RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Toremifene, an Alternative Adjuvant Endocrine Therapy, Is Better than Tamoxifen in Breast Cancer Patients with CYP2D6*10 Mutant Genotypes

        Xin Li,Zehao Li,Lin Li,Tong Liu,Cheng Qian,Yanlv Ren,Zhigao Li,Kejin Chen,Dongchen Ji,Ming Zhang,Jinsong Wang 대한암학회 2024 Cancer Research and Treatment Vol.56 No.1

        Purpose Tamoxifen showed individual differences in efficacy under different CYP2D6*10 genotypes. Our study evaluated the prognosis of tamoxifen or toremifene in hormone receptor (HR)–positive breast cancer patients under different genotypes. Materials and Methods CYP2D6*10 genotypes of HR-positive breast cancer patients were determined by Sanger sequencing, and all the patients were divided into tamoxifen group or toremifene group. Results A total of 268 patients with HR-positive breast cancer were studied. The median follow-up time was 72.0 months (range, 5.0 to 88.0 months). Of these, 88 (32.9%), 114 (42.5%), and 66 (24.6%) patients had C/C, C/T, and T/T genotypes, respectively. Among patients who received tamoxifen (n=176), the 5-year disease-free survival (DFS) rate in patients with C/C and C/T genotype was better than that in patients with T/T genotype, and the difference was statistically significant (p < 0.001 and p=0.030, respectively). In patients receiving toremifene, CYP2D6*10 genotype was not significantly associated with DFS (p=0.325). Regardless of genotypes, the 5-year DFS rate was higher in patients treated with toremifene than in patients with tamoxifen (91.3% vs. 80.0%, p=0.011). Compared with tamoxifen, toremifene remained an independent prognostic marker of DFS in multivariate analysis (hazard ratio, 0.422; p=0.021). For all the 180 patients with CYP2D6*10 C/T and T/T genotypes, the 5-year DFS rate was significantly higher in the toremifene group than in the tamoxifen group (90.8% vs. 70.1%, p=0.003). Conclusion Toremifene may be an alternative adjuvant endocrine therapy for patients with CYP2D6*10 mutant genotypes.

      • KCI등재

        Spectrum- and Energy- Efficiency Analysis Under Sensing Delay Constraint for Cognitive Unmanned Aerial Vehicle Networks

        Jia Zhang,Jun Wu,Zehao Chen,Ze Chen,Jipeng Gan,Jiangtao He,Bangyu Wang 한국인터넷정보학회 2022 KSII Transactions on Internet and Information Syst Vol.16 No.4

        In order to meet the rapid development of the unmanned aerial vehicle (UAV) communication needs, cooperative spectrum sensing (CSS) helps to identify unused spectrum for the primary users (PU). However, multi-UAV mode (MUM) requires the large communication resource in a cognitive UAV network, resulting in a severe decline of spectrum efficiency (SE) and energy efficiency (EE) and increase of energy consumption (EC). On this account, we extend the traditional 2D spectrum space to 3D spectrum space for the UAV network scenario and enable UAVs to proceed with spectrum sensing behaviors in this paper, and propose a novel multi-slot mode (MSM), in which the sensing slot is divided into multiple mini-slots within a UAV. Then, the CSS process is developed into a composite hypothesis testing problem. Furthermore, to improve SE and EE and reduce EC, we use the sequential detection to make a global decision about the PU channel status. Based on this, we also consider a truncation scenario of the sequential detection under the sensing delay constraint, and further derive a closed-form performance expression, in terms of the CSS performance and cooperative efficiency. At last, the simulation results verify that the performance and cooperative efficiency of MSM outperforms that of the traditional MUM in a low EC.

      • KCI등재

        Parametric Structural Calculation of Shield Linings for Large-Diameter Tunnels Based on the Shell-Spring Model

        Linhao Li,Ke Chen,Jun Wang,Zehao Jiang 대한토목학회 2023 KSCE Journal of Civil Engineering Vol.27 No.6

        Structural calculations are essential for segmental lining design, especially in shield tunnels with large diameters. Compared with the conventional 2D structural calculation models, the 3D shell-spring model can explicitly represent detailed structural features such as joints and shields. This study proposes a parametric shell-spring modeling method (PSSMM) that can realize segment typesetting, joint setting, and load arrangement in an automatic and intelligent manner for parametric structural calculation. The PSSMM is applied to a large-diameter tunnel design project for verification. The results show that the PSSMM is feasible for the structural calculation of shield tunnel linings and has advantages over existing methods in modeling efficiency and result visualization. Moreover, the PSSMM can effectively reflect the joint performance effect, which shows that the PSSMM can be adapted to advanced tunnel lining design.

      • KCI등재

        Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

        Jun Wu,Ze Chen,Jianrong Bao,Jipeng Gan,Zehao Chen,Jia Zhang 한국인터넷정보학회 2022 KSII Transactions on Internet and Information Syst Vol.16 No.11

        Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision’s correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

      • KCI등재

        Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective

        ( Jipeng Gan ),( Jun Wu ),( Jia Zhang ),( Zehao Chen ),( Ze Chen ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.11

        Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU’s perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼