• Title/Summary/Keyword: internet use

Search Result 5,983, Processing Time 0.207 seconds

Significant Efficacy of Additional Concurrent Chemotherapy with Radiotherapy for Postoperative Cervical Cancer with Risk Factors: a Systematic Review and Meta-analysis

  • Qin, Ai-Qiu;Liang, Zhong-Guo;Ye, Jia-Xiang;Li, Jing;Wang, Jian-Li;Chen, Chang-Xian;Song, Hong-Lin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.8
    • /
    • pp.3945-3951
    • /
    • 2016
  • Background: Whether concurrent chemotherapy treatment is superior to radiotherapy alone as an adjuvant regimen for postoperative cervical carcinoma with risk factors remains controversial. Materials and Methods: A literature search strategy examined Pubmed, Embase, the Cochrane Library, the China National Knowledge Internet Web, the Chinese Biomedical Database and the Wanfang Database. Article reference lists and scientific meeting abstracts were also screened. Controlled trials comparing concurrent chemoradiotherapy versus radiotherapy alone in postoperative cervical cancer were included. The methodological quality of non-randomized controlled trials was evaluated using the Newcastle-Ottawa Scale. Randomized controlled studies were evaluated with the Cochrane handbook. A meta-analysis was performed with RevMan 5.3. Results: A total of 1,073 patients from 11 clinical trials were analysed, with 582 patients in the concurrent chemoradiotherapy group and 491 patients in the radiotherapy group. Hazard ratios (HR) of 0.47 (95% CI 0.31-0.72) and 0.50 (95% CI 0.35-0.72) were observed for overall survival and progression-free survival, indicating a benefit from the additional use of concurrent chemotherapy. Subgroup analyses demonstrated that cervical cancer with high risk factors significantly benefitted from concurrent chemotherapy when examining overall survival (HR 0.44, 95% CI 0.28-0.67) and progression-free survival (HR 0.48, 95% CI 0.33-0.70), but patients with intermediate risk factors showed no benefit from concurrent chemotherapy in overall survival (HR 1.72, 95% CI 0.28-10.41) and progression-free survival (HR 1.09, 95% CI 0.19-6.14). No significant differences were observed for grade 3-4 anaemia (risk ratio (RR) 3.87, 95% CI 0.69-21.84), grade 3-4 thrombocytopenia (RR 3.04, 95% CI 0.88-10.58), grade 3-4 vomiting or nausea (RR 1.71, 95% CI 0.27-10.96), or grade 3-4 diarrhoea (RR 1.40, 95% CI 0.69-2.83). Significant differences were observed for grade 3-4 neutropenia in favour of the radiotherapy group (RR 7.23, 95% CI 3.94-13.26). Conclusions: In conclusion, concurrent chemoradiotherapy improves survival in postoperative cervical cancer with high risk factors but not in those with intermediate risk factors.

Design and Performance Evaluation of ACA-TCP to Improve Performance of Congestion Control in Broadband Networks (광대역 네트워크에서의 혼잡 제어 성능 개선을 위한 ACA-TCP 설계 및 성능 분석)

  • Na, Sang-Wan;Park, Tae-Joon;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.8-17
    • /
    • 2006
  • Recently, the high-speed Internet users increase rapidly and broadband networks have been widely deployed. However, the current TCP congestion control algorithm was designed for relatively narrowband network environments, and thus its performance is inefficient for traffic transport in broadband networks. To remedy this problem, the TCP having an enhanced congestion control algorithm is required for broadband networks. In this paper, we propose an improved TCP congestion control that can sufficiently utilize the large available bandwidth in broadband networks. The proposed algorithm predicts the available bandwidth by using ACK information and RTT variation, and prevents large packet losses by adjusting congestion window size appropriately. Also, it can rapidly utilize the large available bandwidth by enhancing the legacy TCP algorithm in congestion avoidance phase. In order to evaluate the performance of the proposed algorithm, we use the ns-2 simulator. The simulation results show that the proposed algorithm improves not only the utilization of the available bandwidth but also RTT fairness and the fairness between contending TCP flows better than the HSTCP in high bandwidth delay product network environment.

News Editing and Transferring System in a Distant Region (원격 뉴스 편집 전송 시스템)

  • Yang, Ki-Sun;Jeon, Seong-Qyu;Lee, Man-Kyu;Kim, Hee-Jung;Park, Sung-Choon
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.243-249
    • /
    • 2007
  • In this paper we introduce a system that assists news reporters to easily edit source video anywhere, and transfer the result from a remote site to the station. Presently reporters are bothered to edit source materials, compress and transfer using several separate tools. Moreover such tools have lots of too complicated features to use only for news production. We have integrated file sending and video editing functions together for seamless workflow. News programs usually need promptness in production. For this reason our system is designed to make it possible the one-stop production of news items outside the TV station. Also the system reflects the demands of field workers, that is, easy usage for the beginner and features for speedy news production. One of the most focused is that the reliability of the system is guaranteed in the process of transfer. To achieve this end, we have implemented several error-resilient schemes for unexpected network errors. Our system consists of remote laptop editing terminals and a newsgathering server. DV-format based editing and analog-to-DV converting device are adopted to capture video from not only lightweight DV camcorders but also old-fashioned ENG cameras into laptop computers. We expect that news reporters and cameramen can take terminals anywhere the Internet is available and both editing and sending will be done on the spot. This will help increase the competitive power of our news production.

  • PDF

Convergence of Information Technology and Corporate Strategy (정보기술과 기업전략의 융합에 관한 연구)

  • Kim, Lark Sang
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.17-26
    • /
    • 2015
  • Firms that have adopted internet technology have been confused by distorted market signals. It is natural to look at marketplace outcomes for guidance, when confronted with a new business phenomenon. However, market signals can be unreliable in the early states of any important new information technology. New technologies trigger rampant experimentation, and the experimentation is often unsustainable. As a result, market behavior is distorted and must be interpreted cautiously. In Chapter 1, we review a concept of business model and roles of strategies in a business model. In Chapter 2, we discuss a strategic auditing method for analyzing market/channel positioning, product/service positioning, value chain/value network positioning and external environmental factors. In chapter 3, we introduces major frameworks for understanding factors forming strategies. The strategic grid model categorizes four quadrants depending on the level of impacts of information technology on operation and strategy. The strategic alignment model presents a new method of assessing an alignment of information technology and business throughout all elements of a business model. In this research, we review the concept of a business model. This research introduces factors that shape strategies and new frameworks for understanding these factors. The research objective of this manuscript is to present a guidance for firms how to use information technology for attaining sustainable competitive advantages.

Development of M2M Simulator for Mobile Network using Knapsack Algorithm (Knapsack 알고리즘을 이용한 모바일 네트워크용 M2M 시뮬레이터 개발)

  • Lee, Sun-Sik;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2661-2667
    • /
    • 2013
  • Recently, at Home and abroad, Internet of Things era things(Thing) is participating as a subject of communication in human communication paradigm of existing (lot/M2M) is in full swing. Automobile, refrigerator, bicycle, until shoes, and communication functions generation of information is installed and has created a fusion of new service IT infrastructure. Its use and application are broadening to various areas and the number of devices used for it is increasing to increase the number of information transmitted for each object. When the traffic reaches its limit while each set of data is transmitted from the devices divided into each group through the mobile network, M2M communications service might not be processed smoothly. This study used the Knapsack Problem algorithm to create a virtual simulator for a smooth M2M service when the mobile network used for the M2M communications reaches its limit. The virtual simulator applies smooth processing of services from the M2M communications that should be processed first to other subsequent services when data comes to each group of devices. As the M2M technology develops to make many objects more compact in size, it would help with smoother processing of M2M services for the mobile network with fast-increasing traffic.

A Learning Agent for Automatic Bookmark Classification (북 마크 자동 분류를 위한 학습 에이전트)

  • Kim, In-Cheol;Cho, Soo-Sun
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.455-462
    • /
    • 2001
  • The World Wide Web has become one of the major services provided through Internet. When searching the vast web space, users use bookmarking facilities to record the sites of interests encountered during the course of navigation. One of the typical problems arising from bookmarking is that the list of bookmarks lose coherent organization when the the becomes too lengthy, thus ceasing to function as a practical finding aid. In order to maintain the bookmark file in an efficient, organized manner, the user has to classify all the bookmarks newly added to the file, and update the folders. This paper introduces our learning agent called BClassifier that automatically classifies bookmarks by analyzing the contents of the corresponding web documents. The chief source for the training examples are the bookmarks already classified into several bookmark folders according to their subject by the user. Additionally, the web pages found under top categories of Yahoo site are collected and included in the training examples for diversifying the subject categories to be represented, and the training examples for these categories as well. Our agent employs naive Bayesian learning method that is a well-tested, probability-based categorizing technique. In this paper, the outcome of some experimentation is also outlined and evaluated. A comparison of naive Bayesian learning method alongside other learning methods such as k-Nearest Neighbor and TFIDF is also presented.

  • PDF

Usability Evaluation Framework for Ubiquitous Computing Device (유비쿼터스 디바이스를 위한 사용성 평가 프레임워크 개발 - 디바이스의 Graphical User Interface 중심으로)

  • Kim, Han-Joon;Choi, Jong-Kyu;Ji, Yong-Gu
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.131-135
    • /
    • 2008
  • Nowadays various information devices using electronic technology has been released. And these digital devices will be continuously developed to make a satisfaction of customer's needs. So digital device will support network service using communication technology, so users will use the internet service anywhere, anytime. Also the networked device which is used in ubiquitous computing environment should be evaluated by new evaluation framework. Therefore previous usability evaluation framework need to reflect the characteristics of ubiquitous computing. However most of pervious research about ubiquitous computing was about conceptual issues like rules and characteristics of ubiquitous computing, so the research of usability testing and evaluation method for ubiquitous computing is rarely conducted. This research's purpose is developing the evaluation framework for ubiquitous computing device and usability model for ubiquitous computing. To develop the evaluation framework, we collect the evaluation indexes which have need used in GUI evaluation And we extract evaluation indexes for ubiquitous computing based on literature review.

  • PDF

ICT Utilization and Recognition by Home Economics Teachers in Secondary schools (중등학교 가정과 교사의 ICT 활용수업의 실태와 인지도)

  • Kim Mi-Young;Kim Kyung-Ae;Wee Eun-Hah
    • Journal of Korean Home Economics Education Association
    • /
    • v.16 no.3
    • /
    • pp.63-80
    • /
    • 2004
  • The purpose of this study was to investigate the actual ICT utilization and recognition, to identify the effective and relevant chapters of home economics which can be taught using ICT in teaching and learning method. There were 372 secondary school teachers being participated in the survey. The results of this study can be summarized as follows 1. The reason why they have ICT utilization Instruction is to help the learners improve the academic accomplishment in the development stage through providing data from web-surfing and presentational data such as developed CD, animation and presentations. 2. Regarding ICT utilization capability. teachers have the capability to send and receive E-mail, make a presentation data. practical use of Internet. In addition, the group with less than 10 years experience have a higher capability in information technology. 3. Concerning ICT utilization recognition, this result shows that ICT Instruction is the most effective to motivate learners, and teachers anticipate ICT Instruction would improve the quality of the teaching & learning. 4. The chapter such as 'how to make clothing and recycling'(database). 'the foundation of cooking and its application' (database). 'gender and acquaintance of the opposite sex', 'nutrition of during adolescence' (simulation program) should be the first priority in the development.

  • PDF

A Fitness Verification of Time Series Models for Network Traffic Predictions (네트워크 트래픽 예측을 위한 시계열 모형의 적합성 검증)

  • 정상준;김동주;권영헌;김종근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.217-227
    • /
    • 2004
  • With a rapid growth in the Internet technology, the network traffic is increasing swiftly. As for the increase of traffic, it had a large influence on performance of a total network. Therefore, a traffic management became an important issue of network management. In this paper, we study a forecast plan of network traffic in order to analyze network traffic and to establish efficient correspondence. We use time series forecast models and determine fitness whether the model can forecast network traffic exactly. In order to predict a model, AR, MA, ARMA, and ARIMA must be applied. The suitable model can be found that can express the nature of traffic for the forecast among these models. We determines whether it is satisfied with stationary in the assumption step of the model. The stationary can get the results by using ACF(Auto Correlation Function) and PACF(Partial Auto Correlation Function). If the result of this function cannot satisfy then the forecast model is unsuitable. Therefore, we are going to get the correct model that is to satisfy stationary assumption. So, we proposes a way to classify in order to get time series materials to satisfy stationary. The correct prediction method is managed traffic of a network with a way to be better than now. It is possible to manage traffic dynamically if it can be used.

Packet Loss Concealment Algorithm Based on Speech Characteristics (음성신호의 특성을 고려한 패킷 손실 은닉 알고리즘)

  • Yoon Sung-Wan;Kang Hong-Goo;Youn Dae-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.691-699
    • /
    • 2006
  • Despite of the in-depth effort to cantrol the variability in IP networks, quality of service (QoS) is still not guaranteed in the IP networks. Thus, it is necessary to deal with the audible artifacts caused by packet lasses. To overcame the packet loss problem, most speech coding standard have their own embedded packet loss concealment (PLC) algorithms which adapt extrapolation methods utilizing the dependency on adjacent frames. Since many low bit rate CELP coders use predictive schemes for increasing coding efficiency, however, error propagation occurs even if single packet is lost. In this paper, we propose an efficient PLC algorithm with consideration about the speech characteristics of lost frames. To design an efficient PLC algorithm, we perform several experiments on investigating the error propagation effect of lost frames of a predictive coder. And then, we summarize the impact of packet loss to the speech characteristics and analyze the importance of the encoded parameters depending on each speech classes. From the result of the experiments, we propose a new PLC algorithm that mainly focuses on reducing the error propagation time. Experimental results show that the performance is much higher than conventional extrapolation methods over various frame erasure rate (FER) conditions. Especially the difference is remarkable in high FER condition.