Objectives:In the sphere of occupational intensity,nursing stands recognized for its inherently demanding nature,marked by a rapid succession of tasks.Our primary aim was to assess the level of job intensity within nu...Objectives:In the sphere of occupational intensity,nursing stands recognized for its inherently demanding nature,marked by a rapid succession of tasks.Our primary aim was to assess the level of job intensity within nursing by analyzing the frequency and duration of activities performed by nurses,instances of task overlap,and the distribution of break times within a primary healthcare center.Methods:This study was conducted using a descriptive working method.Nursing activities were recorded with the observation of six nurses,each monitored for 37.5 h.We used the Maribor System for measuring Quantity in Nursing Care in Primary Health Care Settings to measure the nursing care activities about direct patient care,indirect patient care,and other unproductive aspects through direct non-participant observations.Results:About 41.5%(n=1,640)of all nursing activities involving direct contact with patients,about 38.2%(n=1,508)was indirect patient care,where a large amount worked with paper files(n=666,16.9%).In addition,about 15.0%were other nursing activities(mostly computer work),and just 5.3%(n=210)of tasks were unproductive.The observational findings indicate a pronounced level of work intensity experienced by nurses in primary health clinics.Significantly,nurses were predominantly engaged in direct patient care tasks,often managing multiple activities simultaneously.Their transitions between tasks occurred approximately every 3 min,frequently without adequate intervals for breaks.Conclusions:This study highlights the need to shift nurses’focus from a task-centric approach to one centered on patient care.The prevailing emphasis on tasks may contribute to enduring fatigue and professional dissatisfaction.Consequently,there is an urgent need to redefine the scope of a nurse’s role and implement a comprehensive computer information system as an integral part of this redefined approach.展开更多
As an essential amino acid, lysine boosts protein synthesis (Nestor et al1997). Yao et al demonstrated that, lysine also exerts protective effect against the isch-emiclesion of brain. Meanwhile, vitamin C is a natural...As an essential amino acid, lysine boosts protein synthesis (Nestor et al1997). Yao et al demonstrated that, lysine also exerts protective effect against the isch-emiclesion of brain. Meanwhile, vitamin C is a natural antioxidant, which has undisputable protectiveaction against free radical damages. In order to ascertain whether their combination could affordbetter effect, we have investigated the prophylactic effect of the couplant ascorbate-lysine inliver injuries.展开更多
Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data an...Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.展开更多
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr...The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results.展开更多
Large oilfields are often coincidentally located in major river deltas and wetlands,and potentially damage the structure,function and ecosystem service values of wetlands during oil exploration.In the present study,th...Large oilfields are often coincidentally located in major river deltas and wetlands,and potentially damage the structure,function and ecosystem service values of wetlands during oil exploration.In the present study,the effects of crude oil contamination during oil exploration on soil physical and chemical properties were investigated in marshes of the Momoge National Nature Reserve in Jilin Province,China.The concentrations of total petroleum hydrocarbons in the marsh soil near the oil wells are significantly higher than those in the adjacent control marsh.Soil water contents in oil-contaminated marshes are negatively correlated with soil temperature and are significantly lower than those in the control area,especially in fall.Crude oil contamination significantly increases the soil pH up to8.0,and reduces available phosphorus concentrations in the soil.The concentrations of total organic carbon are significantly different among sampling sites.Therefore,crude oil contamination could potentially alkalinize marsh soils,adversely affect soil fertility and physical properties,and cause deterioration of the marshes in the Momoge National Nature Reserve.Phyto-remediation by planting Calamagrostis angustifolia has the potential to simultaneously restore and remediate the petroleum hydrocarbon-contaminated wetlands.Crude oil contamination affects the soil physical and chemical properties,so developing an effective restoration program in the Momoge wetland is neccesary.展开更多
Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular a...Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET.展开更多
Formulation of different ecological zone plans according to the corresponding protection targets and the necessity of proper conservation policy is one of the measures to achieve the goal of ecological conservation in...Formulation of different ecological zone plans according to the corresponding protection targets and the necessity of proper conservation policy is one of the measures to achieve the goal of ecological conservation in China.In order to clarify the interrelation among key ecological zone plans,this paper carried out the research on spatial relation of priority areas of biodiversity conservation and three key ecological areas(key ecological function areas,key regions of ecological service function,national nature reserves)and the research on ecological conditions,based on multi-scale ecological spatial theme information,which incorporates elements like ecological quality and type,and by the aid of spatial information analysis and GIS modeling.The results showed a contrastively fine spatial consistency with 68.8%of priority areas of biodiversity conservation overlapping with three key ecological areas.Although the environment in priority areas of biodiversity conservation were in good conditions,protection pressure is also increasing,powerful supervision and protection should not be ignored.The environmental conditions in the overlapping areas,as a whole,were superior to those in the non-overlapping areas.Since two areas have different characteristics,targeted protection measures should be formulated based on this difference,which will be very important for biodiversity conservation in priority areas of biodiversity conservation.展开更多
文摘Objectives:In the sphere of occupational intensity,nursing stands recognized for its inherently demanding nature,marked by a rapid succession of tasks.Our primary aim was to assess the level of job intensity within nursing by analyzing the frequency and duration of activities performed by nurses,instances of task overlap,and the distribution of break times within a primary healthcare center.Methods:This study was conducted using a descriptive working method.Nursing activities were recorded with the observation of six nurses,each monitored for 37.5 h.We used the Maribor System for measuring Quantity in Nursing Care in Primary Health Care Settings to measure the nursing care activities about direct patient care,indirect patient care,and other unproductive aspects through direct non-participant observations.Results:About 41.5%(n=1,640)of all nursing activities involving direct contact with patients,about 38.2%(n=1,508)was indirect patient care,where a large amount worked with paper files(n=666,16.9%).In addition,about 15.0%were other nursing activities(mostly computer work),and just 5.3%(n=210)of tasks were unproductive.The observational findings indicate a pronounced level of work intensity experienced by nurses in primary health clinics.Significantly,nurses were predominantly engaged in direct patient care tasks,often managing multiple activities simultaneously.Their transitions between tasks occurred approximately every 3 min,frequently without adequate intervals for breaks.Conclusions:This study highlights the need to shift nurses’focus from a task-centric approach to one centered on patient care.The prevailing emphasis on tasks may contribute to enduring fatigue and professional dissatisfaction.Consequently,there is an urgent need to redefine the scope of a nurse’s role and implement a comprehensive computer information system as an integral part of this redefined approach.
文摘As an essential amino acid, lysine boosts protein synthesis (Nestor et al1997). Yao et al demonstrated that, lysine also exerts protective effect against the isch-emiclesion of brain. Meanwhile, vitamin C is a natural antioxidant, which has undisputable protectiveaction against free radical damages. In order to ascertain whether their combination could affordbetter effect, we have investigated the prophylactic effect of the couplant ascorbate-lysine inliver injuries.
基金supported by HONG KONG RGC and HONG KONG PolyU under the Grant G-U752/PolyU5103/09Ethe National Natural Science Foundation of Chinaunder Grant No.61003040,No.61202354
文摘Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.
基金supported by the National Natural Science Foundation of China(Grant No.41371402)the National Basic Research Program of China("973"Program)(Grant No.2011CB302306)the Fundamental Research Funds for the Central University(Grant No.2015211020201 and No.211274230)
文摘The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results.
基金Under the auspices of National Natural Science Foundation of China(No.31170476)Chinese Academy of Sciences/State Administration of Foreign Experts Affairs International Partnership Program for Creative Research Teams(No.KZZD-EW-TZ-07)+1 种基金Major Program of Science and Technology of Jilin Province(No.20075014)Fundamental Research Funds for the Central Universities of China(No.11GJHZ002)
文摘Large oilfields are often coincidentally located in major river deltas and wetlands,and potentially damage the structure,function and ecosystem service values of wetlands during oil exploration.In the present study,the effects of crude oil contamination during oil exploration on soil physical and chemical properties were investigated in marshes of the Momoge National Nature Reserve in Jilin Province,China.The concentrations of total petroleum hydrocarbons in the marsh soil near the oil wells are significantly higher than those in the adjacent control marsh.Soil water contents in oil-contaminated marshes are negatively correlated with soil temperature and are significantly lower than those in the control area,especially in fall.Crude oil contamination significantly increases the soil pH up to8.0,and reduces available phosphorus concentrations in the soil.The concentrations of total organic carbon are significantly different among sampling sites.Therefore,crude oil contamination could potentially alkalinize marsh soils,adversely affect soil fertility and physical properties,and cause deterioration of the marshes in the Momoge National Nature Reserve.Phyto-remediation by planting Calamagrostis angustifolia has the potential to simultaneously restore and remediate the petroleum hydrocarbon-contaminated wetlands.Crude oil contamination affects the soil physical and chemical properties,so developing an effective restoration program in the Momoge wetland is neccesary.
基金the National Natural Science Foundation of China,by the Natural Science Foundation of Anhui Province,by the Specialized Research Fund for the Doctoral Program of Higher Education of China,the Fundamental Research Funds for the Central Universities
文摘Existing location privacy- preserving methods, without a trusted third party, cannot resist conspiracy attacks and active attacks. This paper proposes a novel solution for location based service (LBS) in vehicular ad hoc network (VANET). Firstly, the relationship among anonymity degree, expected company area and vehicle density is discussed. Then, a companion set F is set up by k neighbor vehicles. Based on secure multi-party computation, each vehicle in V can compute the centroid, not revealing its location to each other. The centroid as a cloaking location is sent to LBS provider (P) and P returns a point of interest (POI). Due to a distributed secret sharing structure, P cannot obtain the positions of non-complicity vehicles by colluding with multiple internal vehicles. To detect fake data from dishonest vehicles, zero knowledge proof is adopted. Comparing with other related methods, our solution can resist passive and active attacks from internal and external nodes. It provides strong privacy protection for LBS in VANET.
基金Under the auspices of Public Science and Technology Research Funds of Environment(No.201009021,2011467026,2012467044)National Key Technology R&D Program of China(No.2012BAH32B03)National Natural Science Foundation of China(No.41171318,41001160)
文摘Formulation of different ecological zone plans according to the corresponding protection targets and the necessity of proper conservation policy is one of the measures to achieve the goal of ecological conservation in China.In order to clarify the interrelation among key ecological zone plans,this paper carried out the research on spatial relation of priority areas of biodiversity conservation and three key ecological areas(key ecological function areas,key regions of ecological service function,national nature reserves)and the research on ecological conditions,based on multi-scale ecological spatial theme information,which incorporates elements like ecological quality and type,and by the aid of spatial information analysis and GIS modeling.The results showed a contrastively fine spatial consistency with 68.8%of priority areas of biodiversity conservation overlapping with three key ecological areas.Although the environment in priority areas of biodiversity conservation were in good conditions,protection pressure is also increasing,powerful supervision and protection should not be ignored.The environmental conditions in the overlapping areas,as a whole,were superior to those in the non-overlapping areas.Since two areas have different characteristics,targeted protection measures should be formulated based on this difference,which will be very important for biodiversity conservation in priority areas of biodiversity conservation.