• Title/Summary/Keyword: DLP

Search Result 225, Processing Time 0.03 seconds

Optimization of Brain Computed Tomography Protocols to Radiation Dose Reduction (뇌전산화단층검사에서 방사선량 저감을 위한 최적화 프로토콜 연구)

  • Lee, Jae-Seung;Kweon, Dae Cheol
    • Journal of Biomedical Engineering Research
    • /
    • v.39 no.3
    • /
    • pp.116-123
    • /
    • 2018
  • This study is a model experimental study using a phantom to propose an optimized brain CT scan protocol that can reduce the radiation dose of a patient and remain quality of image. We investigate the CT scan parameters of brain CT in clinical medical institutions and to measure the important parameters that determine the quality of CT images. We used 52 multislice spiral CT (SOMATOM Definition AS+, Siemens Healthcare, Germany). The scan parameters were tube voltage (kVp), tube current (mAs), scan time, slice thickness, pitch, and scan field of view (SFOV) directly related to the patient's exposure dose. The CT dose indicators were CTDIvol and DLP. The CT images were obtained while increasing the imaging conditions constantly from the phantom limit value (Q1) to the maximum value (Q4) for AAPM CT performance evaluation. And statistics analyzed with Pearson's correlation coefficients. The result of tube voltage that the increase in tube voltage proportionally increases the variation range of the CT number. And similar results were obtained in the qualitative evaluation of the CT image compared to the tube voltage of 120 kVp, which was applied clinically at 100 kVp. Also, the scan conditions were appropriate in the tube current range of 250 mAs to 350 mAs when the tube voltage was 100 kVp. Therefore, by applying the proposed brain CT scanning parameters can be reduced the radiation dose of the patient while maintaining quality of image.

Efficient Implementations of Index Calculation Methods of Elliptic Curves using Weil's Theorem (Weil 정리를 이용한 효율적인 타원곡선의 위수 계산법의 구현)

  • Kim, Yong-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.7
    • /
    • pp.693-700
    • /
    • 2016
  • It is important that we can calculate the order of non-supersingular elliptic curves with large prime factors over the finite field GF(q) to guarantee the security of public key cryptosystems based on discrete logarithm problem(DLP). Schoof algorithm, however, which is used to calculate the order of the non-supersingular elliptic curves currently is so complicated that many papers are appeared recently to update the algorithm. To avoid Schoof algorithm, in this paper, we propose an algorithm to calculate orders of elliptic curves over finite composite fields of the forms $GF(2^m)=GF(2^{rs})=GF((2^r)^s)$ using Weil's theorem. Implementing the program based on the proposed algorithm, we find a efficient non-supersingular elliptic curve over the finite composite field $GF(2^5)^{31})$ of the order larger than $10^{40}$ with prime factor larger than $10^{40}$ using the elliptic curve $E(GF(2^5))$ of the order 36.

Evaluation of the marginal and internal fit of a single crown fabricated based on a three-dimensional printed model

  • Jang, Yeon;Sim, Ji-Young;Park, Jong-Kyoung;Kim, Woong-Chul;Kim, Hae-Young;Kim, Ji-Hwan
    • The Journal of Advanced Prosthodontics
    • /
    • v.10 no.5
    • /
    • pp.367-373
    • /
    • 2018
  • PURPOSE. To evaluate the fit of a crown produced based on a 3D printed model and to investigate its clinical applicability. MATERIALS AND METHODS. A master die was fabricated with epoxy. Stone dies were fabricated from conventional impressions (Conventional stone die group: CS, n=10). Digital virtual dies were fabricated by making digital impressions (Digital Virtual die group: VD, n=10). 3D data obtained from the digital impression was used to fabricate 3D printed models (DLP die group: DD, n=10, PolyJet die group: PD, n=10). A total of 40 crowns were fabricated with a milling machine, based on CS, VD, DD and PD. The inner surface of all crowns was superimposed with the master die files by the "Best-fit alignment" method using the analysis software. One-way and 2-way ANOVA were performed to identify significant differences among the groups and areas and their interactive effects (${\alpha}=.05$). Tukey's HSD was used for post-hoc analysis. RESULTS. One-way ANOVA results revealed a significantly higher RMS value in the 3D printed models (DD and PD) than in the CS and DV. The RMS values of PD were the largest among the four groups. Statistically significant differences among groups (P<.001) and between areas (P<.001) were further revealed by 2-way ANOVA. CONCLUSION. Although the fit of crowns fabricated based on the 3D printed models (DD and PD) was inferior to that of crowns prepared with CS and DV, the values of all four groups were within the clinically acceptable range (<$120{\mu}m$).

Design and Implementation of Flying-object Tracking Management System by using Radar Data (레이더 자료를 이용한 항적추적관리시스템 설계 및 구현)

  • Lee Moo-Eun;Ryu Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.175-182
    • /
    • 2006
  • Radars are used to detect the motion of the low flying enemy planes in the military. Radar-detected raw data are first processed and then inserted into the ground tactical C4I system. Next, these data we analyzed and broadcasted to the Shooter system in real time. But the accuracy of information and time spent on the displaying and graphical computation are dependent on the operator's capability. In this paper, we propose the Flying Object Tracking Management System that allows the displaying of the objects' trails in real time by using data received from the radars. We apply the coordinate system translation algorithm, existing communication protocol improvements with communication equipment, and signal and information computation process. Especially, radar signal duplication computation and synchronization algorithm is developed to display the objects' coordinates and thus we can improve the Tactical Air control system's reliability, efficiency, and easy-of-usage.

Evaluation on Usefulness of BMI Application to Urological CT Examination (비뇨기계 CT 검사 시 체질량 지수 적용의 유용성 평가)

  • Kim, Hyeon-jin;Im, In-chul
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.2
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study was to evaluate the usefulness of BMI application to Urography CT by applying different tube voltages in accordance with body mass index. Group A (n = 38) with body mass index of lower than 25 was examined with tube voltage of 100 kVp while Group B (n = 45) with a BMI of 25 and higher was examined with tube voltage of 120 kVp. C group (n = 37) with body mass index (BMI) of lower than 25 was examined with tube voltage of 120kVp. Although the difference in average dose between group A (100 kVp) and group C (120 kVp) with low body mass index (BMI) of lower than 25 was $214.8mGy{\cdot}cm$, there was no significant difference in qualitative evaluation and, compared with patient group with body mass index of 25 and higher, results obtained were rather good. Therefore, this study verified that the tube voltage of lower than 100 kVp does not have adverse effect on the quality of image for patients with body mass index (BMI) of lower than 25.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

Efficient Outsourced Multiparty Computations Based on Partially Homomorphic Encryption (부분동형암호와 외부서버를 이용한 효율적인 다자간 연산 기법)

  • Eun, Hasoo;Ubaidullah, Ubaidullah;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.477-487
    • /
    • 2017
  • Multiparty computation (MPC) is a computation technique where many participants provide their data and jointly compute operations to get a computation result. Earlier MPC protocols were mostly depended on communication between the users. Several schemes have been presented that mainly work by delegating operations to two non-colluding servers. Peter et al. propose a protocol that perfectly eliminates the need of users' participation during the whole computation process. However, the drawback of their scheme is the excessive dependence on the server communication. To cater this issue, we propose a protocol that reduce server communication overhead using the proxy re-encryption (PRE). Recently, some authors have put forward their efforts based on the PRE. However, these schemes do not achieve the desired goals and suffer from attacks that are based on the collusion between users and server. This paper, first presents a comprehensive analysis of the existing schemes and then proposes a secure and efficient MPC protocol. The proposed protocol completely eliminates the need of users' participation, incurs less communication overhead and does not need to solve the discrete logarithm problem (DLP) in order to get the computation results.

A Study on a Scenario-based Information Leakage Risk Response Model Associated with the PC Event Detection Function and Security Control Procedures (PC 이벤트 탐지 기능과 보안 통제 절차를 연계시킨 시나리오 기반 금융정보유출 위험 대응 모델에 관한 연구)

  • Lee, Ig Jun;Youm, Heung Youl
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.137-152
    • /
    • 2018
  • It is a measure to overcome limitations that occur in the activity of detecting and blocking abnormal information leakage activity by collecting the activity log generated by the security solution to detect the leakage of existing financial information and analyzing it by pattern analysis. First, it monitors real-time execution programs in PC that are used as information leakage path (read from the outside, save to the outside, transfer to the outside, etc.) in the PC. Second, it determines whether it is a normal controlled exception control circumvention by interacting with the related security control process at the time the program is executed. Finally, we propose a risk management model that can control the risk of financial information leakage through the process procedure created on the basis of scenario.

Strength Variation with Inter-Layer Fill Factor of FDM 3D Printer (FDM 3D Printer의 층간 충진율에 따른 강도변화)

  • Kang, Yong-Goo;Kweon, Hyun-Kyu;Shin, Geun-Sik
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.18 no.3
    • /
    • pp.66-73
    • /
    • 2019
  • Recently, FDM-type 3D printer technology has been developed, and efforts have been made to improve the output formability and characteristics further. Through this, 3D printers are used in various fields, and printer technologies are suggested according to usage, such as FDM, SLA, DLP, and SLM. In particular, the FDM method is the most widely used, and the FDM method technology is being developed further. The characteristics of the output are produced by the FDM-type 3D printer, which is determined by various factors, and particularly the perspective of the Inter-Layer Fill Factor, which is the volume ratio of the laminated material that exerts a direct influence. In this study, the Inter-Layer Fill Factor is theoretically obtained by presenting the internal space between each layer according to the laminate thickness as a cross-sectional shape model, and the cross section of the actual laminated sample is compared with the theoretical model through experiments. Then, the equation for the theoretical model is defined, and the strength change according to each condition (tensile strength of material, reduction slope, strength reduction rate, and output strength) is confirmed. In addition, we investigated the influence on the correlation and strength between laminate thickness and the Inter-Layer Fill Factor.