• Title/Summary/Keyword: face pose

Search Result 189, Processing Time 0.024 seconds

Anterior Cranial Base Reconstruction in Complex Craniomaxillofacial Trauma: An Algorithmic Approach and Single-Surgeon's Experience

  • Shakir, Sameer;Card, Elizabeth B.;Kimia, Rotem;Greives, Matthew R.;Nguyen, Phuong D.
    • Archives of Plastic Surgery
    • /
    • v.49 no.2
    • /
    • pp.174-183
    • /
    • 2022
  • Management of traumatic skull base fractures and associated complications pose a unique reconstructive challenge. The goals of skull base reconstruction include structural support for the brain and orbit, separation of the central nervous system from the aerodigestive tract, volume to decrease dead space, and restoration of the three-dimensional appearance of the face and cranium with bone and soft tissues. An open bicoronal approach is the most commonly used technique for craniofacial disassembly of the bifrontal region, with evacuation of intracranial hemorrhage and dural repair performed prior to reconstruction. Depending on the defect size and underlying patient and operative factors, reconstruction may involve bony reconstruction using autografts, allografts, or prosthetics in addition to soft tissue reconstruction using vascularized local or distant tissues. The vast majority of traumatic anterior cranial fossa (ACF) injuries resulting in smaller defects of the cranial base itself can be successfully reconstructed using local pedicled pericranial or galeal flaps. Compared with historical nonvascularized ACF reconstructive options, vascularized reconstruction using pericranial and/or galeal flaps has decreased the rate of cerebrospinal fluid (CSF) leak from 25 to 6.5%. We review the existing literature on this uncommon entity and present our case series of n = 6 patients undergoing traumatic reconstruction of the ACF at an urban Level 1 trauma center from 2016 to 2018. There were no postoperative CSF leaks, mucoceles, episodes of meningitis, or deaths during the study follow-up period. In conclusion, use of pericranial, galeal, and free flaps, as indicated, can provide reliable and durable reconstruction of a wide variety of injuries.

Unstable Behavior and Critical Buckling Load of a Single-Layer Dome using the Timber Elements (목재를 이용한 단층 지오데식 돔의 불안정 거동과 임계좌굴하중)

  • Hong, Seok-Ho;Ha, Hyeonju;Shon, Sudeok;Lee, Seungjae
    • Journal of Korean Association for Spatial Structures
    • /
    • v.23 no.2
    • /
    • pp.19-28
    • /
    • 2023
  • Timber structures are susceptible to moisture, contamination, and pest infestation, which can compromise their integrity and pose a significant fire hazard. Despite these drawbacks, timber's lightweight properties, eco-friendliness, and alignment with current architectural trends emphasizing sustainability make it an attractive option for construction. Moreover, timber structures offer economic benefits and provide a natural aesthetic that regulates building temperature and humidity. In recent years, timber domes have gained popularity due to their high recyclability, lightness, and improved fire resistance. Researchers are exploring hybrid timber and steel domes to enhance stability and rigidity. However, shallow dome structures still face challenges related to structural instability. This study investigates stability problems associated with timber domes, the behavior of timber and steel hybrid domes, and the impact of timber member positioning on dome stability and critical load levels. The paper analyzes unstable buckling in single-layer lattice domes using an incremental analysis method. The critical buckling load of the domes is examined based on the arrangement of timber members in the inclined and horizontal directions. The analysis shows that nodal snapping is observed in the case of a concentrated load, whereas snap-back is also observed in the case of a uniform load. Furthermore, the use of inclined timber and horizontal steel members in the lattice dome design provides adequate stability.

Learning efficiency checking system by measuring human motion detection (사람의 움직임 감지를 측정한 학습 능률 확인 시스템)

  • Kim, Sukhyun;Lee, Jinsung;Yu, Eunsang;Park, Seon-u;Kim, Eung-Tae
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • fall
    • /
    • pp.290-293
    • /
    • 2021
  • In this paper, we implement a learning efficiency verification system to inspire learning motivation and help improve concentration by detecting the situation of the user studying. To this aim, data on learning attitude and concentration are measured by extracting the movement of the user's face or body through a real-time camera. The Jetson board was used to implement the real-time embedded system, and a convolutional neural network (CNN) was implemented for image recognition. After detecting the feature part of the object using a CNN, motion detection is performed. The captured image is shown in a GUI written in PYQT5, and data is collected by sending push messages when each of the actions is obstructed. In addition, each function can be executed on the main screen made with the GUI, and functions such as a statistical graph that calculates the collected data, To do list, and white noise are performed. Through learning efficiency checking system, various functions including data collection and analysis of targets were provided to users.

  • PDF

Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures (차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안)

  • Ji-ung Hwang;Yo-seob Yoon;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.217-228
    • /
    • 2024
  • LiDAR(Light Detection And Ranging) sensors, which play a pivotal role among cameras, RADAR(RAdio Detection And Ranging), and ultrasonic sensors for the safe operation of autonomous vehicles, can recognize and detect objects in 360 degrees. However, since LiDAR sensors use lasers to measure distance, they are vulnerable to attackers and face various security threats. In this paper, we examine several security threats against LiDAR sensors: relay, spoofing, and replay attacks, analyze the possibility and impact of physical jamming attacks, and analyze the risk these attacks pose to the reliability of autonomous driving systems. Through experiments, we show that jamming attacks can cause errors in the ranging ability of LiDAR sensors. With vehicle-to-vehicle (V2V) communication, multi-sensor fusion under development and LiDAR anomaly data detection, this work aims to provide a basic direction for countermeasures against these threats enhancing the security of autonomous vehicles, and verify the practical applicability and effectiveness of the proposed countermeasures in future research.

Development of the Hippocampal Learning Algorithm Using Associate Memory and Modulator of Neural Weight (연상기억과 뉴런 연결강도 모듈레이터를 이용한 해마 학습 알고리즘 개발)

  • Oh Sun-Moon;Kang Dae-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.37-45
    • /
    • 2006
  • In this paper, we propose the development of MHLA(Modulatory Hippocampus Learning Algorithm) which remodel a principle of brain of hippocampus. Hippocampus takes charge auto-associative memory and controlling functions of long-term or short-term memory strengthening. We organize auto-associative memory based 3 steps system(DG, CA3, CAl) and improve speed of learning by addition of modulator to long-term memory learning. In hippocampal system, according to the 3 steps order, information applies statistical deviation on Dentate Gyrus region and is labelled to responsive pattern by adjustment of a good impression. In CA3 region, pattern is reorganized by auto-associative memory. In CAI region, convergence of connection weight which is used long-term memory is learned fast by neural networks which is applied modulator. To measure performance of MHLA, PCA(Principal Component Analysis) is applied to face images which are classified by pose, expression and picture quality. Next, we calculate feature vectors and learn by MHLA. Finally, we confirm cognitive rate. The results of experiments, we can compare a proposed method of other methods, and we can confirm that the proposed method is superior to the existing method.

Robust Eye Localization using Multi-Scale Gabor Feature Vectors (다중 해상도 가버 특징 벡터를 이용한 강인한 눈 검출)

  • Kim, Sang-Hoon;Jung, Sou-Hwan;Cho, Seong-Won;Chung, Sun-Tae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.1
    • /
    • pp.25-36
    • /
    • 2008
  • Eye localization means localization of the center of the pupils, and is necessary for face recognition and related applications. Most of eye localization methods reported so far still need to be improved about robustness as well as precision for successful applications. In this paper, we propose a robust eye localization method using multi-scale Gabor feature vectors without big computational burden. The eye localization method using Gabor feature vectors is already employed in fuck as EBGM, but the method employed in EBGM is known not to be robust with respect to initial values, illumination, and pose, and may need extensive search range for achieving the required performance, which may cause big computational burden. The proposed method utilizes multi-scale approach. The proposed method first tries to localize eyes in the lower resolution face image by utilizing Gabor Jet similarity between Gabor feature vector at an estimated initial eye coordinates and the Gabor feature vectors in the eye model of the corresponding scale. Then the method localizes eyes in the next scale resolution face image in the same way but with initial eye points estimated from the eye coordinates localized in the lower resolution images. After repeating this process in the same way recursively, the proposed method funally localizes eyes in the original resolution face image. Also, the proposed method provides an effective illumination normalization to make the proposed multi-scale approach more robust to illumination, and additionally applies the illumination normalization technique in the preprocessing stage of the multi-scale approach so that the proposed method enhances the eye detection success rate. Experiment results verify that the proposed eye localization method improves the precision rate without causing big computational overhead compared to other eye localization methods reported in the previous researches and is robust to the variation of post: and illumination.

A Study on the Use of Police Force in the Public Assembly: Focused on the Vehicle-wall-blocking and water cannon (집회현장에서의 경찰의 물리력 사용현황과 개선방안: 차벽과 물포 사용을 중심으로)

  • Hwang, Mun-Gyu
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.307-337
    • /
    • 2017
  • The freedom of assembly is the fundamental freedoms guaranteed by the Constitution. However, as far as our reality is concerned, the freedom of assembly is guaranteed only when it is under the control of the police, and otherwise it is perceived as an object to be suppressed. Police say even that they will not tolerate even a small illegal law while referring to the "broken window theory". Therefore, regardless of the peaceful nature of the rally, it is too obsessed with 'compliance'. This attitude is causing the citizens who participated in the assembly to be put to the object to be suppressed. This paper analyzes the requirements and current status of police force, focusing on the vehicle-wall-blocking and water cannon as a means of using the police force, which is a recent problem, and suggests ways to improve it. First of all, the installation of the wall cuts off the essential communication function of the assembly by separating the meeting place from the object of protest. Thus, despite the warning for prevention in the face of illegal acts, other than installing a barrier, it should be allowed only in the 'urgent case where there is a risk of causing damage to the life, body or property of the person'. Without this urgency, the vehicle-wall-blocking should not be allowed to be proactive as well as preventive. Secondly, the water cannon is a police force that is likely to harm people's life and body. Therefore, aiming shots, which could pose a significant risk to the human body, should in principle be prohibited. However, considering its risk, it should be supplementary used only when there is no other alternative, only when the direct risk to the legal interest of the other person or the order of public well-being is 'obvious'. In addition, as for the use standard of such a thing, it is necessary to be specified by law.

  • PDF

Consistency in the Basic Plan on Electricity Demand and Supply and Social Costs (전력수급기본계획의 정합성과 사회적 비용)

  • LEE, Suil
    • KDI Journal of Economic Policy
    • /
    • v.34 no.2
    • /
    • pp.55-93
    • /
    • 2012
  • In Korea, energy policies are actualized through various energy-related plans. Recently, however, as high-ranking plans, which are very vision-oriented, continually set higher sector-by-sector goals, subordinate action plans, which require consistency, encounter distortions in their establishment process. Also, each subordinate action plan reveals limitations in terms of securing flexibility of the plan in responding to uncertainties of the future. These problems pose potential risks such as causing huge social costs. In this regard, with an aim to provide empirical evidence for discussions on improving the procedure for developing and executing Korea's energy plans, this study mainly analyzes the Basic Plan on Electricity Demand and Supply-one of the most important subordinate action plans-in order to explain the problems of the Basic Plan in a logical manner, and potential problems that could occur in the process of sustaining consistency between the Basic Plan and its higher-ranking plans. Further, this paper estimates the scale of social costs caused by those problems assuming realistic conditions. According to the result, in the case of where maximum electric power is estimated to be 7% (15%) less than the actual amount in the Basic Plan on Electricity Demand and Supply, the annual generation cost will rise by 286 billion won and (1.2 trillion won) in 2020. Such social costs are found to occur even when establishing and executing the Basic plan according to the target goal set by its higher-ranking plan, the National Energy Master Plan. In addition, when another higher-ranking GHG reduction master plan requires the electricity sector to reduce emissions by additional 5% in the GHG emissions from the right mix in electricity generation with 'zero' cost of carbon emission, the annual generation cost will rise by approximately 915 billion won in 2020. On the other hand, the analysis finds that since economic feasibility of electric powers in Korea varies significantly depending on their type, Korea is expected to face very small potential social costs caused by uncertainties over the future price of carbon dioxide in the process of establishing the Basic Plan.

  • PDF

A Conceptual Review of the Transaction Costs within a Distribution Channel (유통경로내의 거래비용에 대한 개념적 고찰)

  • Kwon, Young-Sik;Mun, Jang-Sil
    • Journal of Distribution Science
    • /
    • v.10 no.2
    • /
    • pp.29-41
    • /
    • 2012
  • This paper undertakes a conceptual review of transaction cost to broaden the understanding of the transaction cost analysis (TCA) approach. More than 40 years have passed since Coase's fundamental insight that transaction, coordination, and contracting costs must be considered explicitly in explaining the extent of vertical integration. Coase (1937) forced economists to identify previously neglected constraints on the trading process to foster efficient intrafirm, rather than interfirm, transactions. The transaction cost approach to economic organization study regards transactions as the basic units of analysis and holds that understanding transaction cost economy is central to organizational study. The approach applies to determining efficient boundaries, as between firms and markets, and to internal transaction organization, including employment relations design. TCA, developed principally by Oliver Williamson (1975,1979,1981a) blends institutional economics, organizational theory, and contract law. Further progress in transaction costs research awaits the identification of critical dimensions in which transaction costs differ and an examination of the economizing properties of alternative institutional modes for organizing transactions. The crucial investment distinction is: To what degree are transaction-specific (non-marketable) expenses incurred? Unspecialized items pose few hazards, since buyers can turn toalternative sources, and suppliers can sell output intended for one order to other buyers. Non-marketability problems arise when specific parties' identities have important cost-bearing consequences. Transactions of this kind are labeled idiosyncratic. The summarized results of the review are as follows. First, firms' distribution decisions often prompt examination of the make-or-buy question: Should a marketing activity be performed within the organization by company employees or contracted to an external agent? Second, manufacturers introducing an industrial product to a foreign market face a difficult decision. Should the product be marketed primarily by captive agents (the company sales force and distribution division) or independent intermediaries (outside sales agents and distribution)? Third, the authors develop a theoretical extension to the basic transaction cost model by combining insights from various theories with the TCA approach. Fourth, other such extensions are likely required for the general model to be applied to different channel situations. It is naive to assume the basic model appliesacross markedly different channel contexts without modifications and extensions. Although this study contributes to scholastic research, it is limited by several factors. First, the theoretical perspective of TCA has attracted considerable recent interest in the area of marketing channels. The analysis aims to match the properties of efficient governance structures with the attributes of the transaction. Second, empirical evidence about TCA's basic propositions is sketchy. Apart from Anderson's (1985) study of the vertical integration of the selling function and John's (1984) study of opportunism by franchised dealers, virtually no marketing studies involving the constructs implicated in the analysis have been reported. We hope, therefore, that further research will clarify distinctions between the different aspects of specific assets. Another important line of future research is the integration of efficiency-oriented TCA with organizational approaches that emphasize specific assets' conceptual definition and industry structure. Finally, research of transaction costs, uncertainty, opportunism, and switching costs is critical to future study.

  • PDF