• Tidak ada hasil yang ditemukan

Jurnal Ilmiah (Prosiding) - Universitas Diponegoro

N/A
N/A
Protected

Academic year: 2023

Membagikan "Jurnal Ilmiah (Prosiding) - Universitas Diponegoro"

Copied!
42
0
0

Teks penuh

(1)

LEMBAR

HASIL PENILAIAN SEJAWAT SEBIDANG ATAU PEER REVIEW KARYA ILMIAH : PROSIDING

Judul Jurnal Ilmiah (Prosiding)

: Calculation of Lung Cancer Volume of Target Based on Thorax Computed Tomography Images using Active Contour Segmentation Method for Treatment Planning System Nama/ Jumlah Penulis : Fiet Patra Yosandha, Kusworo Adi, dan Catur Edi Widodo/ 3 orang

Status Pengusul : Penulis ke- 2

Identitas Prosiding : a. Nama Jurnal : Journal of Physics: Conf. Series b. Nomor ISSN : 1742-6588 (print); 1742-6596 (web) c. Vol, No., Bln Thn : 855, 2017

d. Penerbit : IOP Publishing

e. DOI artikel (jika ada) : https://doi.org/10.1088/1742-6596/855/1/012063 f. Alamat web jurnal : https://iopscience.iop.org/article/10.1088/1742-

6596/855/1/012063

Alamat Artikel : https://iopscience.iop.org/article/10.1088/1742- 6596/855/1/012063/pdf

g. Terindex : Scopus, Q3 SJR: 0.221 (2018)

https://www.scimagojr.com/journalsearch.php?q=13005 3&tip=sid&clean=0

Kategori Publikasi Jurnal Ilmiah : Prosiding forum Ilmiah Internasional (beri pada kategori yang tepat) Prosiding forum Ilmiah Nasional Hasil Penilaian Peer Review :

Komponen Yang Dinilai Nilai Reviewer

Nilai Rata-rata Reviewer 1 Reviewer 2

a. Kelengkapan unsur isi prosiding (10%) 2,90 3,00 2,95

b. Ruang lingkup dan kedalaman pembahasan (30%)

8,70 8,80 8,75

c. Kecukupan dan kemutahiran

data/informasi dan metodologi (30%)

8,70 8,70 8,70

d. Kelengkapan unsur dan kualitas terbitan/prosiding(30%)

8,50 9,00 8,75

Total = (100%) 28,80 29,50 29,15

Semarang, 8 Mei 2020 Reviewer 1

Prof. Dr. Muhammad Nur, DEA NIP. 195711261990011001

Unit Kerja : Departemen Fisika - FSM UNDIP

Reviewer 2

Prof. Dr. Heri Sutanto, SSi, MSi NIP. 197502151998021001

Unit Kerja : Departemen Fisika - FSM UNDIP

(2)

LEMBAR

HASIL PENILAIAN SEJAWAT SEBIDANG ATAU PEER REVIEW KARYA ILMIAH : PROSIDING

Judul Jurnal Ilmiah (Prosiding)

: Calculation of Lung Cancer Volume of Target Based on Thorax Computed Tomography Images using Active Contour Segmentation Method for Treatment Planning System Nama/ Jumlah Penulis : Fiet Patra Yosandha, Kusworo Adi, dan Catur Edi Widodo/ 3 orang

Status Pengusul : Penulis ke- 2

Identitas Prosiding : a. Nama Jurnal : Journal of Physics: Conf. Series b. Nomor ISSN : 1742-6588 (print); 1742-6596 (web) c. Vol, No., Bln Thn : 855, 2017

d. Penerbit : IOP Publishing

e. DOI artikel (jika ada) : https://doi.org/10.1088/1742-6596/855/1/012063 f. Alamat web jurnal : https://iopscience.iop.org/article/10.1088/1742-

6596/855/1/012063

Alamat Artikel : https://iopscience.iop.org/article/10.1088/1742- 6596/855/1/012063/pdf

g. Terindex : Scopus, Q3 SJR: 0.221 (2018)

https://www.scimagojr.com/journalsearch.php?q=13005 3&tip=sid&clean=0

Kategori Publikasi Jurnal Ilmiah : Prosiding forum Ilmiah Internasional (beri pada kategori yang tepat) Prosiding forum Ilmiah Nasional Hasil Penilaian Peer Review :

Komponen Yang Dinilai

Nilai Maksimal Prosiding Nilai Akhir Yang Diperoleh Internasional

Nasional

a. Kelengkapan unsur isi prosiding (10%) 3,00 2,90

b. Ruang lingkup dan kedalaman pembahasan (30%)

9,00 8,70

c. Kecukupan dan kemutahiran data/informasi dan metodologi (30%)

9,00 8,70

d. Kelengkapan unsur dan kualitas terbitan /prosiding (30%)

9,00 8,50

Total = (100%) 30,00 28,80

Nilai Pengusul =

Catatan Penilaian artikel oleh Reviewer : 1. Kelengkapan unsur isi prosiding:

Artikel telah ditulis seuai dengan format IOP Science. Unsur-unsur artikel lengkap Latar belakang sangat sangat singkat dan kebaruan tidak dikemukakan secara explisit..

2. Ruang lingkup dan kedalaman pembahasan:

Ruang lingkup tidak begitu luas. Pembahasan sudah baik lengkap, juga ditemukan dengan jelas terdapat diskusi/pembahasan sebagai pembandingan dengan hasil penelitian dalam referensi yang digunakan

3. Kecukupan dan kemutakhiran data/informasi dan metodologi:

Referensi tidak ditemukan mutahkir. Metoda standard dan dapat direflikasi oleh peneliti lain. Data mutakhir 4. Kelengkapan unsur dan kualitas terbitan:

Kualitas penerbitan cukup baik. Penataan masih ada yang terlewatkan. Paper berasal dari konferensi dimuat di IOP Science, terindeks Scopus, Q3 SJR: 0.221 (2018). Nili maximum 30.

Semarang, 8 Mei 2020 Reviewer 1

Prof. Dr. Muhammad Nur, DEA NIP. 195711261990011001

Unit Kerja : Departemen Fisika - FSM UNDIP

(3)

LEMBAR

HASIL PENILAIAN SEJAWAT SEBIDANG ATAU PEER REVIEW KARYA ILMIAH : PROSIDING

Judul Jurnal Ilmiah (Prosiding)

: Calculation of Lung Cancer Volume of Target Based on Thorax Computed Tomography Images using Active Contour Segmentation Method for Treatment Planning System Nama/ Jumlah Penulis : Fiet Patra Yosandha, Kusworo Adi, dan Catur Edi Widodo/ 3 orang

Status Pengusul : Penulis ke- 2

Identitas Prosiding : a. Nama Jurnal : Journal of Physics: Conf. Series b. Nomor ISSN : 1742-6588 (print); 1742-6596 (web) c. Vol, No., Bln Thn : 855, 2017

d. Penerbit : IOP Publishing

e. DOI artikel (jika ada) : https://doi.org/10.1088/1742-6596/855/1/012063 f. Alamat web jurnal : https://iopscience.iop.org/article/10.1088/1742-

6596/855/1/012063

Alamat Artikel : https://iopscience.iop.org/article/10.1088/1742- 6596/855/1/012063/pdf

g. Terindex : Scopus, Q3 SJR: 0.221 (2018)

https://www.scimagojr.com/journalsearch.php?q=13005 3&tip=sid&clean=0

Kategori Publikasi Jurnal Ilmiah : Prosiding forum Ilmiah Internasional (beri pada kategori yang tepat) Prosiding forum Ilmiah Nasional

Hasil Penilaian Peer Review : Komponen Yang Dinilai

Nilai Maksimal Prosiding Nilai Akhir Yang Diperoleh Internasional

Nasional

e. Kelengkapan unsur isi prosiding (10%) 3,00 3,00

f. Ruang lingkup dan kedalaman pembahasan (30%)

9,00 8,80

g. Kecukupan dan kemutahiran data/informasi dan metodologi (30%)

9,00 8,70

h. Kelengkapan unsur dan kualitas terbitan /prosiding (30%)

9,00 9,00

Total = (100%) 30,00 29,50

Nilai Pengusul =

Catatan Penilaian artikel oleh Reviewer : 1. Kelengkapan unsur isi prosiding:

Artikel telah ditulis secara lengkap mulai dari judul, abstrak, pendahuluan hingga referensi dan sesuai template Journal of Physics: Conf. Series.

2. Ruang lingkup dan kedalaman pembahasan:

Ruang lingkup kedalaman pembahasan sudah diuraikan dengan baik sesuai data yang diperoleh terutama dalam proses perhitungan volume tumor dengan image processing. Pembahasan belum mengkaitkan dengan hasil peneliti lain.

3. Kecukupan dan kemutakhiran data/informasi dan metodologi:

Data penelitian yang diperoleh cukup memadai (ada 1 gambar) yang setiap tahapan image processing ditampilkan..

Hasil penelitian sudah sesuai dengan metodologi riset yang dilakukan. Artikel disusun berdasarkan total 11 referensi dan 5 referensi tidak mutakhir.

4. Kelengkapan unsur dan kualitas terbitan:

Secara umum kelengkapan unsur artikel lengkap. Kualitas penerbit IOP baik dan sudah berpengalaman mempublikasi hasil-hasil seminar internasional. Prosiding terindeks Scopus dengan SJR 0.221 (2018).

Semarang, 4 Mei 2020 Reviewer 2

Prof. Dr. Heri Sutanto, SSi, MSi NIP. 197502151998021001

Unit Kerja : Departemen Fisika - FSM UNDIP

(4)

Journal of Physics: Conference Series

PAPER • OPEN ACCESS

International Conference on Mathematics:

Education, Theory and Application

To cite this article: 2017 J. Phys.: Conf. Ser. 855 011001

View the article online for updates and enhancements.

Related content

Some Pictures of The 2015 International Conference on Mathematics, its Applications, and Mathematics Education Sudi Mungkasi

-

Committee of The 2015 International Conference on Mathematics, its Applications, and Mathematics Education -

2018 8th International Conference on Applied Physics and Mathematics (ICAPM 2018)

-

This content was downloaded from IP address 114.5.242.162 on 22/05/2020 at 10:25

(5)

1

Content from this work may be used under the terms of theCreative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Published under licence by IOP Publishing Ltd

1234567890

International Conference on Mathematics: Education, Theory and Application IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 855 (2017) 011001 doi :10.1088/1742-6596/855/1/011001

Preface

The 1

st

International Conference on Mathematics: Education, Theory, and Application (ICMETA) was held on December 6-7, 2016 at Universitas Sebelas Maret (UNS), Solo, Indonesia. The ICMETA is a conference that was first accomplished by Department of Mathematics, Universitas Sebelas Maret and planned to be held biennially.

The main objective of the conference is to gather world-class researchers, engineers, and educators engaged in the fields of mathematics and its applications to meet and present their latest activities. It provides a platform to disseminate research findings, and hopefully, it also sparks innovative ideas, foster research relations or partnership between the various institutions. As a scientific meeting event we invited experts from six different countries including Australia, the Netherlands, Indonesia, Japan,

Malaysia, and France as keynote speakers.

We are grateful to all speakers for their presentations and all delegates who contributed

for the success of this conference.

(6)

Journal of Physics: Conference Series

PAPER • OPEN ACCESS

Peer review statement

To cite this article: 2017 J. Phys.: Conf. Ser. 855 011002

View the article online for updates and enhancements.

Related content

Peer review statement -

Peer review statement -

Peer review statement -

This content was downloaded from IP address 114.5.242.162 on 22/05/2020 at 10:26

(7)

1

Content from this work may be used under the terms of theCreative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Published under licence by IOP Publishing Ltd

1234567890

International Conference on Mathematics: Education, Theory and Application IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 855 (2017) 011002 doi :10.1088/1742-6596/855/1/011002

Peer review statement

All papers published in this volume of Journal of Physics: Conference Series have been peer reviewed through processes administered by the proceedings Editors. Reviews were conducted by expert referees to the professional and scientific standards expected of a proceedings journal published by IOP Publishing.

(8)

Author details

1 of 1

Return to search results

Adi, K.

Author ID: 57200265615

Affiliation(s):

, Semarang, Indonesia

http://orcid.org/0000-0002-7702-6554

Universitas Diponegoro View more 

View potential author matches

Other name formats:  Adi, K. Adi, Kusworo

Subject area:  Computer Science Engineering Physics and Astronomy Environmental Science Social Sciences Energy Mathematics Medicine Earth and Planetary Sciences Decision Sciences

Health Professions View all

Documents by author

35

Analyze author output

Total citations

66 by 51 documents

View citation overview

h-index:

4

View h-graph

Document and citation trends:

Years

Documents Citations Documents

Citations

2006 2020

0 8

0 21

Profile actions

Edit author profile Connect to ORCID

Alerts

Set citation alert Set document alert

Learn more about Scopus Profiles

KA

Universitas Diponegoro 35 Documents

K. Adi

Is this you?

Sort on:

Document title Authors Year Source Cited by

, ,

, (...), ,

2019

185(1), pp. 42-49

0

Open Access

, , 2019

125,22006

0

35 Documents Cited by 51 documents 48 co-authors Topics

View in search results format View 394 references Date (newest) 

Export all Add all to list Set document alert Set document feed

A SIMPLIFIED METHOD for the WATER-EQUIVALENT DIAMETER CALCULATION to ESTIMATE PATIENT DOSE in CT EXAMINATIONS

Anam, C. Arif, I. Haryanto, F. Adi, K. Dougherty, G.

Radiation Protection Dosimetry



View abstract View at Publisher Related documents

System of Performance Evaluation of Rice Paddy Production with Data Envelopment Analysis

Hidayah, Q.H. Mustafid Adi, K.

E3S Web of Conferences



View abstract View at Publisher Related documents

Brought to you by Universitas Diponegoro

Search Sources Lists SciVal ↗ Create account Sign in

(9)

Document title Authors Year Source Cited by

Open Access

, ,

, (...), ,

2019

25(3), pp. 179-187

0

, ,

, (...), ,

2019

39(3), pp. 783-793

Open Access

, 2019

1217(1),12033

0

Open Access

,

, , ,

2019

1217(1),12032

0

Open Access

, ,

, (...), ,

2019

1217(1),12036

0

, , 2019 Proceeding - 2019 International Conference of Artificial Intelligence and Information Technology, ICAIIT 2019

8834622, pp. 255-259

0

Open Access

, , 2018

73,13004

0

, , 2018 2018 International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2018

8864330, pp. 459-464

0

, ,

,

2018

1977,020007

0

Open Access

, ,

, ,

2018

1025(1),012025 Automated MTF measurement in CT images with a simple wire

phantom

Anam, C. Fujibuchi, T.

Haryanto, F. Muhlisin, Z. Dougherty, G.

Polish Journal of Medical Physics and Engineering



View abstract View at Publisher Related documents

Assessment of patient dose and noise level of clinical CT images:

Automated measurements

Anam, C. Budi, W.S. Adi, K. Fujibuchi, T.

Dougherty, G.

Journal of Radiological Protection 4



View abstract View at Publisher Related documents

Finger edge contour perimeter as a biometric based identification system

Widodo, C.E. Adi, K. Journal of Physics: Conference Series



View abstract View at Publisher Related documents

Richardson number model for turbulence motion analysis around airport runway

Gernowo, R. Saputro, H.D. Setiawan, A. Adi, K.

Widodo, A.P.

Journal of Physics: Conference Series



View abstract View at Publisher Related documents

Detecting driver drowsiness using total pixel algorithm Adi, K. Widodo, A.P.

Widodo, C.E. Naqiyah, S. Aristia, H.N.

Journal of Physics: Conference Series



View abstract View at Publisher Related documents

Determining the Threshold Value for Identification of the Goblet Cells in Chicken Small Intestine

Sepriana, D. Adi, K.

Widodo, C.E.



View abstract View at Publisher Related documents

Information System Prediction with Weighted Moving Average (WMA) Method and Optimization Distribution Using Vehicles Routing Problem (VRP) Model for Batik Product

Nugrahani, T.A. Adi, K.

Suseno, J.E.

E3S Web of Conferences



View abstract View at Publisher Related documents

Logic scoring of preference method for determining landfill with geographic information system

Pirmanto, D. Suseno, J.E.

Adi, K.



View abstract View at Publisher Related documents

Design of crack detection system for concrete built infrastructure based on fiber optic sensors

Hidayah, F.N. Budi, W.S.

Adi, K. Supardjo

AIP Conference Proceedings



View abstract View at Publisher Related documents

Automatic vehicle counting using background subtraction method on gray scale images and morphology operation

Adi, K. Widodo, A.P.

Widodo, C.E. Pamungkas, A. Putranto, A.B.

Journal of Physics: Conference Series 1



View abstract View at Publisher Related documents

(10)

Document title Authors Year Source Cited by

Open Access

, ,

, ,

2018

1025(1),012023

Open Access

, , 2018

31,11007

Open Access

, , 2018

31,10006

0

, ,

, (...), ,

2018

11(2), pp. 8-12

, , 2017

23(7), pp. 6593-6597

, ,

,

2017

23(7), pp. 6618-6622

0

Open Access

, , 2017

855(1),012063

0

, , 2017 Proceedings - 2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering, ICITACEE 2016 7892450, pp. 253-259

Hazard mitigation with cloud model based rainfall and convective data

Gernowo, R. Adi, K.

Yulianto, T. Seniyatis, S.

Yatunnisa, A.A.

Journal of Physics: Conference Series 1



View abstract View at Publisher Related documents

Application Mail Tracking Using RSA Algorithm As Security Data and HOT-Fit a Model for Evaluation System

Permadi, G.S. Adi, K.

Gernowo, R.

E3S Web of Conferences 3



View abstract View at Publisher Related documents

The Decision Support System (DSS) Application to Determination of Diabetes Mellitus Patient Menu Using a Genetic Algorithm Method

Zuliyana, N. Suseno, J.E.

Adi, K.

E3S Web of Conferences



View abstract View at Publisher Related documents

Detection lung cancer using Gray Level Co-Occurrence Matrix (GLCM) and back propagation neural network classification

Adi, K. Widodo, C.E.

Widodo, A.P.

Pamungkas, A. Syifa, R.A.

Journal of Engineering Science and Technology Review

3



View abstract Related documents

Convective cloud model for analyzing of heavy rainfall of weather extreme at Semarang Indonesia

Gernowo, R. Adi, K.

Yulianto, T.

Advanced Science Letters 2



View abstract View at Publisher Related documents

Beef marbling identification using color analysis and decision tree classification

Adi, K. Pujiyanto, S.

Nurhayati, O.D.

Pamungkas, A.

Advanced Science Letters



View abstract View at Publisher Related documents

Calculation of Lung Cancer Volume of Target Based on Thorax Computed Tomography Images using Active Contour Segmentation Method for Treatment Planning System

Yosandha, F.P. Adi, K.

Widodo, C.E.

Journal of Physics: Conference Series



View abstract View at Publisher Related documents

Detection of the beef quality: Using mobile-based K-mean clustering method

Nurhayati, O.D. Adi, K.

Pujiyanto, S.

2



View abstract View at Publisher Related documents

Display:  20  results per page 1 2  Top of page

The data displayed above is compiled exclusively from documents indexed in the Scopus database. To request corrections to any inaccuracies or provide any further feedback, please use the Author Feedback Wizard .

About Scopus

What is Scopus Content coverage Scopus blog Scopus API

Language

⽇本語に切り替える 切换到简体中文 切換到繁體中文 Русский язык

Customer Service

Help Contact us

(11)

Document details

19 of 35

Calculation of Lung Cancer Volume of Target Based on Thorax Computed Tomography Images using Active Contour Segmentation Method for Treatment Planning System (Conference Paper) (Open Access)

, ,

Physics Department, Diponegoro University, Indonesia

Abstract

In this research, calculation process of the lung cancer volume of target based on computed tomography (CT) thorax images was done. Volume of the target calculation was done in purpose to treatment planning system in radiotherapy.

The calculation of the target volume consists of gross tumor volume (GTV), clinical target volume (CTV), planning target volume (PTV) and organs at risk (OAR). The calculation of the target volume was done by adding the target area on each slices and then multiply the result with the slice thickness. Calculations of area using of digital image processing techniques with active contour segmentation method. This segmentation for contouring to obtain the target volume. The calculation of volume produced on each of the targets is 577.2 cm for GTV, 769.9 cm for CTV, 877.8 cm for PTV, 618.7 cm for OAR 1, 1,162 cm for OAR 2 right, and 1,597 cm for OAR 2 left. These values indicate that the image processing techniques developed can be implemented to calculate the lung cancer target volume based on CT thorax images. This research expected to help doctors and medical physicists in determining and contouring the target volume quickly and precisely. © Published under licence by IOP Publishing Ltd.

SciVal Topic Prominence

Topic:

Prominence percentile: 97.808

Indexed keywords

Engineering controlled terms:

Biological organs Calculations Diseases Image processing Image segmentation Tomography

Engineering uncontrolled terms

Active contour segmentation Calculation process Clinical target volumes Computed tomography images Digital image processing technique

Image processing technique Planning target volumes Treatment planning systems

Engineering main heading:

Computerized tomography

◅ Back to results ◅ Previous Next

Export Download Print E-mail Save to PDF Add to List More...

View at Publisher

Journal of Physics: Conference Series

Volume 855, Issue 1, 12 June 2017, Article number 012063

1st International Conference on Mathematics: Education, Theory, and Application, ICMETA 2016;

Universitas Sebelas Maret (UNS)Surakarta; Indonesia; 6 December 2016 through 7 December 2016; Code 128467

Yosandha, F.P. Adi, K. Widodo, C.E.

 View references (11)

3 3

3 3 3 3

Biological organs | Computerized tomography | Lung segmentation

PlumX Metrics

Usage, Captures, Mentions, Social Media and Citations beyond Scopus.

Metrics

Cited by 0 documents

Inform me when this document is cited in Scopus:

Related documents

Find more related documents in Scopus based on:

View all metrics ▻



Set citation alert ▻

Set citation feed

Authors Keywords

Brought to you by Universitas Diponegoro

Search Sources Lists SciVal ↗ Create account Sign in

(12)

References (11)

Elizabeth, D.S., Nehemiah, H.K., Retmin Raj, C.S., Kannan, A.

(2012) IET Image Processing, 6 (6), pp. 697-705.  . doi: 10.1049/iet-ipr.2010.0521

Keshani, M., Azimifar, Z., Tajeripour, F., Boostani, R.

(2013) Computers in Biology and Medicine, 43 (4), pp. 287-300.  . doi: 10.1016/j.compbiomed.2012.12.004

Jin, Z., Arimura, H., Shioyama, Y., Nakamura, K., Kuwazuru, J., Magome, T., Yabu-Uchi, H., (...), Sasaki, M.

(Open Access)

(2014) Journal of Radiation Research, 55 (6), pp. 1153-1162.  . doi: 10.1093/jrr/rru056

Sari, R.T.D., Adi, K., Anam, C.

Volume Phantom Measurement and Calculation of Computed Tomography (CT) Scan Images (2014) Youngster Physics Journal, 3, pp. 221-226.

 

(1993) Prescribing, Recording, and Reporting Photon Beam Therapy (Report 50) the International Commision on Radiation Units and Measurements.  .

ICRU (Maryland: Woodmont Avenue Bethesda)  

(1999) Prescribing, Recording, and Reporting Photon Beam Therapy (Report 62) the International Commision on Radiation Units and Measurements

ICRU (Maryland: Woodmont Avenue Bethesda)  

Podgorsak, E.B.

(2005) External Photon Beams: Physical Aspects in Radiation Oncology Physics.  . (Austria: IAEA Publishing)

 

Khan, F.M., Gibbons, J.P.

(2014) Physics of Radiation Therapy.  . (Philadelphia: Lippincott Williams amp; Wilkins) Fifth Edition

  ISSN: 17426588

Source Type: Conference Proceeding Original language: English

DOI: 10.1088/1742-6596/855/1/012063 Document Type: Conference Paper Sponsors:

Publisher: Institute of Physics Publishing

View in search results format All Export Print E-mail Save to PDF Create bibliography

1

Computer-aided diagnosis of lung cancer based on analysis of the significant slice of chest computed tomography image

Cited 39 times View at Publisher

2

Lung nodule segmentation and recognition using SVM classifier and active contour modeling: A complete intelligent system

Cited 98 times

View at Publisher

3

Computer-assisted delineation of lung tumor regions in treatment planning CT images with PET/CT image sets based on an optimum contour selection method

Cited 9 times http://www.oxfordjournals.org/our_journals/jrr/about.html

View at Publisher

4

5

Cited 126 times

6

7

Cited 460 times

8

Cited 1401 times

(13)

19 of 35 Caselles, V., Kimmel, R., Sapiro, G.

(1997) International Journal of Computer Vision, 22 (1), pp. 61-79.  . doi: 10.1023/A:1007979827043

Hartono

Remote Sensing and Geographic Information System, and Its Application in Education and Development (2010) Seminar Nasional-PJ Dan SIG

 

Bushberg, J.T., Seibert, J.A., Boone, J.M., Leidholdt, E.M.

(2002) The Essential Physics of Medical Imaging.  . (Philadelphia: Lippincott Williams amp; Wilkins)

 

Yosandha, F.P.; Physics Department, Diponegoro University, Indonesia; email:

© Copyright 2018 Elsevier B.V., All rights reserved.

9

Geodesic Active Contours

Cited 4009 times http://www.kluweronline.com/issn/0920-5691/

View at Publisher

10

11

Cited 1637 times

fiet.patra@st.fisika.undip.ac.id

◅ Back to results ◅ Previous Next  Top of page

About Scopus

What is Scopus Content coverage Scopus blog Scopus API Privacy matters

Language

⽇本語に切り替える 切换到简体中文 切換到繁體中文 Русский язык

Customer Service

Help Contact us

Copyright © . All rights reserved. Scopus® is a registered trademark of Elsevier B.V.

We use cookies to help provide and enhance our service and tailor content. By continuing, you agree to the .

Terms and conditions Privacy policy Elsevier B.V

use of cookies

(14)

Journal of Physics: Conference Series

PAPER • OPEN ACCESS

Error-correcting pairs for a public-key cryptosystem

To cite this article: Ruud Pellikaan and Irene Márquez-Corbella 2017 J. Phys.: Conf. Ser. 855 012032

View the article online for updates and enhancements.

Related content

Quantum signature scheme for known quantum messages

Taewan Kim and Hyang-Sook Lee -

Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

S W Al–Safi and C M Wilmott -

DNA-Cryptography-Based Obfuscated Systolic Finite Field Multiplier for Secure Cryptosystem in Smart Grid

Shaobo Chen, Pingxiuqi Chen, Qiliang Shao et al.

-

Recent citations

Squares of matrix-product codes Ignacio Cascudo et al

-

This content was downloaded from IP address 118.96.138.242 on 07/06/2020 at 13:53

(15)

1

Content from this work may be used under the terms of theCreative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Published under licence by IOP Publishing Ltd

1234567890

International Conference on Mathematics: Education, Theory and Application IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 855 (2017) 012032 doi :10.1088/1742-6596/855/1/012032

Error-correcting pairs for a public-key cryptosystem

Ruud Pellikaan

Dept. of Mathematics and Computing Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands

E-mail: [email protected]

Irene M´arquez-Corbella

Dept. of Mathematics, Statistics and O. Research, University of La Laguna, Spain E-mail: [email protected]

Abstract. Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post- quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification.

The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken.

One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has at-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error- correcting pair.

In this paper, the class of codes with at-ECP is proposed for the McEliece cryptosystem.

Moreover, we study the hardness of distinguishing arbitrary codes from those having at-error correcting pair.

1. Introduction

In 1978 [17] McEliece presented the first PKC system based on the theory of error-correcting codes. In 1986 Niederreiter [19] presented a dual version of McEliece cryptosystem which is equivalent in terms of security. Their main advantages are its fast encryption and decryption schemes. It is an interesting candidate for post-quantum cryptography.

2. Code-based cryptography

A linear codeC is a subspace ofFnq. Theweightofx∈Fnq is the number of nonzero entries ofx and is denoted by wt(x). The(Hamming) distancebetween x, y∈Fq is the number of entries where x and y differ and is denoted by d(x,y). The minimum distance of C is the minimal

(16)

2

1234567890

International Conference on Mathematics: Education, Theory and Application IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 855 (2017) 012032 doi :10.1088/1742-6596/855/1/012032

value of d(x,y) wherex, y∈C andx6=y. SinceC is linear it is equal to the minimum weight of C, that is the minimal value of wt(x) wherex∈C and x6=0.

Theparametersof the code are denoted by [n, k, d], wherenis itslength,kitsdimensionand dits minimum distance. The (information) rateof C is defined by R=k/n.

Let C be an Fq-linear code of length n and dimension k. A generator matrix G of C is a k×n matrix with entries inFq such that its rows are a basis ofC. A parity check matrix H is (n−k)×nmatrix with entries inFq such that cHT =0 if and only ifc∈C.

The problem of minimum distance decoding has as input (G,y), where G is a generator matrix of a code C overFq of parameters [n, k, d] andy∈Fnq is a received word. The output is a codeword c∈C of minimal distance toy. One can phrase the problem equivalently in terms of a parity check matrix H of the code. Then the input is (H,s), where s∈Fn−kq . The output is ane∈Fnq of minimal weight such thateHT =s. The relation of the two versions is given by s=yHT thesyndromeand e=y−cthe error vector of the received word y.

The security of code-based cryptosystems is based on the hardness of decoding up to half the minimum distance. The minimum distance decoding problem was shown by Berlekamp- McEliece-Van Tilborg [2] to be NP-hard. The status of the hardness of decoding up to half the minimum distance is an open problem. McEliece proposed to use binary Goppa codes for his PKC system.

In the McEliece PKC system a collectionK of generator k×n matrices is chosen for which an efficient decoding algorithm is available that corrects all patterns ofterrors. Theencryption map

EG: P → C

for a given key G∈ K is defined byEG(m,e) =mG+e. Anadversary A is a map from C × K toP. This adversary is successful for (x, G)∈Ω ifA(EG(x), G) =x.

Let C be a class of codes such that every code C in C has an efficient decoding algorithm correcting all patterns of terrors. Let G∈Fk×nq be a generator matrix ofC. In order to mask the origin ofG, take ak×kinvertible matrixS overFq and ann×npermutation or monomial matrix Π. Then for the McEliece PKC the matricesG,Sand Π are kept secret whileG0 =SGΠ is made public. Furthermore the (trapdoor) one-way function of this cryptosystem is usually presented as follows:

x= (m,e)7→y=mG0+e,

where m ∈ Fkq is the plaintext and e∈ Fnq is a random error vector with Hamming weight at mostt.

3. Error-correcting pairs

From now on the dimension of a linear codeCwill be denoted byk(C) and its minimum distance by d(C). Given two elements a and b in Fnq, the star product is defined by coordinatewise multiplication, that isa∗b= (a1b1, . . . , anbn) while thestandard inner multiplication is defined by a·b=Pn

i=1aibi.

LetA,B and C be subspaces of Fnq. Then A∗B is the subspace generated by{a∗b|a ∈ A and b∈B}. AndC ={x|x·c= 0 for allc∈C}is thedualcode of C. FurthermoreA⊥B meansa·b= 0 for all a∈A and b∈B.

Definition 3.1. LetC be a linear code inFnq. The pair (A, B) of linear codes overFqmof length n is called at-error-correcting pair (ECP) over Fqm forC if the following properties hold:

E.1 (A∗B)⊥C, E.2 k(A)> t, E.3 d(B)> t,

(17)

3

1234567890

International Conference on Mathematics: Education, Theory and Application IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 855 (2017) 012032 doi :10.1088/1742-6596/855/1/012032

E.4 d(A) +d(C)> n.

Remark 3.2. In the above definition A and B are Fqm-linear codes and C is an Fq-linear code. So by k(A) the dimension ofA overFqm is meant. Andd(B), d(A) and d(C) mean the minimum distances ofB andA overFqm and of C overFq.

Remark 3.3. The notion of an error-correcting pair for a linear code was introduced in 1988 by Pellikaan [22] and independently by K¨otter in [11, 12] in 1992. It is shown that a linear code inFnq with a t-error-correcting pair has a decoding algorithm which corrects up to terrors with complexityO(n3).

Remark 3.4. Note that if (A, B) is a pair of codes that satisfies Conditions E.1, E.2, E.3 and the following two conditions:

E.5 d(A)>1, that means A is a non-degenerate code, E.6 d(A) + 2t > n,

then d(C)≥2t+ 1 and (A, B) is a t-ECP forC by [23, Corollary 3.4].

In the following we consider eight collections of pairs.

Example 3.5. Leta be ann-tuple of mutually distinct elements of Fq and b be ann-tuple of nonzero elements of Fq. Then thegeneralized Reed-Solomon code GRSk(a,b) is defined by

GRSk(a,b) ={(f(a1)b1, . . . , f(an)bn)|f(X)∈Fq[X] and deg(f(X))< k}.

If k≤n≤q, then GRSk(a,b) is an [n, k, n−k+ 1] code. Furthermore the dual of a GRS code is again a GRS code, in particular GRSk(a,b)= GRSn−k(a,b) for someb that is explicitly known.

LetA= GRSt+1(a,u), B = GRSt(a,v) and C = GRS2t(a,u∗v). Then (A, B) is at-ECP forC. Conversely letC = GRSk(a,b), thenA= GRSt+1(a,b) andB= GRSt(a,1) is at-ECP forC wheret=n−k

2

.

So GRS codes are the prime examples of codes that have at-error-correcting pair. GRS codes are not suited for a coded-based PKC by the attack of Sidelnikov-Shestakov [26].

Example 3.6. Let C be a subcode of a code D that has (A, B) as a t-ECP. Then condition (E.1) holds for (A, B) with respect to D. So a∗b·d = 0 for all d in D. Hence a∗b·c = 0 for all c inC, sinceC ⊆D. Conditions (E.2), (E.3) and (E.4) hold. Therefore (A, B) is also a t-ECP forC.

In particular, letC be a subcode of the code GRSn−2t(a,b). This GRS code has a t-error- correcting pair by Example 3.5 which is also a t-ECP forC.

The class of subcodes of GRS codes was proposed by Berger and Loidreau in [1] for code-based PKC to resist precisely the Sidelnikov-Shestakov attack. But for certain parameter choices this proposal is also not secure as shown by M´arquez et al. [14].

Example 3.7. The Goppa code Γ(L, g(X)) associated to a Goppa polynomial g(X) of degreer and an n-tupleLof points inFqm can be viewed as an alternant code, that is a subfield subcode of a GRS code of codimension r. Therefore such a code has an br/2c-error-correcting pair. If the Goppa polynomial is square free of degree r in an extension of F2, then the binary Goppa code has an r-ECP, since Γ(L, g(X)) = Γ(L, g(X)2).

Goppa codes were proposed by McEliece [17] for his PKC system. Sidelnikov-Shestakov made a claim [26] that their method for GRS codes could be extended to attack Goppa codes as well, but this had never been substantiated by a paper in the public domain. A binary Goppa code using elements in the extension F2m and with a square free Goppa polynomial of degree t over F2m has parameters [n, k, d] with n≤2m, k≥n−mt and d≥2t+ 1. For these codes efficient decoding algorithms are known that decode all patterns witht errors.

(18)

4

1234567890

International Conference on Mathematics: Education, Theory and Application IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 855 (2017) 012032 doi :10.1088/1742-6596/855/1/012032

A binary Goppa code with parameters [1024,524,101] as proposed by McEliece is no longer secure with nowadays computing power due to recent improvements in the decoding algorithms.

Example 3.8. Algebraic geometry (AG) codes were introduced in 1977 by V.D. Goppa. Recall that GRS codes can be seen as the class of AG codes on the projective line, that is the algebraic curve of genus zero. We refer the interested reader to [24, 25].

Let X be an algebraic curve defined over Fq with genus g. By an algebraic curve we mean a curve that is absolutely irreducible, nonsingular and projective. Let P be an n-tuple of Fq- rational points on X and let E be a divisor of X with disjoint support from P of degree e.

Then the algebraic geometry code CL(X,P, E) is the image of the Riemann-Roch space L(E) of rational functions with prescribed behavior of zeros and poles at E under the evaluation map evP. If e < n, then the dimension of the code CL(X,P, E) is at least e+ 1−g and its minimum distance is at least n−e. If e > 2g−2, then its dimension is e+ 1−g. The dual code CL(X,P, E) is again AG. If e >2g−2, then the dimension of the codeCL(X,P, E) is at least n−e−1 +g and its minimum distance is at least d =e−2g+ 2. If e < n, then its dimension is n−e−1 +g.

If A = CL(X,P, E) and B = CL(X,P, F), then A∗B ⊆ CL(X,P, E +F). So there are abundant ways to construct error-correcting pairs of an AG code. An AG code on a curve of genus g with designed minimum distanced has at-ECP overFq with t=b(d−1−g)/2c by [21, Theorem 1] and [22, Theorem 3.3]. Ifm is sufficiently large, then there exists at-ECP over Fqm witht=b(d−1)/2c by [23, Proposition 4.2].

Algebraic geometry codes were proposed by Niederreiter [19] and Janwa-Moreno [10] for code- based PKC systems. This system was broken for low genus zero [26], one and two [9, 18]. For arbitrary genus it was shown by M´arquez et al. [13, 15] that these codes are not secure for rates R in the intervals [γ,12−γ], [12+γ,1−γ], [12−γ,1−3γ] and [3γ,12 +γ], where R=k/n is the information rate andγ =g/nthe relative genus. Recently Couvreur et al. [6] showed that it is not necessary to retrieve the triple (X,P, E) and the Riemann-Roch space L(E) but that one can stay in the realm ofFnq and its subspaces in order to find an error-correcting pair.

Example 3.9. Geometric Goppa codes are subfield subcodes of algebraic geometry codes generalizing the classical Goppa codes that are subfield subcodes of GRS codes. Geometric Goppa codes were proposed by Janwa-Moreno [10]. Couvreur et al. [5] showed that certain geometric Goppa codes are not secure for a PKC system.

Example 3.10. Let (A, B) be a pair of codes with parameters [n, t+ 1, n−t] and [n, t, n−t+ 1], respectively, and C= (A∗B), then the minimum distance ofC is at least 2t+ 1 and (A, B) is at-error-correcting pair for Cby [23, Corollary 3.4]. The dimension ofA∗B is at mostt(t+ 1).

So the dimension of C is at least n−t(t+ 1). In Appendix A it is shown that this is almost always equal to n−t(t+ 1) for random choices of Aand B.

Ifqis considerably larger thann, then a random linear code is MDS with very high probability.

So taking random codes AandB of lengthnand dimensionst+ 1 andt, respectively, this gives a very large class of codes for the McEliece PKC. However with large field the key size becomes larger and recall that the main obstacle for coded-based cryptosystems was the key size.

4. The ECP one-way function

Let P(n, t, q) be the collection of pairs (A, B) such that there exist a positive integer m and a pair (A, B) of Fqm-linear codes of length n, that satisfy Conditions E.2, E.3, E.5 and E.6. Let C be the Fq-linear code of lengthn that is the subfield subcode that has all elements ofA∗B as parity checks. So

C =Fnq ∩(A∗B).

Then the minimum distance of C is at least 2t+ 1 and (A, B) is at-ECP forC as was noted in Remark 3.4. LetF(n, t, q) be the collection ofFq-linear codes of lengthnand minimum distance

(19)

5

1234567890

International Conference on Mathematics: Education, Theory and Application IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 855 (2017) 012032 doi :10.1088/1742-6596/855/1/012032

d≥2t+ 1. Consider the following map

ϕ(n,t,q): P(n, t, q) −→ F(n, t, q) (A, B) 7−→ C.

The question is whether this map is a one-way function.

Let U and V be generator matrices of the codes A and B, with rows denoted by ui and vi, respectively. Let U ∗V be the matrix with the rowsui∗vj ordered lexicographically. Let (U∗V)(ql) be the matrix with entries theql-power of the entries ofU∗V. LetW be the reduced row echelon form (with the zero rows deleted) of the matrix with rows all the rows of (U∗V)(ql) forl= 0,1. . . , m−1. Then W has entries inFq and is a parity check matrix of C. In this way

(U, V)7−→ W is an implementation of the mapϕ(n,t,q).

If the mapϕ(n,t,q) is indeed difficult to invert, then we will call it the ECP one-way function and the codeCwith parity check matrixW might be used as a public-key in a coding based PKC.

Otherwise it would mean that the PKC based on codes that can be decoded by error-correcting pairs is not secure.

Remark 4.1. Note that uΠ∗vΠ = (u∗v)Π for every permutation or monomial matrix Π.

Thus, if (A, B) is a t-ECP forC, then (AΠ, BΠ) is at-ECP forCΠ.

Furthermore, ifS and T are invertible matrices of the correct sizes to be multiplied on the left of the matricesU and V, respectively, then U∗V generates the same code as (SU)∗(T V) since (SU)∗v=S(U∗v) andu∗(T V) =T(u∗V) for all vectorsuand v. Therefore the usual maskingSHP of a parity check matrixHby means of an invertible matrixS and a permutation matrix P is already incorporated in the choice of the pair of generator matrices (U, V).

5. Distinguishing a code with an ECP

LetK be a collection of generator matrices of codes that have at-error-correcting pair and that is used for a coded-based PKC system. In this section we address assumption A.2 whether we can distinguish arbitrary codes from those coming from K.

LetC be ak dimensional subspace of Fnq with basis g1, . . . ,gk which represents the rows of the generator matrix G ∈ Fk×nq . We denote by S2(C) the second symmetric power of C, or equivalently the symmetrized tensor product of C with itself. If xi = gi, then S2(C) has basis {xixj |1≤i≤j≤n} and dimension k+12

. Furthermore we denote C∗C by C(2) the square of C, that is the linear subspace in Fnq generated by {a∗b|a,b∈C}. See [3, §4 Definition 6]

and [4, 14]. Now, following the same scheme as in [13], we consider the linear map σ : S2(C) −→ C(2),

where the elementxixj is mapped togi∗gj. The kernel of this map will be denoted byK2(C).

Then K2(C) is the solution space of the following set of equations:

X

1≤i≤i0≤k

gijgi0jXii0 = 0, 1≤j ≤n.

There is no loss of generality in assuming G to be systematic at the first k position, making a suitable permutation of columns and applying Gaussian elimination, if necessary. Then G = Ik P

where Ik is the k×k identity matrix and P is an k×(n−k) matrix formed by the last n−k columns of G. Now H = PT −In−k

is a parity check matrix of C, or equivalently H is a generator matrix of the [n, n−k] code D=C.

(20)

6

1234567890

International Conference on Mathematics: Education, Theory and Application IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 855 (2017) 012032 doi :10.1088/1742-6596/855/1/012032

In [8, III] and [20, Ch. 10] a system LP associated to the matrix P of k linear equations involving the n−k2

variables Zjl, withk+ 1≤j < l ≤n, is defined as LP =

n−1

X

j=k+1 n

X

j0>j

pijpij0Zjj0 = 0|1≤i≤k.

This system differs from the system of equations obtained for the kernel K2(C) in interchanging indices i and j and the strict inequality j < j0 in the summation, instead of i≤i0. Denote the kernel ofLP, that is the space of all solutions of LP, by K(LP).

Proposition 5.1.

dimK(LP) = dimK2(D) Proof. Let M be the k+12

×n matrix with entries gijgi0j

1≤i≤i0≤k 1≤j≤n

. Then a basis of K2(C) can be read of directly as the kernel of M. Note also that the dimension ofC(2) is equal to the rank of M. Furthermore, sinceC(2) is the image of the linear map σ, by the first isomorphism theorem we get:

dimK2(C) + dimC(2)= dimS2(C) =

k+ 1 2

.

Let hi be the i-th row of the parity check matrix H,ei be the i-th vector in the canonical basis of Fn−kq and qi be thei-th row of the matrix PT. Then qij =pj,i+k and hi = (qi| −ei).

Therefore

hj∗hj0 =

qj∗qj ej

ifj=j0, qj∗qj0 0

ifj < j0. LetM1 be the k× n−k2

matrix with entries pijpij0

1≤i≤k k<j<j0≤n

, then dimK(LP) =

n−k 2

−rank(M1) Now letM2 be the n−k+12

×nmatrix with entries hijhi0j

1≤i≤i0≤n−k 1≤j≤n

. Then dimD(2)= rank(M2) =n−k+ rank(M1)

Therefore

dimK(LP) =

n−k 2

−rank(M1)

=

n−k 2

+n−k−dimD(2)

= dimK2(D)

The dual statement of Proposition 5.1 gives: dimK(LPT) = dimK2(C).

For every [n, k] code C overFq the following inequality holds:

dimC(2)≤min{n, k+12 }.

However if the entries of the matrixP are taken independently and identically distributed, then the inequality holds with equality with high probability what is actually proved in the next proposition.

Gambar

Data  penelitian  yang  diperoleh  cukup  memadai  (ada  1  gambar)  yang  setiap  tahapan  image  processing  ditampilkan.
Figure 1. Research phases.
Table 4 displays the rainfall data in SAX alphabet symbol format. Finally, from the SAX alphabet symbol, the data is transformed into SAX integer symbol format as for ‘a’ to 1, ‘b’ to 2 and ‘c’ to 3 as shown in table 5.
Table 2. Gaussian distribution table [8].
+7

Referensi

Dokumen terkait

SciVal Topic Prominence Topic: Prominence percentile: 99.868 Author keywords catalyst composite MES zeolite/magnetite Indexed keywords  Export  Download  Print  E-mail 

SciVal Topic Prominence Topic: Prominence percentile: 99.978 Author keywords bio imaging bright Green fluorescence Cdots microwave irradiation Indexed keywords Engineering

SciVal Topic Prominence Topic: Prominence percentile: 69.330 Indexed keywords Engineering controlled terms: Ecology Groundwater Potable water Sustainable development Water

SciVal Topic Prominence Topic: Prominence percentile: 89.103 Indexed keywords Engineering controlled terms: Errors Glass Object detection Pixels Video cameras Engineering

SciVal Topic Prominence Topic: Prominence percentile: 93.215 Author keywords GIS Geographic Information System Landfill location spatial analysis Indexed keywords Engineering

SciVal Topic Prominence Topic: Prominence percentile: 90.389 Author keywords ct scan image processing phantom volume trapezoidal integration Indexed keywords ◅ Back to results ◅

SciVal Topic Prominence Topic: Prominence percentile: 28.288 Indexed keywords Engineering controlled terms: Highway planning Image processing Motor transportation Processing Roads

SciVal Topic Prominence Topic: Prominence percentile: 94.332 Indexed keywords Engineering controlled terms: Agriculture Ammonia Environmental protection Flavonoids Proteins