Skin denervation has been shown to cause remission of psoriatic lesions in patients, which can reappear if reinnervation occurs. This effect can be induced by the activation of dendritic cells ...through sensory innervation. However, a direct effect of nerves on the proliferation of keratinocytes involved in the formation of psoriatic plaques has not been investigated. We developed, by tissue engineering, a model of psoriatic skin made of patient skin cells that showed increased keratinocyte proliferation and epidermal thickness compared to healthy controls. When this model was treated with CGRP, a neuropeptide released by sensory neurons, an increased keratinocyte proliferation was observed in the psoriatic skin model, but not in the control. When a sensory nerve network was incorporated in the psoriatic model and treated with capsaicin to induce neuropeptide release, an increase of keratinocyte proliferation was confirmed, which was blocked by a CGRP antagonist while no difference was noticed in the innervated healthy control. We showed that sensory neurons can participate directly to keratinocyte hyperproliferation in the formation of psoriatic lesions through the release of CGRP, independently of the immune system. Our unique tissue-engineered innervated psoriatic skin model could be a valuable tool to better understand the mechanism by which nerves may modulate psoriatic lesion formation in humans.
This study shows that keratinocytes extracted from patients’ psoriatic skin retain, at least in part, the disease phenotype. Indeed, when combined in a 3D model of tissue-engineered psoriatic skin, keratinocytes exhibited a higher proliferation rate, and produced a thicker epidermis than a healthy skin control. In addition, their hyperproliferation was aggravated by a treatment with CGRP, a neuropeptide released by sensory nerves. In a innervated model of tissue-engineered psoriatic skin, an increase in keratinocyte hyperproliferation was also observed after inducing neurons to release neuropeptides. This effect was prevented by concomitant treatment with an antagonist to CGRP. Thus, this study shows that sensory nerves can directly participate to affect keratinocyte hyperproliferation in psoriasis through CGRP release.
Display omitted
•This work proposes a primitive-oriented cloth simulation method for ground filtering of large-scale 3D meshes from airborne platforms.•This method is not affected by low and unbalanced density ...distribution of mesh vertices.•This method does not require a coherent noise-free 3D mesh.•This work presents a labeled dataset for ground filtering on 3D meshes.
Airborne platforms have been improved in the past decade to provide geographic information systems (GISs) with large-scale 3D geographical information. Objectification of such information organized in meshes is a significant challenge for 3D GISs. The ground filtering of 3D meshes is a key step in meeting this challenge, however, its accuracy is highly affected by negative blunders and unbalanced vertex density. This paper proposes a novel method for differentiating ground geometric primitives from realistic 3D meshes based on a cloth simulation filter. Within the method, the fall of a piece of cloth is simulated on a flipped 3D mesh, and the stationary shape of the cloth is considered to be the fitted ground. Utilizing the spatial continuity of meshes, a collision detection based on bounding volume hierarchy is introduced, making the results independent of vertex density. Further, a collision correction based on the scan line and ray casting is proposed to make it applicable to data with negative blunders. The method is assessed quantitatively and visually over several datasets with different vertex densities, scenes, and noise distributions. Results demonstrate that it is a robust method suitable for different landscapes and is not impacted by vertex density and noise.
•A 3D model encryption algorithm (3DME-SC) is proposed.•A 2D chaotic system (2D-LAIC), which has good dynamic behavior, is proposed.•Simulation experiments show that 3DME-SC exhibits good security ...characteristics and effectiveness.
With the birth of the metaverse, 3D models have received extensive attention, and the security of information transmission continues to be an important issue. In this paper, we propose a 3D model encryption method based on a 2D chaotic system constructed via the coupling of the logistic map and infinite collapse (2D-LAIC) and on semi-tensor product (STP) theory. In terms of Lyapunov exponents, NIST test results, bifurcation diagrams, etc., 2D-LAIC exhibits better dynamical behavior than classical chaotic systems. 2D-LAIC can generate an unpredictable keystream, which is highly suitable for cryptography. Therefore, we propose a new 3D model encryption algorithm based on 2D-LAIC, named 3DME-SC. For a 3D model of the floating-point data type, XOR and STP processing are applied to the integer part and fractional part, respectively, of the model to obtain a 3D ciphertext model. The keystream required for XOR and STP processing is generated by 2D-LAIC. The results of a detailed security analysis and a comparative experimental analysis show that 3DME-SC exhibits good performance and effectiveness.
(Code: https://github.com/Gao5211996/3D-model-encryption)
Demonstrate the utility of 3D printed temporal bone models in individual patient preoperative planning and simulation.
3D models of the temporal bone were made from 5 pediatric and adult patients at ...a tertiary academic hospital with challenging surgical anatomy planned for cochlear implantation or exteriorization of cholesteatoma with complex labyrinthine fistula. The 3D models were created from CT scan used for preoperative planning, simulation and intraoperative reference. The utility of models was assessed for ease of segmentation and production and impact on surgery in regard to reducing intraoperative time and costs, improving safety and efficacy.
Three patients received cochlear implants, two exteriorization of advanced cholesteatoma with fistulas (1 internal auditory canal/cochlea, 1 all three semicircular canals). Surgical planning and intraoperative referencing to the simulations by the attending surgeon and trainees significantly altered original surgical plans. In a case of X-linked hereditary deafness, optimal angles and rotation maneuvers for cochlear implant insertion reduced operating time by 93 min compared to the previous contralateral side surgery. Two cochlear implant cases planned for subtotal petrosectomy approach due to aberrant anatomy were successfully approached through routine mastoidectomy. The cholesteatoma cases were successfully exteriorized without necessitating partial labyrinthectomy or labyrinthine injury. There were no complications.
3D printed models for simulation training, surgical planning and use intraoperatively in temporal bone surgery demonstrated significant benefits in designing approaches, development of patient-specific techniques, avoidance of potential or actual complications encountered in previous or current surgery, and reduced surgical time and costs.
In the past, in vitro studies of invasion and tumor progression were performed primarily using cancer cells cultured on a flat, two‐dimensional (2D) surface in a monolayer. In recent years, however, ...many studies have demonstrated differences in cell signaling and cell migration between 2D and 3D cell cultures. Traditional 2D monolayer cancer cell invasion models do not fully recapitulate 3D cell‐to‐cell and cell−to−extracellular matrix interactions that in vivo models can provide. Moreover, although in vivo animal models are irreplaceable for studying tumor biology and metastasis, they are costly, time‐consuming, and impractical for answering preliminary questions. Thus, emergent and evolving 3D spheroid cell culture models have changed the way we study tumors and their interactions with their surrounding extracellular matrix. In the case of breast cancer, metastasis of breast cancer tumors results in high mortality rates, and thus development of robust cell culture models that are reproducible and practical for studying breast cancer progression is important for ultimately developing preventatives for cancer metastasis. This article provides a set of protocols for generating uniform spheroids with a thin sheet of basement membrane for studying the initial invasion of mammary epithelial cells into a surrounding collagen‐rich extracellular matrix. Details are provided for generating 3D spheroids with a basement membrane, polymerizing collagen I, embedding the spheroids in the 3D collagen gel, and immunostaining the spheroids for invasion studies. Published 2020. U.S. Government.
Basic Protocol 1: Growth of uniformly sized tumor spheroids with an encapsulating basement membrane
Basic Protocol 2: Polymerization and embedding of tumor spheroids in a 3D type I collagen gel
Alternate Protocol: Embedding of tumor spheroids in collagen gels using a sandwich method
Basic Protocol 3: Fixing and immunostaining of tumor spheroids embedded in 3D collagen gels
Recently, multispectral images can be captured not only from satellite sensors but also from cameras. Hence, using the photogrammetric approach, multispectral images can be manipulated to generate a ...three-dimensional model. The main issues regarding multispectral images were the low visibilities of the image features. Moreover, the tie point extractions on multispectral images were still in doubt. Hence, this paper examines the capabilities of the SIFT algorithm to extract feature points from multispectral images and generate the point cloud from the extracted feature points. This study chose a pothole as the subject of this research. The red, red edge, green, and near-infrared bands from the Parrot Sequoia camera were used to generate the pothole model. All captured images were processed using structure-from-motion (SfM) with Multi-View Stereo (MVS) technique. This study records the feature points extraction result and analysis of the pothole model and discuss it in this paper.
The management of cultural heritage leads to the creation of digital files that contain representations of cultural heritage elements. Over the last few decades, a number of technologies designed for ...creating 3D models of objects or scenes have been developed, and the number of digitisation platforms has increased. Despite the dissemination of 3D models on these platforms, generally, the methodologies used appears to be undocumented and there is a lack of standards for providing metadata for creating 3D models. In this paper, a metadata schema for 3D models of archaeological objects is proposed, addressing the possible techniques used to create and process such models and considering that not all digital objects are the same, as they are produced in different ways and with different metrics and chromatic accuracies. Additionally, a core of the most crucial components is suggested to alleviate the difficulty of producing exhaustive metadata to represent the entire procedure.
•Proper cultural heritage (CH) management requires reliable metadata.•There is a lack of standards for creating metadata for capturing 3D models for cultural heritage.•Our proposal provides a schema that considers the techniques used to create 3D models.•A core of the most crucial components in the schema is proposed.•Users should know the technical aspects of the capture and processing of a 3D model through metadata.
3D model security protection has become increasingly essential due to its wide engineering applications. Encryption is a common method to protect 3D models. Jansent et al. recently proposed a novel ...encryption method for 3D models by introducing hierarchical decryption to allow differential visual effects after decryption, in which some bits are selected to form three blocks and then encrypted separately. However, this method does not support the adaptive combination of visual effects, potentially limiting its ability to meet diverse requirements. To this end, we propose a 3D model encryption method supporting adaptive visual effects after decryption, in which some bits of the vertex coordinate value can flexibly be extracted within a reasonable range. Meanwhile, we accordingly optimize some steps in the method and redefine visual security levels to accurately outline how much visual information can be accessed by authorized users. Experimental results show that our method supports adaptively combining different visual effects during decryption while reducing the time cost.
Hula Accessories Design for Prototype Software Ikeda, Satoshi; Nakahara, Takumi; Takei, Amane ...
Journal of Robotics, Networking and Artificial Life,
2023, Letnik:
10, Številka:
3
Journal Article
Recenzirano
Odprti dostop
There are two main types of hula: classical hula ``kahiko'' and modern hula ``auana.'' Music, costumes, and accessories are essential to hula. Auana, in particular, is a dance set to music played ...with Western instruments and can express various aspects of mythology, history, and Hawaiian culture. The costumes and accessories worn by the dancers are designed to match the music. We thought that if we could freely design costumes and accessories on a computer and simulate the finished product, we would be able to create a design that was more in line with the dancer's image. This research focused on ornaments and developed a new CAD system as a result of basic research to develop a CAD system for designing "lei", one of these ornaments.