• Title/Summary/Keyword: False Report

Search Result 169, Processing Time 0.025 seconds

TRAUMATIC FALSE ANEURYSM OF THE LINGUAL ARTERY - A CASE REPORT- (설동맥에 발생한 외상성 위동맥류)

  • Min, Gyung-In;Lee, Ju-Hyun;Seo, Kyung-Suk;Kim, Chul-Hwan
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.27 no.6
    • /
    • pp.551-555
    • /
    • 2001
  • False aneurysms(Pseudoaneurysms) and arteriovenous fistulas have only rarely been reported in the facial region. In this region the false aneurysm arises most frequently in the superficial temporal and facial artery, but other branches of the external carotid are sometimes involved, including the maxillary and lingual artery. False aneurysms can be occurred by blunt trauma that either laceration or rupture the full thickness of the arterial wall. The diagnosis of a false arterial aneurysm can be often made solely on the basis of physical examination. Angiography is helpful for conformation, for delineating the lesion and its vascular supply, and for ruling out the presence of associated vascular lesions such as arteriovenous fistulas. Ultrasonography may also be useful in delineating lesions that are not easily accessible for physical examination. Treatment of false aneurysms is excision, ligation, and arterial embolization. This is a case of false aneurysm of the lingual artery after facial trauma caused by traffic accident. The lesion was successfully treated by embolization and ligation of the lingual and facial branches of the external carotid artery.

  • PDF

Temporomandibular Joint False Ankylosis in a Cat: A Case Report

  • Sanghyeon Yoon;Jung-Ha Lee;Seo-Eui Lee;Hakyoung Yoon
    • Journal of Veterinary Clinics
    • /
    • v.40 no.5
    • /
    • pp.365-369
    • /
    • 2023
  • Temporomandibular joint (TMJ) ankylosis is a rare disease impairing mandible movement and can either be intra-articular (true) or extra-articular (false). A cat presented with an inability to open its mouth, drooling, and facial asymmetry. Computed tomography (CT) confirmed an extracapsular abnormal TMJ fusion, and a surgical plan was devised based on the CT imaging. Post-surgery, the cat regained mouth mobility (indicating false ankylosis) and showed an improved prognosis. This case of CT-diagnosed and treated feline TMJ false ankylosis underscores the indispensable role of CT in diagnosing and devising surgical strategies for feline TMJ false ankylosis.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Regional Path Re-selection Period Determination Method for the Energy Efficient Network Management in Sensor Networks applied SEF (통계적 여과 기법이 적용된 센서 네트워크에서 에너지 효율적인 네트워크 관리를 위한 영역별 경로 재설정 주기 결정 기법)

  • Park, Hyuk;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.69-78
    • /
    • 2011
  • A large-scale sensor network usually operates in open and unattended environments, hence individual sensor node is vulnerable to various attacks. Therefore, malicious attackers can physically capture sensor nodes and inject false reports into the network easily through compromised nodes. These false reports are forwarded to the base station. The false report injection attack causes not only false alarms, but also the depletion of the restricted energy resources in a battery powered network. The statistical en-route filtering (SEF) mechanism was proposed to detect and drop false reports en route. In SEF, the choice of routing paths largely affect the energy consumption rate and the detecting power of the false report. To sustain the secure routing path, when and how to execute the path re-selection is greatly need by reason of the frequent network topology change and the nodes's limitations. In this paper, the regional path re-selection period determination method is proposed for efficient usage of the limited energy resource. A fuzzy logic system is exploited in order to dynamically determine the path re-selection period and compose the routing path. The simulation results show that up to 50% of the energy is saved by applying the proposed method.

False Vocal Fold Hypertrophy Caused by Thyroid Cartilage Inward Bowing (갑상연골 내굴곡에 인한 가성대의 비대)

  • Kwon, Jin Ho;Choi, Byeong Il;Hong, Hyun Jun;Choi, Hong-Shik
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.24 no.1
    • /
    • pp.51-54
    • /
    • 2013
  • False vocal fold hypertrophy caused by diverse pathologic lesion, such as laryngeal amyloidosis, laryngeal lipidosis, laryngocele, saccular cyst and sulcus vocalis. False vocal fold hypertrophy, however, is also caused laryngeal structure deformity, irrespective of pathologic lesions. In this article, we report some cases of false vocal fold hypertrophy caused by inward bowing of thyroid cartilage. At the clinic of the department of otorhinolaryngology in Gangnam Severance Hospital, with 3 male complained of hoarseness as subjects, and comfirmed of false vocal fold hypertrophy using the stroboscopy and larynx CT we checked vocal fold and laryngeal structure. Three patients with apparent hypertrophy of false vocal fold were investigated with computerized tomography (CT). In all patients, marked concavity of thyroid cartilage was revealed in CT scan at the level of the false vocal fold, and this deformity of the thyroid cartilage seemed to cause a protrusion of false vocal fold which taken as hypertrophy in stroboscopy. Careful palpation of the larynx and a CT scan taken at the level of the false vocal fold should be useful in determining whether hypertrophy of the false vocal fold is pathologic. For the next articles, It is necessary to discuss for the cause, diagnosis, treatment and prevention of inward bowing of thyroid cartilage.

  • PDF

Automatic False-Alarm Labeling for Sensor Data

  • Adi, Taufik Nur;Bae, Hyerim;Wahid, Nur Ahmad
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A false alarm, which is an incorrect report of an emergency, could trigger an unnecessary action. The predictive maintenance framework developed in our previous work has a feature whereby a machine alarm is triggered based on sensor data evaluation. The sensor data evaluator performs three essential evaluation steps. First, it evaluates each sensor data value based on its threshold (lower and upper bound) and labels the data value as "alarm" when the threshold is exceeded. Second, it calculates the duration of the occurrence of the alarm. Finally, in the third step, a domain expert is required to assess the results from the previous two steps and to determine, thereby, whether the alarm is true or false. There are drawbacks of the current evaluation method. It suffers from a high false-alarm ratio, and moreover, given the vast amount of sensor data to be assessed by the domain expert, the process of evaluation is prolonged and inefficient. In this paper, we propose a method for automatic false-alarm labeling that mimics how the domain expert determines false alarms. The domain expert determines false alarms by evaluating two critical factors, specifically the duration of alarm occurrence and identification of anomalies before or while the alarm occurs. In our proposed method, Hierarchical Temporal Memory (HTM) is utilized to detect anomalies. It is an unsupervised approach that is suitable to our main data characteristic, which is the lack of an example of the normal form of sensor data. The result shows that the technique is effective for automatic labeling of false alarms in sensor data.

Left Ventricular False Aneurysm after Myocardial Infarction -One Case Report- (심근 경색후 발생한 가성 좌심실류의 치험)

  • Park, Kyeh-Hyeon;Chae, Hurn
    • Journal of Chest Surgery
    • /
    • v.24 no.11
    • /
    • pp.1144-1148
    • /
    • 1991
  • Ventricular false aneurysm is a rare complication of myocardial infarction We successfully operated on a case of left ventricular false aneurysm complicating a silent, undiagnosed myocardial infarction The patients, 64 year-old female, showed marked improvement in her congestive symptom after the operation and was discharged without any complication With its peculiar feature, i.e., propensity to rupture, in addition to the functionally harmful aspects shared with the true aneurysms, a false aneurysm must always be considered to be a surgical indication. Good results can be achieved by proper diagnosis and management with low operative risk.

  • PDF

A Case of Protrusion of False Vocal Fold Resulting from the Deformed Thyroid Cartilage (변형된 갑상연골에서 기인한 가성대 돌출 1예)

  • Lim, Sung Hwan;Kim, Seung Woo
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.29 no.1
    • /
    • pp.47-50
    • /
    • 2018
  • Trauma, congenital malformation and aging process can be a cause of the deviation of laryngeal prominence in the thyroid cartilage. Among these, the senility is the most common cause. Usually, ossification in the thyroid cartilage has occurred symmetrically, but the asymmetrical event leads to the shift of laryngeal prominence. Also, such deformity can provoke protrusion of false vocal fold. A 75-year-old man with hoarseness and globus sense in throat visited our clinic. Five years ago, he experienced a blunt trauma on left midline neck and had a concave deformity in the left thyroid cartilage lamina. Laryngoscopic findings revealed a marked protrusion in the left false vocal fold. We performed the laryngeal microsurgery to discriminate the tumorous condition. The pathology revealed non-pathologic mucosa. We report a unique and didactic case with a brief literature review.

Understanding the genetics of systemic lupus erythematosus using Bayesian statistics and gene network analysis

  • Nam, Seoung Wan;Lee, Kwang Seob;Yang, Jae Won;Ko, Younhee;Eisenhut, Michael;Lee, Keum Hwa;Shin, Jae Il;Kronbichler, Andreas
    • Clinical and Experimental Pediatrics
    • /
    • v.64 no.5
    • /
    • pp.208-222
    • /
    • 2021
  • The publication of genetic epidemiology meta-analyses has increased rapidly, but it has been suggested that many of the statistically significant results are false positive. In addition, most such meta-analyses have been redundant, duplicate, and erroneous, leading to research waste. In addition, since most claimed candidate gene associations were false-positives, correctly interpreting the published results is important. In this review, we emphasize the importance of interpreting the results of genetic epidemiology meta-analyses using Bayesian statistics and gene network analysis, which could be applied in other diseases.

Interleaved Hop-by-Hop Authentication in Wireless Sensor Network Using Fuzzy Logic to Defend against Denial of Service Attack (인터리브드 멀티홉 인증을 적용한 무선 센서네트워크에서 퍼지로직을 이용한 서비스 거부 공격에 대한 방어 기법)

  • Kim, Jong-Hyun;Cho, Tac-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.133-138
    • /
    • 2009
  • When sensor networks are deployed in open environments, an adversary may compromise some sensor nodes and use them to inject false sensing reports. False report attack can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. The Interleaved hop-by-hop authentication (IHA) scheme detects such false reports through interleaved authentication. In IHA, when a report is forwarded to the base station, all nodes on the path must spend energies on receiving, authenticating, and transmitting it. An dversary can spend energies in nodes by using the methods as a relaying attack which uses macro. The Adversary aim to drain the finite amount of energies in sensor nodes without sending false reports to BS, the result paralyzing sensor network. In this paper, we propose a countermeasure using fuzzy logic from the Denial of Service(DoS) attack and show an efficiency of energy through the simulataion result.