期刊文献+
共找到53篇文章
< 1 2 3 >
每页显示 20 50 100
张景岳论“和阵”以及“和解剂” 被引量:1
1
作者 朱元洁 汤川安 《中医研究》 2009年第10期1-2,共2页
关键词 张景岳 和阵 和解剂
下载PDF
论《景岳全书》“和略”与“和阵”在儿科的应用 被引量:6
2
作者 王晓鸣 《浙江中医杂志》 2018年第12期905-905,共1页
张景岳,名介宾,是浙派中医中温补学派主要代表人物。他精通内妇科,亦精研儿科,《景岳全书》是记录张景岳毕生学术成就的一部综合性著作。《景岳全书》中将方剂学部分列为“八略”和“八阵”。“八略”是八种基本治法,“八阵”即对应的... 张景岳,名介宾,是浙派中医中温补学派主要代表人物。他精通内妇科,亦精研儿科,《景岳全书》是记录张景岳毕生学术成就的一部综合性著作。《景岳全书》中将方剂学部分列为“八略”和“八阵”。“八略”是八种基本治法,“八阵”即对应的八类方剂。张景岳自己创造的方剂列入“新方八阵”,其中有不少仍是当今临床常用的名方。本文就“和略”和“和阵”在儿科中的运用谈谈自己的体会。 展开更多
关键词 景岳全书 和略 和阵 儿科
下载PDF
从《新方八阵·和阵》论张景岳调和之道 被引量:4
3
作者 席崇程 张杰 +1 位作者 高先阔 王彤 《北京中医药》 2017年第11期1015-1017,共3页
《新方八阵·和阵》充分体现张景岳调和之道,既是对张仲景和解法的继承发扬,又是其结合临床医案所总结出的宝贵经验,在寒热错杂、虚实夹杂性疾病的治疗中可起立竿见影之效,且和阵所列方剂药性平和,既能防止药过其处,损伤正气,又可... 《新方八阵·和阵》充分体现张景岳调和之道,既是对张仲景和解法的继承发扬,又是其结合临床医案所总结出的宝贵经验,在寒热错杂、虚实夹杂性疾病的治疗中可起立竿见影之效,且和阵所列方剂药性平和,既能防止药过其处,损伤正气,又可防止疾病反复。《新方八阵·和阵》体现了张景岳补而和之、温而和之、行而和之、凉而和之4个方面的用药特点与制方思路。 展开更多
关键词 调和法 新方八 和阵 张景岳
下载PDF
用正交对角拉丁方及幻矩与和阵构作mn阶标准二次幻方 被引量:1
4
作者 潘凤雏 《大学数学》 2011年第6期93-95,共3页
当m和n为同奇或同偶的正整数且m,n≠1,2,3,6时,用m和n阶正交对角拉丁方及{0,1,…,mn-1}上的m×n幻矩与和阵,构作了mn阶标准二次幻方.
关键词 正交对角拉丁方 幻矩 和阵 二次幻方
下载PDF
正形置换的枚举与计数 被引量:17
5
作者 任金萍 吕述望 《计算机研究与发展》 EI CSCD 北大核心 2006年第6期1071-1075,共5页
正形置换在密码算法的设计中占有很重要的地位·研究正形置换的特性、枚举、计数对于密码设计和密码分析均具有重要的意义·正形置换的理论研究已成为国内外密码学编码理论的热点问题·对正形置换的计数和枚举问题进行讨论... 正形置换在密码算法的设计中占有很重要的地位·研究正形置换的特性、枚举、计数对于密码设计和密码分析均具有重要的意义·正形置换的理论研究已成为国内外密码学编码理论的热点问题·对正形置换的计数和枚举问题进行讨论,利用和阵给出了正形置换的一个枚举方法,利用该方法可以列出所有的n阶正形置换·国内外相关文献中还未见到正形置换的枚举方法·由该枚举法得出了n阶正形置换个数Nn的上界和下界,这个结果比迄今为止给出的结果都要好,是目前给出的最优上下界· 展开更多
关键词 正形置换 和阵 枚举法 计数
下载PDF
运动员心律失常——期前收缩
6
作者 王大安 《山东体育科技》 1985年第4期44-46,共3页
心脏的期前收缩(主要是指房性期前收缩、室性期前收缩、交界性期前收缩和阵发性心动过逮)亦称早搏或早跳,在医学临床上属于心律失常的范围。早搏在运动员中的发生率较高。
关键词 期前收缩 心律不齐 文献报道 临床诊断 运动试验 和阵 疲劳过度 症状加剧 大运动量训练 药物治疗
下载PDF
在二尖瓣峡部进行线性消融的技术和结果
7
作者 J.s P. Hocini M. +1 位作者 Hsu L.-F. 杜媛 《世界核心医学期刊文摘(心脏病学分册)》 2005年第4期42-42,共1页
Background -This prospective clinical study evaluates the feasibility and eff icacy of combined linear mitral isthmus ablation and pulmonary vein(PV) isolatio n in patients with paroxysmal atrial fibrillation(AF). Met... Background -This prospective clinical study evaluates the feasibility and eff icacy of combined linear mitral isthmus ablation and pulmonary vein(PV) isolatio n in patients with paroxysmal atrial fibrillation(AF). Methods and Results -One hundred consecutive patients(13 women; age 55±10 years)-with drug-refractory , symptomatic paroxysmal AF underwent PV isolation and linear ablation of the ca votricuspid isthmus and the mitral isthmus(lateral mitral annulus to the left in ferior PV). They were compared with 100 consecutive patients(14 women; age, 52± 10 years) undergoing PV isolation and cavotricuspid ablation without mitral isth mus ablation. Bidirectional mitral isthmus block was confirmed by demonstrating( 1) a parallel corridor of double potentials during coronary sinus(CS) pacing,(2) an activation detour by pacing either side of the line, and(3) differential pac ing techniques. Isolation of all PVs and cavotricuspid isthmus ablation were per formed successfully in all. Mitral isthmus block was achieved in 92 patients aft er 20±10 minutes of endocardial radiofrequency application and an additional 5 ±4 minutes of epicardial radiofrequency application from within the CS in 68, r esulting in a conduction delay of 151±26 ms during CS pacing. Thirty-two patie nts with mitral isthmus ablation compared with 49 without had recurrent atrial a rrhythmia (P=0.02) requiring further ablation. At 1 year after the last procedur e, 87 patients with mitral isthmus ablation and 69 without(P=0.002) were arrhyth mia free without antiarrhythmic drugs, mitral isthmus ablation being the only fa ctor associated with long-term success(RR for AF recurrence, 0.2; CI, 0.1 to 0. 4; P< 0.001). Conclusions -Catheter ablation of the mitral isthmus results cons istently in demonstrable conduction block and is associated with a high cure rat e for paroxysmal AF. 展开更多
关键词 二尖瓣峡部 线性消融 起搏技术 发性房颤 抗心律失常药物 射频消融术 传导阻滞 分离术 冠状窦 和阵
下载PDF
IDENTIFICATION OF NONLINEAR TIME VARYING SYSTEM USING FEEDFORWARD NEURAL NETWORKS 被引量:2
8
作者 王正欧 赵长海 《Transactions of Tianjin University》 EI CAS 2000年第1期8-13,共6页
As it is well known,it is difficult to identify a nonlinear time varying system using traditional identification approaches,especially under unknown nonlinear function.Neural networks have recently emerged as a succes... As it is well known,it is difficult to identify a nonlinear time varying system using traditional identification approaches,especially under unknown nonlinear function.Neural networks have recently emerged as a successful tool in the area of identification and control of time invariant nonlinear systems.However,it is still difficult to apply them to complicated time varying system identification.In this paper we present a learning algorithm for identification of the nonlinear time varying system using feedforward neural networks.The main idea of this approach is that we regard the weights of the network as a state of a time varying system,then use a Kalman filter to estimate the state.Thus the network implements nonlinear and time varying mapping.We derived both the global and local learning algorithms.Simulation results demonstrate the effectiveness of this approach. 展开更多
关键词 IDENTIFICATION nonlinear time varying system feedforward neural network Kalman filter Q and R matrices
全文增补中
Progress in non-invasive detection of liver fibrosis 被引量:43
9
作者 Chengxi Li Rentao Li Wei Zhang 《Cancer Biology & Medicine》 SCIE CAS CSCD 2018年第2期124-136,共13页
Liver fibrosis is an important pathological precondition for hepatocellular carcinoma.The degree of hepatic fibrosis is positively correlated with liver cancer.Liver fibrosis is a series of pathological and physiologi... Liver fibrosis is an important pathological precondition for hepatocellular carcinoma.The degree of hepatic fibrosis is positively correlated with liver cancer.Liver fibrosis is a series of pathological and physiological process related to liver cell necrosis and degeneration after chronic liver injury,which finally leads to extracellular matrix and collagen deposition.The early detection and precise staging of fibrosis and cirrhosis are very important for early diagnosis and timely initiation of appropriate therapeutic regimens.The risk of severe liver fibrosis finally progressing to liver carcinoma is&gt;50%.It is known that biopsy is the gold standard for the diagnosis and staging of liver fibrosis.However,this method has some limitations,such as the potential for pain,sampling variability,and low patient acceptance.Furthermore,the necessity of obtaining a tissue diagnosis of liver fibrosis still remains controversial.An increasing number of reliable non-invasive approaches are now available that are widely applied in clinical practice,mostly in cases of viral hepatitis,resulting in a significantly decreased need for liver biopsy.In fact,the noninvasive detection and evaluation of liver cirrhosis now has good accuracy due to current serum markers,ultrasound imaging,and magnetic resonance imaging quantification techniques.A prominent advantage of the non-invasive detection and assessment of liver fibrosis is that liver fibrosis can be monitored repeatedly and easily in the same patient.Serum biomarkers have the advantages of high applicability(〉95%)and good reproducibility.However,their results can be influenced by different patient conditions because none of these markers are liver-specific.The most promising techniques appear to be transient elastography and magnetic resonance elastography because they provide reliable results for the detection of fibrosis in the advanced stages,and future developments promise to increase the reliability and accuracy of the staging of hepatic fibrosis.This article aims to describe the recent progress in the development of non-invasive assessment methods for the staging of liver fibrosis,with a special emphasize on computer-aided quantitative and deep learning methods. 展开更多
关键词 Liver fibrosis non-invasive detection computer-aided quantitative deep learning
下载PDF
A 9×9 Matrix Representation of Birman-Wenzl-Murakami Algebra and Berry Phase in Yang-Baxter System 被引量:2
10
作者 苟立丹 薛康 王刚成 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第2期263-267,共5页
We present a 9×9 S-matrix and E-matrix.A representation of specialized Birman-Wenzl-Murakami algebra is obtained.Starting from the given braid group representation S-matrix,we obtain the trigonometric solution of... We present a 9×9 S-matrix and E-matrix.A representation of specialized Birman-Wenzl-Murakami algebra is obtained.Starting from the given braid group representation S-matrix,we obtain the trigonometric solution of Yang-Baxter equation.A unitary matrix R(x,φ1,φ2)is generated via the Yang-Baxterization approach.Then we construct a Yang-Baxter Hamiltonian through the unitary matrix R(x,φ1,φ2).Berry phase of this Yang-Baxter system is investigated in detail. 展开更多
关键词 Birman-Wenzl-Murakami algebra Yang Baxter equation Berry phase
下载PDF
RFD-Rao and RFD-Wald tests for distributed targets with range walking effect 被引量:1
11
作者 WANG Yu CAO Yun-he +1 位作者 SU Hong-tao WANG Sheng-hua 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第6期1437-1446,共10页
Two novel adaptive distributed target detectors, the range frequency domain-Rao (RFD-Rao) and range frequency domain-Wald (RFD-Wald) tests are proposed in this work. The application methods for these tests conside... Two novel adaptive distributed target detectors, the range frequency domain-Rao (RFD-Rao) and range frequency domain-Wald (RFD-Wald) tests are proposed in this work. The application methods for these tests consider a partially homogeneous disturbance environment and a target range walking effect in a coherent processing interval (CPI). The asymptotic performance of the detectors is analyzed, and the constant false alarm rate (CFAR) properties with respect to the clutter covariance matrix and power level are shown. The performances of the proposed adaptive detectors are assessed through Monte-Carlo simulations, and the results are presented to demonstrate the effectiveness of the proposed detection algorithms compared to those of similar existing detectors. 展开更多
关键词 adaptive detection distributed target Rao test Wald test range walking
下载PDF
ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX 被引量:3
12
作者 Wang Shaohui Liu Sujuan 《Journal of Electronics(China)》 2013年第1期33-39,共7页
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In... Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack. 展开更多
关键词 Radio Frequency IDentification (RFID) Mutual authentication Matrix-based Imper-sonation attack PRIVACY SCALABILITY
下载PDF
2-Competition Index of Primitive Digraphs Using Graph Theory 被引量:3
13
作者 方炜 高玉斌 李忠善 《Journal of Donghua University(English Edition)》 EI CAS 2014年第3期320-324,共5页
Recently,scrambling index and competition index are widely applied to stochastic matrices and food webs. By analyzing the relationship of scrambling index and 2-competition index,n-「d/2」+ 1 was proved to be an upper... Recently,scrambling index and competition index are widely applied to stochastic matrices and food webs. By analyzing the relationship of scrambling index and 2-competition index,n-「d/2」+ 1 was proved to be an upper bound of the 2-competition2 index of a primitive digraph with exact d loops in this article.Moreover,the maximum index problem and the index set problem for the 2-competition index of primitive digraphs with minimally strong digraphs were settled. 展开更多
关键词 2-competition index primitive digraphs minimally strong digraphs
下载PDF
A Robust Collaborative Recommendation Algorithm Based on k-distance and Tukey M-estimator 被引量:6
14
作者 YI Huawei ZHANG Fuzhi LAN Jie 《China Communications》 SCIE CSCD 2014年第9期112-123,共12页
The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distanc... The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey M-estimator.Firstly,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor model.The influence of attack profiles on the recommendation results is reduced through adjusting similarities among users.Then,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature matrix.Finally,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization model.Experimental results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness. 展开更多
关键词 shilling attacks robust collaborative recommendation matrix factori-zation k-distance Tukey M-estimator
下载PDF
Discussions on the Relation between Rank and the Number of Non-zero Eigenvalue of Matrix
15
作者 Xiquan WANG Guanghua WU 《International Journal of Technology Management》 2015年第5期85-86,共2页
This paper gives the rank of matrix and equalities and inequalities of the difference number of non-zero eigenvalue, and discuss the equivalent description of multi angle of equalities for upper and lower bounds of th... This paper gives the rank of matrix and equalities and inequalities of the difference number of non-zero eigenvalue, and discuss the equivalent description of multi angle of equalities for upper and lower bounds of the inequality. 展开更多
关键词 Rank of a matrix Non-zero eigenvalue Matrix index
下载PDF
Graph publishing method based on differential privacy protection
16
作者 Wang Junli Yang Li +1 位作者 Wu Yuxi Guan Min 《High Technology Letters》 EI CAS 2018年第2期134-141,共8页
There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection... There are growing concerns surrounding the data security of social networks because large amount of user information and sensitive data are collected. Differential privacy is an effective method for privacy protection that can provide rigorous and quantitative protection. Concerning the application of differential privacy in social networks,this paper analyzes current trends of research and provides some background information including privacy protection standards and noise mechanisms.Focusing on the privacy protection of social network data publishing,a graph-publishing model is designed to provide differential privacy in social networks via three steps: Firstly,according to the features of social network where two nodes that possess certain common properties are associated with a higher probability,a raw graph is divided into several disconnected sub-graphs,and correspondingly dense adjacent matrixes and the number of bridges are obtained. Secondly,taking the advantage of quad-trees,dense region exploration of the adjacent matrixes is conducted. Finally,using an exponential mechanism and leaf nodes of quad-trees,an adjacent matrix of the sanitized graph is reconstructed. In addition,a set of experiments is conducted to evaluate its feasibility,availability and strengths using three analysis techniques: degree distribution,shortest path,and clustering coefficients. 展开更多
关键词 differential privacy social network data publication
下载PDF
Eggshell as a Source of Novel Bioactive Molecules
17
作者 Megan Rose-Martel Maxwell Hincke 《Journal of Food Science and Engineering》 2013年第5期219-225,共7页
This review will focus on the more abundant eggshell specific matrix proteins localized in the chicken eggshell (cuticle layer eggshell matrix and shell membranes) that are involved in eggshell mineralization and pr... This review will focus on the more abundant eggshell specific matrix proteins localized in the chicken eggshell (cuticle layer eggshell matrix and shell membranes) that are involved in eggshell mineralization and protecting the egg against microbial contamination, including ovocalyxin-36, ovocleidin-17, ovocalyxin-32 and ovocalyxin-25. Further understanding of these proteins and their mechanisms in egg defence could lead to the development of novel neutraceuticals for human health, additives to animal feed for healthy flocks, or enhanced eggs for human consumption. 展开更多
关键词 Ovocalyxin Ovocleidin ANTIMICROBIAL protease inhibitor cuticle EGGSHELL shell membranes REVIEW
下载PDF
Solving the Sequence Problems by Constructing Matrices and Determinants
18
作者 Liu Xiaobo 《International English Education Research》 2015年第11期76-78,共3页
Higher mathematics is more extensive, profound and abstract than elementary mathematics; it is the development and sublimation of elementary mathematics. They have a deep connection, determinant and matrix theories or... Higher mathematics is more extensive, profound and abstract than elementary mathematics; it is the development and sublimation of elementary mathematics. They have a deep connection, determinant and matrix theories originated in Elementary Mathematics, in tum, they also can be used as tools to solve related problems, and they have important roles in guiding the study of elementary mathematics. This paper will introduce the methods of solving some recursive sequence problems by constructing determinants and matrices. 展开更多
关键词 DETERMINANT MATRIX sequence.
下载PDF
Research on the Eigenvalues of Graphs and Mixed Graphs
19
作者 Zhihui Ma Huimin Jiang 《International Journal of Technology Management》 2015年第1期109-110,共2页
This paper first elaborates the research situation and progress of Laplace characteristics and the eigenvalues value of graphs. The second is given an upper bound of characteristic value of a kind of special graph usi... This paper first elaborates the research situation and progress of Laplace characteristics and the eigenvalues value of graphs. The second is given an upper bound of characteristic value of a kind of special graph using the properties of similar matrices. At the same time, a new upper bound of Laplace characteristic values are given using properties of Laplace matrix and the similarity matrix, to improve the existing results. Then, we use the example of the upper bound of our results are more precise than some previous results. Finally the use Laplace non- zero eigenvalues of graph properties to give a bound expressions using the degree of square with a number of edges and the graph of the number, number of connected component expression map, it reflected the relationship between eigenvalues and the amount of Laplace. 展开更多
关键词 GRAPH EIGENVALUE Nonsingular unicyclic mixed graph
下载PDF
Principal Features of Building Social Accounts Matrix and Improving Statistical Database for Eco-countries
20
作者 Vilayat Valiyev, Malik Mehdiyev +4 位作者 Arzu Suleymanov Elnur Alakbarov Rauf Musayev Elvira Nagoibaeva Natalya Zakharova 《Chinese Business Review》 2014年第10期611-623,共13页
With common borders of the population, total area, and GDP (PPP-based) of Economic Cooperation Organization (ECO) member states are estimated as 416 million persons, 7.9 million m2, and US$2.7 trillion respective... With common borders of the population, total area, and GDP (PPP-based) of Economic Cooperation Organization (ECO) member states are estimated as 416 million persons, 7.9 million m2, and US$2.7 trillion respectively (2010 data). Although heterogeneous in the extent, there is economic development, overall, with serious energy and transport-transit relations among countries that is reflected in growing trade turnover year-by-year. However, there are still rather unused resources and capacity in such areas of cooperation among countries as exchange of energy, transport services, agricultural and industrial goods, use of opportunities for tourism, promoting investment and innovation processes and other areas. Certainly, maximum and optimal use of these resources calls for availability of analytical means capable of accounting for relations both within member states and among them. The implementation of computable general equilibrium (CGE) modeling in each member state would thus be of great significance in resolution of these problems both in terms of accounting for input-output linkages within the countries as well as enabling impact of main trading partners and goods and services among countries. The analysis carried out indicates that there are a number of problems in application of CGE model in most of the member states. As such, input-output tables are not compiled in some countries, while in others despite the fact that these tables are compiled, there are no attempts to build the model, yet in other countries, even if the CGE model is implemented, there are difficulties in taking into account the real results in the face of serious problems related to improving national accounts system database. Summarizing these problems, it is possible to conclude that to ensure the application of a CGE model,there is a great need to work out procedures of compilation of a social accounts matrix (SAM) that lies on the basis of this model, for which the relevant statistics of a member state must be improved. Considering the above-mentioned, the presented research, makes procedures and proposals on compilation of SAM, improves statistical data for researching the extent of application of CGE Model in ECO member states, and identifies the degree of availability and organization of relevant data to develop input-output tables and respective SAM. 展开更多
关键词 social accounts matrix (SAM) system of national accounts (SNA) input-output table CGE model ECO countries
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部