• Title/Summary/Keyword: Software risk

Search Result 873, Processing Time 0.028 seconds

Sun Burn Incidence and Knowledge of Greek Elementary and High School Children about Sun Protection

  • Saridi, Maria Ioannis;Toska, Aikaterini George;Rekleiti, Maria Dimitrios;Tsironi, Maria;Geitona, Maria;Souliotis, Kyriakos
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.4
    • /
    • pp.1529-1534
    • /
    • 2015
  • Introduction: Overexposure to sun radiation and particularly its accumulation during childhood and adolescence is a significant risk factor for skin cancer development. The sun burn is particularly important. Aim: To estimate sun burn incidence in young pupils in a coastal area of Greece. Materials and Methods: Two surveys were conducted in a school population in the same district in Greece, over different periods of time, in young people 9 to 18 years old (n=2 977). Anonymous questionnaires were completed. Levels of significance were two-tailed and statistical significance was set at p=0.05. SPSS 17.0 software was used for statistical analysis. Results: From the individual characteristics of the participants it was shown that the majority of them had dark hair and fair skin, whereas a significant percentage reported the existence of moles on face and their body (83.4% vs 68.1%). The sun burn incidence was high in adolescents and the younger pupils (41.9% vs 55.6%). The younger aged children who were living in an urban area had significantly higher rates of sun burn than those living in semi-urban areas (33.8% vs 24.8%, p=0.020). As far as the knowledge of pupils about the risks of sun radiation it was shown that the elementary school pupils had better knowledge than those at high school. Finally, those with better knowledge had the fewer sun burns (Mean 2.83 SD 0.87, p<0.001). Conclusions: The contribution of knowledge to the decrease of sun burn incidence is important as long as this is continuous. Therefore, the education should concern not only children but also teachers and parents in the context of continuous and systematic programs of health education.

Patterns of Metastasis and Survival in Breast Cancer Patients: A Preliminary Study in an iranian Population

  • Ziaei, Jamal Eivazi;Pourzand, Ali;Bayat, Amrollah;Vaez, Jalil
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.3
    • /
    • pp.937-940
    • /
    • 2012
  • Due to lack of sufficient data on characteristics of breast cancer patients and risk factors for developing metastasis in Iran this study was designed to understand clinical aspects impacting on survival. A cross-sectional study on breast cancer patients was conducted in an oncology clinic of the university hospital between 1995 and 2010. Data were retrieved from medical records and included age, menopausal status, tumor diameter, number of involved nodes, histopathological type, estrogen and progesterone receptor expression, c-erbB-2, primary and secondary metastasis sites, overall survival, disease free interval and type of chemotherapy protocol. The results were analyzed with SPSS 13 software. The mean age of the patients was 49.2 (27-89) years. The primary tumors were mainly ER positive (48%) and PR negative (49.3%). The status of lymph nodes dissected and examined in these patients was unknown in 19 patients (25.3%) while 18 patients (24%) had positive lymph nodes with no report on the number of involved nodes. All of the patients had received antracyclin based chemotherapy in an adjuvant or metastatic setting. Adjuvant hormonal therapy was administered to receptor positive patients. In average, overall survival after recurrence was 30 months (95%CI 24.605-35.325) for non-skeletal versus 42 months (95%CI 31.211-52.789) for skeletal metastasis (P= 0.002). The median survival was also greater for receptor positive patients; 39 months (95%CI 33.716-44.284) for PR+ versus 26 months (95%CI 19.210-32.790) for PR- (P=0.047) and 38 months (95%CI 32.908-43.092) for ER+ versus 27 months (95%CI 18.780-35.220) for ER- patients (P=0.016). No relation was found between site of first metastasis and hormone receptor, age, tumor diameter, DFI and menopausal status. Sites of metastasis were independent of age, size of the tumor, menopausal and hormone receptor status in this study. Overall survival provided significant relations with respect to receptor status and bone metastasis.

Markov's Modeling for Screening Strategies for Colorectal Cancer

  • Barouni, Mohsen;Larizadeh, Mohammad Hassan;Sabermahani, Asma;Ghaderi, Hossien
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.10
    • /
    • pp.5125-5129
    • /
    • 2012
  • Economic decision models are being increasingly used to assess medical interventions. Advances in this field are mainly due to enhanced processing capacity of computers, availability of specific software to perform the necessary tasks, and refined mathematical techniques. We here estimated the incremental cost-effectiveness of ten strategies for colon cancer screening, as well as no screening, incorporating quality of life, noncompliance and data on the costs and profit of chemotherapy in Iran. We used a Markov model to measure the costs and quality-adjusted life expectancy of a 50-year-old average-risk Iranian without screening and with screening by each test. In this paper, we tested the model with data from the Ministry of Health and published literature. We considered costs from the perspective of a health insurance organization, with inflation to 2011, the Iranian Rial being converted into US dollars. We focused on three tests for the 10 strategies considered currently being used for population screening in some Iranians provinces (Kerman, Golestan Mazandaran, Ardabil, and Tehran): low-sensitivity guaiac fecal occult blood test, performed annually; fecal immunochemical test, performed annually; and colonoscopy, performed every 10 years. These strategies reduced the incidence of colorectal cancer by 39%, 60% and 76%, and mortality by 50%, 69% and 78%, respectively, compared with no screening. These approaches generated ICER (incremental cost-effectiveness ratios) of $9067, $654 and $8700 per QALY (quality-adjusted life year), respectively. Sensitivity analyses were conducted to assess the influence of various scales on the economic evaluation of screening. The results were sensitive to probabilistic sensitivity analysis. Colonoscopy every ten years yielded the greatest net health value. Screening for colon cancer is economical and cost-effective over conventional levels of WTP8.

Gene Expression of CYP1A1 and its Possible Clinical Application in Thyroid Cancer Cases

  • Gallegos-Vargas, JA;Sanchez-Roldan, J;Ronquillo-Sanchez, MD;Carmona-Aparicio, L;Floriano-Sanchez, E;Cardenas-Rodriguez, N
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3477-3482
    • /
    • 2016
  • Background: Thyroid cancer is the most common endocrine malignancy, and exact causes remain unknown. The role of CYP450 1A1 (CYP1A1) in cancer initiation and progression has been investigated. The aim of this work was to analyze, for the first time, CYP1A1 gene expression and its relationship with several clinicopathological factors in Mexican patients diagnosed with thyroid cancer. Materials and Methods: Real-time PCR analysis was conducted on 32 sets of thyroid tumors and benign pathologies. Expression levels were tested for correlations with clinical and pathological data. All statistical analysis were performed using GraphPad Prism version 3.0 software. Results: We found that female gender was associated with thyroid cancer risk (P<0.05). A positive relationship was identified between CYP1A1 mRNA levels and the presence of chronic disease, alcohol use, tumor size, metastasis and an advanced clinical stage (P<0.05). Conclusions: The results suggest that CYP1A1 gene expression could be used as a marker for thyroid cancer.

Survival of Patients with Stomach Cancer and its Determinants in Kurdistan

  • Moradi, Ghobad;Karimi, Kohsar;Esmailnasab, Nader;Roshani, Daem
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3243-3248
    • /
    • 2016
  • Background: Stomach cancer is the fourth most common cancer and the second leading cause of death from cancer in the world. In Iran, this type of cancer has high rates of incidence and mortality. This study aimed to assess the survival rate of patients with stomach cancer and its determinants in Kurdistan, a province with one of the highest incidence rates of stomach cancer in the country. Materials and Methods: We studied a total of 202 patients with stomach cancer who were admitted to Tohid Hospital in Sanandaj from 2009 to 2013. Using Kaplan-Meier nonparametric methods the survival rate of patients was calculated in terms of different levels of age at diagnosis, gender, education, residential area, occupation, underweight, and clinical variables including tumor histology, site of tumor, disease stage, and type of treatment. In addition, we compared the survival rates using the log-rank test. Finally, Cox proportional hazards regression was applied using Stata 12 and R 3.1.0 software. The significance level was set at 0.05. Results: The mean age at diagnosis was $64.7{\pm}12.0$ years. The survival rate of patients with stomach cancer was 43.9% and 7% at the first and the fifth year after diagnosis, respectively. The results of log-rank test showed significant relationships between survival and age at diagnosis, education, disease stage, type of treatment, and degree of being underweight (P<0.05). Moreover, according to the results of Cox proportional hazards regression model, the variables of education, disease stage, and type of treatment were associated with patient survival (P<0.05). Conclusions: The survival rate of patients with stomach cancer is low and the prognosis is very poor. Given the poor prognosis of the patients, it is critical to find ways for early diagnosis and facilitating timely access to effective treatment methods.

Detection and Blocking of a Face Area Using a Tracking Facility in Color Images (컬러 영상에서 추적 기능을 활용한 얼굴 영역 검출 및 차단)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.454-460
    • /
    • 2020
  • In recent years, the rapid increases in video distribution and viewing over the Internet have increased the risk of personal information exposure. In this paper, a method is proposed to robustly identify areas in images where a person's privacy is compromised and simultaneously blocking the object area by blurring it while rapidly tracking it using a prediction algorithm. With this method, the target object area is accurately identified using artificial neural network-based learning. The detected object area is then tracked using a location prediction algorithm and is continuously blocked by blurring it. Experimental results show that the proposed method effectively blocks private areas in images by blurring them, while at the same time tracking the target objects about 2.5% more accurately than another existing method. The proposed blocking method is expected to be useful in many applications, such as protection of personal information, video security, object tracking, etc.

Design and Implementation of ontology based context-awareness platform using driver intent information (운전자 의도정보를 이용한 온톨로지 기반 지능형자동차 상황인식 플랫폼 설계 및 구현)

  • Ko, Jae-Jin;Choi, Ki-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.14-21
    • /
    • 2014
  • In this paper, we devise a new ontology-based context-aware system to recognize the smart car information, in which driver's intent is utilized by information of car, driver, environment as well as driving state, driver state. So proposed system can handle dynamically risk changes by adding real-time situational awareness information. We utilize the camera image recognition technology for context-aware intelligent vehicle driving information, and implement information acquisition scheme OBD-II protocol to acquire vehicle's information. Experiments confirm that the proposed advanced driver safety assist system outperforms the conventional system, which only utilizes the information of vehicle, driver, and environmental information, to support the service of a high-speed driving, lane-departure service and emergency braking situation awareness.

SOA Vulnerability Evaluation using Run-Time Dependency Measurement (실행시간 의존성 측정을 통한 SOA 취약성 평가)

  • Kim, Yu-Kyong;Doh, Kyung-Goo
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.2
    • /
    • pp.129-142
    • /
    • 2011
  • Traditionally research in Service Oriented Architecture(SOA) security has focused primarily on exploiting standards and solutions separately. There exists no unified methodology for SOA security to manage risks at the enterprise level. It needs to analyze preliminarily security threats and to manage enterprise risks by identifying vulnerabilities of SOA. In this paper, we propose a metric-based vulnerability assessment method using dynamic properties of services in SOA. The method is to assess vulnerability at the architecture level as well as the service level by measuring run-time dependency between services. The run-time dependency between services is an important characteristic to understand which services are affected by a vulnerable service. All services which directly or indirectly depend on the vulnerable service are exposed to the risk. Thus run-time dependency is a good indicator of vulnerability of SOA.

Evaluating the Effectiveness of Nielsen's Usability Heuristics for Computer Engineers and Designers without Human Computer Interaction Background (비 HCI 전공자들을 대상으로 한 Nielsen의 Usability Heuristics에 대한 이해 정도 평가)

  • Jeong, YoungJoo;Sim, InSook;Jeong, GooCheol
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.2
    • /
    • pp.165-171
    • /
    • 2010
  • Usability heuristics("heuristics") are general principles for usability evaluation during user interface design. Our ultimate goal is to extend the practice of usability evaluation methods to a wider audience(e.g. user interface designers and engineers) than Human Computer Interaction(HCI) professionals. To this end, we explored the degree to which Jakob Nielsen's ten usability heuristics are understood by professors and students in design and computer engineering. None of the subjects received formal training in HCI, though some may have had an awareness of some HCI principles. The study identified easy-to-understand heuristics, examined the reasons for the ambiguities in others, and discovered differences between the responses of professors and students to the heuristics. In the course of the study, the subjects showed an increased tendency to think in terms of user-centric design. Furthermore, the findings in this study offer suggestions for improving these heuristics to resolve ambiguities and to extend their practice for user interface designers and engineers.

  • PDF

Design and Implementation of Secure E-Procurement System based on XML (XML기반의 안전한 E-Procurement 시스템 설계 및 구현)

  • Moon, Tae-Soo;Song, You-Jin
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1043-1054
    • /
    • 2002
  • This paper intends to suggest a XML-based secure E-Procurement system using Unified Modeling Language(UML), as an application system for domestic automobile industry. Applying UML methodology, which is Component-based Development (CBD), we analyzed the workflow on procurement operation of automobile industry and implemented a prototype of efficient E-Procurement system for automobile industry, by developing XML/EDI and XML signature. Also, on this paper, object-oriented CBD is employed to minimize the risk of life cycle and reuse software as mentioned to limitation of information engineering methodology. It enables the interoperability with ERP (Enterprise Resource Planning) as corporate legacy system. This system proposes a solution to apply analysis and design of workflow, component development, interoperability with corporate information system, and XML signature for integrity and authentication of electronic documents in other system so far.