56 research outputs found

    Multi-User Cooperation for Covert Communication Under Quasi-Static Fading

    Full text link
    This work studies a covert communication scheme for an uplink multi-user scenario in which some users are opportunistically selected to help a covert user. In particular, the selected users emit interfering signals via an orthogonal resource dedicated to the covert user together with signals for their own communications using orthogonal resources allocated to the selected users, which helps the covert user hide the presence of the covert communication. For the covert communication scheme, we carry out extensive analysis and find system parameters in closed forms. The analytic derivation for the system parameters allow one to find the optimal combination of system parameters by performing a simple one-dimensional search. In addition, the analytic results elucidate relations among the system parameters. In particular, it will be proved that the optimal strategy for the non-covert users is an on-off scheme with equal transmit power. The theoretical results derived in this work are confirmed by comparing them with numerical results obtained with exhaustive searches. Finally, we demonstrate that the results of work can be utilized in versatile ways by demonstrating a design of covert communication with energy efficiency into account.Comment: 13 pages, 8 figures, This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Simultaneous reconstruction of the forearm extensor compartment tendon, soft tissue, and skin

    Get PDF
    Malignant peripheral nerve sheath tumor (MPNST) is a very rare type of sarcoma, with an incidence of 0.001%. MPNST has a 5-year survival rate near 80%, so successful reconstruction techniques are important to ensure the patient’s quality of life. Sarcoma of the forearm is known for its poor prognosis, which leads to wider excision, making reconstruction even more challenging due to the unique anatomical structure and delicate function of the forearm. A 44-year-old male presented with a large mass that had two aspects, measuring 9×6 cm and 7×5 cm, on the dorsal aspect of the right forearm. The extensor compartment muscles (EDM, EDC, EIP, EPB, EPL, ECRB, ECRL, APL) and invaded radius were resected with the mass. Tendon transfer of the entire extensor compartment with skin defect coverage using a 24×8 cm anterolateral thigh (ALT) perforator free flap was performed. The patient was discharged after 18 days without wound complications, and has not complained of discomfort during supination, pronation, or wrist extension/flexion through 3 years of follow-up. To our knowledge, this is the first report of successful reconstruction of the entire forearm extensor compartment with ALT free flap coverage after resection of MPNST

    A Generalized Framework for Video Instance Segmentation

    Full text link
    The handling of long videos with complex and occluded sequences has recently emerged as a new challenge in the video instance segmentation (VIS) community. However, existing methods have limitations in addressing this challenge. We argue that the biggest bottleneck in current approaches is the discrepancy between training and inference. To effectively bridge this gap, we propose a Generalized framework for VIS, namely GenVIS, that achieves state-of-the-art performance on challenging benchmarks without designing complicated architectures or requiring extra post-processing. The key contribution of GenVIS is the learning strategy, which includes a query-based training pipeline for sequential learning with a novel target label assignment. Additionally, we introduce a memory that effectively acquires information from previous states. Thanks to the new perspective, which focuses on building relationships between separate frames or clips, GenVIS can be flexibly executed in both online and semi-online manner. We evaluate our approach on popular VIS benchmarks, achieving state-of-the-art results on YouTube-VIS 2019/2021/2022 and Occluded VIS (OVIS). Notably, we greatly outperform the state-of-the-art on the long VIS benchmark (OVIS), improving 5.6 AP with ResNet-50 backbone. Code is available at https://github.com/miranheo/GenVIS.Comment: CVPR 202

    Inflammatory bowel disease–associated intestinal fibrosis

    Get PDF
    Fibrosis is characterized by a proliferation of fibroblasts and excessive extracellular matrix following chronic inflammation, and this replacement of organ tissue with fibrotic tissue causes a loss of function. Inflammatory bowel disease (IBD) is a chronic inflammation of the gastrointestinal tract, and intestinal fibrosis is common in IBD patients, resulting in several complications that require surgery, such as a stricture or penetration. This review describes the pathogenesis and various factors involved in intestinal fibrosis in IBD, including cytokines, growth factors, epithelial-mesenchymal and endothelial-mesenchymal transitions, and gut microbiota. Furthermore, histopathologic findings and scoring systems used for stenosis in IBD are discussed, and differences in the fibrosis patterns of ulcerative colitis and Crohn’s disease are compared. Biomarkers and therapeutic agents targeting intestinal fibrosis are briefly mentioned at the end

    The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database

    Get PDF
    Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA
    • …
    corecore