期刊文献+
共找到2,789篇文章
< 1 2 140 >
每页显示 20 50 100
Surgical treatment of liver cancer and pancreatic cancer under the China Healthcare Security Diagnosis Related Groups payment system
1
作者 Yun-He Hu Fan Yu +1 位作者 Yu-Zhuo Zhou Ai-Dong Li 《World Journal of Clinical Cases》 SCIE 2024年第21期4673-4679,共7页
BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers account... BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers accounted for the highest number of new cases.Real-world data(RWD)is now widely preferred to traditional clinical trials in various fields of medicine and healthcare,as the traditional research approach often involves highly selected populations and interventions and controls that are strictly regulated.Additionally,research results from the RWD match global reality better than those from traditional clinical trials.AIM To analyze the cost disparity between surgical treatments for liver and pancreatic cancer under various factors.METHODS This study analyzed RWD 1137 cases within the HB1 group(patients who underwent pancreatectomy,hepatectomy,and/or shunt surgery)in 2023.It distinguished different expenditure categories,including medical,nursing,technical,management,drug,and consumable costs.Additionally,it assessed the contribution of each expenditure category to total hospital costs and performed cross-group comparisons using the non-parametric Kruskal–Wallis test.This study used the Steel–Dwass test for post-hoc multiple comparisons and the Spearman correlation coefficient to examine the relationships between variables.RESULTS The study found that in HB11 and HB13,the total hospitalization costs were significantly higher for pancreaticoduodenectomy than for pancreatectomy and hepatectomy.Although no significant difference was observed in the length of hospital stay between patients who underwent pancreaticoduodenectomy and pancreatectomy,both were significantly longer than those who underwent liver resection.In HB15,no significant difference was observed in the total cost of hospitalization between pancreaticoduodenectomy and pancreatectomy;however,both were significantly higher than those in hepatectomy.Additionally,the length of hospital stay was significantly longer for patients who underwent pancreaticoduodenectomy than for those who underwent pancreatectomy or liver resection.CONCLUSION China Healthcare Security Diagnosis Related Groups payment system positively impacts liver and pancreatic cancer surgeries by improving medical quality and controlling costs.Further research could refine this grouping system and ensure continuous effectiveness and sustainability. 展开更多
关键词 China health care security diagnosis-related groups Real-world study Liver cancer surgical treatment Pancreatic cancer surgical treatment Hospitalization costs Cost structure Average length of stay
下载PDF
Renewal Needs and Solutions for Urban Old Communities under the Guidance of Resilient Security
2
作者 ZHOU Xu LIU Zihan +1 位作者 SUN Ziin YANG Peizhe 《Journal of Landscape Research》 2024年第5期15-18,26,共5页
The renewal strategy guided by resilient security aims to enhance the community’s resistance and resilience to natural disasters and other emergency situations,ensuring that the community can quickly restore normal f... The renewal strategy guided by resilient security aims to enhance the community’s resistance and resilience to natural disasters and other emergency situations,ensuring that the community can quickly restore normal functions in the face of shocks.By enhancing the resilience of the community,residents’sense of security and satisfaction can be improved,while promoting the long-term stability and prosperity of the city.Using methods such as literature review,case analysis,and demand investigation,this paper investigates the needs and strategies for the renewal of urban old communities,and explores the demand analysis and solutions for the renewal of urban old communities under the guidance of resilient security.This paper aims to address the lack of resilience in old communities caused by outdated construction,aging infrastructure,and insufficient public services,as well as how to improve the adaptability,resilience,and transformation ability of communities through renovation and transformation. 展开更多
关键词 Resilient security Old community Community renewal Demand analysis implementation path
下载PDF
Trust Model Based on Structured Protection for High Level Security System 被引量:1
3
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
下载PDF
Structured Equation Model of Tuberculosis Incidence Based on Its Social Determinants and Risk Factors in Bandar Lampung, Indonesia 被引量:1
4
作者 Dyah Wulan Sumekar Rengganis Wardani Lutfan Lazuardi +1 位作者 Yodi Mahendradhata Hari Kusnanto 《Open Journal of Epidemiology》 2014年第2期76-83,共8页
World Health Organization through tuberculosis (TB) control averted up to six million deaths and cured thirty-six million people in 1995-2008, but had less success in reducing TB incidence, especially in thirteen high... World Health Organization through tuberculosis (TB) control averted up to six million deaths and cured thirty-six million people in 1995-2008, but had less success in reducing TB incidence, especially in thirteen high burden countries, including Indonesia. Therefore, TB control will need to have more emphasis on the issues of social determinants, as social determinants affect TB’s incidence directly and/-or through TB’s risk factors. This study aimed to identify a significant effect of social determinants and the risk factors of TB incidence. The research setting was at twenty-seven primary health centers and one hospital that have implemented the Directly Observed Treatment Short Course (DOTS) strategy in Bandar Lampung municipality, Indonesia. Respondents of this research were 238 smear-positive TB patients as case group and 238 patients without TB as control group. Research variables consisted of “social determinants”, “housing condition”, “household food security” and “health access” which were set as latent variables and measured through their indicators. Data had been collected by using questionnaire and then was analyzed with Structural Equation Modeling using SmartPLS 2.0 software. The result showed that “social determinants” through “housing condition” and “household food security” affected “TB incidence”. Moreover, “social determinants”, “housing condition” and “household food security” can be used to explain 34.1% variation of “TB incidence”. In conclusion, the knowledge can be used to support the TB control program, particularly to implement the DOTS strategy together with improving social determinants, housing condition and household food security. 展开更多
关键词 SOCIAL Determinants HOUSING Condition HOUSEHOLD Food security TB INCIDENCE Structural Equation Modeling
下载PDF
Cost analysis of radical resection of malignant breast tumors under the China Healthcare Security Diagnosis Related Groups payment system
5
作者 Yun-He Hu Ai-Dong Li 《World Journal of Clinical Cases》 SCIE 2024年第20期4174-4179,共6页
BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hosp... BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hospitalization costs and structure,and explored the impact of China Healthcare Security Diagnosis Related Groups(CHS-DRG)management on patient costs.It aimed to provide medical institutions with ways to reduce costs,optimize cost structures,reduce patient burden,and improve service efficiency.AIM To study the CHS-DRG payment system’s impact on breast cancer surgery costs.METHODS Using the CHS-DRG(version 1.1)grouping criteria,4073 patients,who underwent the radical resection of breast malignant tumors from January to December 2023,were included in the JA29 group;1028 patients were part of the CHS-DRG payment system,unlike the rest.Through an independent sample t-test,the length of hospital stay as well as total hospitalization,medicine and consumables,medical,nursing,medical technology,and management expenses were compared.Pearson’s correlation coefficient was used to test the cost correlation.RESULTS In terms of hospitalization expenses,patients in the CHS-DRG payment group had lower medical,nursing,and management expenses than those in the diagnosis-related group(DRG)non-payment group.For patients in the DRG payment group,the factors affecting the total hospitalization cost,in descending order of relevance,were medicine and consumable costs,consumable costs,medicine costs,medical costs,medical technology costs,management costs,nursing costs,and length of hospital stay.For patients in the DRG nonpayment group,the factors affecting the total hospitalization expenses in descending order of relevance were medicines and consumable expenses,consumable expenses,medical technology expenses,the cost of medicines,medical expenses,nursing expenses,length of hospital stay,and management expenses.CONCLUSION The CHS-DRG system can help control and reduce unnecessary medical expenses by controlling medicine costs,medical consumable costs,and the length of hospital stay while ensuring medical safety. 展开更多
关键词 China Healthcare security Diagnosis Related Groups Real-world study Radical resection of malignant breast tumors Hospitalization costs Cost structure Average length of stay
下载PDF
The Analysis and Amendment of Security System in 3G
6
作者 Min ZHAO Ling SHI 《Intelligent Information Management》 2009年第1期1-5,共5页
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an... This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR. 展开更多
关键词 3G security 3G security structure 3G AUTHENTICATION and key AGREEMENT protocol security arith- metic
下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
7
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
下载PDF
Security Analysis of Discrete Logarithm Based Cryptosystems 被引量:1
8
作者 WANG Yuzhu LIAO Xiaofeng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1715-1717,共3页
Discrete logarithm based cryptosysterns have subtle problems that make the schemes vulnerable. This paper gives a comprehensive listing of security issues in the systems and analyzes three classes of attacks which are... Discrete logarithm based cryptosysterns have subtle problems that make the schemes vulnerable. This paper gives a comprehensive listing of security issues in the systems and analyzes three classes of attacks which are based on mathematical structure of the group which is used in the schemes, the disclosed information of the subgroup and implementation details respectively. The analysis will, in turn, allow us to motivate protocol design and implementation decisions. 展开更多
关键词 discrete logarithm security analysis prime order subgroup secure implementation
下载PDF
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia 被引量:1
9
作者 Amir Mohamed Talib Fahad Omar Alomary +1 位作者 Hanan Fouad Alwadi Rawan Rashed Albusayli 《Journal of Information Security》 2018年第4期315-333,共19页
Cyber security is an important element of national security and the safekeeping of a nation’s constituency and assets. In Saudi Arabia, the point of interest on cyber security is particularly outstanding due to the f... Cyber security is an important element of national security and the safekeeping of a nation’s constituency and assets. In Saudi Arabia, the point of interest on cyber security is particularly outstanding due to the fact that Saudi Arabia has a highly cyber attacks all over the Arab countries. This paper displays on contemporary studies done in Saudi Arabia in regards to cyber security policy coverage. The point of interest of this paper is the use of ontology to identify and suggest a formal, encoded description of the cyber security strategic environment, and propose the development of ontology to be able to permit the implementation of the sort of policy. The intention of the ontology is to become aware of and constitute the multi-layered company of gamers and their related roles and obligations within the cyber security environment. This could make contributions in large part to the improvement, implementation and rollout of a country wide cyber security policy in Saudi Arabia. 展开更多
关键词 CYBER security CYBER security Policy implementation ONTOLOGY SAUDI ARABIA
下载PDF
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
10
作者 Zhengtao JIANG Yongbin WANG +1 位作者 Yong WANG Yumin WANG 《Intelligent Information Management》 2009年第1期6-13,共8页
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an... This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR. 展开更多
关键词 3G security 3G security structure 3G AUTHENTICATION and key AGREEMENT protocol security arith- metic
下载PDF
A Low-Cost and High-Performance Cryptosystem Using Tripling-Oriented Elliptic Curve
11
作者 Mohammad Alkhatib Wafa S.Aldalbahy 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1807-1831,共25页
Developing a high-performance public key cryptosystem is crucial for numerous modern security applications.The Elliptic Curve Cryptosystem(ECC)has performance and resource-saving advantages compared to other types of ... Developing a high-performance public key cryptosystem is crucial for numerous modern security applications.The Elliptic Curve Cryptosystem(ECC)has performance and resource-saving advantages compared to other types of asymmetric ciphers.However,the sequential design implementation for ECC does not satisfy the current applications’performance requirements.Therefore,several factors should be considered to boost the cryptosystem performance,including the coordinate system,the scalar multiplication algo-rithm,and the elliptic curve form.The tripling-oriented(3DIK)form is imple-mented in this work due to its minimal computational complexity compared to other elliptic curves forms.This experimental study explores the factors playing an important role in ECC performance to determine the best combi-nation that leads to developing high-speed ECC.The proposed cryptosystem uses parallel software implementation to speed up ECC performance.To our knowledge,previous studies have no similar software implementation for 3DIK ECC.Supported by using parallel design,projective coordinates,and a fast scalar multiplication algorithm,the proposed 3DIK ECC improved the speed of the encryption process compared with other counterparts and the usual sequential implementation.The highest performance level for 3DIK ECC was achieved when it was implemented using the Non-Adjacent Form algorithm and homogenous projection.Compared to the costly hardware implementations,the proposed software implementation is cost effective and can be easily adapted to other environments.In addition,the power con-sumption of the proposed ECC is analyzed and compared with other known cryptosystems.thus,the current study presents a detailed overview of the design and implementation of 3DIK ECC. 展开更多
关键词 security CRYPTOGRAPHY elliptic curves software implement greatation MULTITHREADING
下载PDF
A Security Architecture for SCADA Systems
12
作者 Arun Velagapalli Mahalingam Ramkumar 《Journal of Information Security》 2018年第1期100-132,共33页
Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack ... Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack on any system exploits some undesired (malicious or accidental) functionality in the components of the system. Unfortunately, it is far from practical to eliminate undesired functionality in every component of a system. The contribution of this paper is a novel architecture for securing SCADA systems that guarantee that “any malicious modification of the deployment configuration or the design configuration of the SCADA system will be detected”—even if undesired functionality may exist in SCADA system components. 展开更多
关键词 SCADA security: TRUSTED Computing: Authenticated Data structure Critical Infrastructure DCS PCS CYBER security CIP
下载PDF
Structural constraints and its countermeasures to contiguous poor areas with particular difficulties: An case study on southern Shaanxi immigration project
13
作者 He De-gui Dang Guo-ying 《Ecological Economy》 2016年第3期257-268,共12页
Immigration relocation of the poor in rural areas is an effective targeted measure to help people out of poverty in the new normal. The structural constraints lie in the heavy pressure of land resources and environmen... Immigration relocation of the poor in rural areas is an effective targeted measure to help people out of poverty in the new normal. The structural constraints lie in the heavy pressure of land resources and environmental carrying capacity, high cost of immigration settlement and delayed counterpart funds, insufficient industrial support and difficulty in living-making. To realize the goal of targeted poverty alleviation, it demands determination and capability from the policy designer, as well the social basis. The effect imposed by the structural constraints to implementation of such policy should be paid adequate attention by public sectors. It is supposed to change the guiding direction of the policy timely and to relieve financial burden of immigration settlement and resource environmental bearing capacity through mechanism of joint efforts from internal and more external support. 展开更多
关键词 targeted poverty alleviation immigration relocation structural constraints policy implementation immigration living-making
下载PDF
Research on Information Security Technology of Online Insurance System Based on WEB
14
作者 Qingfeng Zhang 《Journal of Electronic Research and Application》 2018年第4期5-9,共5页
With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a... With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a system,it is necessary to manage the safe operation structure,thus effectively establishing complete supervision and maintenance.The system ensures that the management level of insured information security technology can be optimized.This paper briefly analyzes the framework of the WEB-based online insurance system and discusses the security mode and system implementation. 展开更多
关键词 WEB ONLINE INSURANCE system FRAMEWORK security system implementation
下载PDF
Research on Occurrence Mechanism of Public Security Emergency from the perspective of the Structure Box
15
作者 Jian Lin Bo Kang 《International Journal of Technology Management》 2016年第9期1-6,共6页
Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis... Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency. 展开更多
关键词 Public security emergency structure box Emotional resonance Resonance effect Supporting network
下载PDF
Sensitive Information Security Based on Elliptic Curves
16
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《World Journal of Engineering and Technology》 2024年第2期274-285,共12页
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication. 展开更多
关键词 CRYPTOGRAPHY Elliptic Curves Digital security Data Sensitive Data implementation
下载PDF
Economic Growth:The Fundamental Path to the Realization of Social Security Rights for Migrant Workers
17
作者 Zhang Yuqing 《Economics World》 2024年第3期117-121,共5页
The International Labour Organization seems to only see the aspect of social security promoting economic growth,while neglecting the aspect of economic growth supporting social security.From the standpoint of material... The International Labour Organization seems to only see the aspect of social security promoting economic growth,while neglecting the aspect of economic growth supporting social security.From the standpoint of materialism and the practice of social security,the realization of social security rights for migrant workers fundamentally depends on economic growth.The Belt and Road Initiative has provided a Chinese solution for creating a strong material and technological foundation to meet the social security needs of all people,including migrant workers. 展开更多
关键词 economic growth migrant workers social security rights implementation pathways
下载PDF
嵌套SP网络的New-Structure系列结构的零相关线性逼近与不可能差分性质研究 被引量:3
18
作者 付立仕 崔霆 金晨辉 《电子学报》 EI CAS CSCD 北大核心 2017年第6期1367-1374,共8页
分组密码的安全性分析是密码学的重要研究内容,其中不可能差分分析和零相关线性分析是密码算法安全性分析的重要方法.本文利用中间相错方法,通过对扩散层进行限制,给出了嵌套SP网络的New-Structure系列结构的零相关线性逼近.给出了New-S... 分组密码的安全性分析是密码学的重要研究内容,其中不可能差分分析和零相关线性分析是密码算法安全性分析的重要方法.本文利用中间相错方法,通过对扩散层进行限制,给出了嵌套SP网络的New-Structure系列结构的零相关线性逼近.给出了New-Structure I和New-Structure IV结构中概率非零的差分传递链和相关优势非零的线性逼近传递链在结构上的一致性.此外也给出了嵌套SP网络New-Structure I、III的16/22轮不可能差分特征.最后给出在分组规模和密钥规模均为128比特时,对New-Structure I,III,IV进行21/28/22轮的不可能差分攻击和19/28/22轮的多维零相关线性逼近攻击所需要的时间复杂度和数据复杂度.本文的结果对基于New-Structure结构设计的密码算法的安全性分析提供了理论依据. 展开更多
关键词 信息安全 不可能差分分析 零相关线性分析 New-structure系列
下载PDF
Agricultural Production Structure Optimization: A Case Study of Major Grain Producing Areas, China 被引量:4
19
作者 LU Sha-sha LIU Yan-sui +1 位作者 LONG Hua-lou GUAN Xing-liang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2013年第1期184-197,共14页
A large number of mathematical models were developed for supporting agricultural production structure optimization decisions; however, few of them can address various uncertainties existing in many factors (e.g., eco... A large number of mathematical models were developed for supporting agricultural production structure optimization decisions; however, few of them can address various uncertainties existing in many factors (e.g., eco-social benefit maximization, food security, employment stability and ecosystem balance). In this study, an interval-probabilistic agricultural production structure optimization model (IPAPSOM) is formulated for tackling uncertainty presented as discrete intervals and/or probability distribution. The developed model improves upon the existing probabilistic programming and inexact optimization approaches. The IPAPSOM considers not only food security policy constraints, but also involves rural households’income increase and eco-environmental conversation, which can effectively reflect various interrelations among different aspects in an agricultural production structure optimization system. Moreover, it can also help examine the reliability of satisfying (or risk of violating) system constraints under uncertainty. The model is applied to a real case of long-term agricultural production structure optimization in Dancheng County, which is located in Henan Province of Central China as one of the major grain producing areas. Interval solutions associated with different risk levels of constraint violation are obtained. The results are useful for generating a range of decision alternatives under various system benefit conditions, and thus helping decision makers to identify the desired agricultural production structure optimization strategy under uncertainty. 展开更多
关键词 major grain producing areas agricultural production structure optimization interval-probabilistic programming food security farmers’income increase China
下载PDF
The Research Existing Condition and Application of Solid Waste Disposal in Japan
20
作者 TANAKA Reiji KITATSUJI Masafumi 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2009年第S1期62-69,共8页
Japan lacked resources is a large import country and also a large consuming country.So it is turned society structure system of consumption goods stocked in domestic,which leads to 450 millions ton waste material.Rece... Japan lacked resources is a large import country and also a large consuming country.So it is turned society structure system of consumption goods stocked in domestic,which leads to 450 millions ton waste material.Recently,because of continuing development of intermediate handling and recycled utilization technology,finally disposed waste materials approximately 30 millions ton.The quantity of concrete product is consumed 300 millions ton per year unprecedented,beau case of large scope,it is expected valid and large absorption industry of recycled material. The purpose of this paper is to do a report on applied present status and future assignment of recycled material and building structure in Japan. 展开更多
关键词 INORGANIC WASTE recycled AGGREGATE circumstance security PRECAST CONCRETE product reinforced CONCRETE structure
下载PDF
上一页 1 2 140 下一页 到第
使用帮助 返回顶部