• Title/Summary/Keyword: Matching mechanism

Search Result 145, Processing Time 0.027 seconds

Analysis of the Occurrence of Diseases Following Gastrectomy for Early Gastric Cancer: a Nationwide Claims Study

  • Seo, Ho Seok;Na, Yewon;Jung, Jaehun
    • Journal of Gastric Cancer
    • /
    • v.21 no.3
    • /
    • pp.279-297
    • /
    • 2021
  • Purpose: Various changes in nutrition, metabolism, immunity, and psychological status occur through multiple mechanisms after gastrectomy. The purpose of this study was to predict disease status after gastrectomy by analyzing diseases pattern that occur or change after gastrectomy. Materials and Methods: A retrospective cohort study was conducted using nationwide claims data. Patients with gastric cancer who underwent gastrectomy or endoscopic resection were included in the study. Eighteen target diseases were selected and categorized based on their underlying mechanism. The incidence of each target disease was compared by dividing the study sample into those who underwent gastrectomy (cases) and those who underwent endoscopic resection for early gastric cancer (controls). The cases were matched with controls using propensity score matching. Thereafter, Cox proportional hazard models were used to evaluate intergroup differences in disease incidence after gastrectomy. Results: A total of 97,634 patients who underwent gastrectomy (84,830) or endoscopic resection (12,804) were included. The incidence of cholecystitis (P<0.0001), pancreatitis (P=0.034), acute kidney injury (P=0.0083), anemia (P<0.0001), and inguinal hernia (P=0.0007) were higher after gastrectomy, while incidence of dyslipidemia (P<0.0001), vascular diseases (ischemic heart disease, stroke, and atherosclerosis; P<0.0001, P<0.0001, and P=0.0005), and Parkinson's disease (P=0.0093) were lower after gastrectomy. Conclusions: This study identifies diseases that may occur after gastrectomy in patients with gastric cancer.

Application of simple and massive purification system of dsRNA in vivo for acute toxicity to Daphnia magna

  • CHOI, Wonkyun;LIM, Hye Song;KIM, Jin;RYU, Sung-Min;LEE, Jung Ro
    • Entomological Research
    • /
    • v.48 no.6
    • /
    • pp.533-539
    • /
    • 2018
  • The RNA interference (RNAi) has been considered as an important genetic tool and applied to develop a new living modified (LM) crop trait which is an improvement of nutrient quality or pest management. The RNAi of DvSnf7 has been used for resistance to LM maize and the Western Corn Rootworm which is a major agricultural pest for the US Corn Belt. Most of the environmental risk assessments (ERA) of double strand RNA (dsRNA) have been performed using in vitro transcript products, and not in vivo expressed product. A large amount of dsRNA was required for the acute toxicity assay of water fleas. Therefore development of massive dsRNA purification techniques is critical. Daphnia, a freshwater microcrustacean, is a model organism for studying cellular and molecular mechanism involved in life history traits and ecotoxicology. In this study, we established the massive dsRNA purification method using Escherichia coli and implemented acute toxicity assays to Daphnia magna. As a result, the present RNase A and DNase I, dsRNA was efficiently purified without any special techniques or equipment. Even though purified dsRNA existed during the acute toxicity test, lethality or abnormal behavior were not observed in D. magna. These results indicated that GFP and DvSnf7 dsRNA were not significantly affected to D. magna due to their lack of sequence matching in its genome. The purification method of dsRNA and the acute toxicity assay of water fleas using purified dsRNA would be suitable for the toxicological studies of LMOs to aquatic non-target organisms.

Match Field based Algorithm Selection Approach in Hybrid SDN and PCE Based Optical Networks

  • Selvaraj, P.;Nagarajan, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5723-5743
    • /
    • 2018
  • The evolving internet-based services demand high-speed data transmission in conjunction with scalability. The next generation optical network has to exploit artificial intelligence and cognitive techniques to cope with the emerging requirements. This work proposes a novel way to solve the dynamic provisioning problem in optical network. The provisioning in optical network involves the computation of routes and the reservation of wavelenghs (Routing and Wavelength assignment-RWA). This is an extensively studied multi-objective optimization problem and its complexity is known to be NP-Complete. As the exact algorithms incurs more running time, the heuristic based approaches have been widely preferred to solve this problem. Recently the software-defined networking has impacted the way the optical pipes are configured and monitored. This work proposes the dynamic selection of path computation algorithms in response to the changing service requirements and network scenarios. A software-defined controller mechanism with a novel packet matching feature was proposed to dynamically match the traffic demands with the appropriate algorithm. A software-defined controller with Path Computation Element-PCE was created in the ONOS tool. A simulation study was performed with the case study of dynamic path establishment in ONOS-Open Network Operating System based software defined controller environment. A java based NOX controller was configured with a parent path computation element. The child path computation elements were configured with different path computation algorithms under the control of the parent path computation element. The use case of dynamic bulk path creation was considered. The algorithm selection method is compared with the existing single algorithm based method and the results are analyzed.

Question Similarity Measurement of Chinese Crop Diseases and Insect Pests Based on Mixed Information Extraction

  • Zhou, Han;Guo, Xuchao;Liu, Chengqi;Tang, Zhan;Lu, Shuhan;Li, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3991-4010
    • /
    • 2021
  • The Question Similarity Measurement of Chinese Crop Diseases and Insect Pests (QSM-CCD&IP) aims to judge the user's tendency to ask questions regarding input problems. The measurement is the basis of the Agricultural Knowledge Question and Answering (Q & A) system, information retrieval, and other tasks. However, the corpus and measurement methods available in this field have some deficiencies. In addition, error propagation may occur when the word boundary features and local context information are ignored when the general method embeds sentences. Hence, these factors make the task challenging. To solve the above problems and tackle the Question Similarity Measurement task in this work, a corpus on Chinese crop diseases and insect pests(CCDIP), which contains 13 categories, was established. Then, taking the CCDIP as the research object, this study proposes a Chinese agricultural text similarity matching model, namely, the AgrCQS. This model is based on mixed information extraction. Specifically, the hybrid embedding layer can enrich character information and improve the recognition ability of the model on the word boundary. The multi-scale local information can be extracted by multi-core convolutional neural network based on multi-weight (MM-CNN). The self-attention mechanism can enhance the fusion ability of the model on global information. In this research, the performance of the AgrCQS on the CCDIP is verified, and three benchmark datasets, namely, AFQMC, LCQMC, and BQ, are used. The accuracy rates are 93.92%, 74.42%, 86.35%, and 83.05%, respectively, which are higher than that of baseline systems without using any external knowledge. Additionally, the proposed method module can be extracted separately and applied to other models, thus providing reference for related research.

A Quality-Attribute-Driven Software Architecture Brokering Mechanism for Intelligent Service Robots (지능형 서비스 로봇을 위한 품질특성 기반의 소프트웨어 아키텍처 브로커링 방법)

  • Seo, Seung-Yeol;Koo, Hyung-Min;Ko, In-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.1
    • /
    • pp.21-29
    • /
    • 2009
  • An intelligent service robot is a robot that monitors its surroundings, and then provides a service to meet a user's goal. It is normally impossible for a robot to anticipate all the needs of its user and various situations in the surroundings ahead, and to prepare for all the necessary functions to cope with them. Therefore, it is required to support the self-growing capability by which robots can extend their functionality based on users' needs and external conditions. In this paper, as an enabler of the self-growing capability, we propose a method that allows a robot to select a component-composition pattern represented in an architectural form (called a sub-architecture), and to extend its functionality by obtaining a set of software components that are prescribed in the pattern. Sub-architecture is selected and instantiated not only based on the functionality required but also based on quality requirements of a user and the surrounding environment. To provide this method, we constructed a quality-attributes-in-use ontology and developed a brokering mechanism that matches quality requirements of users and surroundings against quality attributes of sub-architectures. The ontology provides the common vocabularies to represent quality requirements and attributes, and enables the semantically-based reasoning in matching and instantiating appropriate sub-architectures in supporting services to users. This ontology-based approach contributes to provide a great flexibility in extending robot functionality based on available software components, and to narrow the gap between users' Quality requirements and the Quality of the actual services provided by a robot.

Metamorphic Malware Detection using Subgraph Matching (행위 그래프 기반의 변종 악성코드 탐지)

  • Kwon, Jong-Hoon;Lee, Je-Hyun;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.37-47
    • /
    • 2011
  • In the recent years, malicious codes called malware are having shown significant increase due to the code obfuscation to evade detection mechanisms. When the code obfuscation technique is applied to malwares, they can change their instruction sequence and also even their signature. These malwares which have same functionality and different appearance are able to evade signature-based AV products. Thus, AV venders paid large amount of cost to analyze and classify malware for generating the new signature. In this paper, we propose a novel approach for detecting metamorphic malwares. The proposed mechanism first converts malware's API call sequences to call graph through dynamic analysis. After that, the callgraph is converted to semantic signature using 128 abstract nodes. Finally, we extract all subgraphs and analyze how similar two malware's behaviors are through subgraph similarity. To validate proposed mechanism, we use 273 real-world malwares include obfuscated malware and analyze 10,100 comparison results. In the evaluation, all metamorphic malwares are classified correctly, and similar module behaviors among different malwares are also discovered.

Stereoscopic depth of surfaces lying in the same visual direction depends on the visual direction of surface features (표면 요소의 시선방향에 의한 동일시선 상에 놓여있는 표면의 입체시 깊이 변화)

  • Kham Keetaek
    • Korean Journal of Cognitive Science
    • /
    • v.15 no.4
    • /
    • pp.1-14
    • /
    • 2004
  • When two objects are tying in the same visual direction there occurs abrupt depth change between two objects, which is against the assumption of the computational model for stereopsis on the surfaces in a natural scene. For this reason, this stimulus configuration is popularly used in the studies for the effectiveness of the constraints employed in the computational model. Contrary to the results from two nails (or objects) tying in the same visual direction, the two different surfaces from random-dot stereogram (RDS) in the same situation can be seen simultaneously in the different depth. The seemingly contradictory results between two situations my reflect the different strategies imposed by binocular mechanism for each situation during binocular matching process. Otherwise, the surfaces tying in the same visual direction is not equivalent situation to two objects tying in the same visual direction with regards to matching process. In order to examine above possibilities, the stereoscopic depth of the surface was measured after manipulating the visual direction of the surface elements. The visual direction of each dot pair from different surfaces in RDS (in Experiment 1) or the visual direction of line (hawing rectangle with regard to that of the vertical line (in Experiment 2) was manipulated. The stereoscopic depth of the surface was found to be varied depending on visual direction of the surface elements in both RDS and line hawing stimulus. Similar to the results from two nails situation depth of the surface was greatly reduced when each surface element was tying in the same visual direction as that of the other surface element or the other object. These results suggest that binocular mechanism imposes no different strategy in resolving correspondence problem in both two objects and two surfaces situation. And the results were discussed in the context of usefulness of the constraints employed in the computational model for stereopsis.

  • PDF

Under and Over Employment and Working Conditions (과소/과잉노동과 근로환경)

  • Rhee, Kyung Yong;Song, Se Wook;Kim, Young Sun
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.24 no.4
    • /
    • pp.536-546
    • /
    • 2014
  • Objectives: The major objective of this paper is compare the exposure work hours and experieence of ill health symptoms among under and over employment and matched group. Workers with over employment have more exposed to hazards than that with under employment because that workers with over employment work more than those with ender employment. Methods: This study as heuristics one used the third Korean Working Conditions Survey done by Occupational Safety and Health Research Institute in 2011. The sample size is 50,023 economic active persons. Over and under employment were measured by matching method of preferred and actual work hours. The exposed work hours to hazards were measured according to 13 hazardous factors and the experience of ill health symptoms were scaled by the number of experienced 14 ill health symptoms. To compare the exposure and the symptoms experience were compared by mean difference test with F test. Results: The proportion of over employment in male employees is 32.1% and that in female employees is 29.3% and under employment rate is 11.2% in mae and 13.9% in female employees. There is significant difference of the rate of over and under emplyment among age groups, industrial sectors, occupational groups and the state of employment. The difference of the exposed work hours to hazards among under, over and matched group were statistically significant in all hazards by gender. The exposed work hours to hazards in over employment were more than those in under employment. The number of experienced symptoms in over employment is statistically significantly more than that in under employment. Conclusions: Workers with over employment may be vulnerable group in the criteria of hazard exposure and health status. The results have some implications and limitations because that this study is heuristic one. The mismatch of preferred and actual working hours may be unfavorable work condition that has impact on safety and health of workers. The impact mechanism may be investigated as future study, Because that this study used cross sectional survey data, some causal relationships cannot be evaluated.

The effect of brightness contrast on resolving the correspondence problem (상의 대응 문제 해결에 미치는 밝기 대비의 영향)

  • 감기택;정찬섭
    • Korean Journal of Cognitive Science
    • /
    • v.12 no.4
    • /
    • pp.49-56
    • /
    • 2001
  • When multiple features are presented in the image the computational models for stereopsis select the most activated matches through the excitatory and inhibitory interactions among all possible matches. Using the random-dot stereogram with two surfaces. we investigate whether human binocular mechanism selects the most activated matches. The dots consisting a surface lying in a fixation plane were selected randomly while each of the dots consisting the other surface was paired with each of the original dots in the following manner. After finding the position of each dots in the original random pattern we placed an additional dot to the left and to the right of the original position in each of the left and right image of a stereogram respectively. The luminance of additional dots was varied while that of the original random dots was fixed so that the hypothetical matches presumably could be activated differently. Across the luminance condition the depth of each surface was measured to examine whether matches to be selected were changed depending on the activation level of possible matches. When the luminance of two patterns was within 30% of one another observers perceived an opaque surface. Beyond this value two transparent surfaces were seen with the magnitude of perceived depth varying with relative luminance of two patterns. When original pattern was brighter one additional surface was perceived at the depth corresponding to the disparity of original pattern. When original dot was dimmer. however the depth of an additional surface corresponded to the disparity of newly introduced pattern. These results suggest that there are dynamic interactions within the matching process whereby highly activated matches inhibit weaker one.

  • PDF

Performance Evaluation of Scaling based Dynamic Time Warping Algorithms for the Detection of Low-rate TCP Attacks (Low-rate TCP 공격 탐지를 위한 스케일링 기반 DTW 알고리즘의 성능 분석)

  • So, Won-Ho;Shim, Sang-Heon;Yoo, Kyoung-Min;Kim, Young-Chon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.3 s.357
    • /
    • pp.33-40
    • /
    • 2007
  • In this paper, low-rate TCP attack as one of shrew attacks is considered and the scaling based dynamic time warping (S-DTW) algorithm is introduced. The low-rate TCP attack can not be detected by the detection method for the previous flooding DoS/DDoS (Denial of Service/Distirbuted Denial of Service) attacks due to its low average traffic rate. It, however, is a periodic short burst that exploits the homogeneity of the minimum retransmission timeout (RTO) of TCP flows and then some pattern matching mechanisms have been proposed to detect it among legitimate input flows. A DTW mechanism as one of detection approaches has proposed to detect attack input stream consisting of many legitimate or attack flows, and shown a depending method as well. This approach, however, has a problem that legitimate input stream may be caught as an attack one. In addition, it is difficult to decide a threshold for separation between the legitimate and the malicious. Thus, the causes of this problem are analyzed through simulation and the scaling by maximum auto-correlation value is executed before computing the DTW. We also discuss the results on applying various scaling approaches and using standard deviation of input streams monitored.