• Title/Summary/Keyword: header

Search Result 646, Processing Time 0.026 seconds

Artifacts in Digital Radiography (디지털 방사선 시스템에서 발생하는 Artifact)

  • Min, Jung-Whan;Kim, Jung-Min;Jeong, Hoi-Woun
    • Journal of radiological science and technology
    • /
    • v.38 no.4
    • /
    • pp.375-381
    • /
    • 2015
  • Digital Radiography is a big part of diagnostic radiology. Because uncorrected digital radiography image supported false effect of Patient's health care. We must be manage the correct digital radiography image. Thus, the artifact images can have effect to make a wrong diagnosis. We report types of occurrence by analyzing the artifacts that occurs in digital radiography system. We had collected the artifacts occurred in digital radiography system of general hospital from 2007 to 2014. The collected data had analyzed and then had categorize as the occurred causes. The artifacts could be categorized by hardware artifacts, software artifacts, operating errors, system artifacts, and others. Hardware artifact from a Ghost artifact that is caused by lag effect occurred most frequently. The others cases are the artifacts caused by RF noise and foreign body in equipments. Software artifacts are many different types of reasons. The uncorrected processing artifacts and the image processing error artifacts occurred most frequently. Exposure data recognize (EDR) error artifacts, the processing error of commissural line, and etc., the software artifacts were caused by various reasons. Operating artifacts were caused when the user didn't have the full understanding of the digital medical image system. System artifacts had appeared the error due to DICOM header information and the compression algorithm. The obvious artifacts should be re-examined, and it could result in increasing the exposure dose of the patient. The unclear artifact leads to a wrong diagnosis and added examination. The ability to correctly determine artifact are required. We have to reduce the artifact occurrences by understanding its characteristic and providing sustainable education as well as the maintenance of the equipments.

Analysis of Bending Performance of Built-up Beam Headers (목재 조립보 헤더의 휨 성능 분석)

  • Jang, Sang Sik;Kim, Yun Hui;Park, Young Ran
    • Journal of the Korean Wood Science and Technology
    • /
    • v.35 no.6
    • /
    • pp.118-125
    • /
    • 2007
  • To obtain design data for built-up beams used as headers in light-frame timber construction, three members of $2{\times}6$ ($38{\times}140 mm$), $2{\times}8$ ($38{\times}184 mm$), $2{\times}10$ ($38{\times}235 mm$) and $2{\times}12$ ($38{\times}286 mm$) were built up as specimens of bending tests. The bending strengths of built-up headers were obtained through bending tests of these specimens, and it was considered that span tables can be calculated for various loading conditions based on the bending strengths of built-up headers. The bending strengths of built-up headers were determined as the bending stresses at 10 mm deflection of specimens from the results of bending tests of built-up beam specimens. Span tables for built-up headers were considered to be obtained by assuming five loading conditions for headers used in exterior walls and two loading conditions for headers used in interior walls. Among these 7 loading conditions, 5 loading conditions applied to headers in exterior walls included dead loads, live loads and snow loads and 2 loading conditions applied to headers in interior walls included dead loads and live loads.

Automatic Generation of Snort Content Rule for Network Traffic Analysis (네트워크 트래픽 분석을 위한 Snort Content 규칙 자동 생성)

  • Shim, Kyu-Seok;Yoon, Sung-Ho;Lee, Su-Kang;Kim, Sung-Min;Jung, Woo-Suk;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.666-677
    • /
    • 2015
  • The importance of application traffic analysis for efficient network management has been emphasized continuously. Snort is a popular traffic analysis system which detects traffic matched to pre-defined signatures and perform various actions based on the rules. However, it is very difficult to get highly accurate signatures to meet various analysis purpose because it is very tedious and time-consuming work to search the entire traffic data manually or semi-automatically. In this paper, we propose a novel method to generate signatures in a fully automatic manner in the form of sort rule from raw packet data captured from network link or end-host. We use a sequence pattern algorithm to generate common substring satisfying the minimum support from traffic flow data. Also, we extract the location and header information of the signature which are the components of snort content rule. When we analyzed the proposed method to several application traffic data, the generated rule could detect more than 97 percentage of the traffic data.

Fast information extraction algorithm for object-based MPEG-4 conversion from MPEG-1,2 (MPEG-1,2로부터 객체 기반 MPEG-4 변환을 위한 고속 정보 추출 알고리즘)

  • 양종호;박성욱
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.91-102
    • /
    • 2004
  • In this paper, a fast information extraction algorithm for object-based MPEG-4 application from MPEG-1,2 is proposed. For object-based MPEG-4 conversion, we need to extract such information as object-image, shape-image, macro-block motion vector, and header information from MPEG-1,2 bit-stream. If we use the extracted information, fast conversion for object-based MPEG-4 is possible. The proposed object extraction algerian has two important steps, namely the motion vector extraction from MPEG-1,2 bit-stream and the watershed algerian The algorithm extracts objects using user's assistance in the intra frame and tracks then in the following inter frames. If we have an unsatisfactory result for a fast moving object the user can intervene to connect the segmentation. The proposed algorithm consist of two steps, which are intra frame object extracting processing and inter frame tracking processing. Object extracting process is the step in which user extracts a semantic object directly by using the block classification and watersheds. Object tracking process is the step of the following the object in the subsequent frames. It is based on the boundary fitting method using motion vector, object-mask and modified watersheds. Experimental results show that the proposed method can achieve a fast conversion from the MPEG-1,2 bit-stream to the object-based MPEG-4 input.

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.

A Design of SPI-4.2 Interface Core (SPI-4.2 인터페이스 코어의 설계)

  • 손승일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1107-1114
    • /
    • 2004
  • System Packet Interface Level 4 Phase 2(SPI-4.2) is an interface for packet and cell transfer between a physical layer(PHY) device and a link layer device, for aggregate bandwidths of OC-192 ATM and Packet Over Sonet/SDH(POS), as well as 10Gbps Ethernet applications. SPI-4.2 core consists of Tx and Rx modules and supports full duplex communication. Tx module of SPI-4.2 core writes 64-bit data word and 14-bit header information from the user interface into asynchronous FIFO and transmits DDR(Double Data Rate) data over PL4 interface. Rx module of SPI-4.2 core operates in vice versa. Tx and Rx modules of SPI-4.2 core are designed to support maximum 256-channel and control the bandwidth allocation by configuring the calendar memory. Automatic DIP4 and DIP-2 parity generation and checking are implemented within the designed core. The designed core uses Xilinx ISE 5.li tool and is described in VHDL Language and is simulated by Model_SIM 5.6a. The designed core operates at 720Mbps data rate per line, which provides an aggregate bandwidth of 11.52Gbps. SPI-4.2 interface core is suited for line cards in gigabit/terabit routers, and optical cross-connect switches, and SONET/SDH-based transmission systems.

600MW(e) CANDU PHTS Flow Instability and Interconnect Effect

  • Won Jae Lee;Jin Soo Kim;Goon Cherl Park
    • Nuclear Engineering and Technology
    • /
    • v.17 no.4
    • /
    • pp.290-301
    • /
    • 1985
  • 600MW(e) CANDU Primary Heat Transport System (PHTS) is composed of the two “figure-of-eight” loops and is designed to operate with the 4% Reactor Outlet Header (ROH) quality at its rated power. This existence of the two compressible regions and the positive flow-qualitly-void feedbacks are the sources of the PHTS flow instability. To ensure the PHTS stability, ROH-ROH interconnect pipes are installed as passive systems. This paper describes the investigation of the PHTS flow instability at its design full power condition. Also studied are the interconnect effect and the inherent system damping effect on the system stability. The time domain stability analyses are accessed by using the ATHER/MOD-I code which is the improved version of the KAERI developed ATHER code. Under the most adverse system modelling, the “figure-of-eight” symmetric loop shows divergent flow oscillations. Under with the interconnect, the PHTS stability is remarkably enhanced so that the system becomes stable. However, even under the conservative pressurizer modelling, the PHTS shows the more convergent flow oscillations. With the interconnect and the pressurizer modelling, its stability is highly credited. Conclusively, the inherent system damping by pressurizer itself can credit the PHTS stability without the interconnect.

  • PDF

Host Interface Design for TCP/IP Hardware Accelerator (TCP/IP Hardware Accelerator를 위한 Host Interface의 설계)

  • Jung, Yeo-Jin;Lim, Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2B
    • /
    • pp.1-10
    • /
    • 2005
  • TCP/IP protocols have been implemented in software program running on CPU in end systems. As the increased demand of fast protocol processing, it is required to implement the protocols in hardware, and Host Interface is responsible for communication between external CPU and the hardware blocks of TCP/IP implementation. The Host Interface follows AMBA AHB specification for the communication with external world. For control flow, the Host Interface behaves as a slave of AMBA AHB. Using internal Command/status Registers, the Host Interface receives commands from CPU and transfers hardware status and header information to CPU. On the other hand, the Host Interface behaves as a master for data flow. Data flow has two directions, Receive Flow and Transmit Flow. In Receive Flow, using internal RxFIFO, the Host Interface reads data from UDP FIFO or TCP buffer and transfers data to external RAM for CPU to read. For Transmit Flow, the Host Interface reads data from external RAM and transfers data to UDP buffer or TCP buffer through internal TxFIFO. TCP/IP hardware blocks generate packets using the data and transmit. Buffer Descriptor is one of the Command/Status Registers, and the information stored in Buffer Descriptor is used for external RAM access. Several testcases are designed to verify TCP/IP functions. The Host Interface is synthesized using the 0.18 micron technology, and it results in 173 K gates including the Command/status Registers and internal FIFOs.

Set Up and Operation for Medical Radiation Exposure Quality Control System of Health Promotion Center (건강검진센터의 의료방사선 피폭 품질관리 시스템 구축 운영 경험 보고)

  • Kim, Jung-Su;Jung, Hae-Kyoung;Kim, Jung-Min
    • Journal of radiological science and technology
    • /
    • v.39 no.1
    • /
    • pp.13-17
    • /
    • 2016
  • In this study, standard model of medical radiation dosage quality control system will be suggested and the useful of this system in clinical field will be reviewed. Radiation dosage information of modalities are gathered from digital imaging and communications in medicine(DICOM) standard data(such as DICOM dose SR and DICOM header) and stored in database. One CT scan, two digital radiography modalities and two mammography modalities in one health promotion center in Seoul are used to derive clinical data for one month. After 1 months research with 703 CT scans, the study shows CT $357.9mGy{\cdot}cm$ in abdomen and pelvic CT, $572.4mGy{\cdot}cm$ in brain without CT, $55.9mGy{\cdot}cm$ in calcium score/heart CT, screening CT at $54mGy{\cdot}cm$ in chest screening CT(low dose screening CT scan), $284.99mGy{\cdot}cm$ in C-spine CT and $341.85mGy{\cdot}cm$ in L-spine CT as health promotion center reference level of each exam. And with 1955 digital radiography cases, it shows $274.0mGy{\cdot}cm2$ and for mammography 6.09 mGy is shown based on 536 cases. The use of medical radiation shall comply with the principles of justification and optimization. This quality management of medical radiation exposure must be performed in order to follow the principle. And the procedure to reduce the radiation exposure of patients and staff can be achieved through this. The results of this study can be applied as a useful tool to perform the quality control of medical radiation exposure.

An Active Queue Management Algorithm Based on the Temporal Level for SVC Streaming (SVC 스트리밍을 위한 시간 계층 기반의 동적 큐 관리 알고리즘)

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.425-436
    • /
    • 2009
  • In recent years, the user demands have increased for multimedia service of high quality over the broadband convergence network. These rising demands for high quality multimedia service led the popularization of various user terminals and large scale display equipments, which needs a variety type of QoS (Quality of Service). In order to support demands for QoS, numerous research projects are in progress both from the perspective of network as well as end system; For example, at the network perspective, QoS guaranteeing by improving of internet performance such as Active Queue Management, while at the end system perspective, SVC (Scalable Video Coding) encoding scheme to guarantee media quality. However, existing AQM algorithms have problems which do not guarantee QoS, because they did not consider the essential characteristics of video encoding schemes. In this paper, it is proposed to solve this problem by deploying the TS- AQM (Temporal Scalability Active Queue Management) which employs the differentiated packet dropping for dependency of the temporal level among the frames, based on SVC encoding characteristics by exploiting the TID (Temporal ID) field of the SVC NAL unit header. The proposed TS-AQM guarantees multimedia service quality through video decoding reliability for SVC streaming service, by differentiated packet dropping when congestion exists.