130 research outputs found

    ๋ถ„์‚ฐ ์ปดํ“จํŒ…๊ณผ ์บ์‹œ๋ฅผ ์ ‘๋ชฉํ•œ ์ •๋ณด ๊ฒ€์ƒ‰์—์„œ์˜ ๋ณด์•ˆ ๋ฐ ํ”„๋ผ์ด๋ฒ„์‹œ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ •๋ณด๊ณตํ•™๋ถ€,2020. 2. ์ด์ •์šฐ.๋งŽ์€ ์–‘์˜ ๋ฐ์ดํ„ฐ ์ €์žฅ์ด๋‚˜ ๋ฐ์ดํ„ฐ ๊ณ„์‚ฐ์„ ์œ„ํ•ด์„œ๋Š” ๋ถ„์‚ฐ ์‹œ์Šคํ…œ์ด ํ•„์ˆ˜์ ์ด๋‹ค. ์ด๋Ÿฌํ•œ ๋ถ„์‚ฐ ์‹œ์Šคํ…œ์˜ ๋ฐ์ดํ„ฐ ์ €์žฅ๊ณผ ๊ณ„์‚ฐ์˜ ํšจ์œจ์˜ ๋†’์ด๋Š” ๋ฐ˜๋ฉด, ๋ฐ์ดํ„ฐ์˜ ๋ณด์•ˆ๊ณผ ํ”„๋ผ์ด๋ฒ„์‹œ์— ๋Œ€ํ•œ ์œ„ํ—˜๋„ ์ฆ๊ฐ€์‹œํ‚จ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋ฐ์ดํ„ฐ ์ €์žฅ๊ณผ ๋ฐ์ดํ„ฐ ๊ณ„์‚ฐ์„ ์œ„ํ•œ ๋ถ„์‚ฐ ์‹œ์Šคํ…œ์—์„œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ๋ณด์•ˆ๊ณผ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ๊ณ ๋ คํ•œ๋‹ค. ํŠนํžˆ, ์ด๋Ÿฌํ•œ ์‹œ์Šคํ…œ์— ๋Œ€ํ•˜์—ฌ ๋ณด์•ˆ๊ณผ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ๋ณด์žฅํ•˜๋Š” ๋ถ€ํ˜ธํ™” ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ์šฐ์„ , ์œ ์ €๊ฐ€ ์‚ฌ์ „์— ์บ์‹œ์— ์ผ์ •๋Ÿ‰์˜ ๋ฐ์ดํ„ฐ๋ฅผ ์ €์žฅํ•˜๊ณ  ์žˆ๋Š” cache-aided PIR์„ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๊ธฐ๋ฒ•์€ ๊ธฐ์กด PIR ๋ฌธ์ œ์˜ ์ตœ์  ๊ธฐ๋ฒ•์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๊ธฐ๋ฒ•์—์„œ, ์บ์‹œ์— ์ €์žฅ๋œ ๋ฐ์ดํ„ฐ๋Š” ๋ถ€๊ฐ€์ •๋ณด๋กœ ์ด์šฉ๋˜๋ฉฐ, ์ด๋Š” ์บ์‹œ๊ฐ€ ์—†์„ ๋•Œ ๋Œ€๋น„ ๋‹ค์šด๋กœ๋“œ์–‘์˜ ๊ฐ์†Œ๋กœ ์ด์–ด์ง„๋‹ค. ๋‘ ๋ฒˆ์งธ๋กœ, ๋ถ€ํ˜ธํ™”๋œ ๋ถ„์‚ฐ ์ปดํ“จํŒ… ์‹œ์Šคํ…œ์—์„œ ๋งˆ์Šคํ„ฐ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ๊ณ ๋ คํ•œ๋‹ค. ์ด ์‹œ์Šคํ…œ์—์„œ ์›Œ์ปค๋“ค๊ณผ ๋งˆ์Šคํ„ฐ๋Š” ๊ฐ๊ฐ ๊ณ ์œ ํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๊ฐ€์ง€๋ฉฐ, ์›Œ์ปค๋“ค์˜ ๋ฐ์ดํ„ฐ๋Š” ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ํ˜•ํƒœ๋กœ ์ด๋ฃจ์–ด์ง„๋‹ค. ๋งˆ์Šคํ„ฐ๋Š” ์ž์‹ ์˜ ๋ฐ์ดํ„ฐ์™€ ๋ฐ์ดํ„ฐ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ๋‚ด ํŠน์ • ๋ฐ์ดํ„ฐ์˜ ํ•จ์ˆ˜๋ฅผ ๊ณ„์‚ฐํ•ด์•ผ ํ•œ๋‹ค. ์ด ๋•Œ ๋งˆ์Šคํ„ฐ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ๋Š” ์›Œ์ปค๋“ค์ด ๋งˆ์Šคํ„ฐ๊ฐ€ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ์•ˆ์˜ ์–ด๋–ค ๋ฐ์ดํ„ฐ๋ฅผ ์›ํ•˜๋Š”์ง€ ๋ชจ๋ฅด๋Š” ๊ฒƒ์„ ๋œปํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ์‹œ์Šคํ…œ์„ private coded computation์ด๋ผ ํ•˜๋ฉฐ, ์ œ์•ˆํ•˜๋Š” ๊ธฐ๋ฒ•์„ private polynomial codes๋ผ ํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๊ธฐ๋ฒ•์—์„œ๋Š” ๊ธฐ์กด์˜ polynomial codes์—์„œ๋Š” ๊ณ ๋ ค๋˜์ง€ ์•Š์•˜๋˜ ๋น„๋™๊ธฐ์  ๊ธฐ๋ฒ•์ด ๋„์ž…๋œ๋‹ค. ์ด๋กœ ์ธํ•˜์—ฌ ์ œ์•ˆํ•˜๋Š” ๊ธฐ๋ฒ•์€ ๋ณ€ํ˜•๋œ ์ตœ์ ์˜ RPIR ๊ธฐ๋ฒ•๋Œ€๋น„ ๋” ๋น ๋ฅธ ๊ณ„์‚ฐ์‹œ๊ฐ„์„ ๋‹ฌ์„ฑํ•œ๋‹ค. ๋์œผ๋กœ, ๋ถ€ํ˜ธํ™”๋œ ๋ถ„์‚ฐ ์ปดํ“จํŒ… ์‹œ์Šคํ…œ์—์„œ ๋งˆ์Šคํ„ฐ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ์™€ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ์„ ๋™์‹œ์— ๊ณ ๋ คํ•œ๋‹ค. ๋ฐ์ดํ„ฐ ๋ณด์•ˆ์€ ๋งˆ์Šคํ„ฐ์˜ ๊ณ ์œ ํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์›Œ์ปค๋“ค๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜๋Š” ๊ฒƒ์„ ์˜๋ฏธํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ์‹œ์Šคํ…œ์„ private secure coded computation์ด๋ผ ํ•˜๋ฉฐ, ์ œ์•ˆํ•˜๋Š” ๊ธฐ๋ฒ•์„ private secure polynomial codes๋ผ ํ•œ๋‹ค. Private polynomial codes๋ฅผ ๋ณ€ํ˜•ํ•˜์—ฌ private secure polynomial codes์™€ private polynomial codes๋ฅผ ๊ณ„์‚ฐ์‹œ๊ฐ„๊ณผ ํ†ต์‹ ๋Ÿ‰ ์ธก๋ฉด์—์„œ ๋น„๊ตํ•œ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ, ๊ฐ™์€ ์–‘์˜ ํ†ต์‹ ๋Ÿ‰์— ๋Œ€ํ•˜์—ฌ, private secure polynomial codes๊ฐ€ ๋” ๋น ๋ฅธ ๊ณ„์‚ฐ ์‹œ๊ฐ„์„ ๋‹ฌ์„ฑํ•œ๋‹ค.As a major format of data changes from the text to the videos, the amount of memory for storing data increases exponentially, as well as the amount of computation for handling the data. As a result, to alleviate these burdens of storage and computations, the distributed systems are actively studied. Meanwhile, since low latency is one of the main objectives in 5G communications, recent techniques such as edge computing or federated learning in machine learning become important. Since the decentralized systems are fundamental characteristics of these techniques, the distributed systems which include the decentralized systems also become important. In this dissertation, I consider the distributed systems for storage and computation. For the data storage, large-scale data centers collectively store a library of files where the size of each file is tremendous. When a user needs a specific file, it can be downloaded from distributed data centers. In this system, minimizing the amount of download is a significant concern. The user's privacy in this system implies that the user should conceal the index of its desired file against the databases. This kind of problem is referred to as private information retrieval (PIR) problem. The goal of PIR problem is to minimize the amount of download from the databases while ensuring the user's privacy. Meanwhile, for a large amount of computation, the user can divide the whole computation into sub-computations and distribute them to external workers who constitute a distributed system. There can be three cases for the computation. Firstly, the user may own all of the data to be computed and sends both of its data and instructions for the computation to the workers. Secondly, the workers collectively own all of the data and the user just sends instructions for the data selection and computation to the workers. Thirdly, the user and the workers have their own data respectively and the user sends the data and instructions for the data selection and computation to the workers. Since some of the workers can be slow for various reasons, the user may use a coding technique, e.g., an erasure code, to avoid the delaying effect caused by the slow workers. This kind of technique is referred to as coded computation. In these systems, speeding up the computation process is a significant concern. In this dissertation, I focus on the third system. In the considered system, the privacy is similar to that of distributed systems for storage. On the other hand, the security implies that the user should conceal the content of its own data against the workers so that the workers do not have any information about the user's own data. In this dissertation, I consider the user's privacy in distributed systems for storage, and both of the privacy and security in distributed systems for the computation. In case of the distributed systems for storage, since the user does not have its own data, the data security on the user's data cannot be considered. Particularly, I propose some achievable schemes that ensure the privacy and security in these systems. To begin with, as a new variation of PIR problem, I consider a user's cache that has some pre-stored data of databases' library. I refer to this problem as cache-aided PIR problem. By introducing the user's cache in the PIR problem, the amount of download from the databases is significantly reduced. The achievable scheme is based on the optimal scheme for conventional PIR problem. In the achievable scheme, the pre-store cache was exploited as an side information, which reduces the amount of download, compared to the PIR problem without cache. Secondly, I consider the master's privacy in coded computation. In the system model, the workers have their own data, as well as the master. The workers' data constitutes a library of several files. The master should compute a function of its own data and a specific file in the library. The master's privacy implies that the workers' should not know which file in the library is desired by the user. I refer to this problem as private coded computation and propose an achievable scheme of private coded computation, namely private polynomial codes. The private polynomial codes are based on the polynomial codes which were proposed in the conventional coded computation system. In the achievable scheme, the workers are grouped for the privacy and asynchronous scheme is considered, which was not considered in the conventional polynomial codes. Due to the asynchronous scheme, the proposed scheme achieves the faster computation time, compared to the modified optimal RPIR scheme. Lastly, I consider the data security in coded computation, as well as the master's privacy. The system model is similar to that of private coded computation. The data security implies that the master should protect its own data against the workers. I refer to this problem as private secure coded computation and propose an achievable scheme, namely private secure polynomial codes. The private secure polynomial codes are based on the polynomial codes which were proposed in the conventional coded computation system. By modifying the private polynomial codes, the private secure polynomial codes and private secure polynomial codes are compared in terms of computation time and communication load. As a result, the private secure polynomial codes achieves faster computation time for the same communication load.1. Introduction 1 1.1 Related work 3 1.1.1 Private information retrieval 3 1.1.2 Coded computation 4 1.2 Contributions and Organization 5 2. Cache-aided Private Information Retrieval 8 2.1 Introduction 8 2.2 System model 9 2.3 Main results : 12 2.4 Achievable scheme 17 2.4.1 Cacheless phase 17 2.4.2 Cache-assisted phase 21 2.4.3 Cache-aided PIR 24 2.5 Tightness of achievable scheme 29 2.6 Conclusions and follow-up works 30 3. Private Coded Computation 32 3.1 Introduction 32 3.2 System model 37 3.3 Main results 41 3.4 Private polynomial codes 42 3.4.1 First example 42 3.4.2 Second example 48 3.4.3 General description 52 3.4.4 Privacy proof 56 3.4.5 Performance analysis 59 3.4.6 Special cases 61 3.5 Simulation results 62 3.5.1 Computation time 62 3.5.2 Communication load 68 3.6 Conclusion 69 4. Private Secure Coded Computation 71 4.1 Introduction 71 4.2 Main results 75 4.3 Private secure polynomial codes 76 4.3.1 Illustrative example 76 4.3.2 General description 80 4.3.3 Performance analysis 83 4.3.4 Privacy and security proof 84 4.4 Simulation results 85 4.4.1 Computation time 86 4.4.2 Communication load 90 4.5 Conclusion 91 5 Conclusion 93 5.1 Summary 93 5.2 Future directions 94 ๊ตญ๋ฌธ์ดˆ๋ก 105 Acknowledgement 107Docto

    ๊ตํ†ต๊ธฐ๋ฐ˜์‹œ์„คํˆฌ์ž์˜ ์ง€์—ญ๊ฐ„๋ฐฐ๋ถ„๊ณผ ์ง€์—ญ๊ฒฝ์ œ์„ฑ์žฅ์— ๊ด€ํ•œ ์—ฐ๊ตฌ(Regional allocation of transportation infrastructure investment and development of local economy)

    Get PDF
    ๋…ธํŠธ : ์ด ์—ฐ๊ตฌ๋ณด๊ณ ์„œ์˜ ๋‚ด์šฉ์€ ๊ตญํ† ์—ฐ๊ตฌ์›์˜ ์ž์ฒด ์—ฐ๊ตฌ๋ฌผ๋กœ์„œ ์ •๋ถ€์˜ ์ •์ฑ…์ด๋‚˜ ๊ฒฌํ•ด์™€๋Š” ์ƒ๊ด€์—†์Šต๋‹ˆ๋‹ค

    ๋Œ€ํ˜•๊ณต๊ณต๊ฑด์„ค์‚ฌ์—…์˜ ํšจ์œจ์  ์ถ”์ง„๋ฐฉ์•ˆ ์—ฐ๊ตฌ

    Get PDF
    ๋…ธํŠธ : ์ด ์—ฐ๊ตฌ๋ณด๊ณ ์„œ์˜ ๋‚ด์šฉ์€ ๊ตญํ† ์—ฐ๊ตฌ์›์˜ ์ž์ฒด ์—ฐ๊ตฌ๋ฌผ๋กœ์„œ ์ •๋ถ€์˜ ์ •์ฑ…์ด๋‚˜ ๊ฒฌํ•ด์™€๋Š” ์ƒ๊ด€์—†์Šต๋‹ˆ๋‹ค

    High Dimensional Markov Chain Monte Carlo with Multiple GPUs

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ž์—ฐ๊ณผํ•™๋Œ€ํ•™ ํ†ต๊ณ„ํ•™๊ณผ, 2018. 2. ์ด์žฌ์šฉ.์ธ๊ณต์‹ ๊ฒฝ๋ง๊ณผ ๊ฐ™์€ ๋งŽ์€ ๊ณ„์‚ฐ์„ ์š”ํ•˜๋Š” ๋ชจํ˜•์ด ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์—์„œ ํšจ๊ณผ์ ์ž„์ด ๋“œ๋Ÿฌ๋‚จ์— ๋”ฐ๋ผ ํ˜•๋ ฌ ์—ฐ์‚ฐ์„ ๋ณ‘๋ ฌ์ฒ˜๋ฆฌ ํ•˜๊ธฐ ์œ„ํ•ด ๊ทธ๋ž˜ํ”ฝ์นด๋“œ(GPU) ์ƒ ์—์„œ ๊ณ„์‚ฐํ•˜๋Š” ๊ฒƒ์ด ์ผ๋ฐ˜ํ™”๋˜๊ณ  ์žˆ์œผ๋ฉฐ ์ด๋ฅผ ์œ„ํ•ด ๊ณ„์‚ฐ์„ ์—ฌ๋Ÿฌ ์Šค๋ ˆ๋“œ๋กœ ๋‚˜๋ˆ„๋Š” ๋ฐฉ๋ฒ•์„ ์ฐพ๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•ด์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ๋ถ„ํ•  ๋œ ์ƒ˜ํ”Œ ๊ณต๊ฐ„์—์„œ ๋ธŒ๋ฆฌ์ง€ ์ƒ˜ํ”Œ๋ง๊ณผ ํ•ด๋ฐ€ํ† ๋‹ˆ์•ˆ ๋ชฌํ…Œ์นด๋ฅผ๋กœ๋ฅผ ๊ฒฐํ•ฉํ•˜์—ฌ ์—ฌ๋Ÿฌ GPU์— ๋ถ„์‚ฐ๋  ์ˆ˜ ์žˆ๋Š” ์ƒˆ๋กœ์šด MCMC ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์‹œํ•œ๋‹ค. ์ด ์ ‘๊ทผ๋ฒ•์€ ๋ฒ ์ด์ง€์•ˆ ๋‰ด๋Ÿด ๋„คํŠธ์›Œํฌ (Bayesian Neural Network)์™€ ๊ฐ™์€ ํƒ€๊ฒŸ ๋ถ„ํฌ์— ๋Œ€ํ•œ MCMC ์ƒ˜ํ”Œ๋ง์„ ๋น ๋ฅด๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ ๋‹ค์ค‘ ๋ชจ๋‹ฌ (Multimodality)์ด ์กด์žฌํ•  ๋•Œ ์ด ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ๋‚ฎ์€ ํ™•๋ฅ  ์˜์—ญ์—์„œ๋„ ์ƒ˜ํ”Œ๋ง์„ ํšจ์œจ์ ์œผ๋กœ ์ž˜ ํ• ์ˆ˜ ์žˆ๋Š”๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ์ด ๋…ผ๋ฌธ์€ Adam Optimizer, ํ•ด๋ฐ€ํ† ๋‹ˆ์•ˆ ๋ชฌํ…Œ์นด๋ฅผ๋กœ์™€ ๊ฐ™์€ ๋‹ค๋ฅธ ํ•™์Šต ๋ฐฉ๋ฒ•์˜ ๋ณ€์ˆ˜ ๋ถ„ํฌ์™€ ๋ณธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ๋ณ€์ˆ˜๋ถ„ํฌ๋ฅผ ๋น„๊ตํ•จ์œผ๋กœ์จ, ์ œํ•œ๋œ ํ‘œ๋ณธ ๊ณต๊ฐ„์ด ์ผ๋ฐ˜ํ™” ์˜ค์ฐจ์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์— ๋Œ€ํ•œ ์ถ”๊ฐ€ ์—ฐ๊ตฌ๊ฐ€ ์ˆ˜ํ–‰ ๋  ์ˆ˜ ์žˆ์Œ์„ ์ œ์‹œํ•œ๋‹ค.Allocating computation over multiple threads to reduce running time has become a key to training big models such as deep neural networks because a Graphics Processing Unit (GPU), which is parallel in nature, can speed up intensive matrix operations. We present a new MCMC algorithm that can be distributed over multiple GPUs by combining bridge sampling with Hamiltonian Monte Carlo on partitioned sample spaces. We empirically show that this approach can expedite MCMC sampling for any unnormalized target distribution such as Bayesian Neural Network in a high dimensional setting. Furthermore, in the presence of multimodality, this algorithm is expected to be more efficient in mixing MCMC chains when proper partitions are chosen. Finally, by comparing the parameter distributions of different learning method, we suggest that further studies could be conducted on the effect of a constrained sample space on the generalization error.Abstract 3 Chapter 1 Introduction 9 1.1 Related Works 10 1.2 Contribution 12 Chapter 2 Hamiltonian Monte Carlo 13 2.1 Momentum proposal 15 2.2 Leap frog update 15 2.3 Metropolis Accept-Reject 16 Chapter 3 Bridged Hamiltonian Monte Carlo 18 3.1 Sampling from Partitioned Sample Space 18 3.1.1 Constrained HMC 19 3.2 Combining Samples from different Sample Space 20 3.2.1 Bridge Sampling 22 3.3 Practical Issues in Implementing Bridged Hamiltonian Monte Carlo 24 3.3.1 Numerical Overflow or Underflow 24 3.3.2 Partitioning Scheme 26 Chapter 4 Experiments 28 4.1 Bivariate Normal Mixture Model 28 4.2 Moon Data Classification 31 4.3 MNIST Data Classification 36 4.4 Result 37 Chapter 5 Discussion 42 ์ดˆ๋ก 48Maste

    ๊ตญ๋ฏผ๊ฒฝ์ œ ์•ˆ์ •์„ ์œ„ํ•œ ์ฃผํƒ์‚ฐ์—… ๋ฐœ์ „๋ฐฉํ–ฅ ์—ฐ๊ตฌ(A study on improvement of housing industry for stability of national economy)

    Get PDF
    ๋…ธํŠธ : ์ด ์—ฐ๊ตฌ๋ณด๊ณ ์„œ์˜ ๋‚ด์šฉ์€ ๊ตญํ† ์—ฐ๊ตฌ์›์˜ ์ž์ฒด ์—ฐ๊ตฌ๋ฌผ๋กœ์„œ ์ •๋ถ€์˜ ์ •์ฑ…์ด๋‚˜ ๊ฒฌํ•ด์™€๋Š” ์ƒ๊ด€์—†์Šต๋‹ˆ๋‹ค

    Analytical Tools and Databases for Metagenomics in the Next-Generation Sequencing Era

    Get PDF
    Metagenomics has become one of the indispensable tools in microbial ecology for the last few decades, and a new revolution in metagenomic studies is now about to begin, with the help of recent advances of sequencing techniques. The massive data production and substantial cost reduction in next-generation sequencing have led to the rapid growth of metagenomic research both quantitatively and qualitatively. It is evident that metagenomics will be a standard tool for studying the diversity and function of microbes in the near future, as fingerprinting methods did previously. As the speed of data accumulation is accelerating, bioinformatic tools and associated databases for handling those datasets have become more urgent and necessary. To facilitate the bioinformatics analysis of metagenomic data, we review some recent tools and databases that are used widely in this field and give insights into the current challenges and future of metagenomics from a bioinformatics perspective.

    Clinical features and long-term prognosis of acute fibrinous and organizing pneumonia histologically confirmed by surgical lung biopsy

    Get PDF
    Background: Acute fibrinous and organizing pneumonia (AFOP) is a rare interstitial pneumonia characterized by intra-alveolar fibrin deposition and organizing pneumonia. The clinical manifestations and long-term prognosis of AFOP are unclear. Our objective was to investigate the clinical features and prognosis of AFOP. Methods: We identified patients diagnosed with AFOP by surgical lung biopsy between January 2011 and May 2018 at Seoul National University Bundang Hospital. We retrospectively reviewed clinical and radiologic findings, treatment, and outcomes of AFOP. Results: Fifteen patients with histologically confirmed lung biopsies were included. The median follow-up duration was 2.4 (range, 0.1-82) months. The median age was 55 (range, 33-75) years, and four patients were immunocompromised. Fever was the most common clinical presentation (86.7%). Patchy ground-glass opacities and/or consolidations were the most predominant findings on chest computed tomography images. Nine patients (60%) received mechanical ventilator care, and eight patients (53.3%) died. The non-survivors tended to have slightly higher body mass index (BMI) and a long interval between symptom onset and diagnosis than the survivors, but these findings were not statistically significant. Among seven survivors, five patients were discharged without dyspnea and oxygen supplement. Conclusions: The clinical course of AFOP was variable. Although AFOP was fatal, most of the patients who recovered from AFOP maintained normal life without supplemental oxygen therapy and respiratory symptoms.ope
    • โ€ฆ
    corecore