• Title/Summary/Keyword: A-Scan

Search Result 4,773, Processing Time 0.029 seconds

The Significance of $^{99m}Technetium$ Dimercaptosuccinic Acid(DMSA) Scan as a Substitute for Voiding Cystourethrography(VCUG) in Evaluating Children with first Febrile Urinary Tract Infection (생애 첫 발열성 요로 감염 환아에 대한 평가에서 배뇨성 방광 요도 조영술을 대체하기 위한 검사로서 $^{99m}technetium$ dimercaptosuccinic acid(DMSA) scan의 의의)

  • Han, Seung-Beom;Ko, Yong-Min;Lee, Sue-Young;Jeong, Dae-Chul;Kang, Jin-Han;Lee, Kyung-Yeon;Uhm, Mee-Ryung;Kim, Woong-Heum;Kim, Jung-Sue
    • Childhood Kidney Diseases
    • /
    • v.11 no.2
    • /
    • pp.220-228
    • /
    • 2007
  • Purpose : We studied the value of clinical signs, laboratory findings and $^{99m}technetium$ dime-rcaptosuccinic acid(DMSA) scan in predicting the presence of vesicoureteral reflux(VUR) in children with first febrile urinary tract infection(UTI). Methods : A retrospective analysis of 84 hospitalized children with first febrile UTI was performed. They underwent DMSA scan and voiding cystourethrography(VCUG) during the acute phase, and were divided into three groups according to the results of the VCUG: absence of VUR, mild(grade I-II) and severe VUR(grade III-V). We studied the relation of VUR to age, gender, fever duration, causative organism, white blood cell count, serum C-reactive protein and result of DMSA scan. Results : Among 84 patients, 6 had mild and 17 had severe VUR. Thirty-eight had abnormal DMSA scan. results Patients with VUR were older than those without VUR(P<0.01). There was a lower probability of infection with Escherichia coli in patients with severe VUR than in those with mild and absent VUR(P<0.01). An abnormal DMSA scan correlated with the presence and severity of VUR(P<0.05). Severe VUR was present in 10.9% of patients with normal DMSA scan. The sensitivity, specificity, positive and negative predictive values of the DMSA scan in predicting the presence of VUR were 69.6%, 63.9%, 42.1%, and 84.8%, respectively. Conclusion : An abnormal DMSA scan correlated to the presence and severity of VUR, but the sensitivity, specificity and positive predictive value of the DMSA scan were low. There-fore, patient with an abnormal DMSA scan requires a VCUG. In order to prevent missing the 10.9% of patients with severe VUR but normal DMSA scans, a VCUG should be performed in patient with normal DMSA scan.

  • PDF

The Fabricating and Utilizing of the Transmission Scan Tool for I-131 Whole Body Scan (I-131 전신 스캔을 위한 Transmission Scan Tool 제작과 활용)

  • Shin, Chae-Ho;Pyo, Sung-Jai;Kim, Bong-Su;Cho, Yong-Gyi;Jo, Jin-Woo;Kim, Chang-Ho
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.13 no.1
    • /
    • pp.40-46
    • /
    • 2009
  • Purpose: A whole body scan using a radioactive iodine (I-131) for the patients with differentiated thyroid cancer is generally an useful method to detect the remnant thyroid tissue, recurred lesion or metastasis lesion after a surgery. The high dose treatment using the radioactive iodine recently tends to increase, and a hospitalization wait for the treatment has been delayed for several months. In this hospital, the treatable patients per week were increased in number through expanding a water-purifier tank and the examination time also increased as the I-131 whole body scan patients increased. Improvement for this problem, this research reduce the existing examination time and classifying the lesion's exact position intended to by fabricating and utilizing the transmission scan tool and an excellent resolution for whole body imaging. Materials and Methods: After conducting the whole body scan for patients who visited the department from February to July 2008 and received the I-131 whole body scan using the ORBITER Gamma Camera. A rail was installed in the examination table for the transmission scan for show a contour of surface area and then the transmission image was obtained and fused to the whole body scan through fabricating the tool to put a flood phantom of diluted 2 mCi $^{99m}Tc$-pertechnetate. Results: Fused image of I-131 whole body scan and the transmission scan had the excellent resolution to discriminate an oral cavity or salivary gland region, neck region's lesion, and metastasis region's position through a simple marking, and could reduce the examination time of 8~28 minutes because without the additional local image. Conclusions: In I-131 whole body scan, the transmission scan can accurately show a contour of surface area through the attenuation of radioactivity, and is useful to indicate the remnant thyroid tissue or metastasis lesion's position by improving the resolution through the fusion image with alreadyexecuted I-131 whole body scan. Also, because the additional local image is not necessary, it can reduce the time required for the examination. It will extensively apply to other clinical examinations to be helpful for identifying an anatomical position because it shows the contour of surface area.

  • PDF

BIM Model Generation at Building Level using Automated Scan-to-BIM Process - Focused on Demonstration of BIM Modeling for Gangwon Fire Service Academy - (Scan-to-BIM 자동화 기술을 활용한 건축물 단위의 BIM 모델 생성 - 강원소방학교 BIM 모델링 실증을 중심으로 -)

  • Park, Jun-Woo;Kim, Jae-Hong;Kim, So-Hyun;Lee, Ji-Min;Choi, Chang-Soon;Jeong, Kwang-Bok;Lee, Jae-Wook
    • Journal of KIBIM
    • /
    • v.11 no.4
    • /
    • pp.53-62
    • /
    • 2021
  • The successful implementation of Scan-to-BIM automation depends on the entire process from scanning of buildings, including indoor facilities and furniture, to generating BIM models. However, the conventional Scan-to-BIM process requires a lot of time, manpower, and cost for the manual generation of BIM models including indoor objects. To solve this problem, this study applied a Scan-to-BIM automation process using a deep learning model and parametric algorithm to an existing building, Kangwon Fire Service Academy. To improve the accuracy of the BIM model, after object data was extracted from the scan data, the data was corrected according to actual object-specific conditions. As a result, the accuracy of the BIM model created by the proposed Scan-to-BIM automation process was 91% compared to the actual area of the construction drawings. In addition, it was confirmed that the BIM objects were automatically generated for 10 object classes.

The effect of the improperly scanned scan body images on the accuracy of virtual implant positioning in computer-aided design software

  • Park, Se-Won;Choi, Yong-Do;Lee, Du-Hyeong
    • The Journal of Advanced Prosthodontics
    • /
    • v.12 no.3
    • /
    • pp.107-113
    • /
    • 2020
  • PURPOSE. The aim of this study was to examine the importance of the defect-free scanning of a scan body by assessing the accuracy of virtual implant positioning in computer-aided design (CAD) software when the scan body image is improperly scanned. MATERIALS AND METHODS. A scan body was digitized in a dentiform model using an intraoral scanner, and scanned images with differing levels of image deficiency were generated: 5%, 10%, and 15% deficiency in the flat or rounded area. Using a best-fit image matching algorithm on each of the deficient scan body images, corresponding virtual implants were created. The accuracy of the implant position was evaluated by comparing the linear and angular discrepancies between the actual and virtual positions of the implant. Kruskal-Wallis tests and Mann-Whitney U tests with Bonferroni correction were used to determine the statistical differences among the seven scanned image deficiency groups (α=.05). RESULTS. In general, the linear and angular discrepancies of the implant position in the software increased as the deficiency of the scan body images increased. A 15% scan body image deficiency generated larger discrepancies than deficiency of 5% and 10%. The difference of scan defect position, flat or rounded area, did not affect the accuracy of virtual implant orientation at 5% and 10% deficiency level, but did affect the accuracy at 15% deficiency level. CONCLUSION. Deficiencies in the scanned images of a scan body can decrease the accuracy of the implant positioning in CAD software when the defect is large, thus leading to the incorrect fabrication of implant prostheses.

Computerized occlusal analysis: correlation with occlusal indexes to assess the outcome of orthodontic treatment or the severity of malocculusion

  • Lee, Sang-Min;Lee, Jin-Woo
    • The korean journal of orthodontics
    • /
    • v.46 no.1
    • /
    • pp.27-35
    • /
    • 2016
  • Objective: The aims of our study were to verify the validity of the T-Scan III system (Tekscan) as an objective occlusal evaluation tool, and to assess the differences between two occlusal indexes - the peer assessment rating (PAR) index and the American Board of Orthodontics objective grading system (OGS) - by comparing the scores derived from the T-Scan III system with the two occlusal indexes and analyzing the correlations between them. Methods: The final study sample included 48 adult volunteers (39 men and 9 women, mean age $24.14{\pm}3.16years$), after excluding 29 volunteers whose occlusion could not be evaluated by the T-Scan III system due to severe skeletal or occlusal problems. PAR index and OGS scores were assessed using dental study models, and measurements of centric occlusion, protrusive movement, and lateral excursion movement were obtained via the T-Scan III system. The results were analyzed to determine correlations. Results: Occlusal analysis by the T-Scan III system was clinically reliable (p < 0.05), and the PAR index and OGS scores were significantly correlated with several measurements obtained with the T-Scan III system (p < 0.05). Conclusions: The T-Scan III system is a quantitative and reliable method for occlusal evaluation, and represents a potential substitute for occlusal indexes. Compared to the PAR index, the OGS scores of more variables were significantly correlated with the T-Scan measurements.

Transition Repression Architecture for scan CEll (TRACE) in a BIST environment (BIST 환경에서의 천이 억제 스캔 셀 구조)

  • Kim In-Cheol;Song Dong-Sup;Kim You-Bean;Kim Ki-Cheol;Kang Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.6 s.348
    • /
    • pp.30-37
    • /
    • 2006
  • This paper presents a modified scan cell architecture to reduce the power dissipation during testing. It not only eliminates switching activities in the combinational logic during scan shifting but also reduces switching activities in the scan chain during the time. Furthermore, it limits the transitions on capture cycles. It can be made for test-per-scan BIST and employed in both single scan style and multiple scan style. Experimental results demonstrate that the proposed structure achieves the same fault coverage with lower power consumption compared to other existing BIST schemes.

Practical theory and ocean survey application of side scan sonar (Side Scan Sonar 실무이론과 현장조사에 적용)

  • Kim, Seong-Ryul;Lee, Yong-Kuk;Jung, Baek-Hun
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.201-204
    • /
    • 2006
  • In the side scan sonar method, use is made of the back-scattering, at low grazing angles of incidence to the seabed, of relatively high-frequency acoustic waves radiated in a fan-shaped beam from a transducer contained in a towed body. The fan beam is oriented so that the wider angle is in the vertical plane (scan range) and the narrower angle in the horizontal plane (beam width) with the axis of the beam normal to the ship track. The display of the returns is usually realized as a series of closely spaced intensity-modulated lines on a paper recorder or computer screen display. In this way a two-dimensional picture of the seabed is build up.

  • PDF

Effective Detecting Method of Nmap Idle Scan

  • Hwang, Jungsik;Kim, Minsoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In recent years, information collection of attacks through stealth port scanning technology has become more sophisticated. The most commonly used Nmap port scanner supports a variety of stealth scanning technologies along with the existing scanning techniques. Nmap also supports Idle scan that is different from conventional stealth scans. This is a more sophisticated stealth scan technique by applying the SYN scan and ACK scan techniques. In previous studies, the detection of Idle scanning was on zombie system, but was not on victim system. In this paper, we propose an effective detection method of Idle scan on victim system. The Idle scanning is composed of two stages; they are probing the zombie and victim system and scanning the victim system. We analyzed the characteristics of the two stages. The characteristics, we captured, are that SYN and RST packets are different from normal packet. We applied them to detection method, then Idle scanning is detected effectively.

Low Power Scan Testing and Test Data Compression for System-On-a-Chip (System-On-a-Chip(SOC)에 대한 효율적인 테스트 데이터 압축 및 저전력 스캔 테스트)

  • 정준모;정정화
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.12
    • /
    • pp.1045-1054
    • /
    • 2002
  • We present a new low power scan testing and test data compression mothod lot System-On-a-Chip (SOC). The don't cares in unspecified scan vectors are mapped to binary values for low Power and encoded by adaptive encoding method for higher compression. Also, the scan-in direction of scan vectors is determined for low power. Experimental results for full - scanned versions of ISCAS 89 benchmark circuits show that the proposed method has both low power and higher compression.

An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks

  • Song, Jae-Hoon;Jung, Tae-Jin;Jung, Ji-Hun;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.286-292
    • /
    • 2012
  • Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.