首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   60篇
  免费   0篇
工业技术   60篇
  2023年   3篇
  2022年   5篇
  2021年   4篇
  2020年   4篇
  2019年   4篇
  2018年   3篇
  2017年   4篇
  2016年   8篇
  2013年   2篇
  2012年   1篇
  2011年   2篇
  2010年   3篇
  2009年   2篇
  2007年   1篇
  2006年   3篇
  2004年   3篇
  2003年   1篇
  1998年   2篇
  1997年   1篇
  1995年   1篇
  1981年   1篇
  1977年   1篇
  1976年   1篇
排序方式: 共有60条查询结果,搜索用时 15 毫秒
11.
Patient Physiological Parameters (PPPs) seem to be the most extensively accessed and utilized Personal Health Information (PHI) in hospitals, and their utilization by the various medical entities for treatment and diagnosis creates a real threat to patient privacy. This study aims to investigate whether PPPs access in a hospital environment violates patient privacy. If so, to what extent can we manage patient privacy while accessing PPPs in this environment? We investigated this question by analyzing questionnaire-based data from two Asian countries: Group A (China) and Group B (Pakistan). For data collection, we targeted those medical entities which were directly dealing with PPPs in their routine tasks. Results suggest that patient type directly influences the collection of PPPs: Group A (one-time?=?1.9, follow-up?=?1.06) and Group B (one-time?=?2.0 and follow-up?=?1.9). Both groups agreed that patients have the right to control their own PPPs. In both, doctors are the most trusted entity: for Group A, the Pearson Chi-Square with one degree of freedom is 1.414, p?=?0.234, whereas for Group B, the Pearson Chi-Square with three degrees of freedom is 4.511, p?=?0.11. Most of the Group A entities (92%) are familiar with unauthorized access of PPPs, while in Group B the level was only 35%. In Group B, only 35% of entities stated the purpose, specification and use limitations of PPPs. Doctors in both groups showed a high utilization of PPPs read authorization rights. This empirical evidence about PPPs usage in both countries will benefit health technology and improve policy on patient privacy.  相似文献   
12.
Wireless Personal Communications - Smart grid is an autonomous power generation and production system, that includes various energy management sub-systems such as energy efficient resources, smart...  相似文献   
13.
14.
AIM: The study of prevalence of carbohydrate metabolism disorders (CHMD) in females. MATERIALS AND METHODS: A representative sample of 20-59-year-old female population of the city of Baku was examined using age-specific standardized index, WHO tests and criteria. RESULTS: CHMD occurred rather frequently. Tolerance to glucose was abnormal in 50% of the examinees. Diabetes mellitus affected 20-29-year-old women 4 times more frequently than poor glucose tolerance. An opposite trend was observed for 40-49-year-old women. CONCLUSION: Relevant prophylactic measures are required for female Baku population.  相似文献   
15.
In recent years, Body Area Networks (BANs) have gained immense popularity in the domain of healthcare as well as monitoring of soldiers in the battlefield. Security of a BAN is inevitable as we secure the lives of soldiers and patients. In this paper, we propose a security framework using Keyed-Hashing Message Authentication Code (HMAC-MD5) to protect the personal information in a BAN. We assume a network in which nodes sense physiological variables such as electrocardiography (EKG), electroencephalography (EEG), pulse oximeter data, blood pressure and cardiac output. Heterogeneous wireless sensor network is considered which consists of a powerful High-end sensor (H-sensor) and several Low-end sensors (L-sensors). EKG is used for secure communication between nodes as it introduces plug and play capability in BANs. The process is made secure by applying HMAC-MD5 on EKG blocks. Key agreement is done by comparing HMAC of feature blocks between sensors resulting in a more secure network. The analysis is done by calculating the entropy of keys and checking the randomness of EKG data using NIST-randomness testing suite.  相似文献   
16.
Automated Prototyping of User Interfaces Based on UML Scenarios   总被引:1,自引:0,他引:1  
User interface (UI) prototyping and scenario engineering have become popular techniques. Yet, the transition from scenario to formal specifications and the generation of UI code is still ill-defined and essentially a manual task, and the two techniques lack integration in the overall requirements engineering process. In this paper, we suggest an approach for requirements engineering that generates a user interface prototype from scenarios and yields a formal specification of the application. Scenarios are acquired in the form of collaboration diagrams as defined by the Unified Modeling Language (UML), and are enriched with user interface (UI) information. These diagrams are automatically transformed into UML Statechart specifications of the UI objects involved. From the set of obtained specifications, a UI prototype is generated that is embedded in a UI builder environment for further refinement. Based on end user feedback, the collaboration diagrams and the UI prototype may be iteratively refined, and the result of the overall process is a specification consisting of the Statechart diagrams of all the objects involved, together with the generated and refined prototype of the UI. The algorithms underlying this process have been implemented and exercised on a number of examples. This research was mainly conducted at University of Montreal, where the first two authors were PhD students and the third author a full-time faculty member. Funding was provided in part by FCAR (Fonds pour la formation des chercheurs et l'aide à la recherche au Québec) and by the SPOOL project organized by CSER (Consortium Software Engineering Research) which is funded by Bell Canada, NSERC (Natural Sciences and Research Council of Canada), and NRC (National Research Council Canada).  相似文献   
17.
Epoxy resins, is an important class of reactive polymers, have been reported to be toughened by nanoparticles. Carbon nanotube is a tubular cylinder ofcarbonatoms having extraordinary mechanical, electrical, and thermal properties. In this article, present state of epoxy/carbon nanotube composite is given. Types of epoxy and hardening agents commonly used in composite processing have been thrashed out. Frequently used fabrication techniques are discussed with particular emphasis on evaluating dispersion state of nanotube. Epoxy/carbon nanotube composites offer substantially improved properties compared to traditional fiber-reinforced epoxy composites. Finally, potential relevance for efficiently transforming filler properties to matrix facilitating aerospace relevance is conversed.  相似文献   
18.
The ability of bifidobacteria isolated from infant feces to inhibit enterohemorrhagic Escherichia coli serotype O157:H7 in vitro and reduce its adhesion to human enterocyte-like Caco-2 cells was evaluated in comparison to American Type Culture Collection bifidobacterial reference strains. Five Bifidobacterium isolates from infant feces were identified and characterized by morphology, fructose-6-phosphate phosphoketolase (F6PPK) assay, polymerase chain reaction using bifidobacterial 16S rDNA specific primers, carbohydrate fermentation patterns, resistance to lysozyme, acid, bile and hydrogen peroxide as well as their ability to inhibit E. coli O157:H7 using the agar spot technique. Infant isolates showed greater resistance to bile, acid, lysozyme and more antimicrobial activity against E. coli O157:H7 than ATCC strains. Two infant isolates identified as B. bifidum RBL 71 and B. bifidum RBL 460 showed good adhesion and significant potential for reducing adhesion of E. coli O157:H7 to Caco-2 cells. This effect was dependent on bifidobacterial cell concentration. These results show that bifidobacteria isolated from infants may be useful for improving probiotic formulae with respect to protection against E. coli O157:H7 infection.  相似文献   
19.
High resolution radar imaging is used to perform target signature analysis. In this paper, we present a comparative study of diverse 2- D imaging methods on spherical waves, such as sar processing and its modes, ssar and isar as well as holography, whose mathematical formulation is identical by using the spherical projection density function, although the measurement technique are quite different. We show that azimuth processing is unified, and under some conditions range processing can be unified. In order to reconstruct the fixed target side looking radar image, we have developed an idea based on the transformation of antenna lateral displacement as a function of equivalent angular displacement, and then the 1- D images coherent summation algorithm of classical holography can be used.  相似文献   
20.
In this article, advancement in epoxy/graphene oxide composites is presented. These materials are comprised of graphene oxide (GO) as filler (carbon-based material, thermodynamically stable, two-dimensional, planar and layered structure). Due to improved properties (mechanical response, low density, electrical resistance, and thermal stability), epoxy resins are used in several applications. Graphene oxide proposes unique properties to epoxy composites as high surface area, thermal and electrical conductivity as well as mechanical and barrier properties, relative to neat matrix. The corresponding significance of epoxy/GO-based materials, related challenges, and potential exploitation regarding technical applications (aerospace, gas sensor, electronic devices, etc.) have been overviewed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号