• Title/Summary/Keyword: Key size

Search Result 1,814, Processing Time 0.032 seconds

Morphological Factors and Cardiac Doses in Whole Breast Radiation for Left-sided Breast Cancer

  • Guan, Hui;Dong, Yuan-Li;Ding, Li-Jie;Zhang, Zi-Cheng;Huang, Wei;Liu, Cheng-Xin;Fu, Cheng-Rui;Zhu, Jian;Li, Hong-Sheng;Li, Miao-Miao;Li, Bao-Sheng
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.7
    • /
    • pp.2889-2894
    • /
    • 2015
  • Background: To investigate the impact of the breast size, shape, maximum heart depth (MDH), and chest wall hypotenuse (the distance connecting middle point of the sternum and the length of lung draw on the selected transverse CT slice) on the volumetric dose to heart with whole breast irradiation (WBI) of left-sided breast cancer patients. Materials and Methods: Fifty-three patients with left-sided breast cancer undergoing adjuvant intensity-modulated radiotherapy (IMRT) were enrolled in the study. The primary breast size and shape, MHD and DCWH (chest wall hypotenuse) were contoured on radiotherapy (RT) planning CT slices. The dose data of hearts were obtained from the dose-volume histograms (DVHs). Data were analyzed by one-way analysis of variance (ANOVA), Student's t-test and linear regression analysis. Results: Breast size was independent of heart dose, whereas breast shape, MHD and DCWH were correlated with heart dose. The shapes of breasts were divided into four types, as the flap type, hemisphere type, cone type and pendulous type with heart mean dose being $491.8{\pm}234.6cGy$, $752.7{\pm}219.0cGy$, $620.2{\pm}275.7cGy$, and $666.1{\pm}238.0cGy$, respectively. The flap type of breasts shows a strong statistically reduction in heart dose, compared to others (p=0.008 for V30 of heart). DCWH and MHD were found to be the most important parameters correlating with heart dose in WBI. Conclusions: More attention should be paid to the heart dose of non-flap type patients. The MHD was found to be the most important parameter to correlate with heart dose in tangential WBI, closely followed by the DCWH, which could help radiation oncologists and physicsts evaluate heart dose and design RT plan in advance.

Control strategy for the substructuring testing systems to simulate soil-structure interaction

  • Guo, Jun;Tang, Zhenyun;Chen, Shicai;Li, Zhenbao
    • Smart Structures and Systems
    • /
    • v.18 no.6
    • /
    • pp.1169-1188
    • /
    • 2016
  • Real-time substructuring techniques are currently an advanced experimental method for testing large size specimens in the laboratory. In dynamic substructuring, the whole tested system is split into two linked parts, the part of particular interest or nonlinearity, which is tested physically, and the remanding part which is tested numerically. To achieve near-perfect synchronization of the interface response between the physical specimen and the numerical model, a good controller is needed to compensate for transfer system dynamics, nonlinearities, uncertainties and time-varying parameters within the physical substructures. This paper presents the substructuring approach and control performance of the linear and the adaptive controllers for testing the dynamic characteristics of soil-structure-interaction system (SSI). This is difficult to emulate as an entire system in the laboratory because of the size and power supply limitations of the experimental facilities. A modified linear substructuring controller (MLSC) is proposed to replace the linear substructuring controller (LSC).The MLSC doesn't require the accurate mathematical model of the physical structure that is required by the LSC. The effects of parameter identification errors of physical structure and the shaking table on the control performance of the MLSC are analysed. An adaptive controller was designed to compensate for the errors from the simplification of the physical model in the MLSC, and from parameter identification errors. Comparative simulation and experimental tests were then performed to evaluate the performance of the MLSC and the adaptive controller.

HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere

  • Chen, Jiahui;Tang, Shaohua;Zhang, Xinglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3166-3187
    • /
    • 2017
  • For "generic" multivariate public key cryptography (MPKC) systems, experts believe that the Unbalanced Oil-Vinegar (UOV) scheme is a feasible signature scheme with good efficiency and acceptable security. In this paper, we address two problems that are to find inversion solution of quadratic multivariate equations and find another structure with some random Oil-Oil terms for UOV, then propose a novel signature scheme based on hyper-sphere (HS-Sign for short) which directly answers these two problems. HS-Sign is characterized by its adding Oil-Oil terms and more advantages compared to UOV. On the one side, HS-Sign is based on a new inversion algorithm from hyper-sphere over finite field, and is shown to be a more secure UOV-like scheme. More precisely, according to the security analysis, HS-Sign achieves higher security level, so that it has larger security parameters choice ranges. On the other side, HS-Sign is beneficial from both the key side and computing complexity under the same security level compared to many baseline schemes. To further support our view, we have implemented 5 different attack experiments for the security analysis and we make comparison of our new scheme and the baseline schemes with simulation programs so as to show the efficiencies. The results show that HS-Sign has exponential attack complexity and HS-Sign is competitive with other signature schemes in terms of the length of the message, length of the signature, size of the public key, size of the secret key, signing time and verification time.

Microstructure Refinement and Strengthening Mechanisms of a 9Cr Oxide Dispersion Strengthened Steel by Zirconium Addition

  • Xu, Haijian;Lu, Zheng;Wang, Dongmei;Liu, Chunming
    • Nuclear Engineering and Technology
    • /
    • v.49 no.1
    • /
    • pp.178-188
    • /
    • 2017
  • To study the effects of zirconium (Zr) addition on the microstructure, hardness and the tensile properties of oxide dispersion strengthened (ODS) ferritic-martensitic steels, two kinds of 9Cr-ODS ferritic-martensitic steels with nominal compositions (wt.%) of $Fe-9Cr-2W-0.3Y_2O_3$ and $Fe-9Cr-2W-0.3Zr-0.3Y_2O_3$ were fabricated by the mechanical alloying (MA) of premixed powders and then consolidated by hot isostatic pressing (HIP) techniques. The experimental results showed that the average grain size decreases with Zr addition. The trigonal ${\delta}$-phase $Y_4Zr_3O_{12}$ oxides and body-centered cubic $Y_2O_3$ oxides are formed in the 9Cr-Zr-ODS steel and 9Cr non-Zr ODS steel, respectively, and the average size of $Y_4Zr_3O_{12}$ particles is much smaller than that of $Y_2O_3$. The dispersion morphology of the oxide particles in 9Cr-Zr-ODS steel is significantly improved and the number density is $1.1{\times}10^{23}/m^3$ with Zr addition. The 9Cr-Zr-ODS steel shows much higher tensile ductility, ultimate tensile strength and Vickers hardness at the same time.

The research on Diffie-Hellman-based IoT Sensor Node key management (Diffie-Hellman 기반 사물인터넷 센서노드 키 관리 연구)

  • Hong, Sunghyuck;Yu, Jina
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.9-14
    • /
    • 2017
  • Recently, the Internet of Things are developing in accordance with the technology of implementation in low-cost, small-size, low power consumption and smart sensor that can communicate using the internet. Especially, key management researches for secure information transmission based on the Internet of Things (IoT) are actively performing. But, Internet of Things(IoT) are uses sensor. Therefore low-power consumption and small-memory are restrictive condition. As a result, managing the key is difficult as a general security measure. However, The problem of secure key management is an essential challenge For the continuous development of the Internet of things. In this paper, we propose a key distribution and management technique in secure Internet of things. In the key generation and management stage, it satisfies the conditions and without physically constrained for IoT based communication.

A rapid modeling method and accuracy criteria for common-cause failures in Risk Monitor PSA model

  • Zhang, Bing;Chen, Shanqi;Lin, Zhixian;Wang, Shaoxuan;Wang, Zhen;Ge, Daochuan;Guo, Dingqing;Lin, Jian;Wang, Fang;Wang, Jin
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.103-110
    • /
    • 2021
  • In the development of a Risk Monitor probabilistic safety assessment (PSA) model from the basic PSA model of a nuclear power plant, the modeling of common-cause failure (CCF) is very important. At present, some approximate modeling methods are widely used, but there lacks criterion of modeling accuracy and error analysis. In this paper, aiming at ensuring the accuracy of risk assessment and minimizing the Risk Monitor PSA models size, we present three basic issues of CCF model resulted from the changes of a nuclear power plant configuration, put forward corresponding modeling methods, and derive accuracy criteria of CCF modeling based on minimum cut sets and risk indicators according to the requirements of risk monitoring. Finally, a nuclear power plant Risk Monitor PSA model is taken as an example to demonstrate the effectiveness of the proposed modeling method and accuracy criteria, and the application scope of the idea of this paper is also discussed.

KA-BAND ANTENNA PERFORMANCE ANALYSIS OF COMS SATELLITE

  • Lee Jeom-Hun;Choi Jang-Sup;Lee Seong Pal
    • Bulletin of the Korean Space Science Society
    • /
    • 2004.10b
    • /
    • pp.316-320
    • /
    • 2004
  • This paper describes Ka-band antenna performance analysis of COMS satellite. The key parameters of the antenna system are optimal antenna diameter, feed horn type and horn size, F/D, and the coordinate of offset horns. The paper deals with the method to determine design core parameters of optimal antenna diameter, feed horn type and horn size, F/D, and the coordinate of offset horns, and the performances of design result.

  • PDF

Dynamic Network: A New Framework for Symmetric Block Cipher Algorithms

  • Park, Seung-Bae;Joo, Nak-Keun;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.743-746
    • /
    • 2000
  • In this paper we propose a new network called Dynamic network for symmetric block ciphers. Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously We present the method for designing secure Dynamic cipher against meet-in-the-middle attack and linear cryptanalysis. Also, we show that the differential cryptanalysis to Dynamic cipher is hard.

  • PDF

Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices

  • Zhang, Yanhua;Hu, Yupu;Gao, Wen;Jiang, Mingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.414-430
    • /
    • 2016
  • Verifier-local revocation (VLR) seems to be the most flexible revocation approaches for any group signature scheme, because it just only requires the verifiers to possess some up-to-date revocation information, but not the signers. Langlois et al. (PKC 2014) proposed the first VLR group signature based on lattice assumptions in the random oracle model. Their scheme has at least Õ(n2) ⋅ log N bit group public key and Õ(n) ⋅ log N bit signature, respectively. Here, n is the security parameter and N is the maximum number of group members. In this paper, we present a simpler lattice-based VLR group signature, which is more efficient by a O(log N) factor in both the group public key and the signature size. The security of our VLR group signature can be reduced to the hardness of learning with errors (LWE) and small integer solution (SIS) in the random oracle model.

Copula entropy and information diffusion theory-based new prediction method for high dam monitoring

  • Zheng, Dongjian;Li, Xiaoqi;Yang, Meng;Su, Huaizhi;Gu, Chongshi
    • Earthquakes and Structures
    • /
    • v.14 no.2
    • /
    • pp.143-153
    • /
    • 2018
  • Correlation among different factors must be considered for selection of influencing factors in safety monitoring of high dam including positive correlation of variables. Therefore, a new factor selection method was constructed based on Copula entropy and mutual information theory, which was deduced and optimized. Considering the small sample size in high dam monitoring and distribution of daily monitoring samples, a computing method that avoids causality of structure as much as possible is needed. The two-dimensional normal information diffusion and fuzzy reasoning of pattern recognition field are based on the weight theory, which avoids complicated causes of the studying structure. Hence, it is used to dam safety monitoring field and simplified, which increases sample information appropriately. Next, a complete system integrating high dam monitoring and uncertainty prediction method was established by combining Copula entropy theory and information diffusion theory. Finally, the proposed method was applied in seepage monitoring of Nuozhadu clay core-wall rockfill dam. Its selection of influencing factors and processing of sample data were compared with different models. Results demonstrated that the proposed method increases the prediction accuracy to some extent.