• Title/Summary/Keyword: Y Block

Search Result 12,758, Processing Time 0.046 seconds

THE EVALUATION OF CYTOTOXICITY AND BIOCOMPATIBILITY OF TI-TA-NB-BASE ALLOY (Ti-Ta-Nb계 합금의 세포독성과 생체적합성의 평가)

  • Cui De-Zhe;Vang Mong-Sook;Yoon Taek-Rin
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.44 no.2
    • /
    • pp.250-263
    • /
    • 2006
  • Statement of problem: Ti-alloy has been used widely since it was produced in the United States in 1947 because it has high biocompatibility and anticorrosive characteristics. Purpose: The pure titanium, however, was used limitedly due to insufficient mechanical charateristics and difficult manufacturing process. Our previous study was focused on the development of a new titanium alloy. In the previous study we found that the Ti-Ta-Nb alloy had better mechanical characteristics and similar anticorrosive characteristics to Ti-6Al-4V Material and methods: In this study, the cytotoxicity of the Ti-Ta-Nb alloy was evaluated by MTT assay using MSCs(Mesenchaimal stem cells) and L929 cells(fibroblast cell line). The biocompatibility of the Ti-Ta-Nb alloy was performed by inserting the alloy into the femur of the rabbits and observing the radiological and histological changes surrounding the alloy implant. Results: 1. In the cytotoxicity test using MSCs, the 60% survival rate was observed in pure titanium, 84% in Ti-6Al-4V alloy and 95% in Ti-10Ta-10Nb alloy. 2. In the animal study, the serial follow-up of the radiographs showed no separation or migration revealing gradual bone ingrowth surrounding the implants. Similar radiographic results were obtained among three implant groups pure titanium, Ti-6Al-4V alloy and Ti-10Ta-10Nb alloy. 3. In the histologic examination of the bone block containing the implants. the bone ingrowth was prominent around the implants with the lapse of time. There was no signs of any tissue rejection, degeneration, or inflammation. Active bone ingrowth was observed around the implants. In the comparison of the three groups, the rate of bone ingrowth was better in the Ti-10Ta-10Nb alloy group than those in pure titanium group or Ti-6Al-4V alloy group. In conclusion, Ti-10Ta-10Nb alloy revealed better biocompatibility in survival rate of the cells and bone ingrowth around the implants. Therefore we believe a newly developed Ti-10Ta-10Nb alloy can replace currently used Ti-6Al-4V alloy to increase biocompatibility and to decrease side effects. Conclusion: In conclusion, Ti-10Ta-10Nb alloy revealed better biocompatibility in survival rate of the cells and bone ingrowth around the implants. Therefore we believe a newly developed Ti-10Ta-10Nb alloy can replace currently used Ti-6Al-4V alloy to increase biocompatibility and to decrease side effects.

Effects of implant alignment and load direction on mandibular bone and implant: finite element analysis (임플란트 배열과 하중 방향이 임플란트와 치조골에 미치는 유한요소 응력분석)

  • Chung, Hyunju;Park, Chan;Yun, Kwi-Dug;Lim, Hyun-Pil;Park, Sang-Won;Yang, Hongso
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.36 no.3
    • /
    • pp.176-182
    • /
    • 2020
  • Purpose: To evaluate the effects of load direction, number of implants, and alignment of implant position on stress distribution in implant, prosthesis, and bone tissue. Materials and Methods: Four 3D models were made to simulate posterior mandible bone block: two implants and 3-unit fixed dental prosthesis (FDP) with a pontic in the center (model M1), two implants and 3-unit FDP with a cantilever pontic at one end (model M2), FDP supported by three implants with straight line placement (model M3) and FDP supported by three implants with staggered implant configuration (model M4). The applied force was 120 N axially or 120 N obliquely. Results: Peak von Mises stresses caused by oblique occlusal force were 3.4 to 5.1 times higher in the implant and 3.5 to 8.3 times higher in the alveolar bone than those stresses caused by axial occlusal force. In model M2, the connector area of the distal cantilever in the prosthesis generated the highest von Mises stresses among all models. With the design of a large number of implants, low stresses were generated. When three implants were placed, there were no significant differences in the magnitude of stress between staggered arrangement and straight arrangement. Conclusion: The effect of staggering alignment on implant stress was negligible. However, the number of implants had a significant effect on stress magnitude.

An Evaluation of Human Thermal Comfort and Improvement of Thermal Environment by Spatial Structure (공간 구조별 열쾌적성 평가와 열환경 개선방안)

  • Lee, Jung-A;Jung, Dae-Young;Chon, Jin-Hyung;Lee, Sang-Moon;Song, Young-Bae
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.38 no.5
    • /
    • pp.12-20
    • /
    • 2010
  • The purpose of this study is to evaluate human thermal comfort by spatial structure and to explore solutions to improve the thermal environment of a small urban space. The study site was Korea University campus. Thermal conditions were measured to evaluate the quality of the thermal environment in each type of space within the study site. Micrometeorology measurements, analysis of space characteristics for using fish-eye lens photography, and thermal comfort modeling through the use of collected meteorological data, such as temperature and humidity, were performed. Results showed that the level of thermal comfort for humans differs depending on the types of space within the study site. Thermal comfort is better in open spaces than enclosed in the aspect of radiative mean temperature, Predicted Mean Vote(PMV), and Physiologically Equivalent Temperature(PET). This fact is probably due to shadows or buildings or trees that may block solar radiation. Thus, it is necessary to consider the spatial arrangements of buildings and trees to enhance openness and ventilation in the space. Paving materials and exterior building materials should also be selected to lower the radiant temperature. Given these results, a quantitative evaluation on human thermal comfort could propose a way to plan user comfortable small urban spaces. Study methods used and results provided in the study can promote a better way for urban space planning direction to improve environmental quality.

Architecture Design of High Performance H.264 CAVLC Encoder Using Optimized Searching Technique (최적화된 탐색기법을 이용한 고성능 H.264/AVC CAVLC 부호화기 구조 설계 기법)

  • Lee, Yang-Bok;Jung, Hong-Kyun;Kim, Chang-Ho;Myung, Je-Jin;Ryoo, Kwang-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.431-435
    • /
    • 2011
  • This paper presents optimized searching technique to improve the performance of H.264/AVC. The proposed CAVLC encoder uses forward and backward searching algorithm to compute the parameters. By zero-block skipping technique and pipelined scheduling, the proposed CAVLC encoder can obtain better performance. The experimental result shows that the proposed architecture needs only 66.6 cycles on average for each $16{\times}16$ macroblock encoding. The proposed architecture improves the performance by 13.8% than that of previous designs. The proposed CAVLC encoder was implemented using VerilogHDL and synthesized with Megnachip $0.18{\mu}m$ standard cell library. The synthesis result shows that the gate count is about 15.6K with 125Mhz clock frequency.

  • PDF

Simulation Implementation of Fossil Power Plant Condensate Pumps' Rotation Operation Logic Using MATLAB/Simulink (MATLAB/Simulink를 이용한 화력발전소 복수펌프 순환기동로직 시뮬레이션 구현)

  • Yoon, Chang-Sun;Hong, Yeon-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.693-699
    • /
    • 2016
  • The simulators for pump operation developed by domestic or overseas research have been developed for dynamic analysis or operator training purposes. However, previous developed simulators focused on the operators so they are unsuitable for logic designers or commissioning engineers who need to change the operation conditions or logics arbitrarily. In addition, the simulator for two or more condensate pumps' operation, which can be used easily by plant designers or operators, has not been developed. Accordingly, this paper suggests a simulation method that can be used easily for plant designers or operators using MATLAB Simulink. This suggestion helps users who can use MATLAB to implement ANSI/ISA S5.2, which is applied mainly for DCS (Distributed Control System). In addition, to implement the logics specified in the CODE, Sub-Systems were created for the block and evaluated to determine if they can be used in the simulator. In the working level stage using the suggested method, all error possibilities that might occur during the three pumps' rotation operation could be verified with the suggested simulator during the design stage or before operation.

A Blind Watermarking Algorithm using CABAC for H.264/AVC Main Profile (H.264/AVC Main Profile을 위한 CABAC-기반의 블라인드 워터마킹 알고리즘)

  • Seo, Young-Ho;Choi, Hyun-Jun;Lee, Chang-Yeul;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.181-188
    • /
    • 2007
  • This paper proposed a watermark embedding/extracting method using CABAC(Context-based Adaptive Binary Arithmetic Coding) which is the entropy encoder for the main profile of MPEG-4 Part 10 H.264/AVC. This algorithm selects the blocks and the coefficients in a block on the bases of the contexts extracted from the relationship to the adjacent blocks and coefficients. A watermark bit is embedded without any modification of coefficient or with replacing the LSB(Least Significant Bit) of the coefficient with a watermark bit by considering both the absolute value of the selected coefficient and the watermark bit. Therefore, it makes it hard for an attacker to find out the watermarked locations. By selecting a few coefficients near the DC coefficient according to the contexts, this algorithm satisfies the robustness requirement. From the results from experiments with various kinds and various strengths of attacks the maximum error ratio of the extracted watermark was 5.02% in maximum, which makes certain that the proposed algorithm has very high level of robustness. Because it embeds the watermark during the context modeling and binarization process of CABAC, the additional amount of calculation for locating and selecting the coefficients to embed watermark is very small. Consequently, it is highly expected that it is very useful in the application area that the video must be compressed right after acquisition.

Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering (모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Oh, Tae-Woo;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 2017
  • With the advance of Internet Technology, various social network services are created and used by users. Especially, the use of smart devices makes that multimedia contents can be used and distributed on social network services. However, since the crime rate also is increased by users with illegal purposes, there are needs to protect contents and block illegal usage of contents with multimedia forensics. In this paper, we propose a multimedia forensic technique which is identifying the video source. First, the scheme to acquire the sensor pattern noise (SPN) using morphology filtering is presented, which comes from the imperfection of photon detector. Using this scheme, the SPN of reference videos from the reference device is estimated and the SPN of an unknown video is estimated. Then, the similarity between two SPNs is measured to identify whether the unknown video is acquired using the reference device. For the performance analysis of the proposed technique, 30 devices including DSLR camera, compact camera, camcorder, action cam and smart phone are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 96% accuracy in identification.

EPR : Enhanced Parallel R-tree Indexing Method for Geographic Information System (EPR : 지리 정보 시스템을 위한 향상된 병렬 R-tree 색인 기법)

  • Lee, Chun-Geun;Kim, Jeong-Won;Kim, Yeong-Ju;Jeong, Gi-Dong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2294-2304
    • /
    • 1999
  • Our research purpose in this paper is to improve the performance of query processing in GIS(Geographic Information System) by enhancing the I/O performance exploiting parallel I/O and efficient disk access. By packing adjacent spatial data, which are very likely to be referenced concurrently, into one block or continuous disk blocks, the number of disk accesses and the disk access overhead for query processing can be decreased, and this eventually leads to the I/O time decrease. So, in this paper, we proposes EPR(Enhanced Parallel R-tree) indexing method which integrates the parallel I/O method of the previous Parallel R-tree method and a packing-based clustering method. The major characteristics of EPR method are as follows. First, EPR method arranges spatial data in the increasing order of proximity by using Hilbert space filling curve, and builds a packed R-tree by bottom-up manner. Second, with packing-based clustering in which arranged spatial data are clustered into continuous disk blocks, EPR method generates spatial data clusters. Third, EPR method distributes EPR index nodes and spatial data clusters on multiple disks through round-robin striping. Experimental results show that EPR method achieves up to 30% or more gains over PR method in query processing speed. In particular, the larger the size of disk blocks is and the smaller the size of spatial data objects is, the better the performance of query processing by EPR method is.

  • PDF

Access Frequency Based Selective Buffer Cache Management Strategy For Multimedia News Data (접근 요청 빈도에 기반한 멀티미디어 뉴스 데이터의 선별적 버퍼 캐쉬 관리 전략)

  • Park, Yong-Un;Seo, Won-Il;Jeong, Gi-Dong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2524-2532
    • /
    • 1999
  • In this paper, we present a new buffer pool management scheme designed for video type news objects to build a cost-effective News On Demand storage server for serving users requests beyond the limitation of disk bandwidth. In a News On Demand Server where many of users request for video type news objects have to be serviced keeping their playback deadline, the maximum numbers of concurrent users are limited by the maximum disk bandwidth the server provides. With our proposed buffer cache management scheme, a requested data is checked to see whether or not it is worthy of caching by checking its average arrival interval and current disk traffic density. Subsequently, only granted news objects are permitted to get into the buffer pool, where buffer allocation is made not on the block basis but on the object basis. We evaluated the performance of our proposed caching algorithm through simulation. As a result of the simulation, we show that by using this caching scheme to support users requests for real time news data, compared with serving those requests only by disks, 30% of extra requests are served without additional cost increase.

  • PDF

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.