• Title/Summary/Keyword: file distribution

Search Result 184, Processing Time 0.02 seconds

Evaluation of the Usefulness of Patient Customized Shielding Block Made with 3D Printer in the Skin Cancer Electron Beam Therapy (전자선치료 시 3D 프린터로 제작한 환자 맞춤형 차폐체의 유용성 평가)

  • Ahn, Ki-Song;Jung, Woo-Chan;Kim, Dae-Hyun;Kim, Moo-Sub;Yoon, Do-Kun;Shim, Jae-Goo;Suh, Tae-Suk
    • Journal of radiological science and technology
    • /
    • v.42 no.6
    • /
    • pp.447-454
    • /
    • 2019
  • In order to improve and supplement the shielding method for electron beam treatment, we designed a patient-specific shielding method using a 3D printer, and evaluated the usefulness by comparing and analyzing the distribution of electron beam doses to adjacent organs. In order to treat 5 cm sized superficial tumors around the lens, a CT Simulator was used to scan the Alderson Rando phantom and the DICOM file was converted into an STL file. The converted STL file was used to design a patient-specific shield and mold that matched the body surface contour of the treatment site. The thickness of the shield was 1 cm and 1.5 cm, and the mold was printed using a 3D printer, and the patient customized shielding block (PCSB) was fabricated with a cerrobend alloy with a thickness of 1 cm and 1.5 cm. The dosimetry was performed by attaching an EBT3 film on the surface of the Alderson Rando phantom eyelid and measuring the dose of 6, 9, and 12 MeV electron beams on the film using four shielding methods. Shielding rates were 83.89%, 87.14%, 87.39% at 6, 9, and 12 MeV without shielding, 1 cm (92.04%, 87.48%, 86.49%), 1.5 cm (91.13%, 91.88% with PSCB), 92.66%) The shielding rate was measured as 1 cm (90.7%, 92.23%, 88.08%) and 1.5 cm (88.31%, 90.66%, 91.81%) when the shielding block and the patient-specific shield were used together. PCSB fabrication improves shielding efficiency over conventional shielding methods. Therefore, PSCB may be useful for clinical application.

Lubrication Effect of Journal Bearing according to its Eccentricity and Attitude Angle (베어링 편심도와 자세각에 따른 저어널 베어링의 윤활효과)

  • Kim, Jong-Do;Wang, Yi-Jun;Yoon, Moon-Chul
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.14 no.5
    • /
    • pp.88-95
    • /
    • 2015
  • The thickness of adsorbed molecular layers is the most critical factor in studying thin-film lubrication, and it is the most essential parameter that distinguishes thin-film from thick-film lubrication analysis. The thin film between the shaft and bearing surface within a very narrow gap was considered. The general Reynolds equation has been derived for calculating thin-film lubrication parameters affecting the performance of the circular journal bearing. Investigation of the load-carrying capacity and pressure distribution for the journal bearing considering the adsorbed layer thickness has been carried out. A Reynolds equation appropriate for the journal bearing is used in this paper for the analysis, and it is discussed using the finite difference method of the central difference scheme. The parameters, such as eccentricity and attitude angle, are used for discussing the load-carrying capacity of the journal bearing. The results reported in this paper should be applied to analysis of the journal bearing with different lubrication factors. The steady-state analysis of the journal bearing is conducted using the Reynolds model under thin-film lubrication conditions. For a journal bearing, several parameters, such as a pressure, load capacity, and pressure components of the bearing can be obtained, and these results can be stored in a sequential data file for later analysis. Finally, their distribution can be displayed and analyzed easily by using the MATLAB GUI technique. The load-carrying capability of the journal bearing is observed for the specified operating conditions. This work could be helpful for the understanding and research of the mechanism of thin-film lubrication.

DRM Enabled P2P Model for Contents Protection (콘텐츠 보호를 위한 DRM이 적용된 P2P 모델)

  • Sung Jae-Youn;Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.389-396
    • /
    • 2006
  • P2P(Peer To Peer) system, a most attractive file sharing system, is the largest channel of contents distribution and it takes 50% of network traffic. But P2P systems are infamous for used to illegal contents distribution channel not only in music industry, but also in movie industry. But, DRM(Digital Right Management) enabled P2P models are not suggested until now that interrupting illegal contents distribution and keeping advantage of P2P. So in this paper, we suggest a DRM enabled P2P model that can support distributed processing ability and high scalability with no modification in exist P2P model or architecture.

Comparison of Practical Usefulness of Respirational Radiation Treatment Using Geant 4 Simulation Code (Geant 4 시뮬레이션 코드를 이용한 호흡 동조 방사선치료의 유용성 비교)

  • Jang, Eun-Sung;Lee, Hyo-Yeong
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.4
    • /
    • pp.637-643
    • /
    • 2019
  • To verify internal movements of the body, a DICOM file obtained from CT and a Geant4 code were used to simulate lung cancer patients. In addition, the method is applied to measure the movement of tumor when the movement of t he tumor is located inhale and exhale by creating a virtual tumor in the self-produced moving phantom, and to check the distribution of dose in the treatment plan and the accuracy of tumor in PTV for respiratory and lung cancer patients. It was confirmed that 97% or more respiratory control radiation therapy was effective even if the moving area was more than 3cm, in the 40% to 70% range. Dose distribution with respiratory radiation therapy applied to moving targets, measured by film in the actuation phantom, was shown to be within a 3mm margin of error for dose distribution containing 90%. It was confirmed that for actual patient breathing curves, the treatment time may be shorter than that due to the longer expiratory time.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Web Traffic Analysis according to the Link-down Duration of TCP and SCTP (링크다운 시간에 따른 TCP와 SCTP의 웹 트래픽 분석)

  • Choi, Yong-Woon;Cho, Kwang-Moon;Lee, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.44-52
    • /
    • 2010
  • The most popular world wide web traffic in the Internet uses TCP as the transport layer protocol. Since TCP utilizes the single path, it can not communicate with the correspondent host during the link-down. On the other hand, SCTP can still communicate with the other SCTP entity by using alternate path even while the primary path is down. Most of previous studies have conducted the performance comparison research between TCP and SCTP by using typical file transfer. Since web traffic with self-similarity is characterized by the packet inter-arrival times and shape parameter affecting the size of web file in the Pareto distribution, it is necessary to perform the experiments considering these parameters. This paper aims to compare the throughput between TCP and SCTP while varying parameters reflecting the web traffic characteristics in link-down environment. Experimental results for web traffic using NS-2 simulator show that the throughput of SCTP using multi-homing is better than that of TCP. Simulation also shows that TCP is more affected than SCTP by mean inter-arrival and shape parameters with regard to the web traffic. These results can be applied to estimate the performance variation of web traffic due to the duration of link-down.

A study on selecting of Light Cutoff Panel depending on the installation condition using the lighting simulation (조명 시뮬레이션을 이용한 설치 환경별 차광판 선정에 관한 연구)

  • Park, Hyung-Kyu;Gu, Jin-Hoi;Lee, Kyu-Mok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.246-251
    • /
    • 2016
  • The use of security lighting that emits spill light is considered a cause of light trespass problems in the residential areas. Therefore, a cutoff panel was installed as an alternative way to reduce light trespass. On the other hand, it has another problem in that it is less effective and is not good enough for aesthetics and safety. In this study, a light cutoff panel was designed and manufactured to reduce the light trespass, and the structure of a proper light cutoff panel was studied. Using a goniophotometer, the light distribution file (IES file) was extracted and the characteristics of light distribution were analyzed using the RELUX program. The results showed that the reduction of spilt light in the backward direction was decreased significantly for all types of light cutoff panels except the coated globe. In the case of a black powder coated light cutoff panel, the forward light caused by light reflected from the surface of the light cutoff panel was also reduced, which means that the black powder coated light cutoff panel is effective in the performance of light cutoff in the forward and backward directions. In addition, the coated glove increased the spilt light in the forward and backward directions because it reflects the upward light to go down. A 90 % accuracy between the measurement value of light trespass and the expected value of the light trespass was obtained from a simulation.

Analysis Program for Diffusion Model: SNUDM (확산모형 분석도구: SNUDM)

  • Koh, Sungryong;Choo, Hyeree;Lee, Dajung
    • Korean Journal of Cognitive Science
    • /
    • v.31 no.1
    • /
    • pp.1-23
    • /
    • 2020
  • This paper introduces SNUDM, an analysis program for Ratcliff's diffusion model, which has been one of the most important models in cognitive psychology over the past 35 years and which has come to occupy an important place in cognitive neuroscience in recent years. The analysis tool is designed with the basic principles of easy comprehension and simplicity in use. A diffusion process was programmed as the limit of a simple random walk in a manner resembling Ratcliff & Tuerlinckx(2002). The response time distribution of the model was constructed by simulating the time taken by a random walk until it reaches a threshold with small steps. The optimal parameter values in the model are found to be the smallest value of the chi-square values obtained by comparing the resulting distribution and the experimental data using Simplex method. For simplicity and ease of use, the input file used here is created as a file containing the quantile of the reaction time, the trials and other information. The number of participants and the number of conditions required for such work programs are given in a way that answers the question. Using this analysis tool, the experimental data of Ratcliff, Gomez, & McKoon(2004) were analyzed. We found the very similar pattern of parameter values to Ratcliff et al.(2004) found. When comparing DMAT, fast-dm and SNUDM with the generated data, we found that when the number of trials is small, SNUDM estimates the boundary parameter to a value similar to fast-dm and less than the DMAT. In addition, when the number of trials was large, it was confirmed that all three tools estimate parameters similarly.

Finite Element Analysis(fem) of The Fixed Position of the Velcro Band for the 3D Print Wrist Brace made using the Dicom File (CT Dicom 파일을 이용하여 제작한 3D Print 손목보호대용 Velcro band 고정위치의 유한요소해석(FEM))

  • Choi, Hyeun-Woo;Seo, An-Na;Lee, Jong-Min
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.5
    • /
    • pp.585-590
    • /
    • 2021
  • Wrist braces are being used for patients with wrist trauma. Recently, many studies have been conducted to manufacture custom wrist braces using 3D printing technology. Such 3D printing customized orthosis has the advantage of reflecting various factors such as reflecting different shapes for each individual and securing breathability. In this paper, the stress on the orthosis by the number and position of Velcro bands that should be considered when manufacturing a 3D printing custom wrist brace was analyzed. For customized orthosis, 3D modeling of the bone and skin regions was performed using an automatic design software (Reconeasy 3D, Seeann Solution) based on CT images. Based on the 3D skin area, a wrist orthosis design was applied to suit each treatment purpose. And, for the elasticity of the brace, a wrist brace was manufactured with an FDM-type 3D printer using TPU material. To evaluate the effectiveness according to the number and position of the Velcro band of the custom 3D printed wrist brace, the stress distribution of the brace was analyzed by the finite element method (FEM). Through the finite element analysis of the wrist orthosis performed in this study, the stress distribution of the orthosis was confirmed, and the number and position of the orthosis production and Velcro bands could be confirmed. These experimental results will help provide quality treatment to patients.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.