• 제목/요약/키워드: Computer Application

검색결과 7,943건 처리시간 0.046초

Chitosan/hydroxyapatite composite coatings on porous Ti6Al4V titanium implants: in vitro and in vivo studies

  • Zhang, Ting;Zhang, Xinwei;Mao, Mengyun;Li, Jiayi;Wei, Ting;Sun, Huiqiang
    • Journal of Periodontal and Implant Science
    • /
    • 제50권6호
    • /
    • pp.392-405
    • /
    • 2020
  • Purpose: Titanium implants are widely used in the treatment of dentition defects; however, due to problems such as osseointegration failure, peri-implant bone resorption, and periimplant inflammation, their application is subject to certain restrictions. The surface modification of titanium implants can improve the implant success rate and meet the needs of clinical applications. The goal of this study was to evaluate the effect of the use of porous titanium with a chitosan/hydroxyapatite coating on osseointegration. Methods: Titanium implants with a dense core and a porous outer structure were prepared using a computer-aided design model and selective laser sintering technology, with a fabricated chitosan/hydroxyapatite composite coating on their surfaces. In vivo and in vitro experiments were used to assess osteogenesis. Results: The quasi-elastic gradient and compressive strength of porous titanium implants were observed to decrease as the porosity increased. The in vitro experiments demonstrated that, the porous titanium implants had no biological toxicity; additionally, the porous structure was shown to be superior to dense titanium with regard to facilitating the adhesion and proliferation of osteoblast-like MC3T3-E1 cells. The in vivo experimental results also showed that the porous structure was beneficial, as bone tissue could grow into the pores, thereby exhibiting good osseointegration. Conclusions: Porous titanium with a chitosan/hydroxyapatite coating promoted MC3T3-E1 cell proliferation and differentiation, and also improved osseointegration in vitro. This study has meaningful implications for research into ways of improving the surface structures of implants and promoting implant osseointegration.

A Study on the Characteristics of Chamdrilling for SCM415 Steel (SCM415강에 대한 캄드릴링 특성연구)

  • Kim, Jin-su
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • 제20권5호
    • /
    • pp.27-34
    • /
    • 2021
  • This study analyzes machining characteristics and presents optimal cutting conditions by measuring the surface roughness, dimensional accuracy, and dimension straightness based on the feed rate after processing the inner diameter hall of SCM415 steel using an automatic CNC(Computerized Numerical Control) lathe. The testing material was cut using an 11.8 mm-diameter Chamdrill after mounting the 32 mm-diameter round bar on an automatic CNC lathe. The cut depth was set at 3 mm, and the cutting speed was fixed at 1500 rpm. The surface roughness, dimensional accuracy, and dimension straightness of 15 testings were measured by changing the feed rate to 0.05, 0.1, and 0.15 mm/rev, respectively. It was difficult to process more than 15 tests during the maching due to noise or break. Additionally, the optimum cutting of SCM415 steel showed excellent surface roughness in the 10th and 11th of testing at cutting speed and feed speed of 1500 rpm and 0.05 mm/rev, respectively. The dimensional accuracy was measured in three dimensions after drilling, which showed good results with an average range of 0.0138-0.0208 mm. Moreover, the lower the feed speed, the higher the accuracy. Additionally, the measurement results of the dimensional straightness showed that the straightness is the straightness was the best at the 1th and 2th cutting regardless of the feed speed.

Cyber-Physical System for Energy Management (에너지 관리를 위한 가상-물리 시스템)

  • Oh, Se-Range;Bae, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • 제16권2호
    • /
    • pp.279-286
    • /
    • 2021
  • Recently, the effort of enterprises are visualized to correspond for 4th industrial revolution and climate change. Reaching the operation of industrial facilities are one of these efforts and is actively progressing under identical condition between real and virtual world through introduction of cyber-physical system (CPS). However, the problem on no unified definition for CPS still exists. Thus, in this paper, we review the previous concept of CPS. We propose new concept of CPS with four sections such as real world section, communication section, virtual world section and management section. We also propose definite concept by classifying the layer of each section. In order to confirm the possibility of application for proposed concept of CPS, we applied simple motor. We compare the result for torque between real motor and virtual motor. Finally we confirm that the applicability of proposed concept of CPS is very high.

Analysis of Memory Write Reference Patterns in Mobile Applications (모바일 앱의 메모리 쓰기 참조 패턴 분석)

  • Lee, Soyoon;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제21권6호
    • /
    • pp.65-70
    • /
    • 2021
  • Recently, as the number of mobile apps rapidly increases, the memory size of smartphones keeps increasing. Smartphone memory consists of DRAM and as it is a volatile medium, continuous refresh operations for all cells should be performed to maintain the contents. Thus, the power consumption of memory increases in proportion to the DRAM size of the system. There are attempts to configure the memory system with low-power non-volatile memory instead of DRAM to reduce the power consumption of smartphones. However, non-volatile memory has weaknesses in write operations, so analysis of write behaviors is a prerequisite to realize this in practical systems. In this paper, we extract memory reference traces of mobile apps and analyze their characteristics specially focusing on write operations. The results of this paper will be helpful in the design of memory management systems consisting of non-volatile memory in future smartphones.

A New Head Pose Estimation Method based on Boosted 3-D PCA (새로운 Boosted 3-D PCA 기반 Head Pose Estimation 방법)

  • Lee, Kyung-Min;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제21권6호
    • /
    • pp.105-109
    • /
    • 2021
  • In this paper, we evaluate Boosted 3-D PCA as a Dataset and evaluate its performance. After that, we will analyze the network features and performance. In this paper, the learning was performed using the 300W-LP data set using the same learning method as Boosted 3-D PCA, and the evaluation was evaluated using the AFLW2000 data set. The results show that the performance is similar to that of the Boosted 3-D PCA paper. This performance result can be learned using the data set of face images freely than the existing Landmark-to-Pose method, so that the poses can be accurately predicted in real-world situations. Since the optimization of the set of key points is not independent, we confirmed the manual that can reduce the computation time. This analysis is expected to be a very important resource for improving the performance of network boosted 3-D PCA or applying it to various application domains.

Implementation of Management of Cafe Staying Time (블록체인을 활용한 카페 이용시간 관리 시스템 구현)

  • Park, Jae-hoon;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제25권7호
    • /
    • pp.946-954
    • /
    • 2021
  • Since COVID19 virus has been occured, variety steps of the quarantine guidelines were enacted. In step 2.5, eating in a cafe was prohibited and only takeout was permitted, but the government has changed several rules. So now people can have a dissert or coffee in the cafe. Though the government adviced available staying time as 1 hour, it is not obeyed often except superstore, and even the management depends on handwriting. In this paper, we implemented a blockchain system to use for this case. This system is implemented with using hyperledger fabric, the blockchain framework which is made by IBM. For a test, 1 organization is in the system and chaincode is installed to the organization to run the system. We expect the certain effect to the quarantine via this system. Moreover, we will develop an application by using this system as a backend.

Optical Character Recognition based Security Document Image File Management System (광학문자인식 기반 보안문서 이미지 파일 관리 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • 제10권3호
    • /
    • pp.7-14
    • /
    • 2019
  • With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

A Study on Comparative Evaluation of Application of Software Reliability Model Dependent on Various Hazard Functions (다양한 위험함수에 의존한 소프트웨어 신뢰모형의 적용에 대한 비교 평가에 관한 연구)

  • Yang, Tae-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • 제11권6호
    • /
    • pp.800-806
    • /
    • 2018
  • Software efficiency is the probability of failure free use in operating environments, and is the most fundamental factor affecting software system stability. The malfunction of the computer system used in the information technology field may cause a significant loss in the related industry. Therefore, in this study, we analyze the attributes of software reliability models that depend on various hazard functions based on finite fault NHPP model with software failure time data. The hazard function pattern of proposed model is constant for the Goel-Okumoto model, and the Minimax and Rayleigh models follow the incremental pattern, but the hazard function increase value of the Minimax model is smaller than that of the Rayleigh model and the Goel-Okumoto model. Also, the Minimax model was relatively efficient because the true value error of the mean value function m(t) and the mean square error (MSE) of the Minimax model were smaller than those of the Rayleigh and Goel-Okumoto models. The results of this study are expected to be useful for software developers as basic information about the hazard function.

Illustrations of the Nine Types of Needles based on Huangdi's Internal Classic Ling-shu

  • Kim, Hyo Jin;Lee, Kwang Ho;Yang, Gi Young
    • Journal of Acupuncture Research
    • /
    • 제36권1호
    • /
    • pp.38-44
    • /
    • 2019
  • Background: The phrase "Nine Needles" refers to the 9 types of acupuncture needles describing their shapes, sizes, and uses in Huangdi's Internal Classic Ling-shu. The aim of this study was to present 3D illustrations of the "Nine Types of Needles" based on Huangdi's Internal classic Ling-shu, taking into consideration the conformation and application of the Nine Needles. Methods: Sketches of the "Nine Needles" were based on references to those needles cited in Huangdi's Internal Classic Ling-shu, the Great Compendium of Acupuncture and Moxibustion, and the Golden Mirror of Medicine. The computer programs Creo 3.0, Keyshot 5, Adobe Photoshop CS5, and Adobe Illustrator CS5 were used for 3D modelling and visualization. Results: Based on a review of Huangdi's Internal Classic Ling-shu, illustrations of the Spade needle, Round-Pointed needle, Pressure needle, Sharp-Edged needle, Sword-Shaped needle, Round-Sharp needle, Fine needle, Long needle, and Large needle, 3D models were created. The Spade needle had a sharp, large head, the Round-Pointed needle had an egg-shaped tip, and the Pressure needle had a blunt head like a grain of millet. The Sharp-Edged needle had a sharp blade with a triangular edge for bloodletting. The Sword-Shaped needle resembled a sword. The Round-Sharp needle resembled a horse's tail. The Fine needle and the Long needle had sharp points and thin bodies. The Large needle had a cylindrical shaft and rounded tip. Conclusion: This study demonstrated that 3D illustrations could be generated for the Nine Needles according to the descriptions and figures provided in the ancient literature.

File Sharing Algorithm based Mutual Cooperation using Smart Device (스마트 기기를 이용한 상호 협력 기반 파일 공유 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • 제9권12호
    • /
    • pp.53-60
    • /
    • 2018
  • With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.