• Title/Summary/Keyword: reconstruction of content

Search Result 107, Processing Time 0.022 seconds

Micro-computed tomography for assessing the internal and external voids of bulk-fill composite restorations: A technical report

  • Tosco, Vincenzo;Monterubbianesi, Riccardo;Furlani, Michele;Giuliani, Alessandra;Putignano, Angelo;Orsini, Giovanna
    • Imaging Science in Dentistry
    • /
    • v.52 no.3
    • /
    • pp.303-308
    • /
    • 2022
  • Purpose: This technical report aims to describe and detail the use of micro-computed tomography for a reliable evaluation of the bulk-fill composite/tooth interface. Materials and Methods: Bulk-fill composite restorations in tooth cavities were scanned using micro-computed tomography to obtain qualitatively and quantitatively valuable information. Two-dimensional information was processed using specific algorithms, and ultimately a 3-dimensional (3D) specimen reconstruction was generated. The 3D rendering allowed the visualization of voids inside bulk-fill composite materials and provided quantitative measurements. The 3D analysis software VG Studio MAX was used to perform image analysis and assess gap formation within the tooth-restoration interface. In particular, to evaluate internal adaptation, the Defect Analysis addon module of VG Studio Max was used. Results: The data, obtained with the processing software, highlighted the presence and the shape of gaps in different colours, representing the volume of porosity within a chromatic scale in which each colour quantitatively represents a well-defined volume. Conclusion: Micro-computed tomography makes it possible to obtain several quantitative parameters, providing fundamental information on defect shape and complexity. However, this technique has the limit of not discriminating materials without radiopacity and with low or no filler content, such as dental adhesives, and hence, they are difficult to visualise through software reconstruction.

Elimination of Saturated Fatty Acids, Toxic Cyclic nonapeptide and Cyanogen Glycoside Components from Flax Seed Oil

  • Choi, Eun-Mi;Kim, Jeung-Won;Pyo, Mi-Kyung;Jo, Sung-Jun;Han, Byung-Hoon
    • Biomolecules & Therapeutics
    • /
    • v.15 no.1
    • /
    • pp.65-72
    • /
    • 2007
  • Flax seed(Linseed, Linum usitatissimum L.) and its oil, a richest source of alpha-linolenic acid(ALA)(${\omega}-3$), contain saturated fatty acids, neurotoxic cyanogen glycosides and immuno-suppressive cyclic-nonapeptides. Present paper describes the development of two chemical processes, Process-A and -B, to remove saturated fatty acids and to destroy cyclic nonapeptides and cyanogen glycosides from flax seed oil. Process-A consists of three major steps, i.e., extraction of fatty acid mixture by alkaline saponification, removal of saturated fatty acid by urea-complexation, and triglyceride reconstruction of unsaturated fatty acid via fatty acyl-chloride activation using oxalyl chloride. Process-B consists of preparation of fatty acid ethyl ester by transesterification, elimination of saturated fatty acid ester by urea-complexation, and reconstruction of triglyceride by interesterification with glycerol-triacetate (triacetin). The destruction of lipophilic cyclic nonapeptide during saponification or transesterification processes could be demonstrated indirectly by the disappearance of antibacterial activity of bacitracin, an analogous cyclic-decapeptide. The cyanogen glycosides were found only in the dregs after hexane extraction, but not in the flax seed oil. The reconstructed triglyceride of flax seed oil, obtained by these two different pathways after elimination of saturated fatty acid and toxic components, showed agreeable properties as edible oil in terms of taste, acid value, iodine and peroxide value, glycerine content, and antioxidant activity.

High Spatial Resolution Satellite Image Simulation Based on 3D Data and Existing Images

  • La, Phu Hien;Jeon, Min Cheol;Eo, Yang Dam;Nguyen, Quang Minh;Lee, Mi Hee;Pyeon, Mu Wook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.34 no.2
    • /
    • pp.121-132
    • /
    • 2016
  • This study proposes an approach for simulating high spatial resolution satellite images acquired under arbitrary sun-sensor geometry using existing images and 3D (three-dimensional) data. First, satellite images, having significant differences in spectral regions compared with those in the simulated image were transformed to the same spectral regions as those in simulated image by using the UPDM (Universal Pattern Decomposition Method). Simultaneously, shadows cast by buildings or high features under the new sun position were modeled. Then, pixels that changed from shadow into non-shadow areas and vice versa were simulated on the basis of existing images. Finally, buildings that were viewed under the new sensor position were modeled on the basis of open library-based 3D reconstruction program. An experiment was conducted to simulate WV-3 (WorldView-3) images acquired under two different sun-sensor geometries based on a Pleiades 1A image, an additional WV-3 image, a Landsat image, and 3D building models. The results show that the shapes of the buildings were modeled effectively, although some problems were noted in the simulation of pixels changing from shadows cast by buildings into non-shadow. Additionally, the mean reflectance of the simulated image was quite similar to that of actual images in vegetation and water areas. However, significant gaps between the mean reflectance of simulated and actual images in soil and road areas were noted, which could be attributed to differences in the moisture content.

Sorption of Arsenate by the Calcined Mg-Al Layered Double Hydroxide (소성된 Mg-Al Layered Double Hydroxide에 의한 비소(V)의 흡착)

  • Seo, Young-Jin;Kang, Yun-Ju;Choi, Jung;Kim, Jun-Hyeong;Park, Man
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.41 no.6
    • /
    • pp.369-373
    • /
    • 2008
  • Special concern has been given to the elevated arsenic content in soils because of its high mobility and toxicity. Layered double hydroxide (LDH) which has a high anionic exchange capacity is another potential anion adsorbent for toxic anions such as arsenic, chromate and selenium etc. The uptake of arsenate from aqueous solutions by the calcined Mg-Al LDH has been investigated. The sorption capacity was about 530 mmol/kg. Sorption isotherm was defined as L-type in which arsenate was removed by LDH through anion uptake reaction. Arsenate sorption by the calcined Mg-Al LDH was occurred by reconstruction of LDH's framework. Competitive adsorption revealed that Mg-Al LDH had higher selectivity for arsenate than for sulfate. These results strongly suggest that calcined Mg-Al LDH has a promising potential for efficient removal of toxic metal oxides like arsenates from aqueous environments.

Reconstruction of e-Learning Contents based on Web 2.0, and the Level Diagnosis (Web 2.0 기반 e-러닝 콘텐츠 재구성 및 수준 진단)

  • Lim, Yang-Won;Lim, Han-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.429-437
    • /
    • 2010
  • As Web technology and functions have recently changed to a user-focused paradigm, new studies are being conducted to construct dynamic learning content that enables the learner's participation and continuous learning in the field of e-learning research and design. This paper covers a study on the degree of difficulty in learner-focused dynamic learning contents to provide efficient learning environments for its adaptation to e-learning 2.0. This study suggests DLA (Dynamic Level Adjustment) to provide learner-focused contents. The suggested system will be a guideline to control and adopt learning content that can be easily applied to the environmental change, and more in-depth future research can be performed by using the system. A dynamic learning content model was made to recognize various learning patterns of learners as a result of the performance evaluation.

Convergence Reconstruction of Transition Education Model for Korean Students with Disabilities: A Feasibility View on the Development of Support System for Lifelong Education for the Disabled through the Linkage between Schools and Community (한국 장애학생 전환교육(transition education) 모델 융합 재구성: 학교-지역사회 연계 장애인평생교육지원체제 개발 타당성 관점)

  • Kim, Young-Jun;Kim, Wha-Soo;Kwon, Ryang-Hee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.95-104
    • /
    • 2021
  • This study was conducted for the purpose of convergence reconstruction of the transition education model for students with disabilities in Korea. Ultimately, this study was also conducted with the aim of enhancing the perspective of the development of a lifelong education support system for the disabled in connection with schools and communities. The research method consisted of a procedure with a meeting of experts based on the procedure of analyzing the previous research literature that tried to materialize the transition education model for students with disabilities from the viewpoint of connection between school age and adulthood. The contents of this study were reflected in the dimension of ensuring consistent connectivity validity based on the viewpoint of school-centered, community-centered, education, and welfare between special education and lifelong education for the disabled in order to reconstruct the conversion transition education model constructed in the current special education field. Accordingly, the transition education model for students with disabilities built in the field of special education centered on school age minimizes the tendency of a fragmented approach between school age and adulthood, and presents a standard basis and structure that can be linked to the entire adulthood. The transition education model was reconstructed convergence in terms of content.

Audience Cognitive Reconstruction of the Extended Meaning of Complex Mechanism Text : For Communication Education using Story Media Expressions (복합기제 텍스트의 확장 의미에 대한 수용자의 인지적 재구성 : 서사적 미디어 표현을 활용한 의사소통 교육을 위해)

  • Lim, Ji-Won
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.7
    • /
    • pp.137-143
    • /
    • 2021
  • This discussion can be said to be a qualitative study on the possibility of linking communication education for college students and literacy education for Korean language-linked educators based on the theory of interpretation of cognitive meaning of media text containing complex mechanisms. The implicit meaning of media content expression used as an interactive communication strategy will be accepted as a multilateral interpretation according to the individual learner's cognitive environment. If so, how is the general media content meaning intended by the content creator being accepted? These doubts are the starting point for discussion. To solve the problem, I leaned on the experimental pragmatic methodology of cognitive aesthetics and applied a model of relevance of cognitive linguistics to connect learners' creative cognitive environment and present content to find a contrast. As a result of the discussion, it was possible to establish a basic framework for learners to express their subjectivity and creative thinking that could connect the cognitive environment and present content themselves. In particular, active and positive learners also revealed direct descriptive expressions to build a new cognitive environment, such as suggesting a third alternative to argue the ability to question produced media texts and the validity of the meaning implied in the text. In the future, since media text containing complex mechanisms is an indirect and persuasive communication behavior that occurs easily through various media in modern society, the universal communication principle of reliable conversation between media text creators and audiences should exist.

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

Study on Effective Knowledge Delivery and Construction (효과적인 지식 전달 요소와 지식 구조화에 관한 연구)

  • Chae, Jeong-Byung;Kim, Soo-Hwan;Kim, HyeonCheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.3
    • /
    • pp.43-55
    • /
    • 2008
  • This study investigates how learners extract their implicit knowledge into explicit form of the knowledge. The process of implicit-explicit transfer is known to help learners to reconstruct and refine their knowledge which was constructed before in some ways. Also we investigate which types of explicit form are more effective when it is delivered to other learners. In a classroom-based learning environment, students take educational content that is delivered by instructor and go through the process in which they try to fit the content into their cognitive structure by reconstructing the knowledge into their cognitive model. When they try to deliver their own cognitive model for the knowledge to other learners, they have to transform it into explicit form, and through the process, they reconstruct and refine the cognitive model of the knowledge, and find effective and appropriate way to express it. In this research, we experimented the process on a group of 77 college students and analyzed the results. We also did peer evaluated experiments to see which types of explicit format and factors are more effective than others. The results indicate that the types of explicit form of implicit knowledge play an important role in effectiveness of learning.

  • PDF

Digital Hologram Encryption Algorithm using Fresnel Diffraction (프레넬 회절을 이용한 디지털 홀로그램 암호화 알고리즘)

  • Lee, Yoon-Hyuk;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.807-817
    • /
    • 2015
  • This paper is to propose an encryption method for only an allowed user to see the content for a digital hologram, that is a high value-added content. This paper uses a characteristic of Fresnel transform that the object region is concentrated to a relatively small part of the diffraction plane. By encrypting the concentrated part only the region to be encrypted and in turn the amount of data to be encrypted is reduced a lot, which results in an high efficiency with low encryption rate. As the methodology, a digital hologram is first Fresnel transformed for reconstruction and the result is secondly Fresnel transformed to concentrate the energy into the center of the diffraction plane to encrypt the concentrated region only. For the 2nd transform, energy concentration degree is determined by adjusting the diffraction distance and encryption strength is determined by adjusting the scaling factor. For this we analyze the optimal encryption area according to the diffraction distance and the scaling factor. When applying the proposed method with diffraction distance of 20m the object information was visually unrecognizable with the encryption ratio only 0.005% ~ 0.02%.