Learn More
BACKGROUND Subcutaneous drainage is considered effective for preventing wound infections, but only anecdotal evidence supports its clinical benefit. The present study evaluated the benefit of subcutaneous drainage in preventing wound infections in patients undergoing liver resection. METHODS Patients scheduled for liver resection were randomly assigned to(More)
Security is now the most critical feature of any computing systems. Eliciting and analyzing security requirements in the early stages of the system development process is highly recommended to reduce security vulnerabilities which might be found in the later stages of the system development process. In order to address this issue, we will propose a new(More)
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that there is a restriction on the implementation of software affects the ease with which security can be tested. In this paper we propose a decision process of coding conventions for(More)
To establish a preoperative morphological classification system for hepatocellular carcinoma using multiphase computed tomography. All consecutive patients who were diagnosed with hepatocellular carcinoma between 2004 and 2009 were enrolled, for a total of 232 patients. The concavity and convexity of each outer contour of hepatocellular carcinoma acquired(More)
1. Acute exposure to ozone is known to cause airway hyperresponsiveness, which, at least in part, seems to result from an increase in the permeability of the airway mucosa. Recently, we demonstrated that depletion of sensory neuropeptides inhibits the ozone-induced increase in the permeability of the tracheal mucosa in guinea-pigs. The aim of this study was(More)
Unlike functional implementations, it is difficult to analyze the impact software enhancements on security. One of the difficulties is identifying the range of effects by new security threats, and the other is developing proper countermeasures. This paper proposes an analysis process that uses two kinds of security pattern: security requirements patterns(More)
Fibronectin specifically binds to U937 cells (monocytic cell line) in a dose-dependent manner. The specific receptors for the RGD sequence have been identified as α5β1 and αIIbβ3, and that for CS1 has been defined as α4β1. RGDS, CS1 peptide, and two peptides together showed similar inhibitory activities on this adhesion, while the 29-kD dispase-digested(More)
Although aspect-oriented software development is regarded as a suitable way to build non-functional requirements such as security concerns, there are few researches for identifying security aspects in early development stages. This paper presents an approach for identifying security aspects and pointcuts in a requirement analysis stage with extending misuse(More)