AUTOMATIC MICROINJECTION SYSTEM USING STEREOSCOPIC MICROSCOPE
نویسندگان
چکیده
منابع مشابه
Micromanipulation System Using Stereoscopic Microscope
In this paper, we describe a visual feedback system using a stereoscopic microscope. The system controls a micromanipulator so that a needle head may pierce a target as much length as desired. The tip position of the needle head and the target under the microscope are measured three dimensionally with two CCD cameras that are set to the eyepieces of the microscope. However, the visual feedback ...
متن کاملHigh-Definition 3D Stereoscopic Microscope Display System for Biomedical Applications
1College of Electrical and Computer Engineering, Chungbuk National University, 410 SungBong-ro, Heungduk-gu, Cheongju-si, Chungbuk 361-763, South Korea 2Department of Computer Education and IIE, Chungbuk National University, 410 SungBong-ro, Heungduk-gu, Cheongju-si, Chungbuk 361-763, South Korea 3Department of Thoracic & Cardiovascular Surgery, Chungbuk National University, 410 SungBong-ro, He...
متن کاملCortical surface tracking using a stereoscopic operating microscope.
OBJECTIVE To measure and compensate for soft tissue deformation during image-guided neurosurgery, we have developed a novel approach to estimate the three-dimensional (3-D) topology of the cortical surface and track its motion over time. METHODS We use stereopsis to estimate the 3-D cortical topology during neurosurgical procedures. To facilitate this process, two charge-coupled device camera...
متن کاملAutomatic microinjection system facilitates detection of growth inhibitory mRNA.
Naturally quiescent human lymphocytes, consisting predominantly of T cells, contain mRNA(s) that can inhibit DNA synthesis when injected into either human diploid fibroblasts (IMR-90) or transformed recipient cells (HeLa). By using an automated capillary microinjection system and a fluorescent coinjection marker (fluorescein isothiocyanate-dextran), individually injected cells can be retrieved ...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2014
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.1.1.72