• Title/Summary/Keyword: Zhengzhou

Search Result 303, Processing Time 0.029 seconds

Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3699-3719
    • /
    • 2017
  • Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.

Correlation Between EGFR Mutations and Serum Tumor Markers in Lung Adenocarcinoma Patients

  • Pan, Jin-Bing;Hou, Yu-Hong;Zhang, Guo-Jun
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.2
    • /
    • pp.695-700
    • /
    • 2013
  • Background: Mutations affecting the epidermal growth factor receptor (EGFR) are good predictors of clinical efficacy of EGFR tyrosine kinase inhibitors (TKI) in patients with non-small cell lung cancer. Serum carcinoembryonic antigen (CEA) levels are also regarded as predictive for the efficacy of EGFR-TKI and EGFR gene mutations. This study analyzed the association between EGFR gene mutations and clinical features, including serum tumor marker levels in lung adenocarcinomas patients. Patients and Methods: A total of 70 lung adenocarcinoma patients with complete clinical data and pathological specimens were investigated. EGFR gene mutations at exons 19 and 21 were assessed. Serum tumor markers were detected by protein chip-chemiluminescence at the corresponding time, and correlations were analyzed. Results: Mutations of the EGFR gene were detected in 27 of the 70 patients and the serum CEA and CA242 concentrations were found to be significantly associated with the incidence of EGFR gene mutations (P<0.05). The AUCs for CEA and CA242 were 0.724 (95% CI: 0.598~0.850, P<0.05) and 0.769 (95% CI: 0.523~0.800, P<0.05) respectively. Conclusions: Serum CEA and CA242 levels are associated with mutations of the EGFR gene in patients with lung adenocarcinomas.

MMSE Transmit Optimization for Multiuser Multiple-Input Single-Output Broadcasting Channels in Cognitive Radio Networks

  • Cao, Huijin;Lu, Yanhui;Cai, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2120-2133
    • /
    • 2013
  • In this paper, we address the problem of linear minimum mean-squared error (MMSE) transmitter design for the cognitive radio (CR) multi-user multiple-input single-output (MU-MISO) broadcasting channel (BC), where the cognitive users are subject to not only a sum power constraint, but also a interference power constraint. Evidently, this multi-constraint problem renders it difficult to solve. To overcome this difficulty, we firstly transform it into its equivalent formulation with a single constraint. Then by utilizing BC-MAC duality, the problem of BC transmitter design can be solved by focusing on a dual MAC problem, which is easier to deal with due to its convexity property. Finally we propose an efficient two-level iterative algorithm to search the optimal solution. Our simulation results are provided to corroborate the effectiveness of the proposed algorithm and show that this proposed CR MMSE-based scheme achieves a suboptimal sum-rate performance compared to the optimal DPC-based algorithm with less computational complexity.

A cumulative damage model for extremely low cycle fatigue cracking in steel structure

  • Huanga, Xuewei;Zhao, Jun
    • Structural Engineering and Mechanics
    • /
    • v.62 no.2
    • /
    • pp.225-236
    • /
    • 2017
  • The purpose of this work is to predict ductile fracture of structural steel under extremely low cyclic loading experienced in earthquake. A cumulative damage model is proposed on the basis of an existing damage model originally aiming to predict fracture under monotonic loading. The cumulative damage model assumes that damage does not grow when stress triaxiality is below a threshold and fracture occurs when accumulated damage reach unit. The model was implemented in ABAQUS software. The cumulative damage model parameters for steel base metal, weld metal and heat affected zone were calibrated, respectively, through testing and finite element analyses of notched coupon specimens. The damage evolution law in the notched coupon specimens under different loads was compared. Finally, in order to examine the engineering applicability of the proposed model, the fracture performance of beam-column welded joints reported by previous researches was analyzed based on the cumulative damage model. The analysis results show that the cumulative damage model is able to successfully predict the cracking location, fracture process, the crack initiation life, and the total fatigue life of the joints.

Robust Transceiver Designs in Multiuser MISO Broadcasting with Simultaneous Wireless Information and Power Transmission

  • Zhu, Zhengyu;Wang, Zhongyong;Lee, Kyoung-Jae;Chu, Zheng;Lee, Inkyu
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.173-181
    • /
    • 2016
  • In this paper, we address a new robust optimization problem in a multiuser multiple-input single-output broadcasting system with simultaneous wireless information and power transmission, where a multi-antenna base station (BS) sends energy and information simultaneously to multiple users equipped with a single antenna. Assuming that perfect channel-state information (CSI) for all channels is not available at the BS, the uncertainty of the CSI is modeled by an Euclidean ball-shaped uncertainty set. To optimally design transmit beamforming weights and receive power splitting, an average total transmit power minimization problem is investigated subject to the individual harvested power constraint and the received signal-to-interference-plus-noise ratio constraint at each user. Due to the channel uncertainty, the original problem becomes a homogeneous quadratically constrained quadratic problem, which is NP-hard. The original design problem is reformulated to a relaxed semidefinite program, and then two different approaches based on convex programming are proposed, which can be solved efficiently by the interior point algorithm. Numerical results are provided to validate the robustness of the proposed algorithms.

Six Sigma and the Cost of(Poor) Quality

  • Aca;U, Jichao-X
    • International Journal of Quality Innovation
    • /
    • v.3 no.2
    • /
    • pp.159-173
    • /
    • 2002
  • Any organization's Six Sigma program may be at high risk without heeding the lessons learned from the past and that tries to operate without a robust business foundation. A foundation that preferably should consist of stepping-stones such as a 5-S house-keeping program, an effective Integrated Management System (IMS), which includes a strong focus on planning for quality to fully capture the Voice of the Customer (VOC), and an organization-wide training scheme, as well as a reliable Cost of Poor Quality (COPQ) system. That's the best advise I can give to any organization that wishes to embark on a Six Sigma improvement program and hope to be successful. The paper will elaborate on the above issues and provide suggested solutions based on the review of published historical information and the experiences encountered over the last four decades by the author, as a quality practitioner and consultant, in industries that produced safety-critical product. This author maintains that few fundamentally new or useful things have been created in the field of Quality during the last couple of decades. Nevertheless, this paper deliberates on a number of relatively “newer” issues including the concept of “three types of customers”, the CTC, “Critical To Customer” term, the eight Quality Management Principles of the new ISO 9000 family, the growth of industry-specific standards, the adoption of Integrated Management Systems, the rebirth of AS2561 COQ standard, the spread of Six Sigma as well as related ASQ certification and the need for a robust business foundation to ensure Six Sigma survival.

Related-Key Differential Attacks on CHESS-64

  • Luo, Wei;Guo, Jiansheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3266-3285
    • /
    • 2014
  • With limited computing and storage resources, many network applications of encryption algorithms require low power devices and fast computing components. CHESS-64 is designed by employing simple key scheduling and Data-Dependent operations (DDO) as main cryptographic components. Hardware performance for Field Programmable Gate Arrays (FPGA) and for Application Specific Integrated Circuits (ASIC) proves that CHESS-64 is a very flexible and powerful new cipher. In this paper, the security of CHESS-64 block cipher under related-key differential cryptanalysis is studied. Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key. To recover 74 bits key, two key recovery algorithms are proposed based on the two types of related-key differential characteristics, and the corresponding data complexity is about $2^{42.9}$ chosen-plaintexts, computing complexity is about $2^{42.9}$ CHESS-64 encryptions, storage complexity is about $2^{26.6}$ bits of storage resources. To break the cipher, an exhaustive attack is implemented to recover the rest 54 bits key. These works demonstrate an effective and general way to attack DDO-based ciphers.

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks

  • Huang, Meigen;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3671-3689
    • /
    • 2019
  • Software defined networking brings unique security risks such as control plane saturation attack while enhancing the performance of wireless sensor networks. The attack is a new type of distributed denial of service (DDoS) attack, which is easy to launch. However, it is difficult to detect and hard to defend. In response to this, the attack threat model is discussed firstly, and then a DDoS attack prevention extension, called FuzzyGuard, is proposed. In FuzzyGuard, a control network with both the protection of data flow and the convergence of attack flow is constructed in the data plane by using the idea of independent routing control flow. Then, the attack detection is implemented by fuzzy inference method to output the current security state of the network. Different probabilistic suppression modes are adopted subsequently to deal with the attack flow to cost-effectively reduce the impact of the attack on the network. The prototype is implemented on SDN-WISE and the simulation experiment is carried out. The evaluation results show that FuzzyGuard could effectively protect the normal forwarding of data flow in the attacked state and has a good defensive effect on the control plane saturation attack with lower resource requirements.

Cyclic behaviour of concrete encased steel (CES) column-steel beam joints with concrete slabs

  • Chu, Liusheng;Li, Danda;Ma, Xing;Zhao, Jun
    • Steel and Composite Structures
    • /
    • v.29 no.6
    • /
    • pp.735-748
    • /
    • 2018
  • In this paper, the cyclic behavior of steel beam-concrete encased steel (CES) column joints was investigated experimentally and numerically. Three frame middle joint samples with varying concrete slab widths were constructed. Anti-symmetrical low-frequency cyclic load was applied at two beam ends to simulate the earthquake action. The failure modes, hysteretic behavior, ultimate load, stiffness degradation, load carrying capacity degradation, displacement ductility and strain response were investigated in details. The three composite joints exhibited excellent seismic performance in experimental tests, showing high load-carrying capacity, good ductility and superior energy dissipation ability. All three joint samples reached their ultimate loads due to shear failure. Numerical results from ABAQUS modelling agreed well with the test results. Finally, the effect of the concrete slab on ultimate load was analyzed through a parametric study on concrete strength, slab thickness, as well as slab width. Numerical simulation showed that slab width and thickness played an important role in the load-carrying capacity of such joints. As a comparison, the influence of concrete grade was not significant.

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

  • Zhou, Weiwei;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5819-5840
    • /
    • 2018
  • Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.