• Title/Summary/Keyword: Party State

Search Result 190, Processing Time 0.028 seconds

Analysis of Failed Spinal Cord Stimulation Trials in the Treatment of Intractable Chronic Pain

  • Jang, Hyun-Dong;Kim, Min-Su;Chang, Chul-Hoon;Kim, Sang-Woo;Kim, Oh-Lyong;Kim, Seong-Ho
    • Journal of Korean Neurosurgical Society
    • /
    • v.43 no.2
    • /
    • pp.85-89
    • /
    • 2008
  • Objective: The purpose of this study is to identify the factors affecting the failure of trials (<50% pain reduction in pain for trial period) to improve success rate of spinal cord stimulation (SCS) trial. Methods: A retrospective review of the failed trials (44 patients, 36.1 %) among the patients (n=122) who underwent SCS trial between January 1990 and December 1998 was conducted. We reviewed the causes of failed trial stimulation, age, sex, etiology of pain, type of electrode, and third party support. Results: Of the 44 patients, 65.9% showed unacceptable pain relief in spite of sufficient paresthesia on the pain area with trial stimulation. Four of six patients felt insufficient paresthesia with stimulation had the lesions of the spinal cord. Seventy five percent of the patients experienced unpleasant or painful sensation during stimulation had allodynia dominant pain. Third-party involvement, sex, age and electrode type had no influence on the outcome. Conclusion: We conclude that SCS trial is less effective for patients with neuropathic pain of cord lesions, postherpetic neuropathy or post-amputation state. Further, patients with allodynia dominant pain can feel unpleasant or painful during trial stimulation.

Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality (CHSH 부등식을 이용하여 양자 키 분배와 양자 인증의 안전성을 개선한 프로토콜)

  • Heo, Jin-O;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.69-78
    • /
    • 2008
  • We propose to analyze a weakness of quantum key distribution and quantum authentication which use entangled state were proposed by Bao-sen Shi(2001) and to improve the security of the protocol. The existing protocol had a weakness against an impersonation attack of an eavesdropper, because of a only process which authenticated a third party(Center) by users. In this paper, we propose improving the security of the protocol that authenticates users by a third party using check mode which applies CHSH inequality.

From a Developmentalist Welfare State to a Social Investment State: A Case Study of Japan (발전주의 복지국가에서 사회투자국가로: 일본 사례를 중심으로)

  • Kwon, Soon-mee
    • 한국사회정책
    • /
    • v.25 no.1
    • /
    • pp.231-257
    • /
    • 2018
  • Japan has generally been considered as the developmentalist welfare state. However, Japan has recently been transformed into a social investment state. Although it still has a developmentalist characteristics with its institutional path dependence, the new social and economic challenges derived from the new social risks such as low birth rates and aging population forced Japan to adopt a new welfare state strategy. The paradigm shift in terms of welfare state strategy was launched by the Third Way positioning of the Democratic party government and succeed to the Second Stage of Abenomics under the Third Abe Cabinet. This paper argues that the welfare state paradigm shift towards a social investment state in Japan is not limited to the Japan's Plan for Dynamic Engagement of All Citizens for a virtuous cycle of growth and distribution, but expands its scope to include the work-family balance policies such as labor market activation for women and public caring for children.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

Implementation of Extended Automatic Callback Service in SIP-based VoIP System (SIP 기반의 VoIP 시스템에서의 확장된 자동 콜백 서비스의 구현)

  • Jo Hyun-Gyu;Lee Ky-Soo;Jang Choon-Seo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.251-260
    • /
    • 2005
  • On the internet phone or PSTN(Public Switched Telephone Network), the automatic callback is an useful service in the case of busy state when one user calls the other. By using this service, automatic redial is possible when the other party hangs up. However, in the basic automatic callback service, the user who wants callback should wait until the other party hangs up even in the case of emergency. Therefore in this paper, to solve this problem we have extended CPL(Call Processing Language) and, within user system we have included and linked this extended CPL processing module and dialog event package which processes SIP INVITE initiated dialog state informations. We have implemented this system for being used in SIP(Session Initiation Protocol)-based VoIP(Voice over IP) system.

Utilities Market: The Sphere of Protection of Subjects

  • Dzhumageldiyeva, Gulnara;Zablodska, Inna;Yukhymenko-Nazaruk, Irina;Dovgaliuk, Vita;Suprunova, Irina;Gylka, Ulyana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.266-274
    • /
    • 2021
  • The study covers three components of the facility for protecting public utilities market participants in the public utilities market: prevention of potential poverty, reduction of existing poverty and compensation to the injured party in a case of tort that exacerbates or threatens to exacerbate its poverty. The analysis is based on official statistical information on the activities of the public utilities sector. Operational information of public utility service providers regarding certain indicators of their activity in the work was not studied. This approach narrows the empirical basis of the study, but at the present stage in the context of different rates of implementation of changes in regions, sectors and at the level of individual entities, as well as lack of uniformity in the structure of indicators published by service providers, analysis allows to identify «bottlenecks» of legal regulation, which are systemic in nature and largely independent of the subjective factor.

Malaysia's 13th General Election: Sabah-Barisan Nasional Fixed-Deposit State? (말레이시아 13대 총선: 사바주(Sabah)는 국민전선의 텃밭인가?)

  • ZAINI, Othman;EKO, Prayitno Joko;RAMLI, Dollah;AMRULLAH, Maraining;KIM, Jong Eop
    • The Southeast Asian review
    • /
    • v.26 no.3
    • /
    • pp.91-118
    • /
    • 2016
  • As all are aware, the results of the Malaysia 12th General Election (GE-12) in 2008 have surprised many. Not only the dominant parties Barisan Nasional (BN) were shocked by the loss of significant numbers of seats but for the first time in the history of Malaysia politics, vis-${\grave{a}}$-vis, electoral affairs, they were denied a two-thirds majority in the Parliament. Notwithstanding the opposition parties such as Parti Islam Se-Malaysia (PAS), Democratic Action Party (DAP) and Parti Keadilan Rakyat (PKR: The People's Justice Party) that form the opposition coalition called Pakatan Rakyat (People's Alliance: PR), has come to a surprised with the GE-12 result, in which they not even think that were able to challenge hegemonic politics of BN, managed to capture and formed a government at the state level namely Kedah, Penang, Perak, and Selangor, except Kelantan which has been under the control of PAS since the 1990 general election. This article aims to analyze whether Sabah as a "fixed deposit"state is still relevant in understanding the continuity and survival of the BN political hegemony in the context of Malaysia political developments post-13th general election.

Effect of the thickness on the mixed mode crack front fields

  • Khan, Shafique M.A.
    • Structural Engineering and Mechanics
    • /
    • v.42 no.5
    • /
    • pp.701-713
    • /
    • 2012
  • Results pertaining to 3D investigations on the effect of the thickness on the stress fields at the crack front are presented. A 3D finite element analysis is performed using a modified single edge-notched tension specimen configuration, with an inclined crack to include mixed mode I-II. A technique to mesh the crack front (3D) with singular finite elements in ANSYS without using third party software is introduced and used in this study. The effect of the specimen thickness is explicitly investigated for six thicknesses ranging from 1 to 32 mm. In addition, three crack inclination angles, including pure Mode-I, are used to study the effect of mixed-mode I-II fracture. An attempt is made to correlate the extent of a particular stress state along the crack front to thickness. In addition, ${\sigma}_{zz}/{\nu}({\sigma}_{xx}+{\sigma}_{yy})$ contours at the crack front are presented as a useful means to analyze the stress state.

Examining China's Internet Policies through a Bibliometric Approach

  • Li, Jiang;Xu, Weiai Wayne;Wang, Fang;Chen, Si;Sun, Jianjun
    • Journal of Contemporary Eastern Asia
    • /
    • v.17 no.2
    • /
    • pp.237-253
    • /
    • 2018
  • In order to understand China's internet governance, this paper examined 1,931 Internet policies of China by bibliometric techniques. Specifically, the bibliometric techniques include simple document counting, co-word analysis, collaboration network analysis and citation analysis. The findings include: (1) China's Internet legislations mainly emphasized e-commerce and Internet governance, and, to some extent, neglected personal data protection; (2) China's Internet is under intensive multiple regulatory controls by central government. A large number of government agencies are involved in Internet policy-making. The Propaganda Department of the Central Committee of the Communist Party of China and the State Information Leading Group of the State Council, enforced fewer policy documents, but occupy higher positions in the Internet governance hierarchy; (3) China's Internet legislation system is primarily composed of industry-specific administrative rules, rather than laws or administrative regulations. Nevertheless, laws and administrative regulations received significantly more citations owing to their superior force. This paper also discussed current gaps in China's internet governance and how the country's internet policies are situated in the broader global context.

The Modern White Horse Temple and Online Reconfiguring of a Buddhist Heritage Space

  • Kai, SHMUSHKO
    • Journal of Daesoon Thought and the Religions of East Asia
    • /
    • v.3 no.1
    • /
    • pp.109-128
    • /
    • 2023
  • Recent research shows that since the early 2000s, the Chinese Communist Party has increasingly used various cultural heritage sites, including Buddhist sites, as soft power agents. Furthermore, in the context of the Belt and Road Initiative, launched by the People's Republic of China, Buddhist temples, representatives, and practices have been harnessed to play a role in the state's agenda. In this context, White Horse Temple, as a feature of cultural tourism in Henan Province, is facing new opportunities and challenges. The article examines the material particularities of reconstructing the temple in light of this trajectory, building on materials retrieved at the site, and online representations of the temple. The author explores how the temple's unique spatiality and characteristics stress the use of soft power which harnesses online and offline cultural and popular trends for state agenda.