• Title/Summary/Keyword: risk access

Search Result 389, Processing Time 0.027 seconds

Neutrophil to Lymphocyte Ratio - Not an Independent Prognostic Factor in Patients with the Myelodysplastic Syndrome

  • Akinci, Sema;Silay, Kamile;Ulas, Arife;Guney, Tekin;Hacibekiroglu, Tuba;Basturk, Abdulkadir;Akinci, Muhammed Bulent;Alkan, Afra;Dilek, Imdat
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.24
    • /
    • pp.10883-10885
    • /
    • 2015
  • Purpose: Neutrophil-to-lymphocyte ratio (NLR) was evaluated as a potential prognostic factor in patients with myelodysplastic syndrome (MDS). Materials and Methods: Between December 2009 and April 2014, 14 female (35%) and 26 male (65%) MDS patients who were followed up in our hematology clinic were included in the study for NLR during diagnosis. Division was into two groups according to the NLR, and the correlation with mortality was evaluated. The prognostic significance of NLR regarding treatment outcome was also evaluated with adjustment for known confounding risk factors. Results: The mortality rate of the patient group was 55%, and median survival was 18 months. There was no significant correlation between mortality and NLR at a median value of 1.8 (p=0.75). Thrombocytopenia was observed to increase mortality (p=0.027), and there was a significant correlation between mortality and pancytopenia (p=0.017). Conclusions: This first study of NLR and mortality did not show any significant correlation. In centres with limited access to genetic evaluation for the presence of pancytopenia and/or thrombocytopenia at the time of diagnosis, a platelet level less than $50{\times}10^9/l$ may be poor prognostic markers in MDS patients.

Design of the Function for User Program Execution Control in the Windows Environments (윈도우 환경에서 사용자 프로그램 실행 권한 제어 기능 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1553-1560
    • /
    • 2016
  • In this paper, we design a program that controls the execution permissions for the running application in the Windows system environment. It does not allow general users to execute the program converting the specific location information of the execution program, to any of the bit values with the formal structure information in window program. The converted bit value can be returned to the original bit value in the case of an authorized user, so that the original program can be normally performed. By doing so, it can be more safely used in the risk of reverse engineering for Windows executable program. We implemented the control program for the program execution authority we proposed in this paper, and the experiment was performed. At the results of experiments, it was confirmed that the control function to permit execution for the user program was working properly in the Windows environment.

Transaxillary Subpectoral Placement of Cardiac Implantable Electronic Devices in Young Female Patients

  • Oh, Joo Hyun;Kim, Chae Min;Song, Seung Yong;Uhm, Jae Sun;Lew, Dae Hyun;Lee, Dong Won
    • Archives of Plastic Surgery
    • /
    • v.44 no.1
    • /
    • pp.34-41
    • /
    • 2017
  • Background The current indications of cardiac implantable electronic devices (CIEDs) have expanded to include young patients with serious cardiac risk factors, but CIED placement has the disadvantage of involving unsightly scarring and bulging of the chest wall. A collaborative team of cardiologists and plastic surgeons developed a technique for the subpectoral placement of CIEDs in young female patients via a transaxillary approach. Methods From July 2012 to December 2015, subpectoral CIED placement via an axillary incision was performed in 10 young female patients, with a mean age of 25.9 years and mean body mass index of $20.1kg/m^2$. In the supine position, with the patient's shoulder abducted, an approximately 5-cm linear incision was made along one of the deepest axillary creases. The submuscular plane was identified at the lateral border of the pectoralis major, and the dissection continued over the clavipectoral fascia until the subpectoral pocket could securely receive a pulse generator. Slight upward dissection also exposed an entrance to the subclavian vein, allowing the cardiology team to gain access to the vein. One patient with dilated cardiomyopathy underwent augmentation mammoplasty and CIED insertion simultaneously. Results One case of late-onset device infection occurred. All patients were highly satisfied with the results and reported that they would recommend the procedure to others. Conclusions With superior aesthetic outcomes compared to conventional methods, the subpectoral placement of CIEDs via a transaxillary approach is an effective, single-incision method to hide operative scarring and minimize bulging of the device, and is particularly beneficial for young female or lean patients.

Attacks and Defenses for Vulnerability of Cross Site Scripting (크로스 사이트 스크립팅(XSS) 취약점에 대한 공격과 방어)

  • Choi, Eun-Jung;Jung, Whi-Chan;Kim, Seung-Yeop
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2015
  • Cross Site Scripting enables hackers to steal other user's information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types. One is Reflect XSS which can be executed in one request for HTTP and its reply, and the other is Stored XSS which attacks those many victim users whoever access to the page which accepted the payload transmitted. To correspond to these XSS attacks, some measures have been suggested. They are data validation for user input, output validation during HTML encoding procedures, and removal of possible risk injection point to prevent from trying to insert malicious code into web application. In this paper, the methods and procedures for these two types are explained and a penetration testing is done. With these suggestions, the attack by XSS could be understood and prepared by its countermeasures.

Crime Prevention by Using CPTED and Improvement (환경설계를 통한 범죄예방 및 개선방안)

  • Park, Kwang-Hyun
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.733-738
    • /
    • 2017
  • This study is to find out empirically how the fear of crime is affected by the level of recognition of people. CPTED elements including natural surveillance, access control, utilization enhancement, territoriality securement, etc. Safety of residents could be considered and then increased when we plan, design, and operate a city. In Korea, CPTED is currently being applied to every town. However, it is not systemized and neither efficient, for there are no constraint provisions, and the foreign cases are not specifically customized to the current situation of the country. This study, therefore, aims to find the limits from analyzing related laws and regimes, administrative regulations, and applied cases, and to deduct improvement plans based on examined foreign cases.

The Investigation of Gene Flows in Artificial Pollination between GM Rice and its Wild Relatives by RAPD Analysis (RAPD PCR에 의한 GM벼의 야생 근연종 벼로의 유전자 전이 분석법)

  • Kim, Yoon-Sik;Kim, Hyun-Soon;Joung, Hyouk;Jeon, Jae-Heung
    • Korean Journal of Plant Resources
    • /
    • v.19 no.5
    • /
    • pp.612-616
    • /
    • 2006
  • In recent years, there has been increasing concerns in gene flow from GM crops to wild or weedy relatives as a potential risk in the commercialization of GM crops. To access the possibility of the environmental impacts by GM rice, small-scale experiments of gene transfer were carried out. Herbicide and drought stress resistant GM rice and non-GM rice Nakdongbyeo, wild rice Oryza nivara, and weedy rice Sharebyeo were used for artificial pollination experiments and bar gene was used as a tractable marker after pollination. The harvested putative hybrid seeds after artificial pollination were germinated and true hybrid plants were selected by basta treatment. The hybrid plants were verified again by PCR amplification of bar and trehalose-6-phosphate phosphatase (TPP) genes and RAPD PCR analysis.

Financing the Commercialisation of Green Innovation

  • Park, Jeongwon;Jeong, Changhyun
    • STI Policy Review
    • /
    • v.4 no.1
    • /
    • pp.94-118
    • /
    • 2013
  • Innovation plays a large role in green growth. While it is a widely accepted view that, without innovation, it would be very difficult and costly to address major environmental issues, innovation itself tends to be constrained by limited access to eco-financing and is inherently risky, often requiring a long-term horizon. Although global consensus is more or less established as to the urgency and necessity of accelerating green innovation, the quality and quantity of financing in this area is largely insufficient, with increasing funding gaps in many countries. A new financial mechanism is urgently needed in order to re-orient financial flow and enable innovators to overcome the valleys of death that occur throughout the innovation cycle. A number of different modalities exist in financing the commercialisation of eco-innovation. Existing mechanisms have not been as successful as expected, revealing critical limits to furthering certain types of projects that are essential for economic and environmental progress. Experts' estimations have shown that the funding gap will widen in the coming years as demand for clean energy and green infrastructure rises, and as green technologies and innovation develop faster than the market for it can develop. Against this backdrop, the main purpose of this research is threefold: to identify issues and problems regarding current means of funding for eco-innovation and green projects; to provide insight into securing longterm green financing by looking at European cases; and ultimately to suggest policy implications for designing and implementing eco-specific financial instruments, focusing on governments' roles in sustainable financing for eco-innovation. This study analyses different models of financing mechanisms, a mix of public and private funds, in view of suggesting conditions for the sustainable financing of green projects, especially for large-scale high-risk projects. Based on the findings from the analyses of mechanisms and the shortcomings of the existing funding modalities, this study ultimately suggests policy implications for effectively supporting the commercialisation of eco-innovation.

Indirect Inguinal Hernia in Pediatric Patients (소아의 간접 서혜부 탈장)

  • Chung, Sang-Young
    • Advances in pediatric surgery
    • /
    • v.16 no.2
    • /
    • pp.101-107
    • /
    • 2010
  • Herniorrhaphy of Indirect inguinal hernia (IIH) is one of the most frequently performed surgical procedures in children. The overall incidence of inguinal hernias in childhood ranges from 0.8 to 4.4 %. The incidence is up to 10 times higher in boys than girls, especially much higher in premature infants. IIHs in children are basically an arrest of embryologic development rather than an acquired weakness, which explains the increased incidence in premature infants. In normal development, the processus vaginalis closes, obliterating the peritoneal opening of the internal ring between 36th and 40th week of gestation. This process is often incomplete, leaving a small patent processus in many newborns. However, closure continues postnatally, and the rate of patency is inversely proportional to age of the child. The presence of a patent processus vaginalis is a necessary but not sufficient variable in developing a congenital IIH. In other words, all congenital IIHs are preceded by a patent processus vaginalis, but not all patent processus vaginalis go on to become IIHs. The overall incidence of IIH in population is approximately 1 to 2 % and the incidence of a processus vaginalis is approximately 12 to 14%, clinically appreciable IIH should develop in approximately 8 to 12 % of patients with a patent processus vaginalis. Although the classic open inguinal hernia repair remains the gold standard for most pediatric surgeons, laparoscopic repair is being performed in many centers. Like open technique, laparoscopic technique is fundamentally a high ligation of the indirect hernia sac with or without internal ring ligation. The advantages of laparoscopic approach include the ease of examining the contralateral internal ring, the avoidance of access damage to vas and vessels during mobilization of cord, decreased operative time, and an ability to identify unsuspected direct or femoral hernias. Almost all groin hernias in children are IIHs and occur as a result of incomplete closure of processus vaginalis. The treatment is repair by high ligation of hernia sac, which can be done by an open or laparoscopic technique. The contralateral side can be explored by laparoscopy or left alone, open exploration is no longer indicated due to potential risk of infertility.

  • PDF

A Design and Implementation of Mobile Coupons Management System Based on NFC (NFC기반 모바일 쿠폰 관리 시스템 설계 및 구현)

  • Kim, Jong-Min;Lee, Yun-Seok;Kim, Eun;Jung, Min-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.267-273
    • /
    • 2013
  • Recently, coupons are distributed in various ways such as paper, Internet, and mobile phone, with the development of the information and communications technology. Coupon users benefit from the use of these coupons. For example, they can get a discount for the product that they wanted to buy and can be offered additional services. However, paper and Internet coupons have a risk of loss since users have to cut them out and keep them separately. Mobile coupons also don't provide users with user convenience, because coupon users first look for coupon data from their mobile phone and show it to the counterperson. To solve these problems, this study proposes a NFC-based mobile coupon system under which we can use coupon data only with mobile device access.

Security Vulnerability and Countermeasure on 5G Networks: Survey (5G 네트워크의 보안 취약점 및 대응 방안: 서베이)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.197-202
    • /
    • 2019
  • In line with the era of the 4th Industrial Revolution, 5G technology has become common technology, and 5G technology is evaluated as a technology that minimizes the speed and response speed compared to 4G using technologies such as network slicing and ultra-multiple access. 5G NR stands for 5G mobile communication standard, and network slicing cuts the network into parallel connections to optimize the network. In addition, the risk of hacking is increasing as data is processed in the base station unit. In addition, since the number of accessible devices per unit area increases exponentially, there is a possibility of base station attack after hacking a large number of devices in the unit area. To solve this problem, this study proposes the introduction of quantum cryptography and 5G security standardization.