期刊文献+
共找到51,427篇文章
< 1 2 250 >
每页显示 20 50 100
Hepatitis B Surface Antigen and Hepatitis C Virus Antibodies among Drug Users in Burkina Faso
1
作者 Sylvie Zida Kadari Cissé +13 位作者 Odette Ky-Zerbo Dinanibè Kambiré Serge Théophile Soubeiga Simon Tiendrebéogo Fatou Sissoko Issa Sory Célestine Ki-Toé Solange Dioma Djeneba Zorom Adama Ouédraogo Cedric Dimitri Axon Hien Mahamoudou Sanou Seni Kouanda Henri Gautier Ouédraogo 《Advances in Microbiology》 CAS 2024年第1期92-104,共13页
Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and ... Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and C viruses among drug users in Burkina Faso. Methodology: This was a cross-sectional biological and behavioral survey conducted between June and August 2022, among drug users in Ouagadougou and Bobo Dioulasso, the two main cities of Burkina Faso. A respondent-driven sampling (RDS) was used to recruit drug users. Hepatitis B surface antigen was determined using lateral flow rapid test kits and antibodies to hepatitis C virus in serum determined using an Enzyme-Linked Immunosorbent Assay. Data were entered and analyzed using Stata 17 software. Weighted binary logistic regression was used to identify the associated factors of hepatitis B and C infections and a p-value Results: A total of 323 drug users were recruited with 97.5% males. The mean age was 32.7 years old. The inhaled or smoked mode was the most used by drug users. The adjusted hepatitis B and hepatitis C prevalence among study participants were 11.1% and 2.3% respectively. The marital status (p = 0.001), and the nationality (p = 0.011) were significantly associated with hepatitis B infection. The type of drug used was not significantly associated with hepatitis B infection or hepatitis C infection. Conclusion: The prevalence of HBsAg and anti-HCV antibodies among DUs are comparable to those reported in the general population in Burkina Faso. This result suggests that the main routes of contamination by HBV and HCV among DUs are similar to those in the population, and could be explained by the low use of the injectable route by DUs in Burkina Faso. 展开更多
关键词 Drug users Hepatitis C Hepatitis B PREVALENCE Burkina Faso
下载PDF
Evaluation of an Autonomous Vehicle User Interface for Sensory Impaired Users
2
作者 Elena Angeleska Linda Lüchtrath Paolo Pretto 《Journal of Transportation Technologies》 2024年第4期570-589,共20页
Autonomous vehicles (AVs) hold immense promises in revolutionizing transportation, and their potential benefits extend to individuals with impairments, particularly those with vision and hearing impairments. However, ... Autonomous vehicles (AVs) hold immense promises in revolutionizing transportation, and their potential benefits extend to individuals with impairments, particularly those with vision and hearing impairments. However, the accommodation of these individuals in AVs requires developing advanced user interfaces. This paper describes an explorative study of a multimodal user interface for autonomous vehicles, specifically developed for passengers with sensory (vision and/or hearing) impairments. In a driving simulator, 32 volunteers with simulated sensory impairments, were exposed to multiple drives in an autonomous vehicle while freely interacting with standard and inclusive variants of the infotainment and navigation system interface. The two user interfaces differed in graphical layout and voice messages, which adopted inclusive design principles for the inclusive variant. Questionnaires and structured interviews were conducted to collect participants’ impressions. The data analysis reports positive user experiences, but also identifies technical challenges. Verified guidelines are provided for further development of inclusive user interface solutions. 展开更多
关键词 Autonomous Vehicles user Interface Inclusive Design Wizard of Oz Simulation
下载PDF
Reform of the Irrigation Sector and Creation of Functional and Sustainable Irrigation Water Users Associations (AUEI) in Niger: Capitalization of the Experience of the Konni AHA
3
作者 Saidou Abdoulkarimou Illou Mahamadou 《Agricultural Sciences》 2024年第2期209-229,共21页
During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to coo... During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to cooperatives concerned. Due to lack of financial resources, but also because of poor management, everywhere in Niger we are witnessing an accelerated deterioration of the irrigation infrastructure of hydro-agricultural developments. Institutional studies carried out on this situation led the State of Niger to initiate a reform of the governance of hydro-agricultural developments, by streng-thening the status of ONAHA, by creating an Association of Irrigation Water Users (AUEI) and by restructuring the old cooperatives. Indeed, this research aims to analyze the creation of functional and sustainable Irrigation Water User Associations (AUEI) in Niger in a context of reform of the irrigation sector, and based on the experience of the Konni AHA. It is based on a methodological approach which takes into account documentary research and the collection of data from 115 farmers, selected by reasoned choice and directly concerned by the management of the irrigated area. The data collected was analyzed and the results were analyzed using the systemic approach and the diagnostic process. The results show that the main mission of the AUEI is to ensure better management of water, hydraulic equipment and infrastructure on the hydro-agricultural developments of Konni. The creation of the Konni AUEI was possible thanks to massive support from the populations and authorities in the implementation process. After its establishment, the AUEI experienced a certain lethargy for some time due to the rehabilitation work of the AHA but currently it is functional and operational in terms of associative life and governance. Thus, the constraints linked to the legal system, the delay in the completion of the work, the uncertainties of access to irrigation water but also the problems linked to the change in mentality of certain ONAHA agents constitute the challenges that must be resolved in the short term for the operationalization of the Konni AUEI. 展开更多
关键词 Konni (Niger) Hydro-Agricultural Developments Association of Irrigation Water users GOVERNANCE
下载PDF
Design Method for Optimizing the Interactive Interface of Live Broadcasting Platform for the Elderly Users
4
作者 WEI Bi-ze FAN Wei DUAN Ying-ke 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第4期167-178,共12页
In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interact... In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interaction design mode used is still mainly based on the interaction mode for young groups,and is not designed for elderly users.Therefore,a design method for optimizing the interaction interface of live broadcasting platform for elderly users was proposed in this study.Firstly,the case study method and Delphi expert survey method were used to determine the design needs of elderly users and the design mode was analysed.Secondly,the orthogonal design principle was used to design a test sample of the interactive interface of live broadcasting platform applicable for the elderly users,and then a user evaluation system was established to calculate the weights of the design elements using hierarchical analysis,and then the predictive relationship between the design mode of the interactive interface of live broadcasting platform and the elderly users was established by Quantitative Theory I.Finally,Genetic Algorithm was applied to generate the optimized design scheme.The results showed that the design method based on the Genetic Algorithm and the combination of Quantitative Theory can scientifically and effectively optimize the design of the interactive interface of the live broadcasting platform for the elderly users,and improve the experience of the elderly users. 展开更多
关键词 Live broadcasting platform Interaction design Elderly users Genetic Algorithm Quantitative Theory I
下载PDF
Determinants of Online Buying Behaviour of Social Media Users in Cameroon
5
作者 Kelly E.Ade Stephen N.Ndode Kingsley L.Ngange 《Journalism and Mass Communication》 2024年第2期112-139,共28页
Online shopping in Cameroon is growing rapidly and gaining considerable ground.The phenomenon is relatively new as compared to the traditional brick-and-mortar store(serving customers face-to-face in a building rather... Online shopping in Cameroon is growing rapidly and gaining considerable ground.The phenomenon is relatively new as compared to the traditional brick-and-mortar store(serving customers face-to-face in a building rather than online).As the world faces digital transformations,businesses in Cameroon are seeking new ways to reach their customers and create favourable environments to effectively carryout online purchase.This study examines the factors that affect consumer online buying behaviour in Cameroon.Three theories guided this investigation:the Technology Acceptance Model(Davis,1989),Diffusion of Innovations Theory(Rogers,1995),and Uses and Gratifications Theory(Katz&Blumler,1974).The study focuses on students of the University of Buea who carry out online shopping.Purposive sampling is used,and data are collected from 365 respondents through a questionnaire with open and closed ended questions.Analysis of data is done with the use of the Statistical Package for Social Scientists(SPSS)Version 21 to determine the types of products consumers buy online;the degree to which consumer trust and satisfaction affect consumer loyalty;and the specific social,economic,and market factors that affect online buying behaviour.Findings indicate that:Consumers mostly buy fashion items(74.3%),electronics(44.7%),cosmetics(37.3%),and house equipment(34%)online.Consumers will repeat purchase from a marketer if they trust and are satisfied with the product and service quality(81.1%);hence,they will also encourage others to buy.If they are dissatisfied,they will not repeat purchase from the online store.Advertisement(76.1%),attractive pricing/discount(71.7%),product quality(71%),service quality(64.1%),convenience(72.3%),available income/money(49.6%),word of mouth recommendation(41.9%),and personal motivation(62.7%)constitute the major factors that affect consumer online buying behaviour.Results of the hypotheses testing show that:H1=Consumers buy more of fashion items online(X^(2)=9.950;df=16;p=0.869);H2=There is a significant relationship between trust and satisfaction and consumers online buying behaviour(X^(2)=270.765;df=16;p=0.000);and H3=Social,economic,and market factors significantly affect consumer online buying behaviour(X^(2)=106.328;df=16;p=0.000).The study recommends online marketers to develop their marketing strategies towards customer orientation and focus on the ease of use of their online shopping services. 展开更多
关键词 online shopping consumer buying behaviour online trust and satisfaction TECHNOLOGY Cameroon
下载PDF
HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites
6
作者 Daisuke Miyamoto Hiroaki Hazeyama Youki Kadobayashi 《Journal of Intelligent Learning Systems and Applications》 2010年第4期190-199,共10页
This paper presents HumanBoost, an approach that aims at improving the accuracy of detecting so-called phishing sites by utilizing users’ past trust decisions (PTDs). Web users are generally required to make trust de... This paper presents HumanBoost, an approach that aims at improving the accuracy of detecting so-called phishing sites by utilizing users’ past trust decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. We assume that a database of user PTDs would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. For our pilot study, in November 2007, we invited 10 participants and performed a subject experiment. The participants browsed 14 simulated phishing sites and six legitimate sites, and judged whether or not the site appeared to be a phishing site. We utilize participants’ trust decisions as a new heuristic and we let AdaBoost incorporate it into eight existing heuristics. The results show that the average error rate for HumanBoost was 13.4%, whereas for participants it was 19.0% and for AdaBoost 20.0%. We also conducted two follow-up studies in March 2010 and July 2010, observed that the average error rate for HumanBoost was below the others. We therefore conclude that PTDs are available as new heuristics, and HumanBoost has the potential to improve detection accuracy for Web user. 展开更多
关键词 PHISHING PERSONALIZATION ADABOOST trust DECISION
下载PDF
Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites
7
作者 Daisuke Miyamoto Hiroaki Hazeyama +1 位作者 Youki Kadobayashi Takeshi Takahashi 《Journal of Intelligent Learning Systems and Applications》 2012年第4期319-329,共11页
This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions... This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. Human-Boostassumed that a database of Web user’s PTD would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. Here, this paper explores the types of the users whose PTDs are useful by running a subject experiment, where 309 participants- browsed 40 websites, judged whether the site appeared to be a phishing site, and described the criterion while assessing the credibility of the site. Based on the result of the experiment, this paper classifies the participants into eight groups by clustering approach and evaluates the detection accuracy for each group. It then clarifies the types of the users who can make suitable trust decisions for HumanBoost. 展开更多
关键词 Detection of PHISHING Sites trust DECISION CREDIBILITY of WEBSITES Machine Learning Cluster ANALYSIS
下载PDF
The Intersection of Privacy by Design and Behavioral Economics: Nudging Users towards Privacy-Friendly Choices
8
作者 Vivek Kumar Agarwal 《Journal of Information Security》 2024年第4期557-563,共7页
This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can... This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can leverage “nudges” to encourage users towards privacy-friendly choices. We analyze the limitations of rational choice in the context of privacy decision-making and identify key opportunities for integrating behavioral economics into PbD. We propose a user-centered design framework for integrating behavioral economics into PbD, which includes strategies for simplifying complex choices, making privacy visible, providing feedback and control, and testing and iterating. Our analysis highlights the need for a more nuanced understanding of user behavior and decision-making in the context of privacy, and demonstrates the potential of behavioral economics to inform the design of more effective PbD solutions. 展开更多
关键词 Privacy by Design Behavioral Economics Nudges user-Centric Design Data Protection Cognitive Biases HEURISTICS
下载PDF
Enable Excel-Based Basic Cybersecurity Features for End Users by Using Python-Excel Integration
9
作者 Mohamed Breik Osama Magdy +2 位作者 Essam Amin Tarek Aly Mervat Gheith 《Journal of Software Engineering and Applications》 2024年第6期522-529,共8页
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int... In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden. 展开更多
关键词 Python End-user Approach EXCEL Excel Add-In CYBERSECURITY URL Check API Virustotal API Encryption Decryption Vigenère Cipher Python-Excel Integration
下载PDF
Survey of HIV Infection among Injection Drug Users in Guangdong, China 被引量:1
10
作者 林鹏 刘勇鹰 +5 位作者 王晔 付笑冰 许锐恒 万卓越 颜瑾 赵茜茜 《Chinese Journal of Sexually Transmitted Infections》 2005年第1期5-9,共5页
Objective: To understand the prevalence and behavioral risk factors of HIV infection among injection drug users in the Pearl River Delta Region (PRDR) of Guangdong province, and to provide evidence for establishing... Objective: To understand the prevalence and behavioral risk factors of HIV infection among injection drug users in the Pearl River Delta Region (PRDR) of Guangdong province, and to provide evidence for establishing effective intervention strategies. Methods: Face to face interviews were conducted and serum samples from injection drug users from detoxification centers and the community were collected for HIV screening. Results: 655 drug users were recruited and interviewed. The HIV seropositive rate was 29.0%. 99.5 % of subjects were injection drug users (IDUs), of whom,75.4% reported sharing injection equipment. Conclusion: HIV prevalence among injection drug users is high in the PRDR of Guangdong. Injection drug use is the principal behavioral risk factor for HIV transmission. Pragmatic harm reduction programs should be implemented to prevent the spread of HIV infection. 展开更多
关键词 HIV/AIDS risk behavior drug users
下载PDF
Study on Guidance of Users’Point of View to Construction of Urban Park in China——Inspiration by "Reflection on Urban Park:Public Space and Multi-culture"
11
作者 王璐艳 刘克成 《Journal of Landscape Research》 2010年第8期14-16,20,共4页
New idea studying urban parks was opened up by "Reflection on Urban Park:Public Space and Multi-culture". By introducing anthropology into planning and design methodology of urban public space, it provided a... New idea studying urban parks was opened up by "Reflection on Urban Park:Public Space and Multi-culture". By introducing anthropology into planning and design methodology of urban public space, it provided a new research method for the planning of urban park in our country. Through introduction and assessment of the book, existing problems and suggestions of the construction of our urban parks were proposed. In the perspective of urban parks' users, by the method of ethnology and anthropology, cultural diversity of urban public space would be investigated, paying attention to the usage behavior and different cultural characteristics, thinking about how to respect ecology and environmental construction of parks and coordinate the relation between culture and ecology while cultural diversity was respected. What should be considered in the construction of urban parks was not only culture but also ecological environment protection when culture was respected and citizens' interests during environment construction. These were also the fundamental problems needed to be considered and solved in parks' planning, construction and operation. 展开更多
关键词 Urban PARK users Planning Culture ECOLOGY
下载PDF
Proxy-Users系统收入分配的Stackelberg模型及解的存在性
12
作者 韩海山 斯琴 《内蒙古民族大学学报(自然科学版)》 2005年第2期121-124,共4页
用对策论的Stackelberg平衡理论研究了Proxy-Users系统中Proxy和Users之间分配收入问题.对Proxy和Users的地位不平等且Proxy不能按到达率提供服务的情况,建立了收入分配的Stackelberg策略模型,得到了一个双层规划模型,并证明了模型的解... 用对策论的Stackelberg平衡理论研究了Proxy-Users系统中Proxy和Users之间分配收入问题.对Proxy和Users的地位不平等且Proxy不能按到达率提供服务的情况,建立了收入分配的Stackelberg策略模型,得到了一个双层规划模型,并证明了模型的解的存在性. 展开更多
关键词 对策 Stackelberg策略 Proxy—users通信系统 双层规划 收入分配
下载PDF
Server-Proxy-Users系统收入分配的对策论模型及解的存在性
13
作者 韩海山 陈荣江 斯琴 《工程数学学报》 CSCD 北大核心 2005年第8期63-66,共4页
用对策论研究了Server-Proxies-Users系统中Server、Proxies和Users之间的收入分配问题,建立了收入分配的对策论模型,得到了三层规划模型。根据三层规划模型的特殊性,把它分解成两个双层规划模型,同时证明了模型的解的存在性。
关键词 对策论 Server-Proxies-users系统 三层规划 收入分配
下载PDF
Server-Agents-Users通信系统的Stackelberg模型
14
作者 韩海山 夏尊铨 《大连理工大学学报》 EI CAS CSCD 北大核心 2004年第3期334-336,共3页
在多媒体通信系统中引入代理服务器,使其成为Server-Agents-Users系统,并用对策论的Stackelberg理论研究该系统.针对Server、Agents和Users地位不平等的情况,建立了该系统的Stackelberg策略模型,得到一个三层规划模型.
关键词 Server-Agents-users通信系统 对策论 Slackelberg策略 三层规划模型 多媒体通信 代理服务器 服务质量
下载PDF
The Research on E-mail Users' Behavior of Participating in Subjects Based on Social Network Analysis 被引量:3
15
作者 ZHANG Lejun ZHOU Tongxin +2 位作者 Qi Zhixin GUO Lin XU Li 《China Communications》 SCIE CSCD 2016年第4期70-80,共11页
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in... The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition. 展开更多
关键词 E-MAIL NETWORK social NETWORK ANALYSIS user BEHAVIOR ANALYSIS KEYWORD selection
下载PDF
Improved Collaborative Filtering Recommendation Based on Classification and User Trust 被引量:3
16
作者 Xiao-Lin Xu Guang-Lin Xu 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期25-31,共7页
When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes ... When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes an improved algorithm based on classification and user trust.It firstly classifies all the ratings by the categories of items.And then,for each category,it evaluates the trustworthy degree of each user on the category and imposes the degree on the ratings of the user.Finally,the algorithm explores the similarities between users,finds the nearest neighbors,and makes recommendations within each category.Simulations show that the improved algorithm outperforms the traditional collaborative filtering algorithms and enhances the accuracy of recommendation. 展开更多
关键词 Collaborative filtering credibility of ratings evaluation on user trust item classification similarity metric
下载PDF
Prevalence of hepatitis C infection among intravenous drug users in Shanghai 被引量:3
17
作者 Yan-Lin Tao Yu-Fan Tang +4 位作者 Jian-Ping Qiu Xiao-Feng Cai Xiao-Ting Shen Ya-Xin Wang Xue-Tao Zhao 《World Journal of Gastroenterology》 SCIE CAS 2013年第32期5320-5325,共6页
AIM:To characterize the prevalence of hepatitis C virus(HCV)infection among Chinese intravenous drug users(IDUs).METHODS:A total of 432 adult IDUs(95 women and337 men)in Shanghai were included in the study.The third-g... AIM:To characterize the prevalence of hepatitis C virus(HCV)infection among Chinese intravenous drug users(IDUs).METHODS:A total of 432 adult IDUs(95 women and337 men)in Shanghai were included in the study.The third-generation Elecsys Anti-HCV assay(Roche Diagnostics GmbH,Sandhofer Strasse 116,D-68305,Mannheim,Germany)was used to screen for antibodies against HCV.The RIBA strip,a supplemental antiHCV test with high specificity,was performed on all of the samples that tested positive during the initial screening.All of the anti-HCV positive samples were analyzed with a Cobas TaqMan 48 Analyzer(Roche Diagnostics)for direct detection of HCV RNA.All of the HCV RNA-positive samples were sequenced for genotype determination.RESULTS:The preliminary screening identified 262(60.6%)subjects who were seropositive for HCV.Of the 62 females and 200 males seropositive subjects,16(16.7%)and 65(19.3%),respectively,were confirmed by RIBA,yielding an overall HCV seropositive rate of18.8%.Four female(6.5%)and 14 male(7.0%)subjects tested positive for HCV RNA,indicating an active infection rate of 4.2%for the entire study population.The 18 HCV RNA-positive serum samples were genotyped.Seven individuals were genotype 1b,and four were genotype 1a.One individual each was infected with genotypes 2a,2b and 3a.Four subjects were coinfected with multiple strains:two with genotypes 1a and 2a,and two with genotypes 1b and 2a.The active infection rate among HCV-seropositive individuals was22.2%,which was significantly lower than most estimates.CONCLUSION:The prevalence of HCV is relatively low among IDUs in Shanghai,with a spontaneous recovery rate much higher than previous estimates. 展开更多
关键词 HEPATITIS C Anti-hepatitis C VIRUS ANTIBODIES PREVALENCE of HEPATITIS C VIRUS Active infection rate INTRAVENOUS drug users
下载PDF
A Trusted Host’s Authentication Access and Control Model Faced on User Action 被引量:1
18
作者 ZHANG Miao XU Guoai HU Zhengming YANG Yixian 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1429-1432,共4页
The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on acc... The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization. 展开更多
关键词 trusted computing trusted network connection host control host authentication
下载PDF
USERS′ PERCEPTION OF KOWLOON PARK, HONG KONG:VISITING PATTERNS AND SCENIC ASPECTS 被引量:6
19
作者 WONG Koon-kwai Manfred DOMROES 《Chinese Geographical Science》 SCIE CSCD 2004年第3期269-275,共7页
Hong Kong is a hyper-dense city with 7x10(6) people living in an area of 1100km(2). One way to improve the livability of compacted and congested cities like Hong Kong is through the provision of urban parks, an aspect... Hong Kong is a hyper-dense city with 7x10(6) people living in an area of 1100km(2). One way to improve the livability of compacted and congested cities like Hong Kong is through the provision of urban parks, an aspect that has largely been under-researched. This study focuses on how users perceive and utilize various facilities in the Kowloon Park. The findings revealed that the Kowloon Park is one of the most preferred parks in Hong Kong for both local residents and tourists. Users were quite satisfied with the park's facilities. Notably, the most important component of an urban park is its greenery. This is followed by water elements, seating places, and facilities for various recreational activities. The improvements users would like to see in urban parks include good design and management, meeting users' needs, overcoming barriers to use, and providing a high quality and varied experience for different groups in the community. The findings of this study provide a good basis to address park management issues from the users' perspective. In particular, parks should provide easy access, encourage optimum usage and enable complimentary improvements to the environment. 展开更多
关键词 urban park visiting pattern user perception urban park management
下载PDF
Analysis of cumulative handoff delay for graded secondary users in cognitive radio networks
20
作者 Zhang Lei 张雷 +2 位作者 宋铁成 吴名 胡静 《Journal of Southeast University(English Edition)》 EI CAS 2013年第2期111-117,共7页
According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respecti... According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users. 展开更多
关键词 cognitive radio network graded secondary users multiple spectrum handoffs cumulative handoff delay admission access region
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部