نتایج جستجو برای: iTrace

تعداد نتایج: 38  

2016
Yanjun Hua Zequan Xu Wei Qiu Qiang Wu Sanjoy Bhattacharya

PURPOSE To evaluate the repeatability and reproducibility of corneal power measurements obtained by Topcon KR-1W and iTrace, and assess the agreement with measurements obtained by Allegro Topolyzer and IOLMaster. METHODS The right eyes of 100 normal subjects were prospectively scanned 3 times using all the 4 devices. Another observer performed additional 3 consecutive scans using the Topcon K...

2016
Yao Chen Xiaobo Xia

BACKGROUND The purpose of this study was to compare corneal power and horizontal corneal diameter (white-to-white [WTW] distance) readings obtained by the Orbscan II topographer and the iTrace aberrometer. METHODS Keratometry readings in the flat (Kf) and steep (Ks) meridians and WTW distance were measured with the Orbscan II and iTrace systems in 100 myopic patients. Statistical evaluation w...

2001
Allison Mankin Daniel Massey Chien-Lung Wu Shyhtsun Felix Wu Lixia Zhang

ION Since late 1999, DDoS (Distributed Denial of Service) [1,2,3] attack has drawn many attentions from both research and industry communities. Many potential solutions (e.g., ingress filtering [6,7], packet marking [5,8,9,10,11] or tracing [4], and aggregate-based congestion control or rate limiting) have been proposed to handle this network bandwidth consumption attack. Among them, “ICMP trac...

2008
Jung Bin Won Sun Woong Kim Eung Kweon Kim Byung Jin Ha Tae-im Kim

PURPOSE To compare and evaluate the total and internal aberrations measured by two aberrometers: the laser ray tracing aberrometer (iTrace, Tracey Technology) and the automatic retinoscope aberrometer (OPD Scan, Nidek). METHODS A total of 54 healthy eyes were enrolled in the study. Following pupil dilation, aberrations were measured with the iTrace and OPD Scan. We compared the aberrations ob...

Journal: :Investigative ophthalmology & visual science 2011
Nienke Visser Tos T J M Berendschot Frenne Verbakel Annelie N Tan John de Brabander Rudy M M A Nuijts

PURPOSE To compare total ocular aberrations and corneal aberrations identified with four different aberrometers and to determine the repeatability and interobserver variability. METHODS In this prospective comparative study, 23 healthy subjects underwent bilateral examination with four aberrometers: the Irx3 (Hartmann-Shack; Imagine Eyes, Orsay, France), Keratron (Hartmann-Shack; Optikon, Rom...

2015
Hyun Ju Park Hun Lee Young Jae Woo Eung Kweon Kim Kyoung Yul Seo Ha Yan Kim Tae-im Kim

PURPOSE To compare the astigmatic power of toric intraocular lenses (IOLs) obtained from the AcrySof, TECNIS, and iTrace toric calculator in patients with preoperative with-the-rule (WTR) or against-the-rule (ATR) corneal astigmatism. MATERIALS AND METHODS Fifty eyes with cataract and corneal astigmatism greater than 0.75 diopters were enrolled in each group (WTR and ATR). Keratometric values...

2018
Zequan Xu Yanjun Hua Wei Qiu Guoqiang Li Qiang Wu

BACKGROUND To assess the precision and agreement of measurements of higher order aberrations (HOAs) obtained with a ray tracing aberrometer (iTrace) and a Hartmann-Shack aberrometer (Topcon KR-1 W). METHODS Prospective evaluation of the diagnostic test. Data from the right eyes of 92 normal subjects obtained using the two devices were included in this study. Two observers performed 3 consecut...

ژورنال: طب توانبخشی 2016

مقدمه و اهداف هدف از تحقیق پیش­رو تعیین توافق iTrace در نتایج ابرومتری با Zywave در بیماران دارای قوز قرنیه است. مواد و روش­ها در مطالعه­ی مقطعی،مشاهده‌ای مقایسه‌ای حاضر، خطاهای اپتیکی ۵۱ چشم از ۴۰ بیمار ۱۹ تا ۲۷ ساله دارای قوز قرنیه که به بیمارستان فوق تخصصی چشم‌پزشکی فارابی تهران مراجعه کرده بودند، در یک جلسه ویزیت و بدون دیلاته کردن مردمک چشم با دستگاه‌های iTrace و Bausch & Lomb Zywave II...

Journal: :J. Inf. Sci. Eng. 2014
Vijayalakshmi Murugesan S. Mercy Shalinie

In the modern technological world, with the increasing dependency on Internet the security threats are on the rise. Distributed Denial of Service (DDoS) attack is one of the biggest threats. The attackers tend to exhaust the network resources, while ingeniously hiding their identity, making the defense process extremely difficult. Many researchers have proposed various solutions to traceback th...

2003
Henry C. J. Lee Vrizlynn L. L. Thing Yi Xu Miao Ma

DoS/DDoS attacks constitute one of the major classes of security threats in the Internet today. The attackers usually use IP spoofing to conceal their real location. The current Internet protocols and infrastructure do not provide intrinsic support to traceback the real attack sources. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید