• Title/Summary/Keyword: Damage tracking

Search Result 119, Processing Time 0.035 seconds

Evaluation of the Jaw-Tracking Technique for Volume-Modulated Radiation Therapy in Brain Cancer and Head and Neck Cancer (뇌암 및 두경부암 체적변조방사선치료시 Jaw-Tracking 기법의 선량학적 유용성 평가)

  • Kim, Hee Sung;Moon, Jae Hee;Kim, Koon Joo;Seo, Jung Min;Lee, Joung Jin;Choi, Jae Hoon;Kim, Sung Ki;Jang, In-Gi
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.30 no.1_2
    • /
    • pp.177-183
    • /
    • 2018
  • Purpose : Volumetric Modulated Arc Therapy(VMAT) has the advantage of uniformly and precisely irradiating the tumor to the shape of the tumor while reducing the risk of radiation damage to normal tissues. such as brain cancer, head and neck cancer and prostate cancer, It is being used for treatment. The purpose of this study is to evaluate the usefulness of the Jaw-Tracking technique(JTT) in VMAT for brain and head and neck cancer. Materials and Methods : We selected eight patients with brain and head and neck cancer(4 Brain, 4 head and neck) who were treated with the VMAT treatment technique. Contouring information of the patient's tumor and normal organ was fused to the Rando phantom using the deformable registration of Velocity(Varian, USA). A treatment plan was developed using the Varian Eclipse(ver 15.5, Varian, USA) with the same patient actual beam parameters except for the use of jaw-tracking. As the evaluation index, the maximum dose and mean dose of target and OAR were compared and a portal dosimetry was performed for the treatment plan verification. Results : When using JTT, the relative dose of OAR decreased by 5.24 % and the maximum dose by 7.05 %, respectively, compared with the Static-Jaw technique(SJT). In the various OARs, the mean dose and maximum dose reduction ranges ranged from 0.01 to 3.16 Gy and from 0.12 to 6.27 Gy, respectively. In the case of the target, the maximum dose of GTV, CTV, PTV decreased by 0.17 %, 0.43 %, and 0.37 % in JTT, and the mean dose decreased by 0.24 %, 0.47 % and 0.47 %, respectively. Gamma analysis The JTT and SJT passing rates were $98{\pm}1.73%$ and $97{\pm}1.83%$ on the basis of 3 % / 3 mm, respectively. Comparing the doses of all OARs applied to the experiment, it was found that the use of JTT resulted in a significant decrease in dose due to additional jaw shielding besides MLC than SJT. Conclusion : In radiation therapy using VMAT treatment plan, we can apply JTT in the case of adjacent tumor and normal organs such as brain cancer and head and neck cancer, and in radiotherapy required large field and high energy caused increase leakage dose through MLC. It is considered that the target dose of PTV can be increased by lowering the dose of normal tissue surrounding the tumor.

  • PDF

Mixing Analysis of Floating Pollutant Using Lagrangian Particle Tracking Model (Lagrangian 입자추적모형을 이용한 부유성 오염물질의 혼합해석)

  • Seo, Il Won;Park, Inhwan;Kim, Young Do;Han, Eun Jin;Choo, Min Ho;Mun, Hyun Saing
    • Journal of Korean Society on Water Environment
    • /
    • v.29 no.3
    • /
    • pp.383-392
    • /
    • 2013
  • In this research, mixing behavior of the floating pollutant such as oil spill accidents was analyzed by studying the advection-diffusion of GPS floaters at water surface. The LPT (Lagrangian Particle Tracking) model of EFDC (Environmental Fluid Dynamics Computer Code) was used to simulate the motion of the GPS floater tracer. In the field experiment, 35 GPS floaters were injected at the Samun Bridge of Nakdong River. GPS floaters traveled to downstream about 700 m for 90 minutes. The field data by the GPS floater experiments were compared with the simulation in order to calibrate the parameter of LPT model. The turbulent diffusion coefficient of LPT model was determined as $K_H/hu^*$ = 0.17 from the scatter diagram. The arrival time of peak concentration and transverse diffusion from the simulation results were similar with the experiments from the concentration curves. Numerical experiments for anticipation of damage from floating pollutant were conducted in the same reach of the Nakdong River and the results show that the pollutant cloud transported to the left bank where the Hwawon pumping station is located. For this reason, it is suggested that the proper action should be needed to maintain the safety of the water withdrawal at the Hwawon pumping station.

Implementation of a Transcutaneous Power Transmission System for Implantable Medical Devices by Resonant Frequency Tracking Method (주파수 추적 방식에 의한 이식형 의료기기용 무선전력전달 장치 구현)

  • Lim, H.G.;Lee, J.W.;Kim, D.W.;Lee, J.H.;Seong, K.W.;Kim, M.N.;Cho, J.H.
    • Journal of Biomedical Engineering Research
    • /
    • v.31 no.5
    • /
    • pp.401-406
    • /
    • 2010
  • Recently, many implantable medical devices have been developed and manufactured in many countries. In these devices, generally, energy is supplied by a transcutaneous method to avoid the skin penetration due to the power wires. As the most transcutaneous power transmission methods, the electromagnetic coupling between two coils and resonance at a specific frequency has been used widely. However, in case of a transcutaneous power transmitter with a fixed switching frequency to drive an electromagnetic coil, inefficient power transmission and thermal damage by the undesirable current variation may occur, because the electromagnetic coupling state between a primary coil and a secondary coil is very sensitive to skin thickness of each applied position and by person. In order to overcome these defects, a transcutaneous power transmitter of which operating frequency can be automatically tracked into the resonance frequency at each environment has been designed and implemented. Through the results of experiments for different coil surroundings, we have been demonstrated that the implemented transcutaneous power transmitter can track automatically into a varied resonance frequency according to arbitrary skin thickness change.

A Study on the Behavior of Floating Debris in a Flood Control Dam Using the Lagrangian Particle Traking Method (라그랑지안 입자 추적기법을 이용한 홍수조절용댐 내 부유쓰레기 거동 모의에 관한 연구)

  • Jang, Suk-Hwan;Oh, Kyoung-Doo;Oh, Ji-Hwan
    • Journal of Environmental Science International
    • /
    • v.25 no.9
    • /
    • pp.1253-1267
    • /
    • 2016
  • After large-scale flooding damage occurred along the Imjin river in 1996, 1998, and 1999, the Hantan river flood control dam was planned, and it has since been under construction. Unlike existing dams in Korea, the Hantan river flood control dam will remain fully open except during high floods, when the dam will store flood water temporarily to reduce flood peaks and flood water volume downstream. During past flooding seasons, floating debris has caused difficulties in the management of large-scale dams. Most of the existing multipurpose dams in Korea have installed nets to collect floating debris based on many years of experience with and data about inflow and distribution of floating debris in the dams. For the Hantan river flood control dam, however, collection of data about inflow and distribution of floating debris is not possible as the dam is located near the border area between North and South Korea. In order to devise a preliminary plan to collect floating debris in the Hantan river flood control dam, an EFDC hydrodynamic model was used to analyze the behavior of floating debris during high floods. The Lagrangian particle tracking method was utilized to simulate the behavior of floating debris in the dam. Based on the analysis of paths and final destinations of the particles, seven collection points were selected where it seemed to be effective to collect floating debris, as debris is likely to accumulate there in high density.

Real-time Responses Scheme to Protect a Computer from Offline Surrogate Users and Hackers (오프라인 대리사용자 및 해커로부터 특정 컴퓨터 보호를 위한 실시간 대응방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.313-320
    • /
    • 2019
  • One of the causes of many damage cases that occur today by hacking attack is social engineering attack. The attacker is usually a malicious traitor or an ignorant insider. As a solution, we are strengthening security training for all employees in the organization. Nevertheless, there are frequent situations in which computers are shared. In this case, the person in charge of the computer has difficulty in tracking and responding when a specific representative accessed and what a specific representative did. In this paper, we propose the method that the person in charge of the computer tracks in real time through the smartphone when a representative access the computer, when a representative access offline using hacked or shared authentication. Also, we propose a method to prevent the leakage of important information by encrypting and backing up important files of the PC through the smartphone in case of abnormal access.

Adaptive-length pendulum smart tuned mass damper using shape-memory-alloy wire for tuning period in real time

  • Pasala, Dharma Theja Reddy;Nagarajaiah, Satish
    • Smart Structures and Systems
    • /
    • v.13 no.2
    • /
    • pp.203-217
    • /
    • 2014
  • Due to the shift in paradigm from passive control to adaptive control, smart tuned mass dampers (STMDs) have received considerable attention for vibration control in tall buildings and bridges. STMDs are superior to tuned mass dampers (TMDs) in reducing the response of the primary structure. Unlike TMDs, STMDs are capable of accommodating the changes in primary structure properties, due to damage or deterioration, by tuning in real time based on a local feedback. In this paper, a novel adaptive-length pendulum (ALP) damper is developed and experimentally verified. Length of the pendulum is adjusted in real time using a shape memory alloy (SMA) wire actuator. This can be achieved in two ways i) by changing the amount of current in the SMA wire actuator or ii) by changing the effective length of current carrying SMA wire. Using an instantaneous frequency tracking algorithm, the dominant frequency of the structure can be tracked from a local feedback signal, then the length of pendulum is adjusted to match the dominant frequency. Effectiveness of the proposed ALP-STMD mechanism, combined with the STFT frequency tracking control algorithm, is verified experimentally on a prototype two-storey shear frame. It has been observed through experimental studies that the ALP-STMD absorbs most of the input energy associated in the vicinity of tuned frequency of the pendulum damper. The reduction of storey displacements up to 80 % when subjected to forced excitation (harmonic and chirp-signal) and a faster decay rate during free vibration is observed in the experiments.

Object Detection Based on Deep Learning Model for Two Stage Tracking with Pest Behavior Patterns in Soybean (Glycine max (L.) Merr.)

  • Yu-Hyeon Park;Junyong Song;Sang-Gyu Kim ;Tae-Hwan Jun
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.89-89
    • /
    • 2022
  • Soybean (Glycine max (L.) Merr.) is a representative food resource. To preserve the integrity of soybean, it is necessary to protect soybean yield and seed quality from threats of various pests and diseases. Riptortus pedestris is a well-known insect pest that causes the greatest loss of soybean yield in South Korea. This pest not only directly reduces yields but also causes disorders and diseases in plant growth. Unfortunately, no resistant soybean resources have been reported. Therefore, it is necessary to identify the distribution and movement of Riptortus pedestris at an early stage to reduce the damage caused by insect pests. Conventionally, the human eye has performed the diagnosis of agronomic traits related to pest outbreaks. However, due to human vision's subjectivity and impermanence, it is time-consuming, requires the assistance of specialists, and is labor-intensive. Therefore, the responses and behavior patterns of Riptortus pedestris to the scent of mixture R were visualized with a 3D model through the perspective of artificial intelligence. The movement patterns of Riptortus pedestris was analyzed by using time-series image data. In addition, classification was performed through visual analysis based on a deep learning model. In the object tracking, implemented using the YOLO series model, the path of the movement of pests shows a negative reaction to a mixture Rina video scene. As a result of 3D modeling using the x, y, and z-axis of the tracked objects, 80% of the subjects showed behavioral patterns consistent with the treatment of mixture R. In addition, these studies are being conducted in the soybean field and it will be possible to preserve the yield of soybeans through the application of a pest control platform to the early stage of soybeans.

  • PDF

The Temporal and Spatial Distribution Analysis of Red Tide using GIS (GIS를 이용한 적조의 시-공간적 분포 분석)

  • Jeong Jong-chul
    • Spatial Information Research
    • /
    • v.13 no.3 s.34
    • /
    • pp.253-260
    • /
    • 2005
  • The aim of this study is to analyze the temporal and spatial distribution aspects of red tide using GIS techniques. The damage caused by red tide appears various aspects according to the species, concentration and spatial distribution of red tide plankton. Therefore, in order to prevent the damage of red tide it is important to understand the distribution characteristics of red tide by each species according to time and space. In this perspective, we analyzed the beginning outbreak area, spatial occurrence frequency and spatial migration of red tide. The spatial data used by this study was constructed by digitizing the red tide quick report and coupled with various attributes such as species, concentration and water temperature for construction of red tide database. We used various spatial analysis methods such as union, intersect, tracking, buffer and spatial interpolation for analyzing temporal and spatial characteristics of red tide. From the result of these spatial analyses, we could get the spatial information on the temporal and spatial distribution characteristics of red tide at the Southern Sea.

  • PDF

A Study on the Countermeasures for Prevention of Opening a Fraud Account (사기이용계좌 개설 방지를 위한 대응방안 연구)

  • Kim, Chang Woo;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.173-179
    • /
    • 2015
  • Financial fraud such as phishing have passed several years from the occurrence, in spite of the widely known through the media, regardless of the social status or age, financial fraud has occurred on an ongoing basis, the damage is not reduced. The fraud account, the person who made the account, the user is different, it is possible to avoid tracking financial channel, and is used as a receiving means for fraud money of various crimes. Efforts of financial institutions and financial supervisory institutions, it has been promoted by preparing various measures for the eradication of fraud account so far been used as a means of financial crime, the proliferation of financial fraud, opening and distribution of fraud account is a receiving means for fraud money are also increasing continuously, it is necessary to take countermeasures. In spite of the continuous crackdown of financial institutions and financial supervisory institutions, it is causing serious damage to society, analyzes the current situation of fraud account, to present an effective and aggressive countermeasure of financial institutions in this paper.

An Overloaded Vehicle Identifying System based on Object Detection Model (객체 인식 모델을 활용한 적재 불량 화물차 탐지 시스템)

  • Jung, Woojin;Park, Jinuk;Park, Yongju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1794-1799
    • /
    • 2022
  • Recently, the increasing number of overloaded vehicles on the road poses a risk to traffic safety, such as falling objects, road damage, and chain collisions due to the abnormal weight distribution, and can cause great damage once an accident occurs. therefore we propose to build an object detection-based AI model to identify overloaded vehicles that cause such social problems. In addition, we present a simple yet effective method to construct an object detection model for the large-scale vehicle images. In particular, we utilize the large-scale of vehicle image sets provided by open AI-Hub, which include the overloaded vehicles. We inspected the specific features of sizes of vehicles and types of image sources, and pre-processed these images to train a deep learning-based object detection model. Also, we propose an integrated system for tracking the detected vehicles. Finally, we demonstrated that the detection performance of the overloaded vehicle was improved by about 23% compared to the one using raw data.