• Title/Summary/Keyword: Sun block

Search Result 644, Processing Time 0.032 seconds

Effects of Robot-assisted Therapy on Function of Upper Extremity in Stroke Patients (로봇보조(Robot-assisted) 치료가 뇌졸중 환자의 상지기능에 미치는 영향)

  • Hwang, Sun-Jung;Yoo, Doo-Han
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.3 no.1
    • /
    • pp.33-42
    • /
    • 2013
  • Objective : The purpose of this study is to assess effects of Robot-assisted therapy on function of upper extremity in stroke patients. Method : A total of 11 patients suffered from stroke participated in this study. Inpatients of 4 people and outpatients of 7 people divided by 12 months conducted Robot-assisted therapy for 5~6 weeks. Therapists selected appropriate exercise mode to patients, and patients Patients performed the reaching exercise was repeated with looking monitor provided 3-dimensional feedback. Before and after treatment of upper extremity functions was compare by Wolf Motor Function(K-WMFT), Box & Block Test(BBT), Dynamometer, average execution time. Result : Grip power, K-WMFT, BBT, average performance times were promoting in all subjects, and only showed statistically significant changes in outpatients. But outpatients did not show statistically significant changes in inpatients. Conclusion : Robotic-assisted therapy in stroke patients have a positive impact on upper extremity function that could confirm that. In the future, Robots-assisted therapy is expected to be useful for stroke patients in the area of occupational therapy.

  • PDF

Efficient Integer pel and Fractional pel Motion Estimation on H.264/AVC (H.264/AVC에서 효율적인 정화소.부화소 움직임 추정)

  • Yoon, Hyo-Sun;Kim, Hye-Suk;Jung, Mi-Gyoung;Kim, Mi-Young;Cho, Young-Joo;Kim, Gi-Hong;Lee, Guee-Sang
    • The KIPS Transactions:PartB
    • /
    • v.16B no.2
    • /
    • pp.123-130
    • /
    • 2009
  • Motion estimation (ME) plays an important role in digital video compression. But it limits the performance of image quality and encoding speed and is computational demanding part of the encoder. To reduce computational time and maintain the image quality, integer pel and fractional pel ME methods are proposed in this paper. The proposed method for integer pel ME uses a hierarchical search strategy. This strategy method consists of symmetrical cross-X pattern, multi square grid pattern, diamond patterns. These search patterns places search points symmetrically and evenly that can cover the overall search area not to fall into the local minimum and to reduce the computational time. The proposed method for fractional pel uses full search pattern, center biased fractional pel search pattern and the proposed search pattern. According to block sizes, the proposed method for fractional pel decides the search pattern adaptively. Experiment results show that the speedup improvement of the proposed method over Unsymmetrical cross Multi Hexagon grid Search (UMHexagonS) and Full Search (FS) can be up to around $1.2{\sim}5.2$ times faster. Compared to image quality of FS, the proposed method shows an average PSNR drop of 0.01 dB while showing an average PSNR gain of 0.02 dB in comparison to that of UMHexagonS.

An Efficient Page-Level Mapping Algorithm for Handling Write Requests in the Flash Translation Layer by Exploiting Temporal Locality (플래시 변환 계층에서 시간적 지역성을 이용하여 쓰기 요청을 처리하는 효율적인 페이지 레벨 매핑 알고리듬)

  • Li, Hai-Long;Hwang, Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1167-1175
    • /
    • 2016
  • This paper proposes an efficient page-level mapping algorithm that reduces the erase count in the FTL for flash memory systems. By maintaining the weight for each write request in the request buffer, the proposed algorithm estimates the degree of temporal locality for each incoming write request. To exploit temporal locality deliberately for determination of hot request, the degree of temporal locality should be much higher than the reference point determined experimentally. While previous LRU algorithm treats a new write request to have high temporal locality, the proposed algorithm allows write requests that are estimated to have high temporal locality to access hot blocks to store hot data intensively. The pages are more frequently updated in hot blocks than warm blocks. A hot block that has most of invalid pages is always selected as victim block at Garbage Collection, which results in delayed erase operation and in reduced erase count. Experimental results show that erase count is reduced by 9.3% for real I/O workloads, when compared to the previous LRU algorithm.

Real-time measurement of dentinal fluid flow during desensitizing agent application (상아질 지각과민 처치제의 적용 중에 일어나는 상아세관액 유동의 실시간 측정)

  • Kim, Sun-Young;Kim, Eun-Joo;Lee, In-Bog
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.5
    • /
    • pp.313-320
    • /
    • 2010
  • Objectives: The aim of this study was to examine changes in the dentinal fluid flow (DFF) during desensitizing agent application and to compare permeability after application among the agents. Materials and Methods: A Class 5 cavity was prepared to exposure cervical dentin on an extracted human premolar which was connected to a sub-nanoliter fluid flow measuring device (NFMD) under 20 cm water pressure. DFF was measured from before application of desensitizing agent (Seal&Protect, SP; SuperSeal, SS; BisBlock, BB; Gluma desensitizer, GL; Bi-Fluoride 12, BF) through application procedure to 5 min after application. Results: DFF rate after each desensitizing agent application was significantly reduced when compared to initial DFF rate before application (p < 0.05). SP showed a greater reduction in DFF rate than GL and BF did (p < 0.05). SS and BB showed a greater reduction in DFF rate than BF did (p < 0.05). Conclusions: Characteristic DFF aspect of each desensitizing agent was shown in NFMD during the application procedure.

Numerical Analysis of Flow Characteristies inside innes part of Fluid Control Valve System (유동해석을 통한 유체제어벨브 시스템의 내부 유동 특성 분석)

  • Son, Chang-Woo;Seo, Tae-Il;Kim, Kwang-Hee;Lee, Sun-Ryong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.160-166
    • /
    • 2018
  • The worldwide semi-conductor market has been growing for a long time. Manufacturing lines of semi-conductors need to handle several types of toxic gases. In particular, they need to be controlled accurately in real time. This type of toxic gas control system consists of many different kinds of parts, e.g., fittings, valves, tubes, filters, and regulators. These parts obviously need to be manufactured precisely and be corrosion resistant because they have to control high pressure gases for long periods without any leakage. For this, surface machining and hardening technologies of the metal block and metal gasket need to be studied. This type of study depends on various factors, such as geometric shapes, part materials, surface hardening method, and gas pressures. This paper presents strong concerns on a series of simulation processes regarding the differences between the inlet and outlet pressures considering several different fluid velocity, tube diameters, and V-angles. Indeed, this study will very helpful to determine the important design factors as well as precisely manufacture these parts. The EP (Electrolytic Polishing) process was used to obtain cleaner surfaces, and hardness tests were carried out after the EP process.

Development of Recognition Application of Facial Expression for Laughter Theraphy on Smartphone (스마트폰에서 웃음 치료를 위한 표정인식 애플리케이션 개발)

  • Kang, Sun-Kyung;Li, Yu-Jie;Song, Won-Chang;Kim, Young-Un;Jung, Sung-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.4
    • /
    • pp.494-503
    • /
    • 2011
  • In this paper, we propose a recognition application of facial expression for laughter theraphy on smartphone. It detects face region by using AdaBoost face detection algorithm from the front camera image of a smartphone. After detecting the face image, it detects the lip region from the detected face image. From the next frame, it doesn't detect the face image but tracks the lip region which were detected in the previous frame by using the three step block matching algorithm. The size of the detected lip image varies according to the distance between camera and user. So, it scales the detected lip image with a fixed size. After that, it minimizes the effect of illumination variation by applying the bilateral symmetry and histogram matching illumination normalization. After that, it computes lip eigen vector by using PCA(Principal Component Analysis) and recognizes laughter expression by using a multilayer perceptron artificial network. The experiment results show that the proposed method could deal with 16.7 frame/s and the proposed illumination normalization method could reduce the variations of illumination better than the existing methods for better recognition performance.

Convergence Study of Brain Activity by Dominant Hand Using functional near-infrared spectroscopy(fNIRS) (기능적 근적외선 분광법(fNIRS)을 이용한 우세손에 따른 뇌 활성화도에 대한 융합 연구)

  • Kim, Mi Kyeong;Park, Sun Ha;Park, Hae Yean
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.323-330
    • /
    • 2021
  • In this study, we intended to examine the difference in brain activation due to dominant and non-dominant hands using functional near-infrared spectroscopy(fNIRS) in 10 healthy adults. Box & Block Test(BBT) was conducted under two conditions: dominant hand and non-dominant hand. During the experiment, brain activity was measured using fNIRS and signals were analyzed using nirsLAB v2019.04 software after the experiment was completed. As a result, 6 out of 10 people showed activation of the cerebral hemisphere related to the dominant hand, and only 3 out of 10 people showed activation of the cerebral hemisphere related to the non-dominant hand. In other words, both dominant and non-dominant hand cconfirmed that the cerebral hemispheres related to dominant hands were more active. Therefore, it is believed that fNIRS can be used as a fundamental data applicable to children with sensory processing disorders that are difficult to identify dominant hand.

A 0.2V DC/DC Boost Converter with Regulated Output for Thermoelectric Energy Harvesting (열전 에너지 하베스팅을 위한 안정화된 출력을 갖는 0.2V DC/DC 부스트 변환기)

  • Cho, Yong-hwan;Kang, Bo-kyung;Kim, Sun-hui;Yang, Min-Jae;Yoon, Eun-jung;Yu, Chong-gun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.565-568
    • /
    • 2014
  • This paper presents a 0.2V DC/DC boost converter with regulated output for thermoelectric energy harvesting. To use low voltages from a thermoelectric device, a start-up circuit consisting of native NMOS transistors and resistors boosts an internal VDD, and the boosted VDD is used to operate the internal control block. When the VDD reaches a predefined value, a detector circuit makes the start-up block turn off to minimize current consumption. The final boosted VSTO is achieved by alternately operating the sub-boost converter for VDD and the main boost converter for VSTO according to the comparator outputs. When the VSTO reaches 2.4V, a buck converter starts to operate to generate a stabilized output VOUT. Simulation results shows that the designed converter generates a regulated 1.8V output from an input voltage of 0.2V, and its maximum power efficiency is 60%. The chip designed using a $0.35{\mu}m$ CMOS process occupies $1.1mm{\times}1.0mm$ including pads.

  • PDF

A System Recovery using Hyper-Ledger Fabric BlockChain (하이퍼레저 패브릭 블록체인을 활용한 시스템 복구 기법)

  • Bae, Su-Hwan;Cho, Sun-Ok;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.2
    • /
    • pp.155-161
    • /
    • 2019
  • Currently, numerous companies and institutes provide services using the Internet, and establish and operate Information Systems to manage them efficiently and reliably. The Information System implies the possibility of losing the ability to provide normal services due to a disaster or disability. It is preparing for this by utilizing a disaster recovery system. However, existing disaster recovery systems cannot perform normal recovery if files for system recovery are corrupted. In this paper, we proposed a system that can verify the integrity of the system recovery file and proceed with recovery by utilizing hyper-ledger fabric blockchain. The PBFT consensus algorithm is used to generate the blocks and is performed by the leader node of the blockchain network. In the event of failure, verify the integrity of the recovery file by comparing the hash value of the recovery file with the hash value in the blockchain and proceed with recovery. For the evaluation of proposed techniques, a comparative analysis was conducted based on four items: existing system recovery techniques and data consistency, able to data retention, recovery file integrity, and using the proposed technique, the amount of traffic generated was analyzed to determine whether it was actually applicable.

Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis (부정차분을 이용한 전력분석 공격의 효율 향상*)

  • Kang, Tae-Sun;Kim, Hee-Seok;Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.43-51
    • /
    • 2009
  • In 1998, Kocher et al. introduced Differential Power Attack on block ciphers. This attack allows to extract secret key used in cryptographic primitives even if these are executed inside tamper-resistant devices such as smart card. At FSE 2003 and 2004, Akkar and Goubin presented several masking methods, randomizing the first few and last few($3{\sim}4$) rounds of the cipher with independent random masks at each round and thereby disabling power attacks on subsequent inner rounds, to protect iterated block ciphers such as DES against Differential Power Attack. Since then, Handschuh and Preneel have shown how to attack Akkar's masking method using Differential Cryptanalysis. This paper presents how to combine Truncated Differential Cryptanalysis and Power Attack to extract the secret key from intermediate unmasked values and shows how much more efficient our attacks are implemented than the Handschuh-Preneel method in term of reducing the number of required plaintexts, even if some errors of Hamming weights occur when they are measured.