• Title/Summary/Keyword: group key distribution

Search Result 228, Processing Time 0.031 seconds

Analysis of Mammographic Breast Density in a Group of Screening Chinese Women and Breast Cancer Patients

  • Liu, Jing;Liu, Pei-Fang;Li, Jun-Nan;Qing, Chun;Ji, Yu;Hao, Xi-Shan;Zhang, Xue-Ning
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.15
    • /
    • pp.6411-6414
    • /
    • 2014
  • Background: A dense breast not only reduces the sensitivity of mammography but also is a moderate independent risk factor for breast cancer. The percentage of Western women with fat breast tissue is higher aged 40 years or older. To a certain extent, mammography as a first choice of screening imaging method for Western women of this group is reasonable. Hitherto, the frequency and age distribution of mammographic breast density patterns among Chinese women had not been characterized. The purpose of this study was to investigate the frequency and age distribution of mammographic breast density patterns among a group of Chinese screening women and breast cancer patients in order to provide useful information for age-specific guidelines for breast cancer screening in Chinese women. Methods: A retrospective review of a total of 3,394 screening women between August and December 2009 and 2,527 breast cancer patients between July 2011 and June 2012 was conducted. Descriptive analyses were used to examine the association between age and breast density. The significance of differences of breast density between the screening women and the breast cancer patients was examined using nonparametric tests. Results: There was a significant inverse relationship between age and breast density overall (r=-0.37, p< 0.01). Breast density of the breast cancer patients in the subgroups of 40-49 years old was greater compared with that of the screening women, the same in those aged 50-54 years and in those 55 years old or older, less than in the screening group. Conclusions: With regard to the Chinese women younger than 55 years old, the diagnostic efficiency of breast cancer screening imaging examinations may be potentially improved by combining screening mammography with ultrasound.

Bayes Estimators in Group Testing

  • Kwon, Se-Hyug
    • Communications for Statistical Applications and Methods
    • /
    • v.11 no.3
    • /
    • pp.619-629
    • /
    • 2004
  • Binomial group testing or composite sampling is often used to estimate the proportion, p, of positive(infects, defectives) in a population when that proportion is known to be small; the potential benefits of group testing over one-at-a-time testing are well documented. The literature has focused on maximum likelihood estimation. We provide two Bayes estimators and compare them with the MLE. The first of our Bayes estimators uses an uninformative Uniform (0, 1) prior on p; the properties of this estimator are poor. Our second Bayes estimator uses a much more informative prior that recognizes and takes into account key aspects of the group testing context. This estimator compares very favorably with the MSE, having substantially lower mean squared errors in all of the wide range of cases we considered. The priors uses a Beta distribution, Beta ($\alpha$, $\beta$), and some advice is provided for choosing the parameter a and $\beta$ for that distribution.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Height-thickness ratio on axial behavior of composite wall with truss connector

  • Qin, Ying;Shu, Gan-Ping;Zhou, Xiong-Liang;Han, Jian-Hong;He, Yun-Fei
    • Steel and Composite Structures
    • /
    • v.30 no.4
    • /
    • pp.315-325
    • /
    • 2019
  • Double skin composite walls offer structural and economic merits over conventional reinforced concrete counterparts in terms of higher capacity, greater stiffness, and better ductility. This paper investigated the axial behavior of double skin composite walls with steel truss connectors. Full-scaled tests were conducted on three specimens with different height-to-thickness ratios. Test results were evaluated in terms of failure mode, load-axial displacement response, buckling loading, axial stiffness, ductility, strength index, load-lateral deflection, and strain distribution. The test data were compared with AISC 360 and Eurocode 4 and it was found that both codes provided conservative predictions on the safe side.

Group Key Management with Low Cost Rekey (저비용 rekey를 갖는 그룹키 관리)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • The Internet today provides group communication model, multicast service. It is important to keep security for multicast communication. Member leaving is associated with scalability problem for group key management. If one member of the group is removed, new group key has to be changed and communicated to all remaining members of group. Modification and distribution of new group keys for rekeying is an expensive operation. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme. Periodic rekey helps reducing these important parameters rather than removing members sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm, our model has advantages of reducing the number of message and operation cost for generation of the composite keys for rekeying.

  • PDF

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.

Morphology and distribution of some marine diatoms, family Rhizosoleniaceae, genus Proboscia, Neocalyptrella, Pseudosolenia, Guinardia, and Dactyliosolen in Korean coastal waters

  • Yun, Suk-Min;Lee, Jin-Hwan
    • ALGAE
    • /
    • v.26 no.4
    • /
    • pp.299-315
    • /
    • 2011
  • The morphology, taxonomy, and distribution of species belonging to the diatom family Rhizosoleniaceae were studied from the marine coastal waters of Korea. Rhizosolenid diatom taxa were collected at 30 sites from September 2008 to February 2010 and were analyzed by light and scanning electron microscopy. We identified 6 rhizosolenid genera, including Rhizosolenia, Proboscia, Pseudosolenia, Neocalyptrella, Guinardia, and Dactyliosolen. We describe 5 genera in this study, except Rhizosolenia. Five genera were compared in detail with congeneric species. Six genera within the family Rhizosoleniaceae were divided into two groups based on morphological diagnostic characters including valve shape, areolae pattern, the shape of external process, and girdle segments in the column. The first group had a conoidal valve and loculate areolae, which comprised Rhizosolenia, Proboscia, Pseudosolenia, and Neocalyptrella, and the second group of Guinardia and Dactyliosolen showed a flat or rounded valve and poroid areolae. Important key diagnostic characters were based on valve shape, areolae pattern on the segment, external process, position of the tube, and the valve margin. D. phuketensis was new to Korean coastal waters.

How Should We Randomly Sample Marine Fish Landed at Korea Ports to Represent a Length Frequency Distribution of Those Fish? (한국 연근해 어업에서 수집되는 어류 개체군 체장자료의 표집(sampling) 방법 제안)

  • Park, Min Gyou;Hyun, Saang-Yoon
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.54 no.1
    • /
    • pp.80-89
    • /
    • 2021
  • In Korea, marine fish landed at ports are randomly sampled on a periodic basis (e.g., daily or weekly), and body sizes (e.g., lengths and weights) of those sampled fish are measured. The motivation for our study is whether or not such measurements reflect the size distribution, especially the length distribution of fish landed (= a population), because such length measurements are key data for a length-based assessment model. The current sampling method is to sample fish landed at ports by body size group (e.g., very small, small, medium, large, very large), using the sampling weights as the number of boxes by body size group. In this study, we showed that length composition data about fish sampled by the current method did not represent the length frequency distribution of the fish landed, and suggested that an alternative sampling method should be applied of using the sampling weights as the number of fish landed by body size group. We also introduced a method for determining an appropriate sample size.

A Group Key based Authentication Protocol Providing Fast Handoff in IEEE 802.11 (IEEE 802.11 환경에서 빠른 핸드오프를 제공하는 그룹키 기반의 인증 프로토콜)

  • Lee, Chang-Yong;Kim, Sang-Jin;Oh, Hee-Kuck;Park, Choon-Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.103-113
    • /
    • 2008
  • Reducing handoff latency is essential in providing seamless multimedia service in Wireless LAN based on the IEEE 802.11 standard. Reducing authentication delay is critical in reducing handoff latency. To this end, several authentication protocols for fBst handoff have been proposed. Mishra et al. used proactive key distribution to improve the authentication delay incurred in the current standard and Park et al. proposed a new authentication protocol based on Blom's key pre-distribution scheme. In this paper, we propose an enhanced authentication protocol based on Bresson et al.'s group key protocol. If a mobile node has previously access the network, our proposed protocol only requires simple hash operations in providing mutual authentication between a mobile node and access points. Our protocol is more efficient than Park et al.'s and Mishra et al.'s technique can be used in our protocol to further enhance our protocol.

Study on the water bursting law and spatial distribution of fractures of mining overlying strata in weakly cemented strata in West China

  • Li, Yangyang;Zhang, Shichuan;Yang, Yingming;Chen, Hairui;Li, Zongkai;Ma, Qiang
    • Geomechanics and Engineering
    • /
    • v.28 no.6
    • /
    • pp.613-624
    • /
    • 2022
  • A study of the evolution of overburden fractures under the solid-fluid coupling state was conducted based on the geological and mining characteristics of the coal seam depth, weak strata cementation, and high-intensity mining in the mining areas of West China. These mining characteristics are key to achieving water conservation during mining or establishing groundwater reservoirs in coal mines. Based on the engineering background of the Daliuta Coal Mine, a non-hydrophilic simulation material suitable for simulating the weakly cemented rock masses in this area was developed, and a physical simulation test was carried out using a water-sand gushing test system. The study explored the spatial distribution and dynamic evolution of the fractured zone in the mining overburden under the coupling of stress and seepage. The experimental results show that the mining overburden can be vertically divided into the overall migration zone, the fracture extension zone and the collapse zone; additionally, in the horizontal direction, the mining overburden can be divided into the primary fracture zone, periodic fracture zone, and stop-fracture zone. The scope of groundwater flow in the overburden gradually expands with the mining of coal seams. When a stable water inrush channel is formed, other areas no longer generate new channels, and the unstable water inrush channels gradually close. Finally, the primary fracture area becomes the main water inrush channel for coal mines. The numerical simulation results indicate that the overlying rock breaking above the middle of the mined-out area allows the formation of the water-conducting channel. The water body will flow into the fracture extension zone with the shortest path, resulting in the occurrence of water bursting accidents in the mining face. The experimental research results provide a theoretical basis for the implementation of water conservation mining or the establishment of groundwater reservoirs in western mining areas, and this theoretical basis has considerable application and promotion value.