /
    • 2021
  • Background Groin wounds occurring after vascular surgical site infection, oncologic resection, or occasionally orthopedic surgery and trauma may represent a surgical challenge. Reconstruction of these defects by the usual workhorse flaps may be contraindicated following previous surgery and in patients with lower limb lymphedema or extreme morbidity. Methods This study included 15 consecutive patients presenting with inguinal wounds after vascular or general surgery that required debridement and soft tissue coverage. All cases had absolute or relative contraindications to conventional reconstructive techniques, including a compromised deep femoral artery network, limb lymphedema, scarring of potential flap harvesting sites, or poor overall condition. Abdominal adipocutaneous excess enabled the performance of adipocutaneous advancement flaps in an abdominoplasty-like fashion. Immediate and long-term outcomes were analyzed. Results Soft tissue coverage was effective in all cases. Two patients required re-intervention due to flap-related complications (venous congestion and partial flap necrosis). All patients fully recovered over a mean±standard deviation follow-up of 2.4±1.5 years. Conclusions Abdominal flaps can be an effective and simple alternative technique for inguinal coverage with reproducible outcomes. In our experience, the main indications are a compromised deep femoral artery network and poor thigh tissue quality. Relative contraindications, such as previous open abdominal surgery, should be considered.

Study on Prediction of Net Thrust of Multi-Pod-Driven Ice-Breaking Vessel Under Bollard Pull and Overload Conditions According to the Change of Water Depth Using Computational Fluid Dynamics-Based Simulations (수심 변화에 따른 볼라드 당김 및 과부하 조건에서의 다중 포드 추진 쇄빙선박의 여유추력 추정에 대한 수치해석적 연구)

  • Kim, JinKyu;Kim, Hyoung-Tae;Kim, Hee-Taek;Lee, Hee-Dong
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.58 no.3
    • /
    • pp.158-166
    • /
    • 2021
  • In this paper, a numerical analysis technique using a body force model is investigated to estimate the available net thrust of multi-pod-driven ice-breaking vessels under bollard pull and overload conditions. To employ the body force model in present flow simulations, drag and thrust components acting on the pod unit are calculated by using Propeller Open Water (POW) test data. The available net thrusts according to the direction of operation are evaluated in both bollard pull and overload conditions under deep water. The simulation results are compared with the model test data. The available net thrusts, calculated by the present analysis for ahead operating modes at 3~6 knots which are typical speeds of the target vessel in arctic field, are agreed well with the model test results. It is also found that the present result for astern operating mode appears approximately 6 % larger than the model test result. In addition, the available net thrusts are calculated under the both operating conditions accompanied by shallow water effects, and the main cause of the difference is studied. Based on the result of the present study, it is confirmed that the body force model can be applied to the performance evaluation of multi-pod propulsion system and the main engine selection in early design stage of the vessel.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

Q-Learning Policy Design to Speed Up Agent Training (에이전트 학습 속도 향상을 위한 Q-Learning 정책 설계)

  • Yong, Sung-jung;Park, Hyo-gyeong;You, Yeon-hwi;Moon, Il-young
    • Journal of Practical Engineering Education
    • /
    • v.14 no.1
    • /
    • pp.219-224
    • /
    • 2022
  • Q-Learning is a technique widely used as a basic algorithm for reinforcement learning. Q-Learning trains the agent in the direction of maximizing the reward through the greedy action that selects the largest value among the rewards of the actions that can be taken in the current state. In this paper, we studied a policy that can speed up agent training using Q-Learning in Frozen Lake 8×8 grid environment. In addition, the training results of the existing algorithm of Q-learning and the algorithm that gave the attribute 'direction' to agent movement were compared. As a result, it was analyzed that the Q-Learning policy proposed in this paper can significantly increase both the accuracy and training speed compared to the general algorithm.

Direct Microwave Sintering of Poorly Coupled Ceramics in Electrochemical Devices

  • Amiri, Taghi;Etsell, Thomas H.;Sarkar, Partha
    • Journal of Electrochemical Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.390-397
    • /
    • 2022
  • The use of microwaves as the energy source for synthesis and sintering of ceramics offers substantial advantages compared to conventional gas-fired and electric resistance furnaces. Benefits include much shorter processing times and reaching the sintering temperature more quickly, resulting in superior final product quality. Most oxide ceramics poorly interact with microwave irradiation at low temperatures; thus, a more complex setup including a susceptor is needed, which makes the whole process very complicated. This investigation pursued a new approach, which enabled us to use microwave irradiation directly in poorly coupled oxides. In many solid-state electrochemical devices, the support is either metal or can be reduced to metal. Metal powders in the support can act as an internal susceptor and heat the entire cell. Then sufficient interaction of microwave irradiation and ceramic material can occur as the sample temperature increases. This microwave heating and exothermic reaction of oxidation of the support can sinter the ceramic very efficiently without any external susceptor. In this study, yttria stabilized zirconia (YSZ) and a Ni-YSZ cermet support were used as an example. The cermet was used as the support, and a YSZ electrolyte was coated and sintered directly using microwave irradiation without the use of any susceptor. The results were compared to a similar cell prepared using a conventional electric furnace. The leakage test and full cell power measurement results revealed a fully leak-free electrolyte. Scanning electron microscopy and density measurements show that microwave sintered samples have lower open porosity in the electrode support than conventional heat treatment. This technique offers an efficient way to directly use microwave irradiation to sinter thin film ceramics without a susceptor.

A Study on Interior Simulation based on Real-Room without using AR Platforms (AR 플랫폼을 사용하지 않는 실제 방 기반 인테리어 시뮬레이션 연구)

  • Choi, Gyoo-Seok;Kim, Joon-Geon;Lim, Chang-Muk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.111-120
    • /
    • 2022
  • It is essential to make a purchase decision to make sure that the furniture matches well with other structures in the room. Moreover, in the Untact Marketing situation caused by the COVID-19 crisis, this is becoming an even more impact factor. Accordingly, methods of measuring length using AR(Augmented Reality) are emerging with the advent of AR open sources such as ARCore and ARKit for furniture arrangement interior simulation. Since this existing method using AR generates a Depth Map based on a flat camera image and it also involves complex three-dimensional calculations, limitations are revealed in work that requires the information of accurate room size using a smartphone. In this paper, we propose a method to accurately measure the size of a room using only the accelerometer and gyroscope sensors built in smartphones without using ARCore or ARKit. In addition, as an example of application using the presented technique, a method for applying a pre-designed room interior to each room is presented.

Comparison of Anomaly Detection Performance Based on GRU Model Applying Various Data Preprocessing Techniques and Data Oversampling (다양한 데이터 전처리 기법과 데이터 오버샘플링을 적용한 GRU 모델 기반 이상 탐지 성능 비교)

  • Yoo, Seung-Tae;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.201-211
    • /
    • 2022
  • According to the recent change in the cybersecurity paradigm, research on anomaly detection methods using machine learning and deep learning techniques, which are AI implementation technologies, is increasing. In this study, a comparative study on data preprocessing techniques that can improve the anomaly detection performance of a GRU (Gated Recurrent Unit) neural network-based intrusion detection model using NGIDS-DS (Next Generation IDS Dataset), an open dataset, was conducted. In addition, in order to solve the class imbalance problem according to the ratio of normal data and attack data, the detection performance according to the oversampling ratio was compared and analyzed using the oversampling technique applied with DCGAN (Deep Convolutional Generative Adversarial Networks). As a result of the experiment, the method preprocessed using the Doc2Vec algorithm for system call feature and process execution path feature showed good performance, and in the case of oversampling performance, when DCGAN was used, improved detection performance was shown.

Anterior Cranial Base Reconstruction in Complex Craniomaxillofacial Trauma: An Algorithmic Approach and Single-Surgeon's Experience

  • Shakir, Sameer;Card, Elizabeth B.;Kimia, Rotem;Greives, Matthew R.;Nguyen, Phuong D.
    • Archives of Plastic Surgery
    • /
    • v.49 no.2
    • /
    • pp.174-183
    • /
    • 2022
  • Management of traumatic skull base fractures and associated complications pose a unique reconstructive challenge. The goals of skull base reconstruction include structural support for the brain and orbit, separation of the central nervous system from the aerodigestive tract, volume to decrease dead space, and restoration of the three-dimensional appearance of the face and cranium with bone and soft tissues. An open bicoronal approach is the most commonly used technique for craniofacial disassembly of the bifrontal region, with evacuation of intracranial hemorrhage and dural repair performed prior to reconstruction. Depending on the defect size and underlying patient and operative factors, reconstruction may involve bony reconstruction using autografts, allografts, or prosthetics in addition to soft tissue reconstruction using vascularized local or distant tissues. The vast majority of traumatic anterior cranial fossa (ACF) injuries resulting in smaller defects of the cranial base itself can be successfully reconstructed using local pedicled pericranial or galeal flaps. Compared with historical nonvascularized ACF reconstructive options, vascularized reconstruction using pericranial and/or galeal flaps has decreased the rate of cerebrospinal fluid (CSF) leak from 25 to 6.5%. We review the existing literature on this uncommon entity and present our case series of n = 6 patients undergoing traumatic reconstruction of the ACF at an urban Level 1 trauma center from 2016 to 2018. There were no postoperative CSF leaks, mucoceles, episodes of meningitis, or deaths during the study follow-up period. In conclusion, use of pericranial, galeal, and free flaps, as indicated, can provide reliable and durable reconstruction of a wide variety of injuries.

Conventional and digital impressions for complete-arch implant-supported fixed prostheses: time, implant quantity effect and patient satisfaction

  • Pereira, Ana Larisse Carneiro;Medeiros, Vitoria Ramos;Campos, Maria de Fatima Trindade Pinto;Medeiros, Annie Karoline Bezerra de;Yilmaz, Burak;Carreiro, Adriana da Fonte Porto
    • The Journal of Advanced Prosthodontics
    • /
    • v.14 no.4
    • /
    • pp.212-222
    • /
    • 2022
  • PURPOSE. To evaluate and compare the effect of impression type (conventional vs digital) and the number of implants on the time from the impressions to the generation of working casts of mandibular implant-supported fixed completearch frameworks, as well as on patient satisfaction. MATERIALS AND METHODS. 17 participants, 3 or 4 implants, received 2 types of digital impression methods (DI) and conventional (CI). In DI, two techniques were performed: scanning with the scan bodies (SC) and scanning with a device attached to the scan bodies (SD) (BR 10 2019 026265 6). In CI, the making of a solid index (SI) and open-tray impression (OT) were used. The outcomes were used to evaluate the time and the participant satisfaction with conventional and digital impressions. The time was evaluated through the timing of the time obtained in the workflow in the conventional and digital impression. The effect of the number of implants on time was also assessed. Satisfaction was assessed through a questionnaire based on seven. The Wilcoxon test used to identify the statistical difference between the groups in terms of time. The Mann-Whitney test was used to analyze the relationship between the time and the number of implants. Fisher's test was used to assess the patient satisfaction (P<.05). RESULTS. The time with DI was shorter than with CI (DI, $\tilde{x}=02:58$; CI, $\tilde{x}=31:48$) (P<.0001). The arches rehabilitated with 3 implants required shorter digital impression time (3: $\tilde{x}=05:36$; 4: $\tilde{x}=09:16$) (P<.0001). Regarding satisfaction, the DI was more comfortable and pain-free than the CI (P<.005). CONCLUSION. Digital impressions required shorter chair time and had higher patient acceptance than conventional impressions.

Minimize Web Applications Vulnerabilities through the Early Detection of CRLF Injection

  • Md. Mijanur Rahman;Md. Asibul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.199-202
    • /
    • 2023
  • Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. Automated testing can help to quickly identify CRLF vulnerabilities, and is particularly useful for companies to test their applications before releasing them. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Security automation is an important issue for companies trying to protect themselves against security threats. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance their security.