• 제목/요약/키워드: ghost

Search Result 372, Processing Time 0.026 seconds

Ghost cell odontogenic carcinoma on right mandible and its respective surgical reconstruction: a case report

  • Park, Sang Yoon;Park, Joonhyoung;Kwon, Do Hyun;Jeon, Jae ho;Kim, Soung Min;Myoung, Hoon;Lee, Jong Ho
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.43 no.6
    • /
    • pp.415-422
    • /
    • 2017
  • Calcifying cystic odontogenic tumor (CCOT) is defined as an odontogenic cyst-like benign neoplasm that characteristically contains several ghost cells, ameloblastoma-like epithelium, and occasional calcification. Ghost cell odontogenic carcinoma (GCOC), a malignant form of CCOT, is an exceptionally rare malignant tumor. In this report, we present a case of a 53-year-old man whose chief complaint was a solitary mass on the right mandible area. The mass was completely removed through an extraoral surgical approach and reconstructive surgery was performed in two phases.

A Robust Method of Capturing Ghost Canceling Reference (강인한 고스트제거기준신호 포획방법)

  • 권성재;정창진
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.76-79
    • /
    • 2002
  • Ghost cancelers need to accurately estimate the distortions suffered by transmitted signals on their way to receivers by capturing ghost canceling reference signals in the vertical blanking interval. As ghosts become much severer, sync separation tends to malfunction, making it impossible to acquire measurement data for channel estimation. This paper presents a robust method of acquiring ghost data using their correlation properties, and evaluates its performance through computer simulation. The reference signals are inserted in such a manner that the polarity alternates from one frame to another to remove color bursts and sync signals, and to increase the signal-to-noise ratio as well. As a result, however, they are prone to timing jitters. So a simple yet effective method is proposed that can correct for even fractional time delays. The timing errors are found to be less than about 4% of the sample spacing.

  • PDF

Fast Noise Reduction Approach in Multifocal Multiphoton Microscopy Based on Monte-Carlo Simulation

  • Kim, Dongmok;Shin, Younghoon;Kwon, Hyuk-Sang
    • Current Optics and Photonics
    • /
    • v.5 no.4
    • /
    • pp.421-430
    • /
    • 2021
  • The multifocal multiphoton microscopy (MMM) enables high-speed imaging by the concurrent scanning and detection of multiple foci generated by lenslet array or diffractive optical element. The MMM system mainly suffers from crosstalk generated by scattered emission photons that form ghost images among adjacent channels. The ghost image which is a duplicate of the image acquired in sub-images significantly degrades overall image quality. To eliminate the ghost image, the photon reassignment method was established using maximum likelihood estimation. However, this post-processing method generally takes a longer time than image acquisition. In this regard, we propose a novel strategy for rapid noise reduction in the MMM system based upon Monte-Carlo (MC) simulation. Ballistic signal, scattering signal, and scattering noise of each channel are quantified in terms of photon distribution launched in tissue model based on MC simulation. From the analysis of photon distribution, we successfully eliminated the ghost images in the MMM sub-images. If the priori MC simulation under a certain optical condition is established at once, our simple, but robust post-processing technique will continuously provide the noise-reduced images, while significantly reducing the computational cost.

Ghost cell odontogenic carcinoma: A case report

  • Panprasit, Wariya;Lappanakokiat, Napas;Kunmongkolwut, Sumana;Phattarataratip, Ekarat;Rochchanavibhata, Sunisa;Sinpitaksakul, Phonkit;Cholitgul, Wichitsak
    • Imaging Science in Dentistry
    • /
    • v.51 no.2
    • /
    • pp.203-208
    • /
    • 2021
  • Ghost cell odontogenic carcinoma (GCOC) is a rare malignant neoplasm characterized by the presence of ghost cells. It is considered to originate from either a calcifying odontogenic cyst(COC) or a dentinogenic ghost cell tumor(DGCT). Its clinical and radiographic characteristics are non-specific, including slow growth, locally aggressive behavior, and eventual metastasis. This case report describes a 43-year-old Thai man with plain radiographs and cone-beam computed tomographic images revealing a unilocular radiolucency with non-corticated borders surrounding an impacted left canine associated with radiopaque foci around the cusp tip. Based on the microscopic findings, the lesion was diagnosed as GCOC. Partial maxillectomy of the right maxilla was performed, and radiotherapy was administered. An obturator was made to support masticatory functions Three years later, the lesion showed complete bone remodeling and no signs of recurrence, and long-term follow-up was done regularly.

Removal Method of Signal Interference between Ultrasound Sensors (초음파 센서 간 신호 간섭 제거 방법)

  • Im, Hyungchul;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.584-590
    • /
    • 2021
  • This paper proposes a removal method of signal interference between ultrasound sensors where ghost signals due to interference are excluded and correct signal is recognized in distance mensurement using ultrasound sensors. The proposed method detects and excludes ghost signals when previous measured distance is compared to current measured distance and the distance difference exceeds a threshold. The threshold is fixed in conventional methods, so ghost signals cannot be correctly excluded when ultrasound sensor or target object move rapidly. On the contrary, to improve accuracy, the threshold is not fixed in the proposed method, and the threshold is adpatively determined based on the relative velocity when ultrasound sensor or target object move. Experiments of distance measurement with ultrasound signal interference are carried out where multiple ultrasound sensors of same type are exploited with maximum interference, and the results show that the proposed method efficiently exclude ghost signals.

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

  • Leihong, Zhang;Yang, Wang;Hualong, Ye;Runchu, Xu;Dawei, Zhang
    • Current Optics and Photonics
    • /
    • v.5 no.6
    • /
    • pp.686-698
    • /
    • 2021
  • A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.

Marina Carr's By the Bog of Cats... : Hester's Becoming-Ghost (마리나 카의 『고양이 늪』 -헤스터의 유령-되기)

  • Chung, Moonyoung
    • Journal of English Language & Literature
    • /
    • v.58 no.1
    • /
    • pp.69-91
    • /
    • 2012
  • Marina Carr's By the Bog of Cats.... (1998) is the last play of the trilogy of "the midlands plays" which can be regarded as her re-writing of both Euripides' Medea and J. M. Synge's The Playboy of the Western World by resetting the two plays in the midlands of contemporary Ireland. Carr intends to courageously explore into the dangerous liminal space, i.e., the middle between the past and the present, the high Greek and the Irish folk culture, dealing with the ghosts of the dead writers for her own Irish feminist theatre. Thus, in the middle Carr can build a new Irish theatre by minorating and abjecting the Greek tragedy and subverting and expanding Synge's theatre of grotesque realism. This paper attempts to read By the Bog of Cats... as Carr's final project of exploration into the midland of Ireland to establish a new Irish feminist theatre and at the same time a new Irish folk theatre. By focusing on her strategies of minoration and subversion through grotesque imagery and carnival rituals it argues that Carr put Hester's becoming-ghost in the middle, the bog of the cats as both grave and womb, waiting for the birth of a new Irish people. And it emphasizes that the ghost of Hester, merging with the ghosts of her mother and daughter by the bog of cats will haunt the official society as a threatening abjection, challenging the restoration of the social order.

Enhanced Equidistant Chosen Message Power Analysis of RSA-CRT Algorithm (RSA-CRT의 향상된 등간격 선택 평문 전력 분석)

  • Park, Jong-Yeon;Han, Dong-Guk;Yi, Ok-Yeon;Choi, Doo-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.2
    • /
    • pp.117-126
    • /
    • 2011
  • RSA-CRT algorithm is widely used to improve the performance of RSA algorithm. However, it is also vulnerable to side channel attacks like as general RSA. One of the power attacks on RSA-CRT, proposed by Boer et al., is a power analysis which utilizes reduction steps of RSA-CRT algorithm with equidistant chosen messages, called as ECMPA(Equidistant Chosen Messages Power Analysis) or MRED(Modular Reduction on Equidistant Data) analysis. This method is to find reduction output value r=xmodp which has the same equidistant patterns as equidistant messages. One can easily compute secret prime p from exposure of r. However, the result of analysis from a reduction step in [5] is remarkably different in our experiment from what Boer expected in [5]. Especially, we found that there are Ghost key patterns depending on the selection of attack bits and selected reduction algorithms. Thus, in this paper we propose several Ghost key patterns unknown to us until now, then we suggest enhanced and detailed analyzing methods.

A study on Detecting a Ghost-key using Additional Coating at the Membrane type Keyboard) (코팅 추가에 의한 멤브레인 키보드에서의 고스트-키 검출에 관한 연구)

  • Lee, HyunChang;Lee, MyungSeok
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.56-63
    • /
    • 2016
  • This paper presents a novel method for detecting a ghost key at the membrane type keyboard, which has additional resistive coating to the membrane film. Also, the optimal ratio of resistances for detecting a ghost key was designed based on the characteristics of the membrane film. The optimal ratio of resistances was considered to be able to detect the worst case (i.e., difference voltage between normal key and ghost key is minimum). The ability of the proposed methods are evaluated by simulation studies in this paper. In order to verify the proposed method, the experiment was carried out with a designed circuit and A/D (analog to digital) in MCU (micro controller unit). The proposed method is implemented into the membrane type keyboard and is verified by experimental results.

Quorum Consensus Method based on Ghost using Simplified Metadata (단순화된 메타데이타를 이용한 고스트 기반 정족수 동의 기법의 개선)

  • Cho, Song-Yean;Kim, Tai-Yun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.1
    • /
    • pp.34-43
    • /
    • 2000
  • Replicated data that is used for fault tolerant distributed system requires replica control protocol to maintain data consistency. The one of replica control protocols is quorum consensus method which accesses replicated data by getting majority approval. If site failure or communication link failure occurs and any one can't get quorum consensus, it degrades the availability of data managed by quorum consensus protocol. So it needs for ghost to replace the failed site. Because ghost is not full replica but process which has state information using meta data, it is important to simplify meta data. In order to maintain availability and simplify meta data, we propose a method to use cohort set as ghost's meta data. The proposed method makes it possible to organize meta data in 2N+logN bits and to have higher availability than quorum consensus only with cohort set and dynamic linear voting protocol. Using Markov model we calculate proposed method's availability to analyze availability and compare it with existing protocols.

  • PDF