56 research outputs found
Multi-User Cooperation for Covert Communication Under Quasi-Static Fading
This work studies a covert communication scheme for an uplink multi-user
scenario in which some users are opportunistically selected to help a covert
user. In particular, the selected users emit interfering signals via an
orthogonal resource dedicated to the covert user together with signals for
their own communications using orthogonal resources allocated to the selected
users, which helps the covert user hide the presence of the covert
communication. For the covert communication scheme, we carry out extensive
analysis and find system parameters in closed forms. The analytic derivation
for the system parameters allow one to find the optimal combination of system
parameters by performing a simple one-dimensional search. In addition, the
analytic results elucidate relations among the system parameters. In
particular, it will be proved that the optimal strategy for the non-covert
users is an on-off scheme with equal transmit power. The theoretical results
derived in this work are confirmed by comparing them with numerical results
obtained with exhaustive searches. Finally, we demonstrate that the results of
work can be utilized in versatile ways by demonstrating a design of covert
communication with energy efficiency into account.Comment: 13 pages, 8 figures, This work has been submitted to the IEEE for
possible publication. Copyright may be transferred without notice, after
which this version may no longer be accessibl
Simultaneous reconstruction of the forearm extensor compartment tendon, soft tissue, and skin
Malignant peripheral nerve sheath tumor (MPNST) is a very rare type of sarcoma, with an incidence of 0.001%. MPNST has a 5-year survival rate near 80%, so successful reconstruction techniques are important to ensure the patient’s quality of life. Sarcoma of the forearm is known for its poor prognosis, which leads to wider excision, making reconstruction even more challenging due to the unique anatomical structure and delicate function of the forearm. A 44-year-old male presented with a large mass that had two aspects, measuring 9×6 cm and 7×5 cm, on the dorsal aspect of the right forearm. The extensor compartment muscles (EDM, EDC, EIP, EPB, EPL, ECRB, ECRL, APL) and invaded radius were resected with the mass. Tendon transfer of the entire extensor compartment with skin defect coverage using a 24×8 cm anterolateral thigh (ALT) perforator free flap was performed. The patient was discharged after 18 days without wound complications, and has not complained of discomfort during supination, pronation, or wrist extension/flexion through 3 years of follow-up. To our knowledge, this is the first report of successful reconstruction of the entire forearm extensor compartment with ALT free flap coverage after resection of MPNST
A Generalized Framework for Video Instance Segmentation
The handling of long videos with complex and occluded sequences has recently
emerged as a new challenge in the video instance segmentation (VIS) community.
However, existing methods have limitations in addressing this challenge. We
argue that the biggest bottleneck in current approaches is the discrepancy
between training and inference. To effectively bridge this gap, we propose a
Generalized framework for VIS, namely GenVIS, that achieves state-of-the-art
performance on challenging benchmarks without designing complicated
architectures or requiring extra post-processing. The key contribution of
GenVIS is the learning strategy, which includes a query-based training pipeline
for sequential learning with a novel target label assignment. Additionally, we
introduce a memory that effectively acquires information from previous states.
Thanks to the new perspective, which focuses on building relationships between
separate frames or clips, GenVIS can be flexibly executed in both online and
semi-online manner. We evaluate our approach on popular VIS benchmarks,
achieving state-of-the-art results on YouTube-VIS 2019/2021/2022 and Occluded
VIS (OVIS). Notably, we greatly outperform the state-of-the-art on the long VIS
benchmark (OVIS), improving 5.6 AP with ResNet-50 backbone. Code is available
at https://github.com/miranheo/GenVIS.Comment: CVPR 202
Inflammatory bowel disease–associated intestinal fibrosis
Fibrosis is characterized by a proliferation of fibroblasts and excessive extracellular matrix following chronic inflammation, and this replacement of organ tissue with fibrotic tissue causes a loss of function. Inflammatory bowel disease (IBD) is a chronic inflammation of the gastrointestinal tract, and intestinal fibrosis is common in IBD patients, resulting in several complications that require surgery, such as a stricture or penetration. This review describes the pathogenesis and various factors involved in intestinal fibrosis in IBD, including cytokines, growth factors, epithelial-mesenchymal and endothelial-mesenchymal transitions, and gut microbiota. Furthermore, histopathologic findings and scoring systems used for stenosis in IBD are discussed, and differences in the fibrosis patterns of ulcerative colitis and Crohn’s disease are compared. Biomarkers and therapeutic agents targeting intestinal fibrosis are briefly mentioned at the end
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA
- …