• Title/Summary/Keyword: Reconstruction of laboratory

Search Result 179, Processing Time 0.024 seconds

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

Compromised extraction sockets: a new classification and prevalence involving both soft and hard tissue loss

  • Kim, Jung-Ju;Amara, Heithem Ben;Chung, Inna;Koo, Ki-Tae
    • Journal of Periodontal and Implant Science
    • /
    • v.51 no.2
    • /
    • pp.100-113
    • /
    • 2021
  • Purpose: Previous studies have solely focused on fresh extraction sockets, whereas in clinical settings, alveolar sockets are commonly associated with chronic inflammation. Because the extent of tissue destruction varies depending on the origin and the severity of inflammation, infected alveolar sockets may display various configurations of their remaining soft and hard tissues following tooth extraction. The aim of this study was to classify infected alveolar sockets and to provide the appropriate treatment approaches. Methods: A proposed classification of extraction sockets with chronic inflammation was developed based upon the morphology of the bone defect and soft tissue at the time of tooth extraction. The prevalence of each type of the suggested classification was determined retrospectively in a cohort of patients who underwent, between 2011 and 2015, immediate bone grafting procedures (ridge preservation/augmentation) after tooth extractions at Seoul National University Dental Hospital. Results: The extraction sockets were classified into 5 types: type I, type II, type III, type IV (A & B), and type V. In this system, the severity of bone and soft tissue breakdown increases from type I to type V, while the reconstruction potential and treatment predictability decrease according to the same sequence of socket types. The retrospective screening of the included extraction sites revealed that most of the sockets assigned to ridge preservation displayed features of type IV (86.87%). Conclusions: The present article classified different types of commonly observed infected sockets based on diverse levels of ridge destruction. Type IV sockets, featuring an advanced breakdown of alveolar bone, appear to be more frequent than the other socket types.

Deep Learning: High-quality Imaging through Multicore Fiber

  • Wu, Liqing;Zhao, Jun;Zhang, Minghai;Zhang, Yanzhu;Wang, Xiaoyan;Chen, Ziyang;Pu, Jixiong
    • Current Optics and Photonics
    • /
    • v.4 no.4
    • /
    • pp.286-292
    • /
    • 2020
  • Imaging through multicore fiber (MCF) is of great significance in the biomedical domain. Although several techniques have been developed to image an object from a signal passing through MCF, these methods are strongly dependent on the surroundings, such as vibration and the temperature fluctuation of the fiber's environment. In this paper, we apply a new, strong technique called deep learning to reconstruct the phase image through a MCF in which each core is multimode. To evaluate the network, we employ the binary cross-entropy as the loss function of a convolutional neural network (CNN) with improved U-net structure. The high-quality reconstruction of input objects upon spatial light modulation (SLM) can be realized from the speckle patterns of intensity that contain the information about the objects. Moreover, we study the effect of MCF length on image recovery. It is shown that the shorter the fiber, the better the imaging quality. Based on our findings, MCF may have applications in fields such as endoscopic imaging and optical communication.

Genetic Diversity of Toxoplasma gondii Strains from Different Hosts and Geographical Regions by Sequence Analysis of GRA20 Gene

  • Ning, Hong-Rui;Huang, Si-Yang;Wang, Jin-Lei;Xu, Qian-Ming;Zhu, Xing-Quan
    • Parasites, Hosts and Diseases
    • /
    • v.53 no.3
    • /
    • pp.345-348
    • /
    • 2015
  • Toxoplasma gondii is a eukaryotic parasite of the phylum Apicomplexa, which infects all warm-blood animals, including humans. In the present study, we examined sequence variation in dense granule 20 (GRA20) genes among T. gondii isolates collected from different hosts and geographical regions worldwide. The complete GRA20 genes were amplified from 16 T. gondii isolates using PCR, sequence were analyzed, and phylogenetic reconstruction was analyzed by maximum parsimony (MP) and maximum likelihood (ML) methods. The results showed that the complete GRA20 gene sequence was 1,586 bp in length among all the isolates used in this study, and the sequence variations in nucleotides were 0-7.9% among all strains. However, removing the type III strains (CTG, VEG), the sequence variations became very low, only 0-0.7%. These results indicated that the GRA20 sequence in type III was more divergence. Phylogenetic analysis of GRA20 sequences using MP and ML methods can differentiate 2 major clonal lineage types (type I and type III) into their respective clusters, indicating the GRA20 gene may represent a novel genetic marker for intraspecific phylogenetic analyses of T. gondii.

Preliminary Test of Forensic Identification Bloodstain Using Guaiac Mixture and It's Effect on Genetic Analysis (Gum guaiac 혼합물을 이용한 혈흔검출 예비시험의 평가와 혈흔의 유전자 분석에 미치는 효과)

  • Lim, Chae-Won;Kim, Yang-Ho;Kim, Jin-Gak
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.42 no.1
    • /
    • pp.22-31
    • /
    • 2010
  • The most common sources of biological trace material which are found in crime scene are the human bloodstains. Reliable identification in the forensic casework is important as it provides crucial insights into crime scene reconstruction and can thus contribute towards solving crimes. Blood-stains are routinely tested in forensic practise using various methods including the leucomalachite green (LMG) test, Kastle-Meyer phenolphthalein test, tetramethylbenzidine test, orthotolidine test, or the luminol chemoluminescence test with the latter cleaning attempts. All these presumptive thus indicative but not identifying tests take advantage of the peroxidase-like activity of the heme unit of the hemoglobin molecule in human blood. Therefore, false-positive results can be caused by the presence of strong oxidants, such as chlorine-containing detergents or by true peroxidases (e.g., from plants). In this study, composition for Gum guaiac was evaluated for the forensic identification of bloodstain and compared with the LMG. The sensitivity and specificity of the composition for Gum guaiac were examined more stable in bloodstain. The positive of Composition for Gum guaiac shown even with the 100,000-fold diluted bloodstain, which was no difference in comparison with LMG test. It was shown that composition for Gum guaiac was very stable to resist boiling for 20 minutes and the effect of bacteria did not affect the genetic analysis as well. The above result of the crime scene investigation, composition for Gum guaiac is easily expected to help identifying bloodstain in the evidences.

  • PDF

Numerical analysis of the thermal behaviors of cellular concrete

  • She, Wei;Zhao, Guotang;Yang, Guotao;Jiang, Jinyang;Cao, Xiaoyu;Du, Yi
    • Computers and Concrete
    • /
    • v.18 no.3
    • /
    • pp.319-336
    • /
    • 2016
  • In this study, both two- and three-dimensional (2D and 3D) finite-volume-based models were developed to analyze the heat transfer mechanisms through the porous structures of cellular concretes under steady-state heat transfer conditions and to investigate the differences between the 2D and 3D modeling results. The 2D and 3D reconstructed pore networks were generated from the microstructural information measured by 3D images captured by X-ray computerized tomography (X-CT). The computed effective thermal conductivities based on the 2D and 3D calculations performed on the reconstructed porous structures were found to be nearly identical to those evaluated from the 2D cross-sectional images and the 3D X-CT images, respectively. In addition, the 3D computed effective thermal conductivity was found to agree better with the measured values, in comparison with the 2D reconstruction and real cross-sectional images. Finally, the thermal conductivities computed for different reconstructed porous 3D structures of cellular concretes were compared with those obtained from 2D computations performed on 2D reconstructed structures. This comparison revealed the differences between 2D and 3D image-based modeling. A correlation was thus derived between the results of the 3D and 2D models.

A well-balanced PCCU-AENO scheme for a sediment transport model

  • Ndengna, Arno Roland Ngatcha;Njifenjou, Abdou
    • Ocean Systems Engineering
    • /
    • v.12 no.3
    • /
    • pp.359-384
    • /
    • 2022
  • We develop in this work a new well-balanced preserving-positivity path-conservative central-upwind scheme for Saint-Venant-Exner (SVE) model. The SVE system (SVEs) under some considerations, is a nonconservative hyperbolic system of nonlinear partial differential equations. This model is widely used in coastal engineering to simulate the interaction of fluid flow with sediment beds. It is well known that SVEs requires a robust treatment of nonconservative terms. Some efficient numerical schemes have been proposed to overcome the difficulties related to these terms. However, the main drawbacks of these schemes are what follows: (i) Lack of robustness, (ii) Generation of non-physical diffusions, (iii) Presence of instabilities within numerical solutions. This collection of drawbacks weakens the efficiency of most numerical methods proposed in the literature. To overcome these drawbacks a reformulation of the central-upwind scheme for SVEs (CU-SVEs for short) in a path-conservative version is presented in this work. We first develop a finite-volume method of the first order and then extend it to the second order via the averaging essentially non oscillatory (AENO) framework. Our numerical approach is shown to be well-balanced positivity-preserving and shock-capturing. The resulting scheme could be seen as a predictor-corrector method. The accuracy and robustness of the proposed scheme are assessed through a carefully selected suite of tests.

Analysis of Skin Movements with Respect to Bone Motions using MR Images

  • Ryu, Jae-Hun;Miyata, Natsuki;Kouchi, Makiko;Mochimaru, Masaaki;Lee, Kwan H.
    • International Journal of CAD/CAM
    • /
    • v.3 no.1_2
    • /
    • pp.61-66
    • /
    • 2003
  • This paper describes a novel experiment that measures skin movement with respect to the flexional motion of a hand. The study was based on MR images in conjunction with CAD techniques. The MR images of the hand were captured in 3 different postures with surface markers. The surface markers attached to the skin where employed to trace skin movement during the flexional motion of the hand. After reconstructing 3D isosurfaces from the segmented MR images, the global registration was applied to the 3D models based on the particular bone shape of different postures. Skin movement was interpreted by measuring the centers of the surface markers in the registered models.

All kinds of singularity avoidance in redundant manipulators for autonomous manipulation

  • Kim, Jin-Hyun;Marani, Giacomo;Chung, Wan-Kyun;Yuh, Jun-Ku
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1587-1592
    • /
    • 2003
  • There are three kinds of singularity in controlling redundant manipulators. Kinematic, algorithmic and representation singularities are those. If manipulators fall into any singularity without proper action to avoid it, the control system must go away from our desire, and we can meet a dangerous situation. Hence, we have to deal the singularities very carefully. In this paper, we describe an on-line solution for avoiding the occurrence of both algorithmic and kinematic singularities in task-priority based kinematic controllers of robotic manipulators. Representation singularity can be easily avoided by using proper representation algorithm, so, in this paper, we only consider kinematic and algorithmic singularities. The proposed approach uses a desired task reconstruction and a successive task projection in order to maintain the measure for singularity over a user defined minimum value. It shows a gain in performance and a better task error especially when working in proximity of singular configurations. It is particularly suitable for autonomous systems where an off-line trajectory control scheme is often not applicable. The advantage and performance of the proposed controller is verified by simulation works. And, the experiment with real manipulator is remaining for the future works.

  • PDF

Analytical solution of seismic stability against overturning for a rock slope with water-filled tension crack

  • Zhang, Yanjun;Nian, Tingkai;Zheng, Defeng;Zheng, Lu
    • Geomechanics and Engineering
    • /
    • v.11 no.4
    • /
    • pp.457-469
    • /
    • 2016
  • Steep rock slope with water-filled tension crack will happen to overturn around the toe of the slope under seismic loading. This failure type is completely different from the common toppling failure occurring in anti-dipping layered rock mass slopes with steeply dipping discontinuities. This paper presents an analytical approach to determine the seismic factor of safety against overturning for an intact rock mass slope with water-filled tension crack considering horizontal and vertical seismic coefficients. This solution is a generalized explicit expression and is derived using the moment equilibrium approach. A numerical program based on discontinuous deformation analysis (DDA) is adopted to validate the analytical results. The parametric study is carried out to adequately investigate the effect of horizontal and vertical seismic coefficients on the overall stability against overturning for a saturated rock slope under two water pressure modes. The analytical results show that vertically upward seismic inertia force or/and second water pressure distribution mode will remarkably decrease the slope stability against overturning. Finally, several representative design charts of slopes also are presented for the practical application.