• Title/Summary/Keyword: 위장의

Search Result 1,434, Processing Time 0.026 seconds

Modified Upper Gastrointestinal Study Using Methylcellulose After Administration of Barium Suspension : Comparison with Conventional Series (바륨 현탁액과 메틸셀룰로스(Methylcellulose)를 사용한 변형 상부위장관조영술 :전통적 바륨조영술과의 비교)

  • 이기창;최민철;서민호;정주현;윤정희
    • Journal of Veterinary Clinics
    • /
    • v.17 no.2
    • /
    • pp.411-415
    • /
    • 2000
  • For comparison with conventional barium-gastrointestinal study, modified method using barium and methylcellulose was performed in 16 normal dogs (4-8 kg) divided into two groups. The group 1 received 8ml/kg of 40% w/v barium suspension only, and group 2 had taken 15 ml/kg of 0.6% w/v methylcellulose after administration 4 ml/kg of 40% w/v barium suspension by feeding tube. The barium suspension was prepared mixing full strength-barium suspension with water and methylcellulose solution was produced by blending methylcellulose sterilized water Sequential radiographs, lateral and ventrodorsal projections were obtained at 5 minute, 20 minute,40 minute. 60 minute and every 30 minutes thereafter, until the contrast is seen in the large intestine Inage qual- ity was rated by three veterinary radiologists as " poor" " fair ". "good", or "excellent" We analyzed the relationship between image quality,, transit time. Between two techniques, the modified method with 4ml of 40% w/v barium suspension and 15 ml of 0.6% w/v methylcellulose showed much better image quality ["excellent" result in 7 of the 8 subjects (88%)] and shorter transit time (107 minutes) toe the cecum. In addition, the best image quality was obtained at 20 and 40 minutes after admin-istration of contrast agent. It call be concluded the modified gastrointestinal study using methylcel-lulose after administration of barium suspension was a simple technique and easily improved the image quality and diagnostic accuracy of gstrointestinal disorders in small animal.racy of gstrointestinal disorders in small animal.

  • PDF

An immunohistochemical study on the gastrointestinal endocrine cells in the bean goose, Anser fabalis Latham (기러기 위장관 내분비세포에 관한 면역조직화학적 연구)

  • Park, Ki-dae;Lee, Jae-hyun;Ku, Sae-kwang;Lee, Hyeung-sik
    • Korean Journal of Veterinary Research
    • /
    • v.39 no.6
    • /
    • pp.1038-1048
    • /
    • 1999
  • The regional distributions and relative frequencies of the gastrointestinal endocrine cells in the bean goose (Anser fabalis Latham) were investigated by immunohistochemical methods using bovine Sp-1/chromogranin (CG), serotonin, gastrin, cholecystokinin (CCK)-8, somatostatin and glucagon antisera. BCG-immunoreactive cells were widespread throughout the gastrointestinal tract (GIT) with moderated frequencies except for the gizzard and proventriculus which were a few frequencies. Serotonin-immunoreactive cells were detected throughout the GIT except for the proventriculus and gizzard. These cells were observed in the pylorus with rare frequencies but numerous cells were detected in the intestinal tract. Gastrin-immunoreactive cells were restricted to the gizzard, pylorus and duodenum. These cells were most predominant in the pylorus and a few or rare in the gizzard and duodenum, respectively. CCK-8-immunoreactive cells were observed from the gizzard to ileum. The highest frequencies of endocrine cells were observed in the duodenum. These cells were increased from the gizzard to duodenum but thereafter decreased. Somatostatin-immunoreactive cells were detected in the GIT except for the large intestine. In the proventriculus and pylorus, numerous immunoreactive cells were demonstrated but a few cells were present in the other regions. Glucagon cells were observed in the gizzard, pylorus, ileum, colon and rectum with a few or moderated numbers.

  • PDF

A study of dream sequence in Freud's Psychoanalysis (Focusing on the David lynch's film "Mulholland Drive (2001)) (꿈 시퀀스 이미지에 대한 프로이드의 정신분석학적 연구 (데이빗 린치의 영화 "멀홀랜드 드라이브(2001)" 를 중심으로))

  • Lee, Tae-hoon
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.433-439
    • /
    • 2016
  • For the past hundred years, since many films have only been focusing on expressing suppressed desire and obsession, there have been few films in which unconsciousness desire is expressed and pursuing dream comes true as Freud says. Well known for a convoluted and dreamy structure and plot, David Lynch successfully represents a real dream sequence with his own way of image presentation form in his representative film "Mulholland Drive (2001)". In this study, I attempt to analyze how he expresses the realistic dream sequence with a strange film structure based on Freud's psychoanalysis. In general, dream world is known as completely visual matter, but the feeling of things is more important for making a realistic dream and it is the main reason that we can have more realistic experiences in a dream.

A Case of Isoniazid Induced Acute Pancreatitis (Isoniazid에 의해 유발된 급성 췌장염 1예)

  • Chung, Byung Ha;Nam, Hae Seong;Kwon, Jung Hyun;Im, So Hi;Park, Sun Hee;Kim, Jin Woo;Kim, Seung Joon;Lee, Sook Young;Kim, Young Kyoon;Park, Sung Hak
    • Tuberculosis and Respiratory Diseases
    • /
    • v.56 no.4
    • /
    • pp.411-414
    • /
    • 2004
  • Isoniazid is a first-line drug in the treatment of tuberculosis. A variety of adverse reactions of isoniazid have been reported. These include hepatitis, peripheral neuropathy, skin rashes, neurologic disturbances and hematologic alterations. Among these, acute pancreatitis due to isoniazid is very rare. We report a case of acute pancreatitis due to isoniazid confirmed by rechallenge test with review of some literatures.

Session Key Agreement Protocol for IoT Home Devices using Shadow Passwords (그림자 패스워드를 사용한 IoT 홈 디바이스 사이의 세션키 공유 프로토콜)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.93-100
    • /
    • 2020
  • Although various home services are developed as increasing the number of home devices with wire and wireless connection, privacy infringement and private information leakage are occurred by unauthorized remote connection. It is almost caused by without of device authentication and protection of transmission data. In this paper, the devices' secret value are stored in a safe memory of a smartphone. A smartphone processes device authentication. In order to prevent leakage of a device's password, a shadow password multiplied a password by the private key is stored in a device. It is proposed mutual authentication between a smartphone and a device, and session key agreement for devices using recovered passwords on SRP. The proposed protocol is resistant to eavesdropping, a reply attack, impersonation attack.

The Security analysis of Self-certified public key based Key agreement protocols against Active Attacks (능동적 공격자 환경에서의 자체인증 공개키에 기반한 키 분배 프로토콜의 안전성 분석)

  • Yang HyungKyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.25-34
    • /
    • 2005
  • Girault proposed a key agreement protocol based on his new idea of self-certified public key. Later Rueppel and Oorschot showed variants of the Girault scheme. All of these key agreement protocols inherit positive features of self-certified public key so that they can provide higher security and smaller communication overhead than key agreement protocols not based on self-certified public key. Even with such novel features, rigorous security analysis of these protocols has not been made clear yet. In this paper, we give rigorous security analysis of key agreement protocols based on self-certified public key. We use reduction among functions for security analysis and consider several kinds of active attacker models such as active impersonation attack, key-compromise impersonation attack, forward secrecy and known key security.

Leiomyosarcoma of Small Intestine -Two cases report with literatural review- (소장의 원발성 평활근육종 2예)

  • Chung, Yong-Sik;Suh, Bo-Yang;Kwun, Koing-Bo;Lee, Tae-Sook
    • Journal of Yeungnam Medical Science
    • /
    • v.2 no.1
    • /
    • pp.281-286
    • /
    • 1985
  • Small bowel malignancy consists 1~2 % of overall gastrointestinal tract cancer and leiomyosarcomas of small intestine are 10~20% of small bowel malignancy. Small bowel leiomyosarcomas are rare in incidence and have no specific symptoms, signs or definite radiologic findings, so it is not easy to diagnose at early stage of disease. They are found occasionally by unknown origined gastrointestinal bleeding, abdominal pain, intestinal obstruction, perforation and palpable mass, and diagnosed mostly by operation. Recently annual case reports are increasing trend in Korea. We experienced two cases of small bowel leiomyosarcoma which was diagnosed finally by pathologic findings, so we report them With literatural review.

  • PDF

A Vulnerability Analysis of Multi-Context RFID Mutual Authentication Protocol (다중 컨텍스트 RFID 상호 인증 프로토콜의 보안 취약점 분석)

  • Kim, Young-Back;Kim, Sung-Soo;Chung, Kyung-Ho;Kim, Soo-Yong;Yun, Tae-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.71-80
    • /
    • 2013
  • In this paper, we analyze the security vulnerability through the several attack scenarios for the MCR-MAP(Multi-Context RFID Mutual Authentication Protocol) proposed by Ahn et al. And we propose the secure mutual authentication protocol that improved a prior MCR-MAP. The suggested protocol uses the ID of the legal tag and the timestamp generated by the server, when the tag tries to authenticate. And when the tag creates the credential, we create the new secret key computing the XOR operation between the secret key shared with the server and the tag timestamp generated by the server. As a result, the proposed protocol provides the secure mutual authentication and then is safe to spoofing attack. Also it provides forward-secrecy and then is safe to offline brute-burst attack. In this paper, we compare and verify the security vulnerability of the prior and the proposed protocol through the security analysis.

Spasmolytic and Anti-peptic Ulcer Activities of Crude Drugs Acting on Gastrointestinal Tract in Rats (흰쥐에서 위장관에 작용하는 생약의 진경 및 항위궤양 효능)

  • Jo, Seung-Gil;Park, Hye-Ran;Kim, Chang-Jong
    • YAKHAK HOEJI
    • /
    • v.40 no.5
    • /
    • pp.591-598
    • /
    • 1996
  • The water extracts of ten crude drugs were tested for the spasmolytic and anti-peptic ulcer activities on rat ileum smooth muscle contraction and aspirin-induced acute hemorrhag ic erosive gastritis respectively. The water extract of Aurantii immaturi pericarpium(AIP)($IC_{50}=1.5{\times}1O^{-2}$g/l), Aurantii nobilis pericarpium(ANP)($IC_{50}=2.5{\times}1O^{-2}$g/l), Cyperi rhizoma(CR)($IC_{50}=3.3{\times}1O^{-2}$g/l). Linderae radix(LR) ($IC_{50}=6.8{\times}1O^{-2}$), Aurantii fructus immaturus(AFI)($IC_{50}=11.8{\times}1O^{-2}$), Saussureae radix(SR)($IC_{50}=13.2{\times}1O^{-2}$g/l) and Ponciri fructus(PF)($IC_{50}=23.3{\times}1O^{-2}$g/l) showed inhibitory activity on the isometric contraction of rat ileum smooth muscle induced by electrical stimulation in a concentration-dependent manner, whereas the water extracts of Arecae pericarpium(AP), Agastachis herba(AH) and Magnoliae cortex(MC) potentiated the isometric contraction. In the aspirin-induced acute gastritis, the water extracts of MC, AP and CR reduced significantly the gastric juice secretion, gastric juice acidity and pepsin activity. They also showed protective activity of gastric mucosal layer from erosion and petichial hemorrhage in gross and histological examination.

  • PDF

A Location Recognition and Notification Method of Attacker in Wireless Network Environment (모바일 환경에서의 공격자 위치 특정 및 알람 기법)

  • Bong, Jin-Sook;Park, Sang-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.201-211
    • /
    • 2017
  • Wireless network using dynamic IP and mobile IP technology provides the user with convenience of access and movement. However, this causes the attacker who disguises normal user(pretending to be a regular user) to have more opportunity in regard to access and acquisition of information. This paper help the network administrator and the service provider quickly to recognize the attacker's intention to access network and service. Therefore network administrator and service provider can specify and respond the location of the attacker appropriately. To achieve above, we define an entity (W_L_M) that manages user information of WiFi and LTE network, and propose messages and procedures for attacker's location identification and alarm. The performance evaluation of this paper is based on qualitative analysis. By using the proposed method, some cost (message creation, processing and transmission) occurred but it was analyzed to be less than the total network operation cost. The proposal of this paper is a management method that utilizes existing network information and structure. This method can be used as a reference material to enhance security.