scholarly journals The new ASRM müllerian anomaly classification: a picture is worth one thousand words

2021 ◽  
Vol 116 (5) ◽  
pp. 1253-1254
Author(s):  
Ann J. Davis ◽  
Richard H. Reindollar
2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Iori Kisu ◽  
Kanako Nakamura ◽  
Tetsuro Shiraishi ◽  
Tomoko Iijima ◽  
Moito Iijima ◽  
...  

Abstract Background Robert’s uterus is a rare Mullerian anomaly, which can be described as an asymmetric, septate uterus with a non-communicating hemicavity. Herein, we present the case of a misdiagnosed Robert’s uterus, resulting in an invasive and disadvantageous surgery. Case presentation A 16-year-old woman was referred to our department because of dysmenorrhea and suspicion of uterine malformation. We misdiagnosed Robert’s uterus as a unicornuate uterus with a non-communicating rudimentary horn and hematometra, and performed laparoscopic hemi-hysterectomy. Although the patient’s symptoms were relieved, our surgical procedure left the lateral uterine wall weak, making the patient’s uterus susceptible to uterine rupture in any future pregnancy. Conclusions Although the early diagnosis of Robert’s uterus is challenging, it is important in order to determine appropriate surgical interventions and management for maintaining the quality of life and ensuring safety in future pregnancies.


Author(s):  
Adil Aslam Mir ◽  
Fatih Vehbi Çelebi ◽  
Muhammad Rafique ◽  
M. R. I. Faruque ◽  
Mayeen Uddin Khandaker ◽  
...  

Author(s):  
Juma Ibrahim ◽  
Slavko Gajin

Entropy-based network traffic anomaly detection techniques are attractive due to their simplicity and applicability in a real-time network environment. Even though flow data provide only a basic set of information about network communications, they are suitable for efficient entropy-based anomaly detection techniques. However, a recent work reported a serious weakness of the general entropy-based anomaly detection related to its susceptibility to deception by adding spoofed data that camouflage the anomaly. Moreover, techniques for further classification of the anomalies mostly rely on machine learning, which involves additional complexity. We address these issues by providing two novel approaches. Firstly, we propose an efficient protection mechanism against entropy deception, which is based on the analysis of changes in different entropy types, namely Shannon, R?nyi, and Tsallis entropies, and monitoring the number of distinct elements in a feature distribution as a new detection metric. The proposed approach makes the entropy techniques more reliable. Secondly, we have extended the existing entropy-based anomaly detection approach with the anomaly classification method. Based on a multivariate analysis of the entropy changes of multiple features as well as aggregation by complex feature combinations, entropy-based anomaly classification rules were proposed and successfully verified through experiments. Experimental results are provided to validate the feasibility of the proposed approach for practical implementation of efficient anomaly detection and classification method in the general real-life network environment.


Author(s):  
Ji Zhang

A great deal of research attention has been paid to data mining on data streams in recent years. In this chapter, the authors carry out a case study of anomaly detection in large and high-dimensional network connection data streams using Stream Projected Outlier deTector (SPOT) that is proposed in Zhang et al. (2009) to detect anomalies from data streams using subspace analysis. SPOT is deployed on 1999 KDD CUP anomaly detection application. Innovative approaches for training data generation, anomaly classification, false positive reduction, and adoptive detection subspace generation are proposed in this chapter as well. Experimental results demonstrate that SPOT is effective and efficient in detecting anomalies from network data streams and outperforms existing anomaly detection methods.


2018 ◽  
Vol 25 (2) ◽  
pp. 318-319
Author(s):  
Benjamin D. Beran ◽  
Laila Folchini Pereira ◽  
Stephen Zimberg ◽  
Tommaso Falcone

Sign in / Sign up

Export Citation Format

Share Document