http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Innovation Network Development Model in Telemedicine: A Change in Participation
Maryam Goodarzi,Mashallah Torabi,Reza Safdari,Hossein Dargahi,Sara Naeimi 대한의료정보학회 2015 Healthcare Informatics Research Vol.21 No.4
This paper introduces a telemedicine innovation network and reports its implementation in Tehran University of Medical Sciences. The required conditions for the development of future projects in the field of telemedicine are also discussed; such projects should be based on the common needs and opportunities in the areas of healthcare, education, and technology. Methods: The development of the telemedicine innovation network in Tehran University of Medical Sciences was carried out in two phases: identifying the beneficiaries of telemedicine, and codification of the innovation network memorandum; and brainstorming of three workgroup members, and completion and clustering ideas. The present study employed a qualitative survey by using brain storming method. Thus, the ideas of the innovation network members were gathered, and by using Freeplane software, all of them were clustered and innovation projects were defined. Results: In the services workgroup, 87 and 25 ideas were confirmed in phase 1 and phase 2, respectively. In the education workgroup, 8 new programs in the areas of telemedicine, tele-education and teleconsultation were codified. In the technology workgroup, 101 and 11 ideas were registered in phase 1 and phase 2, respectively. Conclusions: Today, innovation is considered a major infrastructural element of any change or progress. Thus, the successful implementation of a telemedicine project not only needs funding, human resources, and full equipment. It also requires the use of innovation models to cover several different aspects of change and progress. The results of the study can provide a basis for the implementation of future telemedicine projects using new participatory, creative, and innovative models. Keywords: Innovation, Idea, Health Care Administrat
Bahrami, Pooneh Nikkhah,Dehghantanha, Ali,Dargahi, Tooska,Parizi, Reza M.,Choo, Kim-Kwang Raymond,Javadi, Hamid H.S. Korea Information Processing Society 2019 Journal of information processing systems Vol.15 No.4
The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.
M. H. Korayem,H. Esfandiar,R. Dargahi 대한기계학회 2016 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.30 No.11
The aim of this study is to determine the load capacity of a manipulator in closed-loop form and specified path. In open-loop mode, due to the lack of controller in the system, end effector accuracy constraint is considered as the main constraint in load carrying capacity and the motors are not able to use their maximum capacity for carrying larger load. In this study, for increasing the load carrying capacity of the robots and the use of saturation limit of the motors, the design of the controller is proposed based on game theory. The controller design is aroused as a problem of nonzero-sum differential game. In the method proposed, the motors driven are considered as the players and the track of specific path for end effector with a maximum load are regarded as objective function of the players. The players' optimal strategy is calculated based on Nash equilibrium strategy. By using iterative algorithm according to Riccati equations, optimal values of the control inputs are represented. In general, optimal strategy of the manipulator means to determine the best torques applied by the motors for carrying maximum load. To evaluate the effectiveness of the method proposed, the simulation is performed for Scout mobile robot and a manipulator with flexible joints. The results represent that differential game method when dealing with elastic deformation of the joints has a better performance and efficiency compared with LQR method.
Pooneh Nikkhah Bahrami,Ali Dehghantanha,Tooska Dargahi,Reza M. Parizi,Kim-Kwang Raymond Choo,Hamid H. S. Javadi 한국정보처리학회 2019 Journal of information processing systems Vol.15 No.4
The need for cyber resilience is increasingly important in our technology-dependent society where computingdevices and data have been, and will continue to be, the target of cyber-attackers, particularly advancedpersistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to bemore sophisticated, having access to significantly more resources and time to facilitate their attacks, which inmost cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors oftenutilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus,having up-to-date and detailed information of APT’s tactics, techniques, and procedures (TTPs) facilitates thedesign of effective defense strategies as the focus of this paper. Specifically, we posit the importance oftaxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attackcampaigns is fragmented across practitioner, government (including intelligence/classified), and academicpublications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APTcampaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to “decompose” anycomplex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze morethan 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incidentresponse and cyber threat hunting by aiding in understanding of the potential attacks to organizations as wellas which attacks may surface. In addition, the taxonomy can allow national security and intelligence agenciesand businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailedinformation about the campaigns. It can also notify future security policies and mitigation strategy formulation.
Upregulation of the RNF8 gene can predict the presence of sperm in azoospermic individuals
Nazari, Majid,Babakhanzadeh, Emad,Zarch, Mohsen Aghaei,Talebi, Mehrdad,Narimani, Nima,Dargahi, Mandana,Sabbaghian, Marjan,Ghasemi, Nasrin The Korean Society for Reproductive Medicine 2020 Clinical and Experimental Reproductive Medicine Vol.47 No.1
Objective: In this study, specimens from testicular biopsies of men with nonobstructive azoospermia (NOA) were used to investigate whether RNF8 gene could serve as a biomarker to predict the presence of sperm in these patients. Methods: Testicular biopsy specimens from 47 patients were classified according to the presence of sperm (positive vs. negative groups) and investigated for the expression of RNF8. The level of RNF8 gene expression in the testes was compared between these groups using reverse-transcription polymerase chain reaction. Results: The expression level of RNF8 was significantly higher in testicular samples from the positive group than in those from the negative group. Moreover, the area under the curve of RNF8 expression for the entire study population was 0.84, showing the discriminatory power of RNF8 expression in differentiating between the positive and negative groups of men with NOA. A receiver operating characteristic curve analysis showed that RNF8 expression had a sensitivity of 81% and a specificity of 84%, with a cutoff level of 1.76. Conclusion: This study points out a significant association between the expression of RNF8 and the presence of sperm in NOA patients, which suggests that quantified RNF8 expression in testicular biopsy samples may be a valuable biomarker for predicting the presence of spermatozoa in biopsy samples.