• Title/Summary/Keyword: Physical Network

Search Result 1,876, Processing Time 0.029 seconds

Induced Abortion and Breast Cancer: Results from a Population-Based Case Control Study in China

  • Wu, Jun-Qing;Li, Yu-Yan;Ren, Jing-Chao;Zhao, Rui;Zhou, Ying;Gao, Er-Sheng
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.8
    • /
    • pp.3635-3640
    • /
    • 2014
  • Aim: To determine whether induced abortion (IA) increases breast cancer (BC) risk. Materials and Methods: A population-based case-control study was performed from Dec, 2000 to November, 2004 in Shanghai, China, where IA could be verified through the family planning network and client medical records. Structured questionnaires were completed by 1,517 cases with primary invasive epithelial breast cancer and 1,573 controls frequency-matched to cases for age group. The information was supplemented and verified by the family planning records. Statistical analysis was conducted with SAS 9.0. Results: After adjusting for potential confounders, induced abortions were not found to be associated with breast cancer with OR=0.94 (95%CI= 0.79-1.11). Compared to parous women without induced abortion, parous women with 3 or more times induced abortion (OR=0.66, 95%CI=0.46 to 0.95) and women with 3 or more times induced abortion after the first live birth (OR=0.66, 95%CI =0.45 to 0.97) showed a lower risk of breast cancer, after adjustment for age, level of education, annual income per capita, age at menarche, menopause, parity times, spontaneous abortion, age at first live birth, breast-feeding, oral contraceptives, hormones drug, breast disease, BMI, drinking alcohol, drinking tea, taking vitamin/calcium tablet, physical activity, vocation, history of breast cancer, eating the bean. Conclusions: The results suggest that a history of induced abortions may not increase the risk of breast cancer.

A new approach to estimate the factor of safety for rooted slopes with an emphasis on the soil property, geometry and vegetated coverage

  • Maedeh, Pouyan Abbasi;Wu, Wei;da Fonseca, Antonio Viana;Irdmoosa, Kourosh Ghaffari;Acharya, Madhu Sudan;Bodaghi, Ehsan
    • Advances in Computational Design
    • /
    • v.3 no.3
    • /
    • pp.269-288
    • /
    • 2018
  • 180 different 2D numerical analyses have been carried out to estimate the factor of safety (FOS) for rooted slopes. Four different types of vegetated coverage and a variety of slope geometry considering three types of soil have been evaluated in this study. The highly influenced parameters on the slope's FOS are determined. They have been chosen as the input parameters for developing a new practical relationship to estimate the FOS with an emphasis on the roots effects. The dependency of sliding mode and shape considering the soil and roots-type has been evaluated by using the numerical finite element model. It is observed that the inclination and height of the slope and the coverage type are the most important effective factors in FOS. While the soil strength parameters and its physical properties would be considered as the second major group that affects the FOS. Achieved results from the developed relationship have shown the acceptable estimation for the roots slope. The extracted R square from the proposed relationship considering nonlinear estimation has been achieved up to 0.85. As a further cross check, the achieved R square from a multi-layer neural network has also been observed to be around 0.92. The numerical verification considering different scenarios has been done in the current evaluation.

An Investigation of Technical Methods to Solve the Internet Negative-Function (인터넷 역기능을 해결키 위한 기술적 방법론에 대한 검토)

  • 조동욱;신승수
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.4
    • /
    • pp.40-45
    • /
    • 2002
  • The network community provides people a new area which is called a cyber area, not physical area. However, today in the cyber area, the negative function has been causing social problem. In fact, it has not been causing by original function. Specifically speaking, main reason why it's leading to the negative function is that teenagers are logging into inappropriate sites (such as: violent, adult sites) to unnecessary sites (such as: e-mails with unknown signs combined with words, inappropriate language used in certain web board). Not only that, private password and ID's are being used by unknown user to accomplish illegal access. If this problem does not get solved through immediate development of technologies method, the cyber crime will increase in short period of time. The purpose of this paper is to understand each analyzed method which can cope with negative internet function, to discuss suitable management in certain web board an to check with fuzzy intercommunication mood.

  • PDF

The Design and Implementation of the Position Calibration System Using Sensor on u-WBAN (u-WBAN 기반의 센서를 이용한 자세교정 시스템 설계 및 구현)

  • Moon, Seung-Jin;Park, Yoon-Sung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.304-310
    • /
    • 2010
  • Chronic pain and herniated disk is a common disease that 80% of adults are experienced. There diseases rates of caused by the physical shock, such as the traffic accident, and the accidental fall is about 10%. And the most of these diseases is caused by having habitual incorrect position. People know that incorrect position would cause to accumulate continuous stress, but it is not easy to correct position. Because it does not recognize incorrect position repeated habitual consequently. This system collects data of user position after sensors that could measure position attach on use and presumes correct position used by position presumption algorithms. Its system purpose is continuing incorrect position could be aware to user and lead to change to correct position to prevent habituation of incorrect position. If habitual of correct position continues through accurate measurement and repeating cognitive learning, it would help for children and chronic patience.

Refining and Validating a Two-stage and Web-based Cancer Risk Assessment Tool for Village Doctors in China

  • Shen, Xing-Rong;Chai, Jing;Feng, Rui;Liu, Tong-Zhu;Tong, Gui-Xian;Cheng, Jing;Li, Kai-Chun;Xie, Shao-Yu;Shi, Yong;Wang, De-Bin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.24
    • /
    • pp.10683-10690
    • /
    • 2015
  • The big gap between efficacy of population level prevention and expectations due to heterogeneity and complexity of cancer etiologic factors calls for selective yet personalized interventions based on effective risk assessment. This paper documents our research protocol aimed at refining and validating a two-stage and web-based cancer risk assessment tool, from a tentative one in use by an ongoing project, capable of identifying individuals at elevated risk for one or more types of the 80% leading cancers in rural China with adequate sensitivity and specificity and featuring low cost, easy application and cultural and technical sensitivity for farmers and village doctors. The protocol adopted a modified population-based case control design using 72, 000 non-patients as controls, 2, 200 cancer patients as cases, and another 600 patients as cases for external validation. Factors taken into account comprised 8 domains including diet and nutrition, risk behaviors, family history, precancerous diseases, related medical procedures, exposure to environment hazards, mood and feelings, physical activities and anthropologic and biologic factors. Modeling stresses explored various methodologies like empirical analysis, logistic regression, neuro-network analysis, decision theory and both internal and external validation using concordance statistics, predictive values, etc..

Knowledge- Evolutionary Intelligent Machine-Tools - Part 1 : Design of Dialogue Agent based on Standard Platform

  • Kim, Dong-Hoon;Song, Jun-Yeob
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.11
    • /
    • pp.1863-1872
    • /
    • 2006
  • In FMS (Flexible Manufacturing System) and CIM (Computer Integrated Manufacturing), machine-tools have been the target of integration in the last three decades. The conventional concept of integration is being changed into the autonomous manufacturing device based on the knowledge evolution by applying advanced information technology in which an open architecture controller, high-speed network and internet technology are included. In the advanced environment, the machine-tools is not the target of integration anymore, but has been the key subject of cooperation. In the near future, machine-tools will be more improved in the form of a knowledge-evolutionary intelligent device. The final goal of this study is to develop an intelligent machine having knowledge-evolution capability and a management system based on internet operability. The knowledge-evolutionary intelligent machine-tools is expected to gather knowledge autonomically, by producing knowledge, understanding knowledge, reasoning knowledge, making a new decision, dialoguing with other machines, etc. The concept of the knowledge-evolutionary intelligent machine is originated from the machine control being operated by human experts' sense, dialogue and decision. The structure of knowledge evolution in M2M (Machine to Machine) and the scheme for a dialogue agent among agent-based modules such as a sensory agent, a dialogue agent and an expert system (decision support agent) are presented in this paper, with intent to develop the knowledge-evolutionary machine-tools. The dialogue agent functions as an interface for inter-machine cooperation. To design the dialogue agent module in an M2M environment, FIPA (Foundation of Intelligent Physical Agent) standard platform and the ping agent based on FIPA are analyzed in this study. In addition, the dialogue agent is designed and applied to recommend cutting conditions and thermal error compensation in a tapping machine. The knowledge-evolutionary machine-tools are expected easily implemented on the basis of this study and shows a good assistance to sensory and decision support agents.

Preparation and Physical Properties of Acrylonitrile-Butadiene Rubber Nanocomposites Filled with Zinc Dimethacrylate (디메틸아크릴산 아연을 이용한 아크릴로나이트릴-부타디엔 고무 나노복합체의 제조 및 물성)

  • 진원섭;이해성;나창운
    • Polymer(Korea)
    • /
    • v.28 no.2
    • /
    • pp.185-193
    • /
    • 2004
  • Elastomeric nanocomposites were prepared by employing zinc dimethacrylate into an acrylonitrile-butadiene rubber, and their network structures, mechanical properties, and fracture morphologies were investigated according to the adding methods and contents of zinc dimethacrylate. The total crosslink density increased with increasing the zinc dimethacrylate level, due to increased ionic bonds. Both the tensile strength and tear strength increased with increasing zinc dimethacrylate loadings, and then decreased after reaching a maximum value. It was found that the tear strength and crack resistance were greatly affected by the mixing method of zinc dimethacrylate. The in-situ nanocomposites, where zinc dimethacrylate particles were formed by the reaction of zinc oxide and methacrylic acid, showed much improved tear strength and crack resistance compared to those of the nanocomposites based on the direct mixing of zinc dimetacrylate powders. This was because of the finer zinc dimethacrylate particles and improved dispersion of the in-situ nanocomposites.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

Performance Analysis of Request Handling Schemes for Intelligent Peripherals (IP용 서비스 요청 처리방식의 성능 분석)

  • 최고봉;윤종호;권기호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.7
    • /
    • pp.1321-1334
    • /
    • 1994
  • This paper presents the service handling schemes of an intelligent peripheral(IP) which provides the service function as a physical entity in the intelligent network. Four service request handling scheme are compared for and IP which can handle both ordinary requests and prioritized requests on the blocked-call-delayed basis. Delayed requests are assumed to be stored in a finite storage buffer. Scheme-I exclusively allows prioritized requests be stored and to use a fixed number of reserved servers. The other three schemes without reserved servers(Scheme-II.III,and IV) allow both types of requests to be stored and prioritized requests pushout ordinary requests if the buffer is full. For these four schemes, the blocking probabilities and delay distributions of both types of requests are numerically obtained. From the numericall results, the schemes without reserved servers reduce the blocking probability of ordinary requists without a severe penalty on proritized requests. For three schemes without reserved servers, it is noted that prioritized requests should br served on the first-in, first-out basis, and ordinary requests should be served on the last-in, first-out basis.

  • PDF

A Study on Social Relationship of Housing Types for Social Health of the Elderly (노인의 사회적 건강 측면에서 본 주택유형별 사회적 관계성 연구)

  • Lee, Yeun-Sook;Youn, Ga-Young;Chang, Jae-woo;Ahn, Chang-Houn
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.5
    • /
    • pp.258-266
    • /
    • 2013
  • Rapidly aging society extends the span of aged life of the elderly people longer than before and this trend raises the issue of holistic health of the aged including their physical, psychological and social health making it necessary to study for environmental development to support this trend. This study intends to explore the direction of residential planning to support the deterioration phenomenon of social networks due to aging. Social networks here are treated as basic conditions for social health. This study researched the diverse types of elderly housings in preparation for the aged society and their spatial characteristics, social affordance characteristics and their potentials for social interactions from the viewpoint of their social relations. literature studies with contents analysis method was used. The results of this study were arranged primarily according to the characteristics of social relations by types of housings. Socially integrated types of housings can be found as inclusive housing type as they have both social characteristics that can be found in houses in general and the elderly housings, they should be considered as desirable types in Korea where collective houses are most popular. Form the existing housing plans housing plan direction should move toward socially integrated housing plans that can protect the elderly people collectively and the direction of housing plans here means the direction from more macro-perspective viewpoint. Therefore, the results of this study are meaningful in adding interpretation from the viewpoint of social relations respective housings and promoting housings for the elderly people more desirably.