• Title/Summary/Keyword: Cypher

Search Result 15, Processing Time 0.026 seconds

Economic Value of the Sirolimus Eluting Stent($CYPHER^{TM}$) in Treating Acute Coronary Heart Disease (관상동맥질환 치료를 위한 시롤리무스 방출 스텐트 ($CYPHER^{TM}$)의 경제성 분석)

  • Lee, Hoo-Yeon;Park, Eun-Cheol;Park, Ki-Dong;Park, Ji-Eun;Kim, Young;Lee, Sang-Soo;Kang, Hye-Young
    • Journal of Preventive Medicine and Public Health
    • /
    • v.36 no.4
    • /
    • pp.339-348
    • /
    • 2003
  • Objective : To quantify the economic value of the Sirolimus fluting Stent ($CYPHER^{TM}$) in treating acute coronary heart disease (CMD), and to assist in determining an adequate level of reimbursement for $CYPHER^{TM}$ in Korea. Methods : A decision-analytical model, developed by the Belgium Health Economics Disease Management group, was used to investigate the incremental cost-effectiveness of $CYPHER^{TM}$ versus conventional stenting. The time horizon was five years. The probabilities for clinical events at each node of the decision model were obtained from the results of large, randomized, controlled clinical trials. The initial care and follow-up direct medical costs were analyzed. The initial costs consisted of those for the initial procedure and hospitalization, The follow-vp costs included those for routine follow-up treatments, adverse reactions, revascularization and death. Defending on the perspective of the analysis, the costs were defined as insurance covered or total medical costs (=sum of insurance covered and uncovered medical costs). The cost data were obtained from the administrative data of 449 patients that received conventional stenting from five participating Korean hospitals during June 2002. Sensitivity analyses were peformed for discount rates of 3, 5 and 7%. Since the major clinical advantage of $CYPHER^{TM}$ over conventional stenting was the reduction in the revascularization rates, the economic value of $CYPHER^{TM}$, in relation to the direct medical costs of revascularization, were evaluated. If the incremental cost of $CYPHER^{TM}$ per revascularization avoided, compared to conventional stenting, was no higher than that of a revascularization itself, $CYPHER^{TM}$ would be considered as being cost-effective. Therefore, the maximum acceptable level for the reimbursement price of $CYPHER^{TM}$ making the incremental cost-effectiveness ratio equal to the cost of a revascularization was identified. Results : The average weighted initial insurance covered and total medical costs of conventional stenting were about 6,275,000 and 8,058,000 Won, respectively. The average weighted sum of the initial and 5-year follow-up insurance covered and total medical costs of conventional stenting were about 13,659,000 and 17,353,000 Won, respectively. The estimated maximum level of reimbursement price of $CYPHER^{TM}$ from the perspectives of the insurer and society were $4,126,897{\sim}4,325,161$ and $4,939,939{\sim}5,078,181$ Won, respectively. Conclusion : By evaluating the economic value of $CYPHER^{TM}$, as an alternative to conventional stenting, the results of this study are expected to provide a scientific basis for determining the acceptable level of reimbursement for $CYPHER^{TM}$.

Low Power Cryptographic Design based on Circuit Size Reduction (회로 크기 축소를 기반으로 하는 저 전력 암호 설계)

  • You, Young-Gap;Kim, Seung-Youl;Kim, Yong-Dae;Park, Jin-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.92-99
    • /
    • 2007
  • This paper presented a low power design of a 32bit block cypher processor reduced from the original 128bit architecture. The primary purpose of this research is to evaluate physical implementation results rather than theoretical aspects. The data path and diffusion function of the processor were reduced to accommodate the smaller hardware size. As a running example demonstrating the design approach, we employed a modified ARIA algorithm having four S-boxes. The proposed 32bit ARIA processor comprises 13,893 gates which is 68.25% smaller than the original 128bit structure. The design was synthesized and verified based on the standard cell library of the MagnaChip's 0.35um CMOS Process. A transistor level power simulation shows that the power consumption of the proposed processor reduced to 61.4mW, which is 9.7% of the original 128bit design. The low power design of the block cypher Processor would be essential for improving security of battery-less wireless sensor networks or RFID.

Numerical Evaluation and Shape Design of Coronary Artery Stent (관상동맥혈관용 스텐트의 수치해석 및 형상 설계)

  • Kim, Dae-Young;Lee, Seung-Yeol;Kim, Heon-Young
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.29 no.1
    • /
    • pp.103-108
    • /
    • 2012
  • Restenosis symptom, which is well known as a problem of stents, is due to the recoil and expansion pressure depending on shapes of stent. In order to reduce the effect of recoil problem, study on pattern and shape for the stent is required and the expansion pressure and recoil should be evaluated. This paper aims at evaluating mechanical characteristics of stent used in surgery for vessel stenosis. The expansion process of coronary artery stent in vessel for two models including the Cypher$^{(R)}$ from Johnson & Johnson$^{TM}$ and a suggested model were simulated using the Finite Element Analysis. Comparison of the directional recoil simulation results was made. The issues in the deformed shape of vessel and recoil of Cypher$^{(R)}$ were partially resolved in the suggested model. Therefore, the shape design suggested in this paper was able to reduce the restenosis symptom.

A MDIT(Mobile Digital Investment Trust) Agent design and security enhancement using 3BC and E2mECC (3BC와 F2mECC를 이용한 MDIT(Mobile Digital Investment Trust) 에이전트 설계 및 보안 강화)

  • Jeong Eun-Hee;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.1-16
    • /
    • 2005
  • This paper propose not only MDIT(Mobile Digital Investment Trust) agent design for Trust Investment under Mobile E-commerce environment, but also the symmetric key algorithm 3BC(Bit, Byte and Block Cypher) and the public encryption algorithm F2mECC for solving the problems of memory capacity, CPU processing time, and security that mobile environment has. In Particular, the MDIT Security Agent is the banking security project that introduces the concept of investment trust in mobile e-commerce, This mobile security protocol creates a shared secrete key using F2mECC and then it's value is used for 3BC that is block encryption technique. The security and the processing speed of MDIT agent are enhanced using 3BC and F2mECC.

  • PDF

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

XML Document Encrypt Implementation using Elliptic Curve Cryptosystem (타원곡선 알고리즘을 이용한 XML 문서 암호 구현)

  • Ko, Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2007
  • As the use of the computer and networks generalized, the various tasks which are requested secrets can be processed such os the banking transaction. And because of increasing of data exchange, Internet, and mobile networks, the method which is not connected only but also used with many users has been changed. Especially because of the structural problem of the Internet, a lot of information is leaked out when we use the Internet banking. If we check the Internet banking by using an existing cypher method which is either simple of slow, a credit card number, an account number or password will be leaked out. Because the security of information doesn't meet our expectation, we need more powerful cryptography. But, the wasted space-time which is required shouldn,t be ignored when the whole transferred data are encrypted. So, by using both the Elliptic Curve algorithm which is based on mobile networks and the partial encryption of the DTD of XML in this essay, we will implement more faster cypher method of the partial XML.

  • PDF

GOMS: Large-scale ontology management system using graph databases

  • Lee, Chun-Hee;Kang, Dong-oh
    • ETRI Journal
    • /
    • v.44 no.5
    • /
    • pp.780-793
    • /
    • 2022
  • Large-scale ontology management is one of the main issues when using ontology data practically. Although many approaches have been proposed in relational database management systems (RDBMSs) or object-oriented DBMSs (OODBMSs) to develop large-scale ontology management systems, they have several limitations because ontology data structures are intrinsically different from traditional data structures in RDBMSs or OODBMSs. In addition, users have difficulty using ontology data because many terminologies (ontology nodes) in large-scale ontology data match with a given string keyword. Therefore, in this study, we propose a (graph database-based ontology management system (GOMS) to efficiently manage large-scale ontology data. GOMS uses a graph DBMS and provides new query templates to help users find key concepts or instances. Furthermore, to run queries with multiple joins and path conditions efficiently, we propose GOMS encoding as a filtering tool and develop hash-based join processing algorithms in the graph DBMS. Finally, we experimentally show that GOMS can process various types of queries efficiently.

Fault Tolerant Cryptography Circuit for Data Transmission Errors (데이터 전송 오류에 대한 고장 극복 암호회로)

  • You, Young-Gap;Park, Rae-Hyeon;Ahn, Young-Il;Kim, Han-Byeo-Ri
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.10
    • /
    • pp.37-44
    • /
    • 2008
  • This paper presented a solution to encryption and decryption problem suffering data transmission error for encrypted message transmission. Block cypher algorithms experience avalanche effect that a single bit error in an encrypted message brings substantial error bits after decryption. The proposed fault tolerant scheme addresses this error avalanche effect exploiting a multi-dimensional data array shuffling process and an error correction code. The shuffling process is to simplify the error correction. The shuffling disperses error bits to many data arrays so that each n-bit data block may comprises only one error bit. Thereby, the error correction scheme can easily restore the one bit error in an n-bit data block. This scheme can be extended on larger data blocks.

Block Cipher Circuit and Protocol for RFID in UHF Band (UHF 대역 RFID 시스템을 위한 블록 암호 회로와 프로토콜)

  • Lee, Sang-Jin;Park, Kyung-Chang;Kim, Han-Byeo-Ri;Kim, Seung-Youl;You, Young-Gap
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.74-79
    • /
    • 2009
  • This paper proposes a hardware structure and associated finite state machine designs sharing key scheduling circuitry to enhance the performance of the block cypher algorithm, HIGHT. It also introduces an efficient protocol applicable to RFID systems comprising the HIGHT block cipher algorithm. The new HIGHT structure occupies an area size small enough to accommodate tag applications. The structure yields twice higher performance them conventional HIGHT algorithms. The proposed protocol overcomes the security vulnerability of RFID tags and thereby strengthens the security of personal information.

FPGA Implementation of the AES Cipher Algorithm by using Pipelining (파이프라이닝을 이용한 AES 암호화 알고리즘의 FPGA 구현)

  • 김방현;김태규;김종현
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.717-726
    • /
    • 2002
  • In this study, we analyze hardware implementation schemes of the ARS(Advanced Encryption Standard-128) algorithm that has recently been selected as the standard cypher algorithm by NIST(National Institute of Standards and Technology) . The implementation schemes include the basic architecture, loop unrolling, inner-round pipelining, outer-round pipelining and resource sharing of the S-box. We used MaxPlus2 9.64 for VHDL design and simulations and FLEX10KE-family FPGAs produced by Altera Corp. for implementations. According to the results, the four-stage inner-round pipelining scheme shows the best performance vs. cost ratio, whereas the loop unrolling scheme shows the worst.