• Title/Summary/Keyword: Digital guides

Search Result 62, Processing Time 0.024 seconds

Accuracy and reliability of stitched cone-beam computed tomography images

  • Egbert, Nicholas;Cagna, David R.;Ahuja, Swati;Wicks, Russell A.
    • Imaging Science in Dentistry
    • /
    • v.45 no.1
    • /
    • pp.41-47
    • /
    • 2015
  • Purpose: This study was performed to evaluate the linear distance accuracy and reliability of stitched small field of view (FOV) cone-beam computed tomography (CBCT) reconstructed images for the fabrication of implant surgical guides. Material and Methods: Three gutta percha points were fixed on the inferior border of a cadaveric mandible to serve as control reference points. Ten additional gutta percha points, representing fiduciary markers, were scattered on the buccal and lingual cortices at the level of the proposed complete denture flange. A digital caliper was used to measure the distance between the reference points and fiduciary markers, which represented the anatomic linear dimension. The mandible was scanned using small FOV CBCT, and the images were then reconstructed and stitched using the manufacturer's imaging software. The same measurements were then taken with the CBCT software. Results: The anatomic linear dimension measurements and stitched small FOV CBCT measurements were statistically evaluated for linear accuracy. The mean difference between the anatomic linear dimension measurements and the stitched small FOV CBCT measurements was found to be 0.34 mm with a 95% confidence interval of +0.24 - +0.44 mm and a mean standard deviation of 0.30 mm. The difference between the control and the stitched small FOV CBCT measurements was insignificant within the parameters defined by this study. Conclusion: The proven accuracy of stitched small FOV CBCT data sets may allow image-guided fabrication of implant surgical stents from such data sets.

A Study on the Simulation and DSF Molding of V-groove Type Light Guide for a Backlight Unit (백라이트 유닛용 V-그루브 도광판의 전산모사 및 DSF성형에 관한 비교연구)

  • Cho K. H.;Yoon K. H.
    • Transactions of Materials Processing
    • /
    • v.14 no.3 s.75
    • /
    • pp.282-290
    • /
    • 2005
  • Nowadays, TFT-LCD is widely used as display unit of many digital devices. And, the backlight unit(BLU) is used as a light source of TFT-LCD module. In the backlight unit, the most important component is a light guide, which guides the input light to the TFT-LCD module uniformly. Recently, many researchers have focused on improving the efficiency of BLU by changing the design and structure of a light guide. In the present paper, a series of simulation was performed to find the optimal luminance distribution of emanated light from the given geometry as the first step. From the results of simulations for the light guide with given V-groove pattern, the emanated light from it is mostly affected by the groove angle. In the case of acute angle, about 74 degrees was found as optimal angle to satisfy the restrictions of angular luminance distribution, FWHM, the maximum luminance, etc. However, as far as the average luminance value was concerned, the case of 120 degrees(abtuse angle) was found to be the best while prism films were added to the BLU. As a next step the light guide samples of 74 and 120 degrees were manufactured by DSF method, which was recently proposed by the authors. Of course, most of design parameters were chosen by the aid of simulation results. Finally, the results of average luminance values were compared between the simulation and DSF molded samples.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Development of a Framework for Improvement of Sensor Data Quality from Weather Buoys (해양기상부표의 센서 데이터 품질 향상을 위한 프레임워크 개발)

  • Ju-Yong Lee;Jae-Young Lee;Jiwoo Lee;Sangmun Shin;Jun-hyuk Jang;Jun-Hee Han
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.3
    • /
    • pp.186-197
    • /
    • 2023
  • In this study, we focus on the improvement of data quality transmitted from a weather buoy that guides a route of ships. The buoy has an Internet-of-Thing (IoT) including sensors to collect meteorological data and the buoy's status, and it also has a wireless communication device to send them to the central database in a ground control center and ships nearby. The time interval of data collected by the sensor is irregular, and fault data is often detected. Therefore, this study provides a framework to improve data quality using machine learning models. The normal data pattern is trained by machine learning models, and the trained models detect the fault data from the collected data set of the sensor and adjust them. For determining fault data, interquartile range (IQR) removes the value outside the outlier, and an NGBoost algorithm removes the data above the upper bound and below the lower bound. The removed data is interpolated using NGBoost or long-short term memory (LSTM) algorithm. The performance of the suggested process is evaluated by actual weather buoy data from Korea to improve the quality of 'AIR_TEMPERATURE' data by using other data from the same buoy. The performance of our proposed framework has been validated through computational experiments based on real-world data, confirming its suitability for practical applications in real-world scenarios.

A Study on Production of Broadcasting New Media Style Guide (방송사 뉴미디어 스타일 가이드 제작에 관한 연구)

  • Kim, Kyung-Yoon;Jung, Hoe-Kyung
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.379-385
    • /
    • 2014
  • N-Screen era is held due to the cloud computing technology which access to contents anytime, anywhere without any persistent. In the broadcast industry, this broadcast contents is rapidly serviced by variety of media devices such as PC, Smart phone, Tablet, App, IPTV. To Increase the usefulness and usability of the platform, same brand identity have to be maintain by devices and integrated guide which can encompass a variety of media are needed. This study tries to figure out the need of New Media Style Guide to keep brand identity in a variety of new media beyond previously Web style guide which limited in the Web pages. First, Integrated Guide GEL of BBC's and Web style guide of KBS was analyzed. Through the analysis it was found that the limitations and problem of the current web style guide and then suggested the improvement direction. In addition, this study tried to find which design elements should be made for new media style guides through in-depth interview with practitioners who work in broadcast media industry for more than three years. Through the research it was understood the current status of integrated brand identity and found a way to improve forward to new media platforms of KBS.

Research on the Workers' Awareness and the Status of the Current Working Conditions in Domestic IT and Non-IT Industries (국내 IT 비IT산업체 근로조건 실태 및 근로자 인식조사 연구)

  • Moon, Tae-Eun
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.225-238
    • /
    • 2012
  • This research measured the current working conditions and workers' awareness of their working conditions in both information technology industry and non-information technology industry. Furthermore, the research analyzed the characteristics of pertaining industries and age, sex, and job status of the workers to diagnose the current status of the working conditions and awareness of domestic workers in information technology industry in Korea. The purpose of this research is to provide the necessary data to establish the policy that guides ramifications to the current problems to restore the fame that Korea earned as one of the top information technology countries, and that requires a thorough paired comparison analysis between the information technology industries. The paired comparison analysis indicated that the information technology industries generally have had much worse working conditions than non-information technology industries. This research also verified that information technology industries have scored low on the satisfaction to the average working hours, employee welfare, social perception by other industries, the degree of anxiety, and the growth potential compared to the non information technology industries. Data collected during this research is meaningful in a sense that it provides basic yet crucial information that encourages the policies that are in favor of information technology employees to be adopted. The fact that there is a tacit skepticism in improvement of working conditions among the information technology workers supports the adoption of better policies that will improve not only working conditions but also find the solutions to eliminate the sources of insecurity of the retirement in information technology industry.

Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle (소프트웨어 생명주기 단계별 사이버보안 평가 방법론 제안)

  • Seo, Dal-Mi;Cha, Ki-Jong;Shin, Yo-Soon;Jeong, Choong-Heui;Kim, Young-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.363-374
    • /
    • 2015
  • Instrumentation and control(I&C) system has been mainly designed and operated based on analog technologies in existing Nuclear Power Plants(NPPs). However, As the development of Information Technology(IT), digital technologies are gradually being adopted in newly built NPPs. I&C System based on digital technologies has many advantages but it is vulnerable to cyber threat. For this reason, cyber threat adversely affects on safety and reliability of I&C system as well as the entire NPPs. Therefore, the software equipped to NPPs should be developed with cyber security attributes from the initiation phase of software development life cycle. Moreover through cyber security assessment, the degree of confidence concerning cyber security should be measured and if managerial, technical and operational work measures are implemented as intended should be reviewed in order to protect the I&C systems and information. Currently the overall cyber security program, including cyber security assessment, is not established on I&C systems. In this paper, we propose cyber security assessment methods in the Software Development Life Cycle by drawing cyber security activities and assessment items based on regulatory guides and standard technologies concerned with NPPs.

Manufacture Lenticular Map of Golf Courses Using Digital Orthophoto (수치정사영상을 이용한 렌티큘러 코스맵 제작)

  • Kim, Kam-Lae;Cheong, Hae-Jin;Cho, Won-Woo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.5
    • /
    • pp.475-482
    • /
    • 2007
  • Most golfers believe that knowing yardages will improve their score. Certainly it helps with club selection. But, simple "Graphic" yardage guides being notorious for error and inaccuracies, which a serious golfer will pick immediately, only serve to erode the players enjoyment and ultimately, golf course satisfaction. Someone believes with low-level aerial photographic images, golfer will be impressed with the accuracy of the depiction, helping them play a more confident game. But, there are no mapping products in true 3-D available in the world that allows a golfer to determine shot distances in yards or meters. So, we suggest an lenticular technology for real 3-D display as a viable alternative to conventional image map solution. This technology is an image display method for the generation of multi-image effects like 3D visualization or animation. This methodology is cutting edge stereoscopic image which overcomes the limitation of conventional photo tech by recomposing and producing 3 dimensional images. A significant strength of this methods its versatility concerning display effects. The main use of the hardcopy 3-D lenticular displays is in the fields of science, education, planning, and representation. This paper gives a concise overview of the lenticular foil technology and describes the production of the true 3-D yardage book of golf courses. For this study, 3-D effects are achieved and evaluated with the lenticular display by incorporation multiple synthetic images based on digital topographic terrain model and by using the two images of the actual stereopair.

Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules (HW 보안 모듈을 활용한 탬퍼링 대응 기술의 검증 및 평가 방안 조사)

  • Dongho Lee;Younghoon Ban;Jae-Deok Lim;Haehyun Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.335-345
    • /
    • 2024
  • In the digital era, data security has become an increasingly critical issue, drawing significant attention. Particularly, anti-tampering technology has emerged as a key defense mechanism against indiscriminate hacking and unauthorized access. This paper explores case studies that exemplify the trends in the development and application of TPM (Trusted Platform Module) and software anti-tampering technology in today's digital ecosystem. By analyzing various existing security guides and guidelines, this paper identifies ambiguous areas within them and investigates recent trends in domestic and international research on software anti-tampering. Consequently, while guidelines exist for applying anti-tampering techniques, it was found that there is a lack of methods for evaluating them. Therefore, this paper aims to propose a comprehensive and systematic evaluation framework for assessing both existing and future software anti-tampering techniques. To achieve this, it using various verification methods employed in recent research. The proposed evaluation framework synthesizes these methods, categorizing them into three aspects (functionality, implementation, performance), thereby providing a comprehensive and systematic evaluation approach for assessing software anti-tampering technology in detail.

Visual Media Education in Visual Arts Education (미술교육에 있어서 시각적 미디어를 통한 조형교육에 관한 연구)

  • Park Ji-Sook
    • Journal of Science of Art and Design
    • /
    • v.7
    • /
    • pp.64-104
    • /
    • 2005
  • Visual media transmits image and information reproduced in large quantities, such as a photography, film, television, video, advertisement, or computer image. Correspondence to the students' reception and recognition of culture in the future. arrangements for the field of studies of visual culture. 'Visual Culture' implies cultural phenomena of visual images via visual media, which includes not only the categories of traditional arts like a painting, sculpture, print, or design, but the performance arts including a fashion show or parade of carnival, and the mass and electronic media like a photography, film, television, video, advertisement, cartoon, animation, or computer image. In the world of visual media, Image' functions as an essential medium of communication. Therefore, people call the culture of today fra of Image Culture', which has been converted from an alphabet convergence era to an image convergence one. Image, via visual media, has become a dominant means for communication in large part of human life, so we can designate an Image' as a typical aspect of visual culture today. Image, as an essential medium of communication, plays an important role in contemporary society. The one way is the conversion of analogue image like an actual picture, photograph, or film into digital one through the digitalization of digital camera or scanner as 'an analogue/digital commutator'. The other is a way of process with a computer drawing, or modeling of objects. It is appropriate to the production of pictorial and surreal images. Digital images, produced by the other, can be divided into the form of Pixel' and form of Vector'. Vector is a line linking the point of departure to the point of end, which organizes informations. Computer stores each line's standard location and correlative locations to one another Digital image shows for more 'Perfectness' than any other visual media. Digital image has been evolving in the diverse aspects, such as a production of geometrical or organic image compositing, interactive art, multimedia art, or web art, which has been applied a computer as an extended trot of painting. Someone often interprets digitalized copy with endless reproduction of original even as an extension of a print. Visual af is no longer a simple activity of representation by a painter or sculptor, but now is intimately associated with a matter of application of media. There is some problem in images via visual media. First, the image via media doesn't reflect a reality as it is, but reflects an artificial manipulated world, that is, a virtual reality. Second, the introduction of digital effect and the development of image processing technology have enhanced a spectacle of destructive and violent scenes. Third, a child intends to recognize the interactive images of computer game and virtual reality as a reality, or truth. Education needs not only to point out an ill effect of mass media and prevent the younger generation from being damaged by it, but also to offer a knowledge and know-how to cope actively with social, cultural circumstances. Visual media education is one of these essential methods for the contemporary and future human being in the overflowing of image informations. The fosterage of 'Visual Literacy' can be considered as a very purpose of visual media education. This is a way to lead an individual to the discerning, active consumer and producer of visual media in life as far as possible. The elements of 'Visual Literacy' can be divided into a faculty of recognition related to the visual media, a faculty of critical reception, a faculty of appropriate application, a faculty of active work and a faculty of creative modeling, which are promoted at the same time by the education of 'visual literacy'. In conclusion, the education of 'Visual Literacy' guides students to comprehend and discriminate the visual image media carefully, or receive them critically, apply them properly, or produce them creatively and voluntarily. Moreover, it leads to an artistic activity by means of new media. This education can be approached and enhanced by the connection and integration with real life. Visual arts and education of them play an important role in the digital era depended on visual communications via image information. Visual me야a of day functions as an essential element both in daily life and in arts. Students can soundly understand visual phenomena of today by means of visual media, and apply it as an expression tool of life culture as well. A new recognition and valuation visual image and media education is required to cultivate the capability of active, upright dealing with the changes of history of civilization. 1) Visual media education helps to cultivate a sensibility for images, which reacts to and deals with the circumstances. 2) It helps students to comprehend the contemporary arts and culture via new media. 3) It supplies a chance of students' experiencing a visual modeling by means of new media. 4) There are educational opportunities of images with temporality and spaciality, and therefore a discerning person becomes to increase. 5) The modeling activity via new media leads students to be continuously interested in the school and production of plastic arts. 6) It raises the ability of visual communications dealing with image information society. 7) An education of digital image is significant in respect of cultivation of man of talent for the future society of image information as well. To correspond to the changing and developing social, cultural circumstances, and the form and recognition of students' reception of them, visual arts education must arrange the field of studying on a new visual culture. Besides, a program needs to be developed, which is in more systematic and active level in relation to visual media education. Educational contents should be extended to the media for visual images, that is, photography, film, television, video, computer graphic, animation, music video, computer game and multimedia. Every media must be separately approached, because they maintain the modes and peculiarities of their own according to the conveyance form of message. The concrete and systematic method of teaching and the quality of education must be researched and developed, centering around the development of a course of study. Teacher's foundational capability of teaching should be cultivated for the visual media education. In this case, it must be paid attention to the fact that a technological level of media is considered as a secondary. Because school education doesn't intend to train expert and skillful producers, but intends to lay stress on the essential aesthetic one with visual media under the social and cultural context, in respect of a consumer including a man of culture.

  • PDF