• Title/Summary/Keyword: X network

Search Result 1,002, Processing Time 0.032 seconds

Hybrid model-based and deep learning-based metal artifact reduction method in dental cone-beam computed tomography

  • Jin Hur;Yeong-Gil Shin;Ho Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.2854-2863
    • /
    • 2023
  • Objective: To present a hybrid approach that incorporates a constrained beam-hardening estimator (CBHE) and deep learning (DL)-based post-refinement for metal artifact reduction in dental cone-beam computed tomography (CBCT). Methods: Constrained beam-hardening estimator (CBHE) is derived from a polychromatic X-ray attenuation model with respect to X-ray transmission length, which calculates associated parameters numerically. Deep-learning-based post-refinement with an artifact disentanglement network (ADN) is performed to mitigate the remaining dark shading regions around a metal. Artifact disentanglement network (ADN) supports an unsupervised learning approach, in which no paired CBCT images are required. The network consists of an encoder that separates artifacts and content and a decoder for the content. Additionally, ADN with data normalization replaces metal regions with values from bone or soft tissue regions. Finally, the metal regions obtained from the CBHE are blended into reconstructed images. The proposed approach is systematically assessed using a dental phantom with two types of metal objects for qualitative and quantitative comparisons. Results: The proposed hybrid scheme provides improved image quality in areas surrounding the metal while preserving native structures. Conclusion: This study may significantly improve the detection of areas of interest in many dentomaxillofacial applications.

A Quarter-Wavelength Open Circuited Microstripline Slot Array ($\lambda$g/4 개방 마이크로스트립 선로 스로트의 배열)

  • 배정이
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.19 no.6
    • /
    • pp.80-83
    • /
    • 1982
  • A quarter-wavelength open circuited microstripline slot array is realized at X-band froquency. The optimal feeding point is experimentally determined. The input impedance of the slot array for various frequencies and its radiation pattern are measured. The bandwidth of the slot array is increased by using the 4$\times$4 elements which are slightly different in length and feeding network which is suggested in this papers.

  • PDF

An automatic mask alignment system using moire sensors

  • Furuhashi, Hideo;Uchida, Yoshiyuki;Ohashi, Asao;Watanabe, Shigeo;Yamada, Jun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10b
    • /
    • pp.545-549
    • /
    • 1993
  • an alignment system in the X-and Y-directions an X-Y-.theta. stage driven by piezoelectric actuators is presented. A pair of quadruple gratings and a quadruple photo-detector are used. The difference between the two 0-th order moire signals in reflection with a relative spatial phase of 180.deg. is used in each direction to control the alignment of the X-Y-.theta. stage. The stage is aligned at the position where the difference is zero. The quadruple gratings are 10 mm * 10 mm, and of a binary square-type with a 1/2 duty cycle. Their pitches are 16 .mu.m. Alignment accuracy of .+-.20nm was obtained in this system.

  • PDF

Density-Based Opportunistic Broadcasting Protocol for Emergency Situations in V2X Networks

  • Park, Hyunhee;Singh, Kamal Deep;Piamrat, Kandaraj
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.26-32
    • /
    • 2014
  • Vehicular-to-anything (V2X) technology is attractive for wireless vehicular ad-hoc networks (VANETs) because it allows for opportunistic choice of a vehicular protocol between vehicular-to-vehicular (V2V) and vehicular-to-infrastructure (V2I) communications. In particular, achieving seamless connectivity in a VANET with nearby network infrastructure is challenging. In this paper, we propose a density-based opportunistic broadcasting (DOB) protocol, in which opportunistic connectivity is carried out by using the nearby infrastructure and opposite vehicles for solving the problems of disconnection and long end-to-end delay times. The performance evaluation results indicate that the proposed DOB protocol outperforms the considered comparative conventional schemes, i.e., the shortest path protocol and standard mobile WiMAX, in terms of the average end-to-end delay, packet delivery ratio, handover latency, and number of lost packets.

SCE Toolkit Library Implementation Method; Offering Parlay X and Web 2.0 APIs (Parlay X & 웹 2.O API를 제공하는 SCE 툴킷 라이브러리 구현 방법)

  • Chung, Seung-Hwa;Shin, Young-Mee
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.386-391
    • /
    • 2007
  • 개방형 서비스개발자들은 SCE(service Creation Environment) 도구를 사용하여 망에 대한 전문적인 지식이 없더라도 예전보다 쉽고 빠르게 서비스를 개발할 수 있게 되었다. 본 논문에서는 툴킷 라이브러리 형태의 SCE를 제공하는 방법을 제안한다. SCE 툴킷 라이브러리는 SCE를 SDK((Software Development Kit) 형태로 제공한다. 이는 기존의 IDE(Integrated Development Environment) 환경에 라이브러리 형식으로 SCE 기능을 추가할 수 있게 함으로써, 개발자가 기존에 사용하던 친숙한 환경에서 서비스를 개발할 수 있도록 해준다. 또한 Parlay X API, 웹 2.0 API, 유틸리티 API를 제공하는데 있어서 복잡한 API 및 파라미터를 추상화하여 제공하는 방법을 제안한다. 이러한 SCE 툴킷 라이브러리는 창조적인 새로운 서비스의 출현에 많은 기여를 할 것으로 전망된다.

  • PDF

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF

A Comparative Study on Simultaneous Adjustment of Geodetic Networks between with $varphi,\lambda$ Coordinates and with X, Y coordinates ($varphi,\lambda$망과 X, Y망의 조정에 관한 비교 연구)

  • 백은기;김원익;최윤수
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.4 no.1
    • /
    • pp.37-42
    • /
    • 1986
  • This paper deals with comparison of simultaneous geodetic networks between with geographical coordinates and with plane coordinates. The adjustment computation is performed by variation of coordinates. Provisional values for observation equations are computed by extended Guass mid-latitude formula using, official coordinates ($\varphi,\lambda$) in geographical network abjustment, measurements are reduced to plane by origin scale factor (=1.0000) Bessel ellipsoid and unit weight are adopted, and geographical coordinates are projected by Guass conformal double projection. The processing results of a test-network by distances yield the average root mean square error of position 6ㆍ2cm for adjustment with $\varphi,\lambda$ and 5.8cm for adjustment with X, Y. RMSE of discrepancy between two methods is 1.7cm. This result conform to required accracy.

  • PDF

Pneumonia Detection from Chest X-ray Images Based on Sequential Model

  • Alshehri, Asma;Alharbi, Bayan;Alharbi, Amirah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.53-58
    • /
    • 2022
  • Pneumonia is a form of acute respiratory infection that affects the lungs. According to the World Health Organization, pneumonia is the leading cause of death for children worldwide. As a result, pneumonia was the top killer of children under the age of five years old in 2015, which is 15% of all deaths worldwide. In this paper, we used CNN model architectures to compare between the result of proposed a CNN method with VGG based model architecture. The model's performance in detecting pneumonia shows that the proposed model based on VGG can classify normal and abnormal X-rays effectively and more accurately than the proposed model used in this paper.

Penetration Evaluation for X-ray Images Based on Residual Analysis of Histogram Equalization (히스토그램 평탄화 잔차 분석 기반 X-ray 영상의 투과도 평가 기법)

  • JunYoung Heo;HyeonJin Choi;Dong-Yeon Yoo;Joo-Sung Sun;Jung-Won Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.597-598
    • /
    • 2023
  • X-ray는 촬영 방식의 한계로 진단하기 어려운, 품질 낮은 영상을 다수 발생시킨다. 이러한 저품질 영상은 임상 현장에서의 진단이 어려울 뿐만 아니라, 진단 보조 도구를 개발함에 모델의 성능과 신뢰도를 떨어뜨리는 주요 요소가 된다. 특히 투과도가 낮은 영상은 학습 성능에 악영향을 미친다는 것이 입증된 바 있다. 따라서 본 연구는 투과도가 낮은 영상을 진단에 부적합한 영상으로 정의하여, 이를 분류하는 기법을 제안한다. 제안하는 기법은 민감도 94.9%. 특이도 96.0%의 높은 성능을 보였다.

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).