• Title/Summary/Keyword: Tracing error

Search Result 92, Processing Time 0.027 seconds

MIDFACIAL MEASUREMENT USING OCCLUSAL MAXILLARY CT AND SURGICAL IMPLICATIONS OF MAXILLARY OSTEOTOMIES (컴퓨터 단층촬영을 이용한 중안모 계측과 상악골 절단술에의 응용)

  • Choung, Pill-Hoon;Yoo, Chung-Kyu;Lee, Eun-Kyung;Suh, Je-Duck;Chung, Il-Hyuk
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.28 no.3
    • /
    • pp.222-228
    • /
    • 2006
  • Various methods have been used in the past to indirectly analyze the craniofacial region. Among these, the lateral and posterior-anterior cephalometircs are used for the evaluation of the dentofacial deformities. However, cephalometircs create inaccuracies because of the inherent enlargement and distortion of the image. The interpretation of cephalometric films is also problematic: the number of anatomic landmarks that can be identified accurately is limited, and the overlap of structures on a radiograph making locating these landmarks difficult. To overcome these problems, computed tomography(CT) has been recommended as an useful modality in the diagnosis, surgical planning, and follow-up of craniofacial anomalies. There is no significant enlargement or distortion of the image, overlap of structure, or tracing error. And the number of anatomic landmarks is vast. The purpose of this study was to examine the orbit and midfacial region using Occlusal Maxillary CT, consisted of slices parallel to the occlusal plane. Based on these CT scan, we provide the data that could be applied to monitor an individual patient's skeletal pattern and the guide to the maxillary osteotomy.

OBLIQUE TRANSCRANIAL RADIOGRAPHIC ANALYSIS OF CHANGES IN CONDYLE POSITION FOLLOWING SAGITTAL SPLIT RAMUS OSTEOTOMY IN MANDIBULAR PROGNATHISM (측사위경두개방사선사진(Oblique Transcranial Radiograph)을 이용한 하악전돌증환자의 하악지 시상골절단술후 하악과두위치변화 분석)

  • Kwon, Tae-Geon;Jang, Hyun-Jung;Lee, Sang-Han
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.17 no.1
    • /
    • pp.32-45
    • /
    • 1995
  • This study was intended to evaluate condyle position and the relationship of condyle position change and post surgical relapse following the sagittal split ramus osteotomy for mandible setback in 25 patients by paired t-test and multiple regression analysis. We used oblique transcranial and cephalometric radiographs taken before operation, immediate after operation, and at least 6 months post operatively. 1. In oblique transcranial view, posterior joint space was decreased immediate after operation and increased 6 months after operation. To compare the measurement before and 6 months after operation, there was no statistically significant change in over all joint spaces(P>0.05). 2. The joint spaces changed under the 0.2mm were 30%, 0.2mm to 1.0mm were 60.7%, above 1.0mm were 9.3%. This result reveals that condyle position was relatively reproduced to pre-operative state. 3. Statistically, the amount of mandible set back didn't influence the post operative relapse(P>0.05). 4. Statistically, the amount of mandible set back didn't influence the condylar displacement(P>0.05), and the amount of joint space change didn't influence the post operative relapse.(P>0.05) The changes in joint space is in the standard tracing error or within the adaptive capacity of the individual, it was too small to influence the stability of surgery.

  • PDF

A Scheme for User Authentication using Pupil (눈동자를 이용한 사용자 인증기법)

  • Lee, Jae-Wook;Kang, Bo-Seon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.325-329
    • /
    • 2016
  • Facial authentication has the limelight because it has less resistance and it is hard to falsify among various biometric identification. The algorithm of facial authentication can bring about huge difference in accuracy and speed by the algorithm construction. Along with face-extracted data by tracing and extracting pupil, the thesis studied algorithm which extracts data to improve error rate and to accurately authenticate face. It detects face by cascade, selects as significant area, divides the facial area into 4 equal parts to save the coordinate of object. Also, to detect pupil from the eye, the binarization is conducted and it detects pupil by Hough conversion. The core coordinate of detected pupil is saved and calculated to conduct facial authentication through data matching. The thesis studied optimized facial authentication algorithm which accurately calculates facial data with pupil trace.

Block-based Motion Vector Smoothing for Nonrigid Moving Objects (비정형성 등속운동 객체의 움직임 추정을 위한 블록기반 움직임 평활화)

  • Sohn, Young-Wook;Kang, Moon-Gi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.6
    • /
    • pp.47-53
    • /
    • 2007
  • True motion estimation is necessary for deinterlacing, frame-rate conversion, and film judder compensation. There have been several block-based approaches to find true motion vectors by tracing minimum sum-of-absolute-difference (SAD) values by considering spatial and temporal consistency. However, the algorithms cannot find robust motion vectors when the texture of objects is changed. To find the robust motion vectors in the region, a recursive vector selection scheme and an adaptive weighting parameter are proposed. Previous frame vectors are recursively averaged to be utilized for motion error region. The weighting parameter controls fidelity to input vectors and the recursively averaged ones, where the input vectors come from the conventional estimators. If the input vectors are not reliable, then the mean vectors of the previous frame are used for temporal consistency. Experimental results show more robust motion vectors than those of the conventional methods in time-varying texture objects.

A Position Tracking System Using Pattern Matching and Regression Curve (RFID 태그를 이용한 실내 위치 추적 시스템에 관한 연구)

  • Cho, Jaehyung
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.211-217
    • /
    • 2019
  • Location positioning systems are available in applications such as mobile, robotic tracking systems and Wireless location-based service (LBS) applications. The GPS system is the most well-known location tracking system, but it is not easy to use indoors. The method of radio frequency identification (RFID) location tracking was studied in terms of cost-effectiveness for indoor location tracking systems. Most RFID systems use active RFID tags using expendable batteries, but in this paper, an inexpensive indoor location tracking system using passive RFID tags has been developed. A pattern matching method and a system for tracing location by generating regression curves were studied to use precision tracking algorithms. The system was tested by verifying the level of error caused by noise. The three-dimensional curves are produced by the regression equation estimated the statistically meaningful coordinates by the differential equation. The proposed system could also be applied to mobile robot systems, AGVs and mobile phone LBSs.

A Stereo Matching Method Based on the Dynamic Programming to Reduce the Streaking Phenomena (스트리킹 현상을 감소시키기 위한 다이내믹 프로그래밍 기반의 스테레오 정합 방법)

  • Park, Jang-Ho;Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1217-1230
    • /
    • 2010
  • The dynamic programming based methods, a kind of globally optimizing stereo matching methods, has the inherent advantage that the occlusion regions can be found during the process. But it also has a serious drawback of streaking phenomena. This paper focuses on reducing the streaking phenomena by adjusting the penalties in calculating the cost matrix and re-establishing the optimal path in the back-tracing process using the boundary information of the image. Especially we use a pixel expansion method in re-establishing the path, which is the results from expanding the pixel information of the ones just left the boundaries. Experiments with the four image pairs provided by the Middlebury site showed the results that the proposed method has the disparity error ratio of 6.33% and the rank is 29, which is competitive to the best method among the previously published dynamic programming based methods.

Location-based Frequency Interference Management Scheme Using Fingerprinting Localization Algorithms (Fingerprinting 무선측위 알고리즘을 이용한 영역 기반의 주파수 간섭 관리 기법)

  • Hong, Aeran;Kim, Kwangyul;Yang, Mochan;Oh, Sunae;Jung, Hongkyu;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.901-908
    • /
    • 2012
  • In an intelligent automated manufacturing environment, an administrator may use M2M (Machine-to-Machine) communication to recognize machine movement and the environment, as well as to respond to any potential dangers. However, commonly used wireless protocols for this purpose such WLAN (Wireless Local Area Network), ZigBee, and Bluetooth use the same ISM (Industrial Science Medical) band, and this may cause frequency interference among different devices. Moreover, an administrator is frequently exposed to dangerous conditions as a result of being surrounded by densely distributed moving machines. To address this issue, we propose in this paper to employ a location-based frequency interference management using fingerprinting scheme in industrial environments and its advanced localization schemes based on k-NN (Nearest Neighbor) algorithms. Simulation results indicate that the proposed schemes reduce distance error, frequency interference, and any potential danger may be responded immediately by continuous tracing of the locations.

Dynamic Data Path Prediction use Extend EKF Movement Tracing in Net-VE (Net-VE에서 이동궤적을 이용한 동적데이터 경로예측)

  • Song, Sun-Hee;Oh, Haeng-Soo;Park, Kwang-Chae;Kim, Gwang-Jun;Ra, Sang-Dong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.81-89
    • /
    • 2008
  • Improved EKF suggests variable path prediction to reduce the event traffic caused by the information sharing among multi-users in networked virtual environment. The three dimensional virtual space is maintained consistently by endless status information exchange among dispersed users, and periodic status transmission brings traffic overhead in network. By using the error between the measured movement trace of dynamic information and the EKF predicted, we propose the method applied to predict the mobile packet of dynamic data which is simultaneously changing. And, the simulation results of DIS dead reckoning algorithms and EKF path prediction is compared here. It followed the specific path and while moving, the proposed method which it proposes predicting with DIS dead reckoning algorithm and to compare to the mobile path of the actual object and it got near it predicts the possibility of knowing it was.

  • PDF

Improving Strontium Isotope Ratio Analysis Using MC-ICP-MS (다검출기 유도결합 플라즈마 질량분석기를 이용한 스트론튬 동위원소비 분석법 개선)

  • Lee, Sin-Woo;Park, Jaeseon;Park, Hyun-Woo;Hwang, Jong Yeon;Kim, Kumhee;Chung, Hyun-Mi;Choi, Jong-Woo
    • Journal of Environmental Analysis, Health and Toxicology
    • /
    • v.21 no.4
    • /
    • pp.237-242
    • /
    • 2018
  • Strontium (Sr) commonly exists in rock, groundwater, soil, plants, and animals. The Sr isotope ratio offers important information as a tracer on nature because the Sr isotopic composition is not fractionated by any biological process in these ecosystems. Hence, Sr isotope ratio has been used in several studies on tracing the Sr source for contaminated sites and human migration. In this study, we developed a separation method for Sr content, and then improved Sr isotope analysis using multi-collector inductively coupled plasma mass spectrometry (MC-ICP-MS). A powdered rock standard (NIST 2710a) was used to determine the removal of interference elements (Rb and Ca) and the recovery rate of Sr content. The results ranged from 98% to 106%. Additionally, three standard samples (NBS 987, IAPSO and NIST 1486) were analyzed to evaluate the precision and accuracy of the results. The measured $^{87}Sr/^{86}Sr$ ratio for all the samples were consistent with the reported values, within an error. These results indicate that our established Sr separation and Sr isotope measurement methods are reliable and can hence be useful in the fields of environmental and forensic sciences.

Improved cryptanalysis of lightweight RFID mutual authentication Protocols LMAP, $M^2AP$, EMAP (경량 RFID 상호인증 프로토콜 LMAP, $M^2AP$, EMAP에 대한 향상된 취약성 분석)

  • Kwon, Dae-Sung;Lee, Joo-Young;Koo, Bon-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.103-113
    • /
    • 2007
  • In this paper, we present a security analysis of Lightweight RFID Mutual Authentication Protocols-LMAP[10], $M^2AP$[11], EMAP[12]. Based on simple logic operations, the protocols were designed to be suitable for lightweight environments such as RFID systems. In [8,9], it is shown that these protocols are vulnerable to do-synchronization attacks with a high probability. The authors also presented an active attack that partially reveals a tag's secret values including its ID. In this paper, we point out an error from [9] and show that their do-synchronization attack would always succeed. We also improve the active attack in [9] to show an adversary can compute a tag's ID as well as certain secret keys in a deterministic way. As for $M^2AP$ and EMAP, we show that eavesdropping $2{\sim}3$ consecutive sessions is sufficient to reveal a tag's essential secret values including its ID that allows for tracing, do-synchronization and/or subsequent impersonations.