• Title/Summary/Keyword: logs

Search Result 723, Processing Time 0.029 seconds

Excisional lipectomy versus liposuction in HIV-associated lipodystrophy

  • Barton, Natalie;Moore, Ryan;Prasad, Karthik;Evans, Gregory
    • Archives of Plastic Surgery
    • /
    • v.48 no.6
    • /
    • pp.685-690
    • /
    • 2021
  • Background Human immunodeficiency virus (HIV)-associated lipodystrophy is a known consequence of long-term highly active antiretroviral therapy (HAART). However, a significant number of patients on HAART therapy were left with the stigmata of complications, including fat redistribution. Few studies have described the successful removal of focal areas of lipohypertrophy with successful outcomes. This manuscript reviews the outcomes of excisional lipectomy versus liposuction for HIV-associated cervicodorsal lipodystrophy. Methods We performed a 15-year retrospective review of HIV-positive patients with lipodystrophy. Patients were identified by query of secure operative logs. Data collected included demographics, medications, comorbidities, duration of HIV, surgical intervention type, pertinent laboratory values, and the amount of tissue removed. Results Nine male patients with HIV-associated lipodystrophy underwent a total of 17 procedures. Of the patients who underwent liposuction initially (n=5), 60% (n=3) experienced a recurrence. There were a total of three cases of primary liposuction followed by excisional lipectomy. One hundred percent of these cases were noted to have a recurrence postoperatively, and there was one case of seroma formation. Of the subjects who underwent excisional lipectomy (n=4), there were no documented recurrences; however, one patient's postoperative course was complicated by seroma formation. Conclusions HIV-associated lipodystrophy is a disfiguring complication of HAART therapy with significant morbidity. Given the limitations of liposuction alone as the primary intervention, excisional lipectomy is recommended as the primary treatment. Liposuction may be used for better contouring and for subsequent procedures. While there is a slightly higher risk for complications, adjunctive techniques such as quilting sutures and placement of drains may be used in conjunction with excisional lipectomy.

Proactive Virtual Network Function Live Migration using Machine Learning (머신러닝을 이용한 선제적 VNF Live Migration)

  • Jeong, Seyeon;Yoo, Jae-Hyoung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.24 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • VM (Virtual Machine) live migration is a server virtualization technique for deploying a running VM to another server node while minimizing downtime of a service the VM provides. Currently, in cloud data centers, VM live migration is widely used to apply load balancing on CPU workload and network traffic, to reduce electricity consumption by consolidating active VMs into specific location groups of servers, and to provide uninterrupted service during the maintenance of hardware and software update on servers. It is critical to use VMlive migration as a prevention or mitigation measure for possible failure when its indications are detected or predicted. In this paper, we propose two VNF live migration methods; one for predictive load balancing and the other for a proactive measure in failure. Both need machine learning models that learn periodic monitoring data of resource usage and logs from servers and VMs/VNFs. We apply the second method to a vEPC (Virtual Evolved Pakcet Core) failure scenario to provide a detailed case study.

The Edge Computing System for the Detection of Water Usage Activities with Sound Classification (음향 기반 물 사용 활동 감지용 엣지 컴퓨팅 시스템)

  • Seung-Ho Hyun;Youngjoon Chee
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.2
    • /
    • pp.147-156
    • /
    • 2023
  • Efforts to employ smart home sensors to monitor the indoor activities of elderly single residents have been made to assess the feasibility of a safe and healthy lifestyle. However, the bathroom remains an area of blind spot. In this study, we have developed and evaluated a new edge computer device that can automatically detect water usage activities in the bathroom and record the activity log on a cloud server. Three kinds of sound as flushing, showering, and washing using wash basin generated during water usage were recorded and cut into 1-second scenes. These sound clips were then converted into a 2-dimensional image using MEL-spectrogram. Sound data augmentation techniques were adopted to obtain better learning effect from smaller number of data sets. These techniques, some of which are applied in time domain and others in frequency domain, increased the number of training data set by 30 times. A deep learning model, called CRNN, combining Convolutional Neural Network and Recurrent Neural Network was employed. The edge device was implemented using Raspberry Pi 4 and was equipped with a condenser microphone and amplifier to run the pre-trained model in real-time. The detected activities were recorded as text-based activity logs on a Firebase server. Performance was evaluated in two bathrooms for the three water usage activities, resulting in an accuracy of 96.1% and 88.2%, and F1 Score of 96.1% and 87.8%, respectively. Most of the classification errors were observed in the water sound from washing. In conclusion, this system demonstrates the potential for use in recording the activities as a lifelog of elderly single residents to a cloud server over the long-term.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Study Case on the Log Cultivation of Phellinus baumii for It's High Quality and Large Quantity (고품질 다수확 원목 상황버섯 재배 경영사례 조사)

  • Suh, Gyu-Sun;Chang, Hyun-You;Kim, Soon-Geun
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.10 no.1
    • /
    • pp.153-167
    • /
    • 2008
  • High temperature and natural sun light are considered as the core conditions for high quality and large quantity of Phellinus baumii production. However still now on there has been a mistake of excessively cutting off the natural light by spreading the closing nets on the mushroom cultivating house. For an example there are many houses where the closing nets under the roofs be extended to cover the sides of the houses, which way prevents the mushrooms in the houses from receiving sufficient natural sun light and getting the temperature sufficiently to grow so that the quantity and quality of the produced mushrooms are lowered even though the mushrooms can grow in those conditions. In order to avoid this mistake, the closing nets must be placed on the roofs of the houses only without dropping them to cover the sides. Further more when the closing nets are placed triply at the beginning stage of Phellinus baumii's growth in the house, the nets restrain the internal temperature of the house going up and intercept the natural bright light flowing into the house so that the growing tardiness occur to the Phellinus baumii. Therefore the roof only must have been covered by the closing net for 65% cutting off the light until May, and then covered by double folded the net for June, triple folded the net for July and August, double folded the net for September, and the single net for October. When the ventilation in the house has been maintained until the house tightly balloon out through controling lifting force of internal air, the Phellinus baumii can grow well while the bed logs themselves aren't dried out. Marketing is also very much important as well as increasing quality and quantity of Phellinus baumii production.

A Case Study on Corporate Character Designs: A focus on Korean and the U.S. Cases (기업 캐릭터 디자인 사례 분석: 한국과 미국의 사례를 중심으로)

  • Jun, Jong Woo;Lee, Jong Yoon
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.162-172
    • /
    • 2022
  • Using content analysis, this study explored design differences between Korean and the U.S. corporate characters. Top 100 corporate logs are collected from Korea and the United States. The results showed that Korean characters appear a group of or friends than the ones of the U.S. This result stems from the collective nature of Korea. Korea used more motif of things than the U.S., and Korean personalized characters more often that those of the U.S. Uses of human and animals did not showed statistical differences. In addition, it is found that Korea used blue as main color, and the U.S. used red as main color more often. The number of colors used in character design is not statistically different. These findings could provide academic implications that cultural differences could be adapted to corporate character marketing, and also provide managerial implications.

Designing Integrated Diagnosis Platform for Heterogeneous Combat System of Surface Vessels (다기종 수상함 전투체계의 통합 진단 플랫폼 설계)

  • Kim, Myeong-hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.186-188
    • /
    • 2021
  • The architecture named IDPS is a design concept of web-based integrated platform for heterogeneous naval combat system, which accomplishes efficiency(decreasing complexity) of diagnosis process and reduces time to diagnose system. Each type of surface vessel has its own diagnostic processes and applications, and that means it also requires its own diagnostic engineer(inefficiency in human resource management). In addition, man-based diagnostic causes quality issues such as difference approach of log analysis in accordance with engineer skills. Thus In this paper, we designed integrated diagnostic platform named IDPS with simplified common process regardless of type of surface vessel and we reinforced IDPS with status decision algorithm(SDA) that judges current software status of vessel based on gathered lots of logs. It will enable engineers to diagnose system more efficiently and to use more resources in utilizing SDA-analyzed diagnostic results.

  • PDF

A Survey on Deep Learning-based Analysis for Education Data (빅데이터와 AI를 활용한 교육용 자료의 분석에 대한 조사)

  • Lho, Young-uhg
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.240-243
    • /
    • 2021
  • Recently, there have been research results of applying Big data and AI technologies to the evaluation and individual learning for education. It is information technology innovations that collect dynamic and complex data, including student personal records, physiological data, learning logs and activities, learning outcomes and outcomes from social media, MOOCs, intelligent tutoring systems, LMSs, sensors, and mobile devices. In addition, e-learning was generated a large amount of learning data in the COVID-19 environment. It is expected that learning analysis and AI technology will be applied to extract meaningful patterns and discover knowledge from this data. On the learner's perspective, it is necessary to identify student learning and emotional behavior patterns and profiles, improve evaluation and evaluation methods, predict individual student learning outcomes or dropout, and research on adaptive systems for personalized support. This study aims to contribute to research in the field of education by researching and classifying machine learning technologies used in anomaly detection and recommendation systems for educational data.

  • PDF

Development of IoT Sensor-Gateway-Server Platform for Electric Fire Prediction and Prevention (전기화재 예측 및 예방을 위한 IoT 센서-게이트웨이-서버 플랫폼 개발)

  • Yang, Seung-Eui;Kim, Hankil;Song, Hyun-ok;Jung, Heokyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.255-257
    • /
    • 2021
  • During the winter season, when electricity usage increases rapidly every year, fires are frequent due to short circuits in aging electrical facilities in multi-use facilities such as traditional markets and jjimjilbangs, apartments, and multi-family houses. Most of the causes of such fires are caused by excessive loads applied to aging wires, causing the wire covering to melt and being transferred to surrounding ignition materials. In this study, we implement a system that measures the overload and overheating of the wire through a composite sensor, detects the toxic gas generated there, and logs it to the server through the gateway. Based on this, we will develop a platform that can predict, alarm and block electric fires in real time through big data analysis, and a simulator that can simulate fire occurrence experiments.

  • PDF

Real-time user behavior monitoring technique in Linux environment (Linux 환경에서 사용자 행위 모니터링 기법 연구)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.3-8
    • /
    • 2022
  • Security threats occur from the outside, but more often from the inside. In particular, since the internal user knows about the information service, the security threat damage caused by the internal user is greater. In this environment, the actions of all users accessing information services should be monitored and recorded in real-time. However, the current operating system records only the logs of system and application execution, so there is a limit to monitoring user behavior in real-time. In such a security environment, damage may occur due to user's unauthorized actions. To solve this problem, this study proposes an architecture that monitors user behavior in real-time in a Linux environment. As a result of verifying the function to confirm the effectiveness of the proposed architecture, the console input values and output angles of all users who have access to the operating system are monitored in real-time and stored. Although the performance of the proposed architecture is somewhat slower than the identification and authentication functions provided by the operating system, it was confirmed that the performance was not at a level that users would recognize, and thus it was judged to be sufficiently effective. However, since this study focuses on monitoring the console behavior, it is impossible to monitor the behavior of user applications running in the background, so additional research is needed.