• Title/Summary/Keyword: Restoration technique

Search Result 652, Processing Time 0.033 seconds

Supraceliac Aorta Bypass Surgery For Juxtarenal Aortic Occlussive Disease -2 Cases - (신장근접 대동맥 폐색증의 상복강대동맥 우회술)

  • 오중환
    • Journal of Chest Surgery
    • /
    • v.25 no.1
    • /
    • pp.105-111
    • /
    • 1992
  • Total atherosclerotic obstruction of the juxtarenal abdominal aorta is a relatively rarely encountered form of atherosclerotic vascsular disease, accounting for less than 5% of all arterial obstrutive disease. We have encountered two patients with such lesions, both of whom were admitted for intermittent claudication of the lower extremities and symptoms of vascular ischemia. Digital subtraction angiography[DSA] was performed on both patients, the results of which revealed total obstruction of the aorta just inferior to the renal arteries without involving the latter. Operative technique involved the use of the sup-raceliac aorta as the site of proximal anastomosis of aortofemoral bypass followed by a fem-orofemoral bypass graft with Smm sized Woven Dacron[Vascutek] through a subcutaneous tunnel within the retroperitoneal space. Both patients experienced restoration of blood flow distal to the obstruction postoperatively without any complications, and OPD follow-up one month postoperatively and postoperative DSA showed evidence of continued graft patency with persistent symptomatic improvement.

  • PDF

A Genetic Algorithm for Backup Virtual Path Routing in Multicast ATM Networks (멀티캐스트 ATM 망에서 대체가상결로의 설정을 위한 유전 알고리듬)

  • 김여근;송원섭;곽재승
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.25 no.2
    • /
    • pp.101-114
    • /
    • 2000
  • Multicasting is the simultaneous transmission of data to multiple destinations. In multicast ATM networks the effect of failures on transmission links or nodes can be catastrophic so that the issue of survivability is of great importance. However little attention has been paid to the problem of multicast restoration. This paper presents an efficient heuristic technique for routing backup virtual paths in ulticast networks with link failure. Genetic algorithm is employed here as a heuristic. In the application of genetic algorithm to the problem, a new genetic encoding and decoding method and genetic operators are proposed in this paper. The other several heuristics are also presented in order to assess the performance of the proposed algorithm. Experimental results demonstrate that our algorithm is a promising approach to solving the problem.

  • PDF

A New Efficient Impulse Noise Detection based on Rank Estimation

  • Oh, Jin-Sung;Kim, You-Nam
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.3
    • /
    • pp.173-178
    • /
    • 2008
  • In this paper, we present a new impulsive noise detection technique. To remove the impulse noise without detail loss, only corrupted pixels must be filtered. In order to identify the corrupted pixels, a new impulse detector based on rank and value estimations of the current pixel is proposed. Based on the rank and value estimations of the current pixel, the new proposed method provides excellent statistics for detecting an impulse noise while reducing the probability of detecting image details as impulses. The proposed detection is efficient and can be used with any noise removal filter. Simulation results show that the proposed method significantly outperforms many other well-known detection techniques in terms of image restoration and noise detection.

  • PDF

Sparse-View CT Image Recovery Using Two-Step Iterative Shrinkage-Thresholding Algorithm

  • Chae, Byung Gyu;Lee, Sooyeul
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1251-1258
    • /
    • 2015
  • We investigate an image recovery method for sparse-view computed tomography (CT) using an iterative shrinkage algorithm based on a second-order approach. The two-step iterative shrinkage-thresholding (TwIST) algorithm including a total variation regularization technique is elucidated to be more robust than other first-order methods; it enables a perfect restoration of an original image even if given only a few projection views of a parallel-beam geometry. We find that the incoherency of a projection system matrix in CT geometry sufficiently satisfies the exact reconstruction principle even when the matrix itself has a large condition number. Image reconstruction from fan-beam CT can be well carried out, but the retrieval performance is very low when compared to a parallel-beam geometry. This is considered to be due to the matrix complexity of the projection geometry. We also evaluate the image retrieval performance of the TwIST algorithm -sing measured projection data.

A Study on the Error Compensation of Artificial Intelligent Process System (지능형 가공시스템의 오차 보정에 관한 연구)

  • 공석민;김영탁;문희근;김관형;이상배
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.8
    • /
    • pp.736-741
    • /
    • 2001
  • The restoration optimum image from transformation image demands compound change of image change, calender reform, and multiple solution calculation. This study presents that system actively deal with outside interference, vibration, movement, mechanical feature on the operating or before the operating and avoids complicated mathematical numerical expression and revise based on expert knowledge based which applies Fuzzy Logic which is one of Artificial Intelligent technique.

  • PDF

Ridge Augmentation Using Vascularized Interpositional Periosteal- Connective Tissue (VIP-CT) in Conjunction with Anterior Implant Placement in Maxilla : Report of Three Cases (상악 전치부의 임플란트 식립과 관련하여 혈관개재골막결합조직판막술을 이용한 치조제증대술: 3가지 증례보고)

  • Kim, Yun-Sang
    • Journal of Periodontal and Implant Science
    • /
    • v.38 no.2
    • /
    • pp.207-214
    • /
    • 2008
  • Purpose: The aim of augmentation of the alveolar ridge is to restore absorbed alveolar ridges for future implant site or esthetic prosthodontic restoration. The present clinical report describes the anterior maxillary augmentation cases using a soft tissue rotated palatal flap, and considers various problems of before and after surgery. Method: First & second patients were treated by vascularized interpositional periosteal-connective tissue(VIP-CT) flap for horizontal soft tissue augmentation. Especially second patient was progressed with bone grafting at the same time. Third patient was treated by the same flap with bone graft and implant placement in single tooth missing premaxillary area. Result: The obtained horizontal augmentation width measured $0.5{\sim}2.7\;mm$. Conclusion: This technique constitutes a viable approach for augmentation the anterior sector of alveolar ridge with the placement of dental implants. But it needs correct diagnosis preparation and careful surgery skill.

A Study on Service Restoration Guide by Network Reduction in Distribution Systems (배전계통에서의 계통 축약에 의한 정전 복구방안 수립에 관한 연구)

  • Kim, S.H.;Choi, B.Y.;Lee, S.M.;Cho, S.H.;Lee, J.K.;Moon, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 1995.07b
    • /
    • pp.500-502
    • /
    • 1995
  • Whenever faults(a fault) occur(s) in a particular section of a distribution system, some of loads get disconnected and are left unsupplied. Service should be restored to these affected load points as quickly as possible through network reconfiguration. An efficient technique is presented in this paper for this purpose. Network reduction and strategy testing the voltage and current constraints are the main contributions of this paper.

  • PDF

Comparative evaluation of micro-shear bond strength to different luting procedures of ceramics to dentin

  • Lee, Yoon-Jeong;Park, Sang-Jin;Choi, Kyoung-Kyu
    • Proceedings of the KACD Conference
    • /
    • 2003.11a
    • /
    • pp.569-569
    • /
    • 2003
  • I. Objectives The purpose of this study was to evaluate the effort of a modified luting procedure called "dual bonding technique" by compare micro-shear bond strength to different luting procedures of ceramics to dentin. II. Materials and Methods Eighty-four freshly extracted caries-and restoration-free human third molar were embedded in epoxy resin using acrylic ring. Flat superficial occlusal dentin surfaces were obtained, initially using a Low speed diamond saw and exposed detin surface was group with #600-grit SiC paper.(omitted)

  • PDF

PR based Output Voltage Controller Design with Voltage Magnitude Restoration Technique for Harmonic Compensation (고조파 보상을 위한 전압 매그니튜드 회복 기능을 가진 비례공진 제어 기반의 출력 전압 제어기 설계)

  • Lim, Kyungbae;Sin, Chanho;Choi, Jaeho
    • Proceedings of the KIPE Conference
    • /
    • 2016.11a
    • /
    • pp.95-96
    • /
    • 2016
  • 본 논문은 독립 운전 모드에서 전압 고조파 보상을 위한 비례 다중 공진 제어 기반의 전압 제어에 대해 다루고 있다. 독립 운전 모드에서 인버터는 계통과의 연계 없이 전체 지역적 부하의 수요를 담당해야 하기 때문에 전압원으로서 정의된다. 그런데 이때 부하가 불평형 또는 비선형 부하인 경우 역상차, 영상차 또는 특정 고조파 전류가 발생하며 이로 인해 출력 전압이 왜곡된다. 본 논문에서는 앞서 언급한대로 전압 고조파 보상을 위해 흔히 사용되는 비례적분 제어기 대신 고조파 보상 제어의 단순화를 위해 비례 공진 제어기를 사용하였다. 하지만 이와 같은 비례 공진 제어를 실용적인 텀으로서 추가될 경우 전압 매그니튜드 추종 에러가 발생하게 되므로 본 논문에서는 추가적으로 실용적인 비례 공진 제어기가 갖는 단점을 극복하고자 비례 적분 기반의 간단한 전압 회복 기법에 대해 제안하며 제안된 제어 방식은 PSiM 시뮬레이션과 실험을 통해 입증되었다.

  • PDF

A Study on Reconstruction Vulnerability of Daugman's Iriscode

  • Youn, Soung-Jo;Anusha, B.V.S;Kim, Gye-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.35-40
    • /
    • 2019
  • In this paper, we propose a technique to reconstruct the iris image from the iris code by analyzing the process of generating the iris code and calculating it inversely. Iris recognition is an authentication method for authenticating an individual's identity by using iris information of an eye having unique information of an individual. The iris recognition extracts the features of the iris from the iris image, creates the iris code, and determines whether to authenticate using the corresponding code. The iris recognition method using the iris code is a method proposed by Daugman for the first time and is widely used as a representative method of iris recognition technology currently used commercially. In this paper, we restore the iris image with only the iris code, and test whether the reconstructed image and the original image can be recognized, and analyze restoration vulnerability of Daugman's iris code.