Successful cannulation of the common bile duct may be difficult in patients in whom the papilla is located entirely within a diverticulum.In this study,we report successful biliary cannulation in three patients follow...Successful cannulation of the common bile duct may be difficult in patients in whom the papilla is located entirely within a diverticulum.In this study,we report successful biliary cannulation in three patients following intubation of the distal tip of the duodenoscope into the duodenal diverticulum and locating the major papilla.No complications occurred during the operation or during the postoperative period.This method didn't need second incubation an endoscope and might lower the burden of patients.So this skill is useful to deal with the papilla hidden inside the large diverticulum because of its safety and convenience.展开更多
Particle-in-cell (PIC) method has got much benefits from GPU-accelerated heterogeneous systems.However,the performance of PIC is constrained by the interpolation operations in the weighting process on GPU (graphic pro...Particle-in-cell (PIC) method has got much benefits from GPU-accelerated heterogeneous systems.However,the performance of PIC is constrained by the interpolation operations in the weighting process on GPU (graphic processing unit).Aiming at this problem,a fast weighting method for PIC simulation on GPU-accelerated systems was proposed to avoid the atomic memory operations during the weighting process.The method was implemented by taking advantage of GPU's thread synchronization mechanism and dividing the problem space properly.Moreover,software managed shared memory on the GPU was employed to buffer the intermediate data.The experimental results show that the method achieves speedups up to 3.5 times compared to previous works,and runs 20.08 times faster on one NVIDIA Tesla M2090 GPU compared to a single core of Intel Xeon X5670 CPU.展开更多
AIM: To evaluate the value of endoscopic ultrasono- graphy (EUS) in the preoperative TNM staging of gastric cancer. METHODS : Forty-one patients with gastric cancer (12 early stage and 29 advanced stage) proved ...AIM: To evaluate the value of endoscopic ultrasono- graphy (EUS) in the preoperative TNM staging of gastric cancer. METHODS : Forty-one patients with gastric cancer (12 early stage and 29 advanced stage) proved by esophagogastroduodenoscopy and biopsies preoperatively evaluated with EUS according to TNM (1997) classification of International Union Contrele Cancer (UICC). Pentax EG-3630U/Hitachi EUB-525 echo endoscope with real-time ultrasound imaging linear scanning transducers (7.5 and 5.0 MHz) and Doppler information was used in the current study. EUS staging procedures for tumor depth of invasion (T stage) were performed according to the widely accepted five-layer structure of the gastric wall. All patients underwent surgery. Diagnostic accuracy of EUS for TNM staging of gastric cancer was determined by comparing preoperative EUS with subsequent postoperative histopathologic findings. RESULTS: The overall diagnostic accuracy of EUS in preoperative determination of cancer depth of invasion was 68.3% (41/28) and 83.3% (12/10), 60% (20/12), 100% (5/5), 25% (4/1) for T1, T2, T3, and T4, respectively. The rates for overstaging and understaging were 24.4% (41110), and 7.3% (4113), respectively. EUS tended to overstage T criteria, and main reasons for overstaging were thickening of the gastric wall due to perifocal inflammatory change, and absence of serosal layer in certain areas of the stomach. The diagnostic accuracy of metastatic lymph node involvement or N staging of EUS was 100% (17/17) for NO and 41.7% (24/10) for N+, respectively, and 66% (41127) overall.Misdiagnosing of the metastatic lymph nodes was related to the difficulty of distinguishing inflammatory lymph nodes from malignant lymph nodes, which imitate similar echo features. Predominant location and distribution of tumors in the stomach were in the antrum (20 patients), and the lesser curvature (17 patients), respectively. Three cases were found as surgically unresectable (T4 N+), and included as being correctly diagnosed by EUS. CONCLUSION: EUS is a useful diagnostic method for preoperative staging of gastric cancer for T and N criteria. However, EUS evaluation of malignant lymph nodes is still unsatisfactory.展开更多
TO THE EDITORReviewing the available therapeutic options in the medical treatment of ulcerative colitis, Xu et al.[1], have omitted to mention an important aspect in the pharmacological management of the disease, name...TO THE EDITORReviewing the available therapeutic options in the medical treatment of ulcerative colitis, Xu et al.[1], have omitted to mention an important aspect in the pharmacological management of the disease, namely the possibility to promote clinical and endoscopic improvement by manipulating the enteric flora.展开更多
SITUSinversus totalis is uncommon anatomic anomaly, with gallbladder on the left side} Since the first known laparoscopic cholecystectomy in a patient with situs inversus has been reported by Camposand Sipes in 1991,2...SITUSinversus totalis is uncommon anatomic anomaly, with gallbladder on the left side} Since the first known laparoscopic cholecystectomy in a patient with situs inversus has been reported by Camposand Sipes in 1991,2 there have been only approximately 40 cases of laparoscopic cholecystectomy performed in patients with situs inversus reported in the published literatures.3' 4 These cases may cause difficulties in the diagnostic and therapeutic management due to the mirror-image anatomy during operation, which requires more technically procedures and needs reorientation of visuomotor skills to the left upper quadrant. We herein discuss technical and diagnostic difficulties and review the literatures.展开更多
The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be cons...The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program.展开更多
Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in t...Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead.展开更多
Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicio...Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicious cyber attack. It is more difficult to fred the drivers and get network connections information from a 64-bit windows 7 memory image file than from a 32-bit operating system memory image f'de. In this paper, an approach to fred drivers and get network connection information from 64-bit windows 7 memory images is given. The method is verified on 64-bit windows 7 version 6.1.7600 and proved reliable and efficient.展开更多
基金Supported by National Natural Science Foundation of China,No. 30900671Shanghai Natural Science Foundation,No. 09ZR1419700
文摘Successful cannulation of the common bile duct may be difficult in patients in whom the papilla is located entirely within a diverticulum.In this study,we report successful biliary cannulation in three patients following intubation of the distal tip of the duodenoscope into the duodenal diverticulum and locating the major papilla.No complications occurred during the operation or during the postoperative period.This method didn't need second incubation an endoscope and might lower the burden of patients.So this skill is useful to deal with the papilla hidden inside the large diverticulum because of its safety and convenience.
基金Projects(61170049,60903044)supported by National Natural Science Foundation of ChinaProject(2012AA010903)supported by National High Technology Research and Development Program of China
文摘Particle-in-cell (PIC) method has got much benefits from GPU-accelerated heterogeneous systems.However,the performance of PIC is constrained by the interpolation operations in the weighting process on GPU (graphic processing unit).Aiming at this problem,a fast weighting method for PIC simulation on GPU-accelerated systems was proposed to avoid the atomic memory operations during the weighting process.The method was implemented by taking advantage of GPU's thread synchronization mechanism and dividing the problem space properly.Moreover,software managed shared memory on the GPU was employed to buffer the intermediate data.The experimental results show that the method achieves speedups up to 3.5 times compared to previous works,and runs 20.08 times faster on one NVIDIA Tesla M2090 GPU compared to a single core of Intel Xeon X5670 CPU.
文摘AIM: To evaluate the value of endoscopic ultrasono- graphy (EUS) in the preoperative TNM staging of gastric cancer. METHODS : Forty-one patients with gastric cancer (12 early stage and 29 advanced stage) proved by esophagogastroduodenoscopy and biopsies preoperatively evaluated with EUS according to TNM (1997) classification of International Union Contrele Cancer (UICC). Pentax EG-3630U/Hitachi EUB-525 echo endoscope with real-time ultrasound imaging linear scanning transducers (7.5 and 5.0 MHz) and Doppler information was used in the current study. EUS staging procedures for tumor depth of invasion (T stage) were performed according to the widely accepted five-layer structure of the gastric wall. All patients underwent surgery. Diagnostic accuracy of EUS for TNM staging of gastric cancer was determined by comparing preoperative EUS with subsequent postoperative histopathologic findings. RESULTS: The overall diagnostic accuracy of EUS in preoperative determination of cancer depth of invasion was 68.3% (41/28) and 83.3% (12/10), 60% (20/12), 100% (5/5), 25% (4/1) for T1, T2, T3, and T4, respectively. The rates for overstaging and understaging were 24.4% (41110), and 7.3% (4113), respectively. EUS tended to overstage T criteria, and main reasons for overstaging were thickening of the gastric wall due to perifocal inflammatory change, and absence of serosal layer in certain areas of the stomach. The diagnostic accuracy of metastatic lymph node involvement or N staging of EUS was 100% (17/17) for NO and 41.7% (24/10) for N+, respectively, and 66% (41127) overall.Misdiagnosing of the metastatic lymph nodes was related to the difficulty of distinguishing inflammatory lymph nodes from malignant lymph nodes, which imitate similar echo features. Predominant location and distribution of tumors in the stomach were in the antrum (20 patients), and the lesser curvature (17 patients), respectively. Three cases were found as surgically unresectable (T4 N+), and included as being correctly diagnosed by EUS. CONCLUSION: EUS is a useful diagnostic method for preoperative staging of gastric cancer for T and N criteria. However, EUS evaluation of malignant lymph nodes is still unsatisfactory.
文摘TO THE EDITORReviewing the available therapeutic options in the medical treatment of ulcerative colitis, Xu et al.[1], have omitted to mention an important aspect in the pharmacological management of the disease, namely the possibility to promote clinical and endoscopic improvement by manipulating the enteric flora.
文摘SITUSinversus totalis is uncommon anatomic anomaly, with gallbladder on the left side} Since the first known laparoscopic cholecystectomy in a patient with situs inversus has been reported by Camposand Sipes in 1991,2 there have been only approximately 40 cases of laparoscopic cholecystectomy performed in patients with situs inversus reported in the published literatures.3' 4 These cases may cause difficulties in the diagnostic and therapeutic management due to the mirror-image anatomy during operation, which requires more technically procedures and needs reorientation of visuomotor skills to the left upper quadrant. We herein discuss technical and diagnostic difficulties and review the literatures.
文摘The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program.
基金supported in part by the National High Technology Research and Development Program of China(863 Program)under Grant No.2009AA01Z433the Project of National Ministry under Grant No.A21201-10006the Open Foundation of State Key Laboratory of Information Security(Institute of Information Engineering,Chinese Academy of Sciences)under Grant No.2013-4-1
文摘Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead.
基金This work is supported by the National Natural Science Foundation of China(61070163) and Shandong Natural Science Foundation (Y2008G35).
文摘Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicious cyber attack. It is more difficult to fred the drivers and get network connections information from a 64-bit windows 7 memory image file than from a 32-bit operating system memory image f'de. In this paper, an approach to fred drivers and get network connection information from 64-bit windows 7 memory images is given. The method is verified on 64-bit windows 7 version 6.1.7600 and proved reliable and efficient.