4 research outputs found
μΈλΆ 곡격μΌλ‘λΆν° μμ¨ λ³΅μ κ°λ₯ν μ μ΄ μμ€ν : μΌμ 곡격μ μμ ν μν μΆμ κΈ°λ²
νμλ
Όλ¬Έ (λ°μ¬)-- μμΈλνκ΅ λνμ : 곡과λν μ κΈ°Β·μ»΄ν¨ν°κ³΅νλΆ, 2018. 2. μ¬ν보.Recent advances in computer and communication technologies make control systems more connected thanks to the developments in networked actuation and sensing devices. As this connectivity increases, the resulting large scale networked control systems, or the cyber-physical systems (CPS), are exposed and can be vulnerable to malicious attacks. In response to the crisis by the malicious adversaries, this dissertation presents sophisticated control algorithms which are more reliable even when some components of the feedback control systems are corrupted. Focusing especially on sensor attacks, security related problems on CPS are carefully analyzed and an attack-resilient state estimation scheme is proposed. First, the notion of redundant observability is introduced that explains in a unified manner existing security notions such as dynamic security index, attack detectability, and observability under attacks. The redundant observability is a key concept in this dissertation, and a system is said to be q-redundant observable if it is observable even after eliminating any q measurements. It has been shown that any q-sparse sensor attack is detectable if and only if the given linear time invariant (LTI) system is q-redundant observable. It is also equivalent to the condition that the system is observable under βq/2β-sparse sensor attacks. Moreover, the dynamic security index, which is defined by the minimum number of attacks to be undetectable, can be computed as q + 1. In addition, the redundant detectability (or, asymptotic redundant observability), which is a weaker notion than the redundant observability, is also introduced. While the redundant observability does not care about the magnitudes of sensor attacks and does not mind whether the attacks are disruptive or not, the redundant detectability only deals with attacks that do not converge to zero as time goes on, so that it is more practical in the sense that it can only detect and correct the attacks that are actually harmful to the system. Next, a resilient state estimation scheme is proposed under two assumptions: βq/2β-sparsity of attack vector and q-redundant detectability of the system. The proposed estimator consists of a bank of partial observers operating based on Kalman detectability decomposition and a decoder exploiting error correction techniques. The partial observers are either constructed by Luenberger observers or Kalman filters. The Luenberger observer guarantees the robustness with bounded disturbances/noises, while the Kalman filter shows the suboptimality in the sense of minimum variance with Garussian disturbances/noises. In terms of time complexity, an β0 minimization problem in the decoder alleviates the computational efforts by reducing the search space to a finite set and by combining a detection algorithm to the optimization process. On the other hand, in terms of space complexity, the required memory is linear with the number of sensors by means of the decomposition used for constructing a bank of partial observers. This resilient state estimation scheme proposed for LTI systems, is further extended for a class of uniformly observable nonlinear systems. Based on the uniform observability decomposition, a high gain observer is constructed for each single measurement to estimate the observable sub-state and it constitutes the partial observer. Finally, the decoder solves a nonlinear error correcting problem by collecting all the information from the high gain observers and by exploiting redundancy.1 Introduction 1
1.1 Background 1
1.2 Research Objective and Contributions 5
1.3 Outline of the Dissertation 8
2 Error Correction over Reals and its Extensions 11
2.1 Error Correction over Reals and Compressed Sensing 11
2.2 Extension to Stacked Vector Case 16
2.2.1 Error Detectability and Error Correctability 16
2.2.2 Error Detection and Correction Scheme for Noiseless Case 20
2.2.3 Error Detection and Correction Scheme for Noisy Case 23
3 On Redundant Observability 41
3.1 Redundant Observability 42
3.1.1 Definition and Characterization 42
3.1.2 Relationship with Strong Observability 45
3.1.3 Redundant Unobservable Subspace 47
3.1.4 Asymptotic Redundant Observability 49
3.2 Attack Detectability and Dynamic Security Index 56
3.3 Observability under Sparse Sensor Attacks 65
4 Attack-Resilient State Estimation for Linear Systems 69
4.1 Problem Formulation 70
4.2 Components of Attack-Resilient Estimator and Their Functions 73
4.2.1 Partial Observer: Kalman Detectability Decomposition 73
4.2.2 Decoder: Error Correction for Stacked Vector 77
4.3 Design of Attack-Resilient State Estimator 78
4.3.1 Deterministic Estimator with Bounded Disturbance and Noise 79
4.3.2 Suboptimal Estimator with Gaussian Disturbance and Noise 85
4.4 Remarks on Proposed Attack-Resilient Estimator 93
4.4.1 Comparison with Fault Detection and Isolation 93
4.4.2 Analysis of Time and Space Complexity 95
4.5 Simulation Results: Three-Inertia System 96
5 Attack-Resilient State Estimation for Nonlinear Systems 101
5.1 Problem Formulation and Preliminaries 102
5.1.1 Problem Formulation 102
5.1.2 Bi-Lipschitz Function and Lipschitz Left Inverse 103
5.1.3 Nonlinear Error Detectability and Error Correctability 105
5.2 Uniformly Observable Nonlinear Systems for Any Input 108
5.2.1 Uniform Observability Decomposition 108
5.2.2 Design of High Gain Observer 111
5.3 Redundant Observability for Nonlinear Systems 112
5.4 Attack Detection and Resilient Estimation for Nonlinear Systems 115
5.4.1 Detection of Sensor Attacks 115
5.4.2 Attack-Resilient State Estimation 119
5.5 Simulation Results: Numerical Example 121
6 Conclusion 125
6.1 Summary 125
6.2 Future Works 127
Bibliography 129
κ΅λ¬Έμ΄λ‘ 141Docto
λλ§₯κ²½νμ¦κ³Ό μ’ μλ§μ°μ€λͺ¨λΈμμ ν리ν΄μ μ΄μ©ν μΈν¬μΆμ μ기곡λͺ μμ
Dept. of Medicine/λ°μ¬Molecular imaging is a type of innovative medical imaging that provides detailed images of the in vivo occurrences at a molecular or cellular level through real-time imaging. Among the various molecular imaging modalities, magnetic resonance imaging(MRI) can use in detection of cell movement, proliferation, and division through cell labeling, and diagnose and evaluate the treatment effectiveness of tumors or inflammations depending the labeling cell type. MRI provides high tissue contrast and superior resolution but it has relatively low sensitivity, and therefore, contrast agents are used to overcome this challenge. However, problems such as dilution of contrast agents within the body, instability of cell labeling, and cytotoxicity suggest that there is a need for a more safe and efficient cell labeling technique. The reporter-gene based technique is being proposed as a method to overcome these problems. Ferritin is an intracellular, iron-binding protein that accumulates extracellular iron entering the cell and exhibits magnetic properties, allowing T2 contrast effects under MRI. This makes it a good candidate as an MR contrast agent for cell tracking. This study aims to understand the effectiveness of ferritin as a contrast agent and also a potential reporter gene, by tracking macrophages and tumor cells using ferritin in arteriosclerosis and tumor mouse models. In a comparison experiment with the currently used T2 contrast agent Feridex, ferritin showed 50% lower relaxivity (Feridex vs ferritin = 0.00298 ml/Β΅g Feβ1/sec vs 0.00159 ml/Β΅g Feβ1/sec), which was sufficient to act as the MR contrast agent for cellular imaging. Macrophage cell line Raw264.7, labeled with ferritin, showed T1 and T2 contrast effects in cell pellet imaging. In vivo imaging of ApoE knockout (ApoE-/-) mice 24 hr after intravenous injection of the cells revealed negative contrast effects in the aortic arch walls. Therefore, ferritin can be used to diagnose inflammations by tracking ferritin-labeled macrophages. Since the contrast effects of ferritin were confirmed, the use of ferritin as a reporter gene and its use as an adenovirus-based expression system were assessed in this experiment. First, a Mock (control group) and an adenoviral human ferritin heavy chain ([Ad-FTH] experimental group) were injected into the subcutaneous tumor models made using the colorectal cancer cell line HCT116. T1 and T2 -weighted images were obtained every two days after injection. Day 2 post-injection images showed negative contrast areas within the tumor, and by day 4 post-injection, the enhanced contrast areas were clearly observed. The results of the Prussian blue staining performed using the same tissue samples demonstrated overlapping of the negative contrast-enhanced region and iron absorption region, thereby confirming that the contrast effects were due to ferritin gene expression. Considering the fact that the iron concentration increases within the tumor, a glioma cell line U87MG was infected with Ad-FTH and ferritin expression was induced. Then, cell-pellet MRI was performed using cells cultured with 1mM FeCl3 and 3mM FeCl3; cells cultured under higher iron concentration were confirmed to show stronger negative contrast enhancing effects. In order to validate the negative contrast effects of ferritin through T2*-weighted images, brain tumor models were established by injecting U87MG cells into mouse brain and Ad-FTH was injected into the tumor; T1, T2 and T2*- weighted images were simultaneously obtained from days 1 through 6. Day 2 post-injection, T2 and T2*- images showed negative contrast effects at the tumor margins, and maintained until day 6. In conclusion, through cellular level investigation and in vivo experiments using animal models, this study strongly suggests the effectiveness of ferritin as an endogenous MR contrast agent and a potential reporter gene, which is capable of maintaining cell labeling stability and cellular safety.ope
Angiographic analysis of the intracranial aneurysms
μνκ³Ό/μμ¬[νκΈ]
νμ΄μ μ λλλ§₯λ₯λ κ±°μ μ¦μμ λνλ΄μ§ μκ³ μμμ μΌλ‘ λ¬Έμ λ₯Ό μΌμΌν€μ§ μμΌλ, μΌλ¨ νμ΄λλ©΄ λμ μ λ³λ₯ λ° μ¬λ§λ₯ μ μ΄λνκ² λλ―λ‘ νμ΄μ μ κ·Ήμ μΈ μΉλ£κ° μ€μνλ€. λ°λΌμ νμ΄μνμ μμΈ‘ν μ μλ κΈ°μ€μ΄ νμνλ°, λλλ§₯λ₯μ νμ΄μ κ΄μ¬νλ μΈμλ€ μ¦, λλλ§₯λ₯ λͺ¨νκ΄μ νλ₯μλνμ λ³ν, λλλ§₯λ₯λ²½μ λ³ν, λλλ§₯λ₯μ ν¬κΈ° λ° μμΉ, νμμ λμ΄, μ±λ³ λ° νμ λ±μ μ¬λ¬ κ°μ§ μ€λλλ§₯λ₯μ ν¬κΈ°κ° κ°μ₯ μ€μνλ€κ³ μλ €μ Έ μλ€. μ΄μ μ μλ λνκ΄μ‘°μμ μ견μ λΆμνμ¬ νμ΄λ λλλ§₯λ₯μ ν¬κΈ°λ₯Ό μΈ‘μ ν¨μΌλ‘μ¨ νμ΄μνμ κΈ°μ€μ΄ λλ μκ³μΉλ₯Ό μμλ³΄κ³ μ νμκ³ , λλλ§₯λ₯μ μμΉλ³ λΆν¬ λ° κ·Έμ λ°λ₯Έ ν¬κΈ°μ μ°¨μ΄κ° μλκ°, λλλ§₯λ₯μ λͺ¨μμ 보μ νμ΄μ¬λΆλ₯Ό μμΈ‘ν μ μλκ°λ₯Ό 보μμΌλ©°, μ μ°νλ¨μΈ΅μ΄¬μμ ν¨κ» λΉκ΅ λΆμνμλ€.
1989λ
7μλΆν° 1991λ
12μκΉμ§ μμμ μΌλ‘ λλλ§₯λ₯ νμ΄μ μν μ§μ£Όλ§νμΆνμ μμ¬νμ¬ μ μ°νλ¨μΈ΅μ΄¬μ λ° λνκ΄μ‘°μμ μ μννκ³ μμ κ²μ¬ λ± κΈ°λ‘μ νμΈν μ μμλ 100λͺ
μ νμλ₯Ό λμμΌλ‘ νμλ€. λνκ΄μ‘°μμ μ λλλ§₯λ₯ ν¬κΈ°μ μ΅λμΉλ₯Ό μΈ‘μ νμκ³ , λλλ§₯λ₯μ μμΉ ,μ«μ λ° λͺ¨μμ 보μμΌλ©°, μμΉ λΆν¬μ λ°λ₯Έ ν¬κΈ°μ μ°¨μ΄λ₯Ό λΆμνμλ€. μ μ°νλ¨μΈ΅μ΄¬μμ μ°Έκ³ νμ¬ μ§μ£Όλ§νμΆνλΆν¬λ‘ νμ΄ λλλ§₯λ₯μ μμΉλ₯Ό μμΈ‘ν΄ λ³΄μκ³ , μ§μ£Όλ§νμΆνμ μ λμ λλλ§₯λ₯ ν¬κΈ°μ¬μ΄μ μκ΄κ΄κ³, λμ€μ§λ΄ νμ’
λ° λμ€μΆνμ λλ°λΉλλ₯Ό 보μμΌλ©°, μ΄λ€μ΄ μ§μ£Όλ§νμΆνμ μ λμ κ΄κ³κ° μλμ§λ₯Ό μ΄ν΄λ³Έ κ²°κ³Ό λ€μκ³Ό κ°μ κ²°κ³Όλ₯Ό μ»μλ€.
1. μ°λ Ήμ 23μΈμμ 15μΈ μ¬μ΄λ‘ νκ· 52.2μΈλ‘ 50λμμ κ·Έ λΉλκ° κ°μ₯ λμκ³ , μ±λ³μ λ¨λ
λΉκ° 45:55λ‘ μ¬μκ° μ½κ° λ§μλ€.
2. λλ§₯λ₯μ μλ λ¨μΌμ± λλ§₯λ₯κ° 78μμκ³ , λ€λ°μ± λλ§₯λ₯λ 22μλ‘μ 2κ°μ λλ§₯λ₯λ 14μ, 3κ° μ΄μμ 8μμμ κ΄μ°°λμλ€.
3. νμ΄λ λλ§₯λ₯μ ν¬κΈ°λ 2-l8mm μ¬μ΄μκ³ νκ· 7.9Β±3.2mmλ‘ λνλ¬μΌλ©°, νμ΄λμ§ μμ λλλ§₯λ₯μ ν¬κΈ°λ 2-9mmλ‘ νκ· 4.0Β±1.5mm λ‘μ, νμ΄λ λλ§₯λ₯μ ν¬κΈ°κ° μ»Έλ€(t=0.677, p < 0.001).
4. λλ§₯λ₯μ μμΉλ³ λΆν¬λ μ λλλλ§₯μ΄ 34%μκ³ μ΄ μ€ μ κ΅ν΅λλ§₯μ΄ 29.6%μμΌλ©°, λ΄κ²½λλ§₯μ 35.5%, κ·Έ μ€ νκ΅ν΅λλ§₯ 22.2%λ‘ λνλ¬κ³ , μ€λλλλ§₯μ 28.2%λ₯Ό μ°¨μ§νμμΌλ©°, κ° μμΉμ λ°λ₯Έ λλ§₯λ₯ ν¬κΈ°μ μ°¨μ΄λ μμλ€.
5. λνκ΄μ‘°μμ μμ λλλ§₯λ₯ λͺ¨μμ κΈ°μ€μΌλ‘ 68.9%μμ νμ΄μ¬λΆλ₯Ό μμΈ‘ν μ μμλ€.
6. μ μ°ν λ¨μΈ΅μ΄¬μμ μ§μ£Όλ§ν μΆνμ λΆν¬, λμ€μ§λ΄νμ’
μ μμΉ λ° μ‘°μμ¦κ°λ μκ²°μ λ‘ λνλλ λλ§₯λ₯ μ체μ μμμ ν λλ‘ 47%μμ νμ΄ λλλ§₯λ₯μ μμΉλ₯Ό μΆμ ν μ μμλ€.
7. μ μ°νλ¨μΈ΅μ΄¬μμ 86%μμ μ§μ£Όλ§νμΆνμ μ§λ¨ν μ μμκ³ , 15.3%μμ λλ§₯λ₯ μ체λ₯Ό κ΄μ°°ν μ μμμΌλ©°, λμ€μ§λ΄νμ’
μ 11%μμ λμ€μΆνμ 10%μμ λλ°λμλ€.
8. μ μ°νλ¨μΈ΅μ΄¬μμ μ§μ£Όλ§νμΆνμ μ λμ μ€μ λλλ§₯λ₯μ ν¬κΈ° λ° λμ€νμ₯ λλ°λΉλλ 무κ΄νμκ³ , μ§μ£Όλ§νμΆνμ΄ μ¬ν μλ‘ λμ€μΆνμ λλ°λΉλλ λκ² λνλ¬λ€.
μ΄μμ κ²°κ³Όλ‘ λ³΄μ λλλ§₯λ₯μ νμ΄μκ³μΉλ₯Ό νΉμ μμΉλ‘ νμ μ§μ μλ μμΌλ λνκ΄μ‘°μμ μ 5-lOmm ν¬κΈ°μ νμ΄λλ§₯λ₯κ° κ°μ₯ λΉλκ° λμΌλ―λ‘, 5mmμ΄μμ μ΅λμ§κ²½μ κ°λ λλ§₯λ₯ λ°κ²¬μ μμ λ±μ μ κ·Ήμ μΉλ£λ₯Ό νλ κ²μ΄ λ°λμ§νλ¦¬λΌ μ¬λ£λλ€. κ·Έλ¬λ λ³Έ μ°κ΅¬λ§μΌλ‘ μ μ°©ν νμ΄μκ³μΉμ νΉμ κ°μ κ²°μ μ§μ μλ μκ³ , λμ°κΈ° λλ§₯λ₯νμ΄μ΄ λ¨μν λλλ§₯λ₯μ ν¬κΈ°λ§μΌλ‘ κ²°μ λμ§λ μμΌλ―λ‘ μΆν λλ§₯λ₯νμ΄μ μν₯μ λΌμΉλ λ€λ₯Έ μ€μμΈμμ κ΄ν μ°κ΅¬κ° νμνλ¦¬λΌ μκ°λλ€.
[μλ¬Έ]
Intracranial aneurysms do not cause significant symptoms or present serious clinical problems when unruptured, but once rupture occurs, it is associated with a high morbidity and mortality rate, and therefore active management before rupture and methods to predict are necessary. Factors predisposing to aneurysm rupture such as hemodynamic changes in the parent vessel, pathophysiology of the aneurysm wall, size and location of the aneurysm, age, sex aid blood pressure of the patient are
thought to be important contributing factors. The authors analysed the angiograms along with CTs in order to evaluate the size of ruptured aneurysms and to obtain the critical size that an aneurysm becomes hazardous, and to observe if there is any significant difference in the distribution of the location and size of aneurysms, and to see if rupture of the aneurysms can be predicted according to its shape.
From July 1989 to Dec. 1991, 100 patients who underwent cerebral angiograhy and CT due to clinically ruptured aneufsm leading to SAH were studied. The maximum size of the aneurysms was measured on the angiograms, and the location, number and shape of each aneurysm was noted. The difference in size according to differing locations, the correlation between the size of aneurysm and degree of SAH, the rate of combined presence of intracerebral hematoma and initraventricular hemorrhage were all analysed with respect to degree of SAH, and the following results were obtained.
1. The mean age of the subject was 52.2 years (range 23-75 years), the 6th decade being the most common, and the ratio of males and females was 45:55.
2. Single aneurysms were present in 78 cases, and multiple aneurysms were present in 22 cases, of which 14 cases had 2 aneurysms, and 8 cases had 3 or more.
3, The size of the ruptured aneurysms were between 2-l8mm (mean 7.9Β±3.2mm),and for the unruptured aneurysm the sine was 2-9mm (mean 4.0Β± 1.5mm), showing that ruptured aneurysm were significantly larger.
4. The locations of aneurysms were anterior cerebral artery (34%) among which A-COM was 29.6%, internal carotid artery (35.5%) among which P-COM was 22.2% and MCA (28.2%), which showed no significant difference in size.
5. According to the shape of aneurysm, rupture was predicted in more than 68.9% of the cases studied.
6. The location of 47% of the ruptured aneurysms could be assumed by studying the distribution of SAH on CT, and by the density of the aneurysm itself representing as enhancing nodules and the site of the ICH.
7. Diagnesis of the SAH could be made in 86% by CT, and 15.3% of the aneurysms could be detected. Intracerebral hematomas were present in 11 %and IVH was present in 10% of the cases.
8. There was no correlation between the degree of SAH and size of the aneurysms, but the severity of SAH correlated with the incidence of IVH.
In conclusion, the exact relationship between the size of unruptured aneurysm and liklihood of bleeding remains poorly defined. However, our data revealed the average longest diameter was 5-lOmm in the most cases of reptured aneurysm. Therefore, intact sacs less than 10mm in diameter cannot be considered innocuous. Until further information is available, we recommended surgical correction of the aneurysms greater than 5mm in longest diameter. However, further study regarding attributing factors of aneurysmal rupture other than aneurysmal size should be taken into consideration.restrictio
μ΄μ° μκ° μΈλ κ΄μΈ‘κΈ°μ ν΄μκ³Ό μ€κ³
Thesis(masters) --μμΈλνκ΅ λνμ :μ κΈ°. μ»΄ν¨ν°κ³΅νλΆ,2010.2.Maste