• 제목/요약/키워드: A key technique

검색결과 1,732건 처리시간 0.025초

혈관조영영상에서 고화질 혈관가시화를 위한 영상정합 (Image Registration for High-Quality Vessel Visualization in Angiography)

  • 홍헬렌;이호;신영길
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2003년도 추계학술대회 및 정기총회
    • /
    • pp.201-206
    • /
    • 2003
  • In clinical practice, CT Angiography is a powerful technique for the visualziation of blood flow in arterial vessels throughout the body. However CT Angiography images of blood vessels anywhere in the body may be fuzzy if the patient moves during the exam. In this paper, we propose a novel technique for removing global motion artifacts in the 3D space. The proposed methods are based on the two key ideas as follows. First, the method involves the extraction of a set of feature points by using a 3D edge detection technique based on image gradient of the mask volume where enhanced vessels cannot be expected to appear, Second, the corresponding set of feature points in the contrast volume are determined by correlation-based registration. The proposed method has been successfully applied to pre- and post-contrast CTA brain dataset. Since the registration for motion correction estimates correlation between feature points extracted from skull area in mask and contrast volume, it offers an accelerated technique to accurately visualize blood vessels of the brain.

  • PDF

The Goldilocks technique: An alternative method to construct a breast mound after prosthetic breast reconstruction failure

  • Zavala, Karina Jaikel;Kwon, Jin Geun;Han, Hyun Ho;Kim, Eun Key;Eom, Jin Sup
    • Archives of Plastic Surgery
    • /
    • 제46권5호
    • /
    • pp.475-479
    • /
    • 2019
  • The Goldilocks technique for breast reconstruction utilizes redundant mastectomy flap tissue to construct a breast mound. This technique is suitable for women who decline, or are poor candidates for, traditional postmastectomy reconstruction. Moreover, this technique can be applied in secondary operations after the failure of initial reconstruction efforts. A 74-year-old patient underwent the Goldilocks procedure after reconstruction failure with an implant and acellular dermal matrix. At her 6-month follow-up, the cosmetic outcome of the procedure was satisfactory, and no complications were noted. Therefore, the Goldilocks procedure is a safe alternative to reconstruct breast mounds following reconstruction failure, especially in obese patients.

Amplitude dependency of damping of tall structures by the random decrement technique

  • Xu, An;Xie, Zhuangning;Gu, Ming;Wu, Jiurong
    • Wind and Structures
    • /
    • 제21권2호
    • /
    • pp.159-182
    • /
    • 2015
  • This study focuses on the amplitude dependency of damping of tall structures by the random decrement technique (RDT). Many researchers have adopted RDT to establish the amplitude dependency of damping ratios in super-tall buildings under strong wind loads. In this study, a series of simulated examples were analyzed to examine the reliability of this method. Results show that damping ratios increase as vibration amplitudes increase in several cases; however, the damping ratios in the simulated signals were preset as constants. This finding reveals that this method and the derived amplitude-dependent damping ratio characteristics are unreliable. Moreover, this method would obviously yield misleading results if the simulated signals contain Gaussian white noise. Full-scale measurements on a super-tall building were conducted during four typhoons, and the recorded data were analyzed to observe the amplitude dependency of damping ratio. Relatively wide scatter is observed in the resulting damping ratios, and the damping ratios do not appear to have an obvious nonlinear relationship with vibration amplitude. Numerical simulation and field measurement results indicate that the widely-used method for establishing the amplitude-dependent damping characteristics of super-tall buildings and the conclusions derived from it might be questionable at the least. More field-measured data must be collected under strong wind loads, and the damping characteristics of super-tall buildings should be investigated further.

Zebrafish Dnd protein binds to 3'UTR of geminin mRNA and regulates its expression

  • Chen, Shu;Zeng, Mei;Sun, Huaqin;Deng, Wenqian;Lu, Yilu;Tao, Dachang;Liu, Yunqiang;Zhang, Sizhong;Ma, Yongxin
    • BMB Reports
    • /
    • 제43권6호
    • /
    • pp.438-444
    • /
    • 2010
  • Dnd (dead end) gene encodes an RNA binding protein and is specifically expressed in primordial germ cells (PGCs) as a vertebrate-specific component of the germ plasma throughout embryogenesis. By utilizing a technique of specific nucleic acids associated with proteins (SNAAP), 13 potential target mRNAs of zebrafish Dnd (ZDnd) protein were identified from 8-cell embryo, and 8 target mRNAs have been confirmed using an RT-PCR analysis. Of the target mRNAs, the present study is focused on the regulation of geminin, which is an inhibitor of DNA replication. Using electrophoretic mobility shift assay (EMSA), we demonstrated that ZDND protein bound the 67-nucleotide region from 864 to 931 in the 3'UTR of geminin mRNA, a sequence containing 60.29% of uridine. Results from a dual-luciferase assay in HEK293 cells showed that ZDND increases the translation of geminin. Taken together, the identification of target mRNA for ZDnd will be helpful to further explore the biological function of Dnd in zebrafish germ-line development as well as in cancer cells.

Limit analysis of 3D rock slope stability with non-linear failure criterion

  • Gao, Yufeng;Wu, Di;Zhang, Fei;Lei, G.H.;Qin, Hongyu;Qiu, Yue
    • Geomechanics and Engineering
    • /
    • 제10권1호
    • /
    • pp.59-76
    • /
    • 2016
  • The non-linear Hoek-Brown failure criterion has been widely accepted and applied to evaluate the stability of rock slopes under plane-strain conditions. This paper presents a kinematic approach of limit analysis to assessing the static and seismic stability of three-dimensional (3D) rock slopes using the generalized Hoek-Brown failure criterion. A tangential technique is employed to obtain the equivalent Mohr-Coulomb strength parameters of rock material from the generalized Hoek-Brown criterion. The least upper bounds to the stability number are obtained in an optimization procedure and presented in the form of graphs and tables for a wide range of parameters. The calculated results demonstrate the influences of 3D geometrical constraint, non-linear strength parameters and seismic acceleration on the stability number and equivalent strength parameters. The presented upper-bound solutions can be used for preliminary assessment on the 3D rock slope stability in design and assessing other solutions from the developing methods in the stability analysis of 3D rock slopes.

강연선과 아일랜드타입 전단키를 이용한 쉴드터널 체결기술 연구 (A Study on Shield Tunnel Assembling System Using a Cable and Island-Type Shear Key)

  • 마상준;이영섭;김동민
    • 한국지반공학회논문집
    • /
    • 제31권3호
    • /
    • pp.17-25
    • /
    • 2015
  • 본 연구에서는 볼트체결을 이용한 쉴드터널 세그먼트의 체결방식의 문제점을 보완하기 위해 새로운 세그먼트 체결기술을 개발하였다. 개발된 체결방식과 볼트체결방식에 대하여 구조검토와 수치해석 기법을 통해 세그먼트에 발생하는 역학적 거동을 평가하였다. 아일랜드타입 전단키는 기존 세그먼트 체결방식의 고인장력 볼트보다 높은 전단강도를 확보하였으며, 강연선에 의한 인장강도의 증대로 세그먼트 전체의 안정성 증가를 기대할 수 있을 것으로 판단된다.

Proposal for Analog Signature Scheme Based on RSA Digital Signature Algorithm and Phase-shifting Digital Holography

  • Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • 제4권6호
    • /
    • pp.483-499
    • /
    • 2020
  • In this paper, a novel analog signature scheme is proposed by modifying an RSA-based digital signature scheme with optical phase-shifting digital holography. The purpose of the proposed method is generating an analog signature to provide data confidentiality and security during the data transfer, compared to the digital signature. The holographic encryption technique applied to a hash value reveals an analog-type of pseudo-random pattern in the analog signature scheme. The public key and secret key needed to verify the analog signature are computed from public key ciphers which are generated by the same holographic encryption. The proposed analog signature scheme contains a kind of double encryption in the process of generating signature and key, which enhances security level more than the digital signature. The results of performance simulations show the feasibility of the highly secure signature scheme, and security analysis shows high robustness against known-message attacks and chosen-message attacks. In addition, the proposed method can apply to one-time signature schemes which can be used to sign only one message and it can also apply to authentication, e-mails, electronic banking and electronic data interchange.

2 Key Bridge에 대한 연구 (A Study on the 2 Key Bridge)

  • 박종희
    • 대한치과기공학회지
    • /
    • 제22권1호
    • /
    • pp.57-67
    • /
    • 2000
  • The 2 key bridge system has been developed to make crownless bridges without damaging sound teeth. Strong bridge work of single or multiple pontics is possible for replacing both anterior and posterior teeth. It is incresingly considerde to be unacceptable, by dentists as well as patients, to fully grind down healthy elements in order fit a conventional bridges. Because this technique uses a combination of hole and adhesive fitting, it has a number of adventages over etched bridges and conventional bridges: - In comparison with conventional bridges, hardly and healthy dental tissue is sacrificed - Due to the lack of crown edges there is no periodontal pressure, as is the case with conventional bridges - The treatment procedure is straight forward and involves less time than conventional bridges. - The treatment is largely resiverable and repairable

  • PDF

Residual Synchronization Error Elimination in OFDM Baseband Receivers

  • Hu, Xingbo;Huang, Yumei;Hong, Zhiliang
    • ETRI Journal
    • /
    • 제29권5호
    • /
    • pp.596-606
    • /
    • 2007
  • It is well known that an OFDM receiver is vulnerable to synchronization errors. Despite fine estimations used in the initial acquisition, there are still residual synchronization errors. Though these errors are very small, they severely degrade the bit error rate (BER) performance. In this paper, we propose a residual error elimination scheme for the digital OFDM baseband receiver aiming to improve the overall BER performance. Three improvements on existing schemes are made: a pilot-aided recursive algorithm for joint estimation of the residual carrier frequency and sampling time offsets; a delay-based timing error correction technique, which smoothly adjusts the incoming data stream without resampling disturbance; and a decision-directed channel gain update algorithm based on recursive least-squares criterion, which offers faster convergence and smaller error than the least-mean-squares algorithms. Simulation results show that the proposed scheme works well in the multipath channel, and its performance is close to that of an OFDM system with perfect synchronization parameters.

  • PDF

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'

  • Tallapally, Shirisha;Padmavathy, R.
    • Journal of Information Processing Systems
    • /
    • 제6권1호
    • /
    • pp.43-52
    • /
    • 2010
  • In the secure communication areas, three-party authenticated key exchange protocol is an important cryptographic technique. In this protocol, two clients will share a human-memorable password with a trusted server, in which two users can generate a secure session key. On the other hand the protocol should resist all types of password guessing attacks. Recently, STPKE' protocol has been proposed by Kim and Choi. An undetectable online password guessing attack on STPKE' protocol is presented in the current study. An alternative protocol to overcome undetectable online password guessing attacks is proposed. The results show that the proposed protocol can resist undetectable online password guessing attacks. Additionally, it achieves the same security level with reduced random numbers and without XOR operations. The computational efficiency is improved by $\approx$ 30% for problems of size $\approx$ 2048 bits. The proposed protocol is achieving better performance efficiency and withstands password guessing attacks. The results show that the proposed protocol is secure, efficient and practical.