Purpose: Although the Dejour classification is the primary classification system for evaluating trochlear dysplasia, concerns have been raised about its reliability owing to its qualitative criteria and challenges associated with obtaining accurate radiographs. This study aimed to quantify trochlear dysplasia using three-dimensional (3D) computed tomography (CT) reconstruction with novel parameters related to the transepicondylar axis (TEA).
Methods: Sixty patients were enrolled, including 20 with trochlear dysplasia and 40 healthy controls.
Recently, with the increasing application of the Internet of Things (IoT), various IoT environments such as smart factories, smart homes, and smart grids are being generated. In the IoT environment, a lot of data are generated in real time, and the generated IoT data can be used as source data for various services such as artificial intelligence, remote medical care, and finance, and can also be used for purposes such as electricity bill generation. Therefore, data access control is required to grant access rights to various data users in the IoT environment who need such IoT data.
View Article and Find Full Text PDFIn IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wireless channel in the Wireless Sensor Network (WSN) for utilizing IoT services. Authentication and key agreements are essential elements for providing secure services in WSNs.
View Article and Find Full Text PDFIEEE Trans Image Process
August 2022
A holistic understanding of dynamic scenes is of fundamental importance in real-world computer vision problems such as autonomous driving, augmented reality and spatio-temporal reasoning. In this paper, we propose a new computer vision benchmark: Video Panoptic Segmentation (VPS). To study this important problem, we present two datasets, Cityscapes-VPS and VIPER together with a new evaluation metric, video panoptic quality (VPQ).
View Article and Find Full Text PDFPurpose: To evaluate the clinical efficacy and safety of tumor enucleation (TE) compared with partial nephrectomy (PN) for T1 renal cell carcinoma.
Materials And Methods: According to protocol, we searched multiple data sources for published and unpublished randomized controlled trials and nonrandomized studies (NRSs) in any language. We performed systematic review and meta-analysis according to the Cochrane Handbook for Systematic Reviews of Interventions and rated the certainty of the evidence (CoE) using the GRADE framework.
Korean J Women Health Nurs
September 2021
Purpose: The purpose of this study was to describe pregnant women's lived experiences of hospitalization due to preterm labor in Korea.
Methods: This qualitative study adopted a phenomenological approach. Individual in-depth interviews were conducted with nine participants, over the age of 20 years, who had been hospitalized for more than 1 week after being diagnosed with preterm labor.
Sensors (Basel)
February 2021
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel.
View Article and Find Full Text PDFWireless sensor networks (WSN) are widely used to provide users with convenient services such as health-care, and smart home. To provide convenient services, sensor nodes in WSN environments collect and send the sensing data to the gateway. However, it can suffer from serious security issues because susceptible messages are exchanged through an insecure channel.
View Article and Find Full Text PDFIEEE Trans Pattern Anal Mach Intell
January 2022
We propose a novel and unified solution for user-guided video object segmentation tasks. In this work, we consider two scenarios of user-guided segmentation: semi-supervised and interactive segmentation. Due to the nature of the problem, available cues - video frame(s) with object masks (or scribbles) - become richer with the intermediate predictions (or additional user inputs).
View Article and Find Full Text PDFPhysical changes in arranged silver nanowires were monitored during progressive heating inside a transmission electron microscope. Using the in-situ experimental method, overall variation of silver nanowires and movement of the silver atoms could be assessed. The physical morphology of silver nanowires was rapidly transformed above 350 °C as they fused with each other, which led to extrusion of the silver atoms.
View Article and Find Full Text PDFIn the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are difficult to share on the different medical platforms. Recently, blockchain technology is one of the popular alternatives to enable medical service centers based on different platforms to share EHRs. However, it is hard to store whole EHR data in blockchain because of the size and the price of blockchain.
View Article and Find Full Text PDFIEEE Trans Pattern Anal Mach Intell
May 2020
Video inpainting aims to fill in spatio-temporal holes in videos with plausible content. Despite tremendous progress on deep learning-based inpainting of a single image, it is still challenging to extend these methods to video domain due to the additional time dimension. In this paper, we propose a recurrent temporal aggregation framework for fast deep video inpainting.
View Article and Find Full Text PDFSmart grids incorporating internet-of-things are emerging solutions to provide a reliable, sustainable and efficient electricity supply, and electric vehicle drivers can access efficient charging services in the smart grid. However, traditional electric vehicle charging systems are vulnerable to distributed denial of service and privileged insider attacks when the central charging server is attacked. The blockchain-based charging systems have been proposed to resolve these problems.
View Article and Find Full Text PDFInternet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users. However, the wireless network is an open channel, which is insecure to attacks from adversaries such as replay attacks, impersonation attacks, and invasions of privacy.
View Article and Find Full Text PDFPurpose: To evaluate whether the fibular position and lateral proximal tibial geometry affect the osteotomy configuration and lateral hinge fracture (LHF) during open wedge high tibial osteotomy (OWHTO).
Methods: From March 2014 to January 2016, patients who underwent OWHTO for isolated medial compartment osteoarthritis of the knee were retrospectively reviewed. To identify whether the fibular position and lateral proximal tibial geometry affect the osteotomy configuration, the fibular height, fibular anteroposterior position, lateral tibial condylar width, and lateral tibial condylar slope were evaluated on plain radiograph or computed tomography (CT).
With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle accidents, and speed. However, a driver and traffic manager can be vulnerable to various attacks because such information is transmitted through a public channel. Therefore, secure mutual authentication has become an important security issue, and many authentication schemes have been proposed.
View Article and Find Full Text PDFPhytoestrogen (PE) has received considerable attention due to the physiological significance of its estrogenicity. Flemingia strobilifera (FS) has been used as a folk medicine in Asia for the treatment of inflammation, cancer, and infection; however, the estrogenic effects and chemical components of FS have not yet been reported. We aimed to uncover the estrogenic properties and PEs derived from FS using phytochemical and pharmacological evaluation.
View Article and Find Full Text PDFWe herein describe a novel impedimetric method to determine alkaline phosphatase (ALP) activity based on the Cu-mediated oxidation of ascorbic acid on a specific DNA probe-modified electrode. In this method, pyrophosphate (PPi) capable of complexing with Cu is employed as a substrate of the ALP enzyme. In the presence of ALP, PPi is hydrolyzed to phosphate (Pi), which is not able to entrap Cu.
View Article and Find Full Text PDFA novel strategy to achieve label-free multiplex DNA detection system based on the projected capacitive touchscreen is developed. Touchscreen panel is first fabricated by patterning the ITO (indium-tin-oxide) electrode array on the glass wafer, and the electrodes are modified with the respective capture probe DNA sequences complementary to hemagglutinin1 (H1), neuraminidase1 (N1), and matrix1 (M1) DNA to demonstrate the molecular diagnosis of H1N1 influenza virus as a model pathogen. DNA sample is applied to the electrodes to allow hybridization of target DNA with the corresponding complementary capture probe.
View Article and Find Full Text PDFIEEE Trans Image Process
May 2017
We present a novel coded exposure video technique for multi-image motion deblurring. The key idea of this paper is to capture video frames with a set of complementary fluttering patterns, which enables us to preserve all spectrum bands of a latent image and recover a sharp latent image. To achieve this, we introduce an algorithm for generating a complementary set of binary sequences based on the modern communication theory and implement the coded exposure video system with an off-the-shelf machine vision camera.
View Article and Find Full Text PDFBackground: Mucosal Schwann-cell hamartoma is a rare mesenchymal polyp that presents in the intestine. Despite lacking ganglion cells, it resembles a gastrointestinal ganglioneuroma.
Case Presentation: We report a case of synchronous mucosal Schwann-cell hamartomas in a young male patient, who presented with a single discrete polyp in the mid-rectum and multiple polypoid mucosal lesions in the distal rectum.
IEEE Trans Pattern Anal Mach Intell
June 2015
This paper introduces a new high dynamic range (HDR) imaging algorithm which utilizes rank minimization. Assuming a camera responses linearly to scene radiance, the input low dynamic range (LDR) images captured with different exposure time exhibit a linear dependency and form a rank-1 matrix when stacking intensity of each corresponding pixel together. In practice, misalignments caused by camera motion, presences of moving objects, saturations and image noise break the rank-1 structure of the LDR images.
View Article and Find Full Text PDFIEEE Trans Pattern Anal Mach Intell
July 2015
We present a calibration method of a time-of-flight (ToF) sensor and a color camera pair to align the 3D measurements with the color image correctly. We have designed a 2.5D pattern board with irregularly placed holes to be accurately detected from low resolution depth images of a ToF camera as well as from high resolution color images.
View Article and Find Full Text PDFBackground/aims: To investigate the incidence of cholangiocarcinoma in patients with hepatolithiasis with or without previous resection of liver.
Methods: From 2002 to 2009, we retrospectively reviewed 117 patients who were diagnosed and treated for hepatolithiasis in Korea University Guro Hospital. Among the 117 patients, 55 patients who were lost during follow-up were excluded, and 62 patients were eligible for analysis.