期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
方以智的“不落有无”说
1
作者 张世亮 《阴山学刊》 2010年第4期102-104,121,共4页
方以智针对"有"、"无"这一对范畴提出了"不落有无"说。经过对"半提"与"全提"的批判,他在"允中氏之则天"、"子思之言‘中、和’"与"孟子之创为‘养气、践... 方以智针对"有"、"无"这一对范畴提出了"不落有无"说。经过对"半提"与"全提"的批判,他在"允中氏之则天"、"子思之言‘中、和’"与"孟子之创为‘养气、践形’之说"三个方面,详细阐释了"大全提"意义上的"不落有无",从而指出"大全提"才是"不落有无"的真正内涵。方以智"不落有无"说的提出最终导致了其学术取向上的"统合三教"主张。 展开更多
关键词 方以智 “不落有无” “半提” “全提” “大全提” “统合三教”
下载PDF
Definition, theory, methods, and applications of the safe and efficient simultaneous extraction of coal and gas 被引量:36
2
作者 Yuanping Cheng Liang Wang +3 位作者 Hongyong Liu Shengli Kong Jintuo Zhu Qingyi Tu 《International Journal of Coal Science & Technology》 EI 2015年第1期52-65,共14页
Simultaneous extraction of the coal and gas is an effective method of eliminating coal mine gas disasters while safely exploiting the coal and achieving efficient gas drainage in China, which is widely accepted by the... Simultaneous extraction of the coal and gas is an effective method of eliminating coal mine gas disasters while safely exploiting the coal and achieving efficient gas drainage in China, which is widely accepted by the main coal-producing countries around the world. However, the concrete definition of simultaneous extraction is vague and there is little accurate theoretical support for the simultaneous extraction of coal and gas, which makes it difficult to determine an efficient gas drainage method appropriate to the features of coal seams. Based on theoretical analysis, laboratory tests and field observations, a specific definition of simultaneous extraction of coal and gas is proposed after analyzing the characteristics of coal seam occurrences in China, and we developed the mechanism of mining-enhanced permeability and established the corresponding theoretical model. This comprises a process of fracture network formation, in which the original fractures are opened and new fractures are produced by unloading damage. According to the theoretical model, the engineering approaches and their quantitative parameters of 'unloading by borehole drilling' for single coal seams and 'unloading by protective seam mining' for groups of coal seams are proposed, and the construction principles for coal exploitation and gas-drainage systems for different conditions are given. These methods were applied successfully in the Tunlan Coal Mine in Shanxi Province and the Panyi Coal Mine in Anhui Province and could assure safe and efficient simultaneous extraction of coal and gas in these outburst coal mines. 展开更多
关键词 Coal seam gas Outburst coal seam Mining-enhanced permeability Simultaneous extraction of coal and gas
下载PDF
Systematic review of health-related quality of life after esophagectomy for esophageal cancer 被引量:15
3
作者 Marco Scarpa Stefano Valente +4 位作者 Rita Alfieri Matteo Cagol Giorgio Diamantis Ermanno Ancona Carlo Castoro 《World Journal of Gastroenterology》 SCIE CAS CSCD 2011年第42期4660-4674,共15页
This study is aimed to assess the long-term healthrelated quality of life (HRQL) of patients after esophagectomy for esophageal cancer in comparison with established norms, and to evaluate changes in HRQL during the... This study is aimed to assess the long-term healthrelated quality of life (HRQL) of patients after esophagectomy for esophageal cancer in comparison with established norms, and to evaluate changes in HRQL during the different stages of follow-up after esophageal resection. A systematic review was performed by searching medical databases (Medline, Embase and the Cochrane Library) for potentially relevant studies that appeared between January 1975 and March 2011. Studies were included if they addressed the question of HRQL after esophageal resection for esophageal cancer. Two researchers independently performed the study selection, data extraction and analysis processes. Twenty-one observational studies were included with a total of 1282 (12-355) patients. Five studies were performed with short form-36 (SF-36) and 16 with European Organization for Research and Treatment of Cancer (EORTC) QLQ c30 (14 of them also utilized the disease-specific OESI8 or its previous version OES24).The analysis of long-term generic HRQL with SF-36 showed pooled scores for physical, role and social function after esophagectomy similar to United States norms, but lower pooled scores for physical function, vitality and general health perception. The analysis of HRQL conducted using the Global EORTC C30 global scale during a 6-mo follow-up showed that global scale and physical function were better at the baseline. The symptom scales indicated worsened fatigue, dyspnea and diarrhea 6 mo after esophagectomy. In contrast, however, emotional function had significantly improved after 6 mo. In conclusion, short- and long-term HRQL is deeply affected after esophagectomy for cancer. The impairment of physical function may be a long-term consequence of esophagectomy involving either the respiratory system or the alimentary tract. The short- and long-term improvement in the emotional function of patients who have undergone successful operations may be attributed to the impression that they have survived a near-death experience. 展开更多
关键词 Health-related quality of life Esophageal cancer ESOPHAGECTOMY Short form 36 European Organization for Research and Treatment of Cancer QLQ c30 European Organization for Research and Treatment of Cancer OES18
下载PDF
Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat
4
作者 Robert Brumnik Sergii Kavun 《Computer Technology and Application》 2015年第1期45-56,共12页
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in... Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony. 展开更多
关键词 Intelligence and counterintelligence activities electronic spy devices detection methods netwar counterterrorism.
下载PDF
Thinking in three's: Changing surgical patient safety practices in the complex modern operating room 被引量:9
5
作者 Verna C Gibbs 《World Journal of Gastroenterology》 SCIE CAS CSCD 2012年第46期6712-6719,共8页
The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to stu... The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to study. The likelihood of occurrence and the magnitude of risk for each of these surgical safety events are undefined. Many providers may never have a personal experience with one of these events and training and education on these topics are sparse. These circumstances lead to faulty thinking that a provider won't ever have an event or if one does occur the provider will intuitively know what to do. Surgeons are not preoccupied with failure and tend to usually consider good outcomes, which leads them to ignore or diminish the importance of implementing and following simple safety practices. These circumstances contribute to the persistent low level occurrence of these three events and to the difficulty in generating sufficient interest to resource solutions. Individual facilities rarely have the time or talent to understand these events and develop lasting solutions. More often than not, even the most well meaning internal review results in a new line to a policy and some rigorous enforcement mandate. This approach routinely fails and is another reason why these problems are so persistent. Vigilance actions alone havebeen unsuccessful so hospitals now have to take a systematic approach to implementing safer processes and providing the resources for surgeons and other stake-holders to optimize the OR environment. This article discusses standardized processes of care for mitigation of injury or outright prevention of wrong site surgery, RSI and surgical fires in an action-oriented framework illustrating the strategic elements important in each event and focusing on the responsibilities for each of the three major OR agents-anesthesiologists, surgeons and nurses. A Surgical Patient Safety Checklist is discussed that incorporates the necessary elements to bring these team members together and influence the emergence of a safer OR. 展开更多
关键词 Complex adaptive systems Wrong site surgery Retained surgical items Retained foreign objects Retained foreign bodies Surgical patient safety Surgical fires Safety checklist
下载PDF
Chaotic system and QR factorization based robust digital image watermarking algorithm 被引量:9
6
作者 宋伟 侯建军 +1 位作者 李赵红 黄亮 《Journal of Central South University》 SCIE EI CAS 2011年第1期116-124,共9页
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si... In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented. 展开更多
关键词 digital watermarking QR factorization pseudorandom circular chain logistic mapping
下载PDF
An Efficient Method for Checking the Integrity of Data in the Cloud 被引量:2
7
作者 TAN Shuang TAN Lin +1 位作者 LI Xiaoling JIA Yan 《China Communications》 SCIE CSCD 2014年第9期68-81,共14页
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new ch... Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure. 展开更多
关键词 cloud computing storage security public auditability provable data integrity
下载PDF
Towards Efficient and Secure Access Control System for Mobile Cloud Computing 被引量:5
8
作者 TU Shanshan HUANG Yongfeng 《China Communications》 SCIE CSCD 2015年第12期43-52,共10页
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ... This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud. 展开更多
关键词 cloud execution constraints partition encryption Encryption satisfying assume posed visualization
下载PDF
Risk based security assessment of power system using generalized regression neural network with feature extraction 被引量:2
9
作者 M. Marsadek A. Mohamed 《Journal of Central South University》 SCIE EI CAS 2013年第2期466-479,共14页
A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural n... A comprehensive risk based security assessment which includes low voltage, line overload and voltage collapse was presented using a relatively new neural network technique called as the generalized regression neural network (GRNN) with incorporation of feature extraction method using principle component analysis. In the risk based security assessment formulation, the failure rate associated to weather condition of each line was used to compute the probability of line outage for a given weather condition and the extent of security violation was represented by a severity function. For low voltage and line overload, continuous severity function was considered due to its ability to zoom in into the effect of near violating contingency. New severity function for voltage collapse using the voltage collapse prediction index was proposed. To reduce the computational burden, a new contingency screening method was proposed using the risk factor so as to select the critical line outages. The risk based security assessment method using GRNN was implemented on a large scale 87-bus power system and the results show that the risk prediction results obtained using GRNN with the incorporation of principal component analysis give better performance in terms of accuracy. 展开更多
关键词 generalized regression neural network line overload low voltage principle component analysis risk index voltagecollapse
下载PDF
多模态影像融合在颅底肿瘤的诊断、治疗中的应用价值 被引量:9
10
作者 李成才 姚国杰 +6 位作者 杜威 胡亮平 韦可 伍杰 秦汉 王再贵 马廉亭 《中国临床神经外科杂志》 2018年第3期145-148,共4页
目的探讨多模态影像融合在颅底肿瘤的诊断、治疗中的应用价值。方法 9例颅底肿瘤术前均行DynaCTA检查及MRI薄层(2 mm)增强扫描检查,将多组影像数据输入工作站,采用"双容积重建"技术进行脑血管及MRI的影像融合,通过静态及动态... 目的探讨多模态影像融合在颅底肿瘤的诊断、治疗中的应用价值。方法 9例颅底肿瘤术前均行DynaCTA检查及MRI薄层(2 mm)增强扫描检查,将多组影像数据输入工作站,采用"双容积重建"技术进行脑血管及MRI的影像融合,通过静态及动态融合影像观察肿瘤与脑结构、血管及颅骨的毗邻关系,并对肿瘤的诊断、手术治疗及预防血管并发症进行分析。结果 9例均获得满意的影像融合、具有很好的空间一致性,在一张影像上可以清晰显示病变及其周围脑结构、血管及颅骨解剖关系,提高精准性诊断,并应用于指导治疗策略、设计手术划及预防并发症。9例均恢复满意出院。结论多模态影像融合对提高颅底肿瘤的诊断精准性、提高肿瘤全切除率、降低病死率和残疾率效果肯定,对血管损伤并发症治疗疗效肯定。 展开更多
关键词 颅底肿瘤 多模态影像融合 诊断 治疗 并发症
下载PDF
通信枢纽楼能耗运行分析研究 被引量:1
11
作者 樊春锋 伍建萍 《电信工程技术与标准化》 2016年第5期89-92,共4页
如何在业务量不断增加,电源容量无法扩容的情况下,更好地解决供电能力紧张、机房装机位不足、机房散热等问题,是本论文的研究意义所在。本文通过对S省通信枢纽楼能耗运行分析,给出以上难点的合理化建议和建设指导原则。
关键词 枢纽楼 变压器 能耗 红色预警 搬迁
下载PDF
基于无线传感器网络定位技术的图书馆智能管理创新 被引量:3
12
作者 罗桦 陈勇 +2 位作者 张清 赵滟 黄猛 《大学图书情报学刊》 2016年第2期50-52,57,共4页
"互联网+"时代,信息技术的发展对图书馆的智能化管理工作提出了更高的要求。文章概述了无线传感器网络与定位技术,重点讨论了如何将WSN定位技术运用到图书智能管理,通过定位技术与大数据、云计算等信息技术的结合,推动图书馆... "互联网+"时代,信息技术的发展对图书馆的智能化管理工作提出了更高的要求。文章概述了无线传感器网络与定位技术,重点讨论了如何将WSN定位技术运用到图书智能管理,通过定位技术与大数据、云计算等信息技术的结合,推动图书馆智能系统建设和智能化发展。 展开更多
关键词 图书馆 智能管理 无线传感器网络 定位技术 互联网+
下载PDF
Hepatic CT Image Query Based on Threshold-based Classification Scheme with Gabor Features
13
作者 蒋历军 罗永兴 +1 位作者 赵俊 庄天戈 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期753-758,共6页
Hepatic computed tomography(CT) images with Gabor function were analyzed.Then a threshold-based classification scheme was proposed using Gabor features and proceeded with the retrieval of the hepatic CT images.In our ... Hepatic computed tomography(CT) images with Gabor function were analyzed.Then a threshold-based classification scheme was proposed using Gabor features and proceeded with the retrieval of the hepatic CT images.In our experiments, a batch of hepatic CT images containing several types of CT findings was used and compared with the Zhao's image classification scheme, support vector machines(SVM) scheme and threshold-based scheme. 展开更多
关键词 content based image retrieval Gabor features threshold-based scheme support vector machines (SVM) hepatic computed tomography (CT) images
原文传递
Image quality assessment method based on nonlinear feature extraction in kernel space 被引量:2
14
作者 Yong DING Nan LI +1 位作者 Yang ZHAO Kai HUANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第10期1008-1017,共10页
To match human perception, extracting perceptual features effectively plays an important role in image quality assessment. In contrast to most existing methods that use linear transformations or models to represent im... To match human perception, extracting perceptual features effectively plays an important role in image quality assessment. In contrast to most existing methods that use linear transformations or models to represent images, we employ a complex mathematical expression of high dimensionality to reveal the statistical characteristics of the images. Furthermore, by introducing kernel methods to transform the linear problem into a nonlinear one, a full-reference image quality assessment method is proposed based on high-dimensional nonlinear feature extraction. Experiments on the LIVE, TID2008, and CSIQ databases demonstrate that nonlinear features offer competitive performance for image inherent quality representation and the proposed method achieves a promising performance that is consistent with human subjective evaluation. 展开更多
关键词 Image quality assessment Full-reference method Feature extraction Kernel space Support vector regression
原文传递
Research on pulse edge extraction by using nonlinear optical fiber-loop mirror
15
作者 彭拥军 邱昆 纪四潍 《Optoelectronics Letters》 EI 2012年第1期9-12,共4页
The output characteristics of nonlinear optical fiber-loop mirror are analyzed in detail when the pump pulses with the same wavelength are input in the both directions for recovering the clock component of the signal ... The output characteristics of nonlinear optical fiber-loop mirror are analyzed in detail when the pump pulses with the same wavelength are input in the both directions for recovering the clock component of the signal spectrum.It is found that the double output pulses are produced in the transmission port of the nonlinear optical fiber-loop mirror.The output pulse peaks are located in time domain at the rising and falling edges of the pump pulses.It is demonstrated that the rising and falling edges of the pump pulse can be directly extracted by this method.Through numerical simulation,the effects of therelative delay of pump pulses and the dispersion of fiber on the characteristics of output pulses are studied.By spectrum analysis,it is found that the spectrum of output pulse sequence includes the clock components of the pump pulse sequence,and a new idea is provided for all-optical clock extraction. 展开更多
关键词 Clocks Optical fibers Optical signal processing PUMPS Spectrum analysis Time domain analysis
原文传递
ESTIMATING MULTI-COUNTRY PROSPERITY INDEX: A TWO-DIMENSIONAL SINGULAR SPECTRUM ANALYSIS APPROACH 被引量:2
16
作者 ZHANG Jiawei HASSANI Hossein +1 位作者 XIE Haibin ZHANG Xun (Corresponding author) 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2014年第1期56-74,共19页
With the development of the global economy, interaction among different economic entities from one region is intensifying, which makes it significant to consider such interaction when constructing composite index for ... With the development of the global economy, interaction among different economic entities from one region is intensifying, which makes it significant to consider such interaction when constructing composite index for each country from one region. Recent advances in signal extraction and time series analysis have made such consideration feasible and practical. Singular spectrum analysis (SSA) is a well-developed technique for time series analysis and proven to be a powerful tool for signal extraction. The present study aims to introduce the usage of the SSA technique for multi-country business cycle analysis. The multivariate SSA (MSSA) is employed to construct a model-based composite index and the two dimensional SSA (2D-SSA) is employed to establish the multi-country composite index. Empirical results performed on Chinese economy demonstrate the accuracy and stability of MSSA-based composite index, and the 2D-SSA based composite indices for Asian countries confirm the efficiency of the technique in capturing the interaction among different countries. 展开更多
关键词 2D-SSA business cycle analysis multi-country composite index singular spectrum anal-ysis.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部