• Title/Summary/Keyword: Triple Data

Search Result 392, Processing Time 0.019 seconds

Characteristics of Invasive Breast Ductal Carcinoma, NOS, Diagnosed in a Tertiary Institution in the East Coast of Malaysia with a Focus on Tumor Angiogenesis

  • Ch'ng, Ewe Seng;Sharif, Sharifah Emilia Tuan;Jaafar, Hasnan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.9
    • /
    • pp.4445-4452
    • /
    • 2012
  • Background: Prognosis of breast cancer depends on classic pathological factors and also tumor angiogenesis. This study aimed to evaluate the clinicopathological factors of breast cancer in a tertiary centre with a focus on the relationship between tumor angiogenesis and clinicopathological factors. Methods: Clinicopathological data were retrieved from the archived formal pathology reports for surgical specimens diagnosed as invasive ductal carcinoma, NOS. Microvessels were immunohistochemically stained with anti-CD34 antibody and quantified as microvessel density. Results: At least 50% of 94 cases of invasive breast ductal carcinoma in the study were advanced stage. The majority had poor prognosis factors such as tumor size larger than 50mm (48.9%), positive lymph node metastasis (60.6%), and tumor grade III (52.1%). Higher percentages of estrogen and progesterone receptor negative cases were recorded (46.8% and 46.8% respectively). Her-2 overexpression cases and triple negative breast cancers constituted 24.5% and 22.3% respectively. Significantly higher microvessel density was observed in the younger patient age group (p=0.012). There were no significant associations between microvessel density and other clinicopathological factors (p>0.05). Conclusions: Majority of the breast cancer patients of this institution had advanced stage disease with poorer prognostic factors as compared to other local and western studies. Breast cancer in younger patients might be more proangiogenic.

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Implementation of FTTH System based on G-PON Technology (G-PON 기술 기반 FTTH 시스템 구현)

  • Park, Chun-Kwan;Song, Han-Young;Jeon, Byung-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.77-88
    • /
    • 2008
  • This paper addresses the implementation of FTTH system based on G-PON technology. This system supports the duplication function that can switchover both TDM and data routes within 10msec. This system consists of OLT and ONU/ONT. G-PON OLT supports the maximum 32 2.5Gbps interfaces, and then has the flexibility and the scalability for supplying digital communication and broadcasting convergence service in the near future. OLT system consists switch module, subscriber module, processor module, and G-PON link module, and has the operating system based on Linux. ONU is installed in customer premise to supply TPS (Triple Play Service). Also ONT has the dedicated interface for IP-TV to improve the transmission characteristics of IP-TV signal.

  • PDF

Balancing Efficiency and Flexibility in Software Project: The Role of Team Collective Improvisation, behavioral integration, and member diversity

  • Lee, Young-Joo;Lee, Jung-Hoon;Ham, Kyung Sun
    • Journal of Contemporary Eastern Asia
    • /
    • v.16 no.1
    • /
    • pp.22-45
    • /
    • 2017
  • The successful management of software (SW) projects is a continuous concern to managers, which is attributed to the contradictory demands that most projects are facing; meeting user requirements within time and budget limit while flexibly dealing risks during the progress of the projects. The present study asserts project performance and risk mitigation are not tradeoff but to be achieved simultaneously, which is called SW project ambidexterity. Drawing on the literature on organizational behavior, hypotheses are developed speculating the relation among project performance, risk mitigation, team collective improvisation, team behavioral integration, and team diversity. Using empirical data collected from 102 SW project teams of 507 team members in South Korea, empirical analysis indicates team collective improvisation is a significant antecedent to SW project ambidexterity, playing a pivotal role to balance the contradictory demands. Furthermore, team behavioral integration positively influences the degree of team collective improvisation, and the magnitude of the relation is partially contingent on the team members' age and major diversity. The present study advances theory by providing a context specific explanation about the SW project ambidexterity and its precedents.

Who Leads Nonprofit Advocacy through Social Media? Some Evidence from the Australian Marine Conservation Society's Twitter Networks

  • Jung, Kyujin;No, Won;Kim, Ji Won
    • Journal of Contemporary Eastern Asia
    • /
    • v.13 no.1
    • /
    • pp.69-81
    • /
    • 2014
  • While much in the field of public management has emphasized the importance of nonprofit advocacy activities in policy and decision-making procedures, few have considered the relevance and impact of leading actors on structuring diverse patterns of information sharing and communication through social media. Building nonprofit advocacy is a complicated process for a single organization to undertake, but social media applications such as Facebook and Twitter have facilitated nonprofit organizations and stakeholders to effectively share information and communicate with each other for identifying their mission as it relates to environmental issues. By analyzing the Australian Marine Conservation Society's (AMCS) Twitter network data from the period 1 April to 20 April, 2013, this research discovered diverse patterns in nonprofit advocacy by leading actors in building advocacy. Based on the webometrics approach, analysis results show that nonprofit advocacy through social media is structured by dynamic information flows and intercommunications among participants and followers of the AMCS. Also, the findings indicate that the news media and international and domestic nonprofit organizations have a leading role in building nonprofit advocacy by clustering with their followers.

Systemic Review : The Study on Electroacupuncture in PubMed (Pub Med 검색(檢索)을 통한 전침(電鍼)의 최신(最新) 연구(硏究)에 관한 고찰(考察) -임상(臨床) 논문(論文) 중심(中心)으로-)

  • Seo, Dong-Min;Kang, Sung-Keel
    • Journal of Acupuncture Research
    • /
    • v.19 no.3
    • /
    • pp.168-179
    • /
    • 2002
  • Objective : To research the trend of the study related to electroacupuncture and to establish the hereafter direction for the study on electroacupuncture. Methods : We have referred to PubMed, with electroacupuncture (Limits: 5 Years, only items with abstracts, English, Human) Results : 1. We have searched 67 papers in 49 journals on electroacupuncture. 2. The pattern of study was as follows: review articles-8 papers in 8 journals, RCT articles-22 papers in 16 journals, meta-analysis-2 papers in 2 journals, and clinical trials-29 papers in 14 journals. 3. How frequently each Meridians was used for electroacupuncture in the searched papers was as follows: Large Intestine Meridian-14 times, Stomach Meridian-12 times, GallBladder Meridian-5 times, Governor Vessel-4 times, Conception Vessel-3 times, Pericardium Meridian-2 times, Triple Energizer Meridian-2 times, and Liver Meridian-2 times in that order. 4. The acupoints used in the searched papers were as follows: LI4-8 times, ST36, LI11, and GB34-3 times, GV20, LR3, and PC6-2 times in that order. 5. The diseases in the searched papers were as follows: pain, stroke, and others. Conclusion : More clinical data would be needed to prove the effects of electroacupuncture for better application.

  • PDF

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

A Study on the Performance Evaluation of Semantic Retrieval Engines (시맨틱검색엔진의 성능평가에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.2
    • /
    • pp.141-160
    • /
    • 2011
  • This study suggested knowledge base and search engine for the libraries that have the largescaled data. For this purpose, 3 components of knowledge bases(triple ontology, concept-based knowledge base, inverted file) were constructed and 3 search engines(search engine JENA for rule-based reasoning, Concept-based search engine, keyword-based Lucene retrieval engine) were implemented to measure their performance. As a result, concept-based retrieval engine showed the best performance, followed by ontology-based Jena retrieval engine, and then by a normal keyword search engine.

A Study on the Windows and Doors of Traditional Houses in Jecheon (제천시 전통주거의 창호 특성에 관한 연구)

  • Lee, Wan-Geon
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.4
    • /
    • pp.94-103
    • /
    • 2013
  • This study investigated the windows and doors of traditional houses in Jecheon, designated as a cultural assets in Chungcheongbuk-do. It aimed to contribute to the study of korean traditional architecture by finding the characteristics of windows and doors, and to the preservation and reuse policy of local cultural assets. This study was conducted using the research methods of the literature and field survey, and it was to analyze and to compare the existing data and a current status. The result are as followings. Firstly, the windows and doors of kitchen in An-chae were generally installed double swinging type with wooden board door(板張門). Secondly, the windows and doors of An-bang were generally installed double swinging type with slender-ribbed windows and doors(細箭窓戶), were mostly installed Merum(遠音). Thirdly, the windows and doors of Daechung(大廳) towards the backyard were generally installed double swinging type with wooden board door, corrugated cardboard door(骨板門) and slender-ribbed windows. Lastly, the windows and doors of Sarang-bang in a house of nobility(班家) was installed triple windows and doors.

CALIBRATION OF STELLAR PARAMETERS OF 85 PEG SYSTEM

  • Bach, Kiehunn;Kim, Yong-Cheol;Demarque, Pierre
    • Journal of Astronomy and Space Sciences
    • /
    • v.24 no.1
    • /
    • pp.31-38
    • /
    • 2007
  • We have investigated the evolutionary status of 85 Peg within the framework of standard evolutionary theory. 85 Peg has been known to be a visual and spectroscopic binary system in the solar neighborhood. In spite of the accurate information of the total mass (${\sim}1.5M_{\odot}$) and the distance (${\sim}12pc$) from the HIPPARCOS parallax, it has been undetermined an individual mass, therefore the evolved status of the system. Moreover, the coupled uncertainties of chemical composition and age, make matters worse in predicting an evolutionary status of the system. Nevertheless, we computed the various possible models for 85 Peg, and then calibrated stellar parameters by adjusting to the recent observational data. Our modelling computation has included recently updated input physics and stellar theory such as opacity, equation of state, and chemical diffusion. Through a statistical assessment, we have derived a confident parameter set as the best solution which minimized $X^{2}$ within the observational error domain. Most of all, we found that 85 Peg is not a binary system but a triple system with an unseen companion 85 Peg $B_{b}\;{\sim}0.16M_{\odot}$. The aim of the present paper is (1) to provide a complete modelling of the stellar system based on the evolutionary theory, and (2) to constrain the physical dimensions such as mass, metallicity and age.