• Title/Summary/Keyword: characteristics and perspective of aid

Search Result 6, Processing Time 0.024 seconds

A Comparative Study on Characteristics of ODA of China-Japan-Korea to Cambodia

  • Ky, Sereyvath;Lee, Cheon-Woo;Stauvermann, Peter J.
    • East Asian Economic Review
    • /
    • v.16 no.4
    • /
    • pp.333-361
    • /
    • 2012
  • Development assistance plays an important role in contributing to the development process of Cambodia. The top bilateral donors, China, Japan, and Korea provide ODA to Cambodia in different characteristics and from different perspectives. This study tries to pull out some implications for Cambodia as recipient and for donors in order to achieve the development of Cambodia's economy-effectively by using the ODA. As a viewpoint, ODA structure emphasizes the intention of donors, either for their self-interest and benefit or for achieving MDGs. China's ODA to Cambodia seems to distort the ODA allocation by other donors with unconditional loans or loans with conditionality focusing only on infrastructure. Cambodia benefits from the better infrastructure, but it has to pay the price set by China, even for concessional loans. The driving interests of Japan and Korea are more influenced by their national policy goals and the expected perceptions of their voters. The aid projects should at least catch the attention of national media or win obvious and unbiased support from the suffering people in the recipient countries.

  • PDF

A Study on the Change Process and Characteristics of the Development Policy for Rural Areas (농촌지역 개발정책의 변천과정과 특성에 관한 연구)

  • Kim, Kang-Sub;Lee, Sang-Jung
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.6 no.3
    • /
    • pp.25-38
    • /
    • 2004
  • The government has made a great effort for the development of rural area. The aim of this study is to analyze the change process and characteristics of the government's rural area development policies implemented so far and present an aid as adequate material to the direction of development policy for rural areas. The rural area development policy had been focused on maintenance of physical infrastructure facilities in the rural areas, pursuing urban convenience led by the government from the 1950s to 1990s. The policy has changed to local residents-led rural area development from the late 1990s to present time. The basic direction of the policy turned into making much of environment-friendliness and promotion of regional activation. The policy was transformed to recognize our rural area and also perceive it pastoral and resting space. In addition, green tourism has emerged as an important theme since 2000. In the rural area development policy, it is the most important to connect it with various development projects, select target areas from the long-term perspective and pursue efficiency through intensified investment of financial resources.

  • PDF

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • v.52 no.12
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

Clinical Prognostic Factors and Survival Outcome in Renal Cell Carcinoma Patients - A Malaysian Single Centre Perspective

  • Yap, Ning Yi;Ng, Keng Lim;Ong, Teng Aik;Pailoor, Jayalakshmi;Gobe, Glenda Carolyn;Ooi, Chong Chien;Razack, Azed Hassan;Dublin, Norman;Morais, Christudas;Rajandram, Retnagowri
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.12
    • /
    • pp.7497-7500
    • /
    • 2013
  • Background: This study concerns clinical characteristics and survival of renal cell carcinoma (RCC) patients in University Malaya Medical Centre (UMMC), as well as the prognostic significance of presenting symptoms. Materials and Methods: The clinical characteristics, presenting symptoms and survival of RCC patients (n=151) treated at UMMC from 2003-2012 were analysed. Symptoms evaluated were macrohaematuria, flank pain, palpable abdominal mass, fever, lethargy, loss of weight, anaemia, elevated ALP, hypoalbuminemia and thrombocytosis. Univariate and multivariate Cox regression analyses were performed to determine the prognostic significance of these presenting symptoms. Kaplan Meier and log rank tests were employed for survival analysis. Results: The 2002 TNM staging was a prognostic factor (p<0.001) but Fuhrman grading was not significantly correlated with survival (p=0.088). At presentation, 76.8% of the patients were symptomatic. Generally, symptomatic tumours had a worse survival prognosis compared to asymptomatic cases (p=0.009; HR 4.74). All symptoms significantly affect disease specific survival except frank haematuria and loin pain on univariate Cox regression analysis. On multivariate analysis adjusted for stage, only clinically palpable abdominal mass remained statistically significant (p=0.027). The mean tumour size of palpable abdominal masses, $9.5{\pm}4.3cm$, was larger than non palpable masses, $5.3{\pm}2.7cm$ (p<0.001). Conclusions: This is the first report which includes survival information of RCC patients from Malaysia. Here the TNM stage and a palpable abdominal mass were independent predictors for survival. Further investigations using a multicentre cohort to analyse mortality and survival rates may aid in improving management of these patients.

A Study on the Development of Services Supporting Personal Relationship Management - focusing on relationship management using mobile phones (인간 관계관리 지원 서비스 개발을 위한 연구 - 휴대전화를 이용한 관계 관리를 중심으로)

  • Kim, Ju-Yong;Lee, Chang-Hee;Lee, Se-Young;Lee, Jun-Ho
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.239-244
    • /
    • 2008
  • We lead a life in our community, beginning a new relationship with a stranger or maintaining or stopping existing relationships. Relationships with others are sustained through social activities based on communication. Generally speaking, by exchanging feelings and information through communication, relationships are formed and continued, and strengthened through active communication As a result of the development of technologies and information technology over the recent 10 years, a mobile phone has stood as a communication channel, and now it has become such a universal, and highly intimate and important means of communication that almost all the Koreans use more often than wired phones. Today, people have their communication channel available for others, by using a mobile phone at any time and anywhere. Like this, mobile phones have been playing a key role in helping people maintain, repair and strengthen their personal relationship, but from the perspective of personal relationship management, they still remain as an aid to help communication, failing to provide a positive help for actual relationship management. This study was designed to provide services supporting user's personal relationship management, focusing on the use of mobile phones as a major tool of communication, aiming to enable users to understand current state of their relationship and make relationship management efforts, or communication behaviors, by informing who needs communication, on the basis of data on mobile phone calls. To this end, the study established a method to extract intimacy between users and callers and develop a prototype of services supporting personal relationship management, using relationship characteristics in terms of mobile communication.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.