期刊文献+
共找到179篇文章
< 1 2 9 >
每页显示 20 50 100
安全术野技术的历史沿革及发展现状
1
作者 何旭昶 安文慧 +1 位作者 陈洋伟 罗恩 《肝胆胰外科杂志》 CAS 2023年第10期638-640,F0003,共4页
安全术野技术(CVS)由Strasberg于1995年首先提出,现逐渐成为国际上公认的预防医源性胆管损伤(IBDI)的重要技术,经由长期的实践发展,现已成为一种高效安全的手术理念,并逐渐被国际主流观念所认可。目前国内相关研究较少,缺乏详细论述该... 安全术野技术(CVS)由Strasberg于1995年首先提出,现逐渐成为国际上公认的预防医源性胆管损伤(IBDI)的重要技术,经由长期的实践发展,现已成为一种高效安全的手术理念,并逐渐被国际主流观念所认可。目前国内相关研究较少,缺乏详细论述该技术发生发展过程的文献。本文通过对安全术野技术进行综述,对技术发展沿革、应用现状进行详细阐述,为国内胆道外科研究者们提供新的研究思路。 展开更多
关键词 安全术野技术 腹腔镜胆囊切除术 胆管损伤 历史沿革 发展现状
下载PDF
严重脊髓型颈椎病手术减压的安全术式分析
2
作者 张学龙 《中国继续医学教育》 2017年第20期83-84,共2页
目的探讨严重脊髓型颈椎病手术减压的安全术式。方法选取2008年9月—2015年9月来我院治疗严重脊髓型颈椎病的患者36例,并按照随机原则将患者分为实验组与对照组。对照组患者行颈前路手术,实验组患者行后前路联合手术。所有患者均得到1... 目的探讨严重脊髓型颈椎病手术减压的安全术式。方法选取2008年9月—2015年9月来我院治疗严重脊髓型颈椎病的患者36例,并按照随机原则将患者分为实验组与对照组。对照组患者行颈前路手术,实验组患者行后前路联合手术。所有患者均得到1年随访,对两组JOA评分改善率进行比较分析。结果两组患者在术后3 d内,JOA评分差异无统计学意义,但随访1年发现实验组患者JOA评分改善著高于对照组患者,P<0.05,差异有统计学意义。结论后路固定治疗患者,神经功能改善率较高,且手术安全性较高,是治疗的首选方式。 展开更多
关键词 严重脊髓型颈椎病 手术减压 安全术
下载PDF
Research Advance on Absorption Law of Cadmium by Rice and Safety Control Technology of Cadmium in Rice Grain 被引量:6
3
作者 陈群芳 叶瑶瑶 +3 位作者 徐青 范克关 王飞娟 朱诚 《Agricultural Science & Technology》 CAS 2014年第10期1801-1804,共4页
Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety contr... Heavy metal pol ution, especial y cadmium pol ution, has threatened the safety production of rice. The research advance on law of absorption, distribution and accumulation of cadmium in rice and on recent safety control technology of cadmium in rice grain was summarized in this paper. We hoped to lay a foundation for the safety production of rice. 展开更多
关键词 RICE CADMIUM Low accumulation Safety control technology
下载PDF
Efficacy and Safety of a Continuous Wound Catheter in Open Abdominal Partial Hepatectomy
4
作者 车璐 卢欣 裴丽坚 《Chinese Medical Sciences Journal》 CAS CSCD 2017年第3期171-176,共6页
Objective To investigate the efficacy and safety of continuous local anesthetic wound infiltration following open abdominal partial hepatectomy. Methods We performed a prospective, non-randomized, concurrent and con... Objective To investigate the efficacy and safety of continuous local anesthetic wound infiltration following open abdominal partial hepatectomy. Methods We performed a prospective, non-randomized, concurrent and controlled study. Patients undergoing open abdominal partial hepatectomy, according to their willingness, accepted one of the following managements for the postoperative pain: continuous wound catheter (CWC) infiltration, patient-controlled epidural analgesia (PCEA), patient-controlled intravenous analgesia of morphine (PCIAM), and patient-controlled intravenous analgesia of sufentanil (PCIAS). The primary outcome was postoperative visual analogue scale (VAS) scores at rest and on movement. Secondary outcomes included consumption of rescue medication, side effects, and complications associated with postoperative pain management. Results From August 2013 to December 2013, 80 patients were allocated to receive CWC (n=10), PCEA (n=22), PCIAM (n=29), or PCIAS (n=19). After adjusting for age, sex, body mass index, percentage of resected liver, operation time, and Amsterdam Preoperative Anxiety and Information Scale, there was no significant difference in the VAS scores at rest or on movement between Group CWC and the other groups, namely PCEA, PCIAM, and PCIAS, at 4, 12, 48, and 72 hours postoperatively (all P〉0.05). The need for rescue medication was not significantly different between Group CWC and the other three groups at 48 and 72 hours postoperatively (all P〉0.05). There was no significant difference in the incidence of postoperative nausea and vomiting or anal exsufflation time between group CWC and the other three groups (all P〉0.05). No severe adverse effects associated with continuous wound infiltration were observed during the study period. Conclusions CWC has a comparable analgesic effect compared with traditional analgesia methods at most time points postoperatively. CWC is a safe alternative for the postoperative analgesic management of open liver surgery. 展开更多
关键词 continuous wound catheter postoperative pain partial hepatectomy
下载PDF
Advances in Plant Science and Its Prospects
5
作者 许智宏 《Agricultural Science & Technology》 CAS 2011年第1期1-7,10,共8页
Focusing on the global food security and analyzing the challenges now confronting human being of global climate change,sustainable development of agriculture,energy and environment,plant scientists should take the soc... Focusing on the global food security and analyzing the challenges now confronting human being of global climate change,sustainable development of agriculture,energy and environment,plant scientists should take the social responsibility and play the role in solving the global problems like food security from the developmental status and potential of plant science and technology. Moreover,by working with agronomists, ecologists and environmental experts,plant scientists do provide novel ideas and technologies for developing low carbon agriculture,for breeding new crop varieties with high yield and quality and stress resistance,for developing new type of energy plants,for supplying healthy foods and drugs,reasonably using land and water resources,and for ameliorating environment,making better contribution to the sustainable development of the globe and human being ourselves. 展开更多
关键词 Plant science Food security BIOTECHNOLOGY TRANSGENE Medicinal plant Energy plant
下载PDF
Efficiency assessment of coal mine safety input by data envelopment analysis 被引量:22
6
作者 TONG Lei DING Ri-jia 《Journal of China University of Mining and Technology》 EI 2008年第1期88-92,共5页
In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal m... In recent years improper allocation of safety input has prevailed in coal mines in China, which resulted in the frequent accidents in coal mining operation. A comprehensive assessment of the input efficiency of coal mine safety should lead to improved efficiency in the use of funds and management resources. This helps government and enterprise managers better understand how safety inputs are used and to optimize allocation of resources. Study on coal mine's efficiency assessment of safety input was con- ducted in this paper. A C^2R model with non-Archimedean infinitesimal vector based on output is established after consideration of the input characteristics and the model properties. An assessment of an operating mine was done using a specific set of input and output criteria. It is found that the safety input was efficient in 2002 and 2005 and was weakly efficient in 2003. However, the efficiency was relatively low in both 2001 and 2004. The safety input resources can be optimized and adjusted by means of projection theory. Such analysis shows that, on average in 2001 and 2004, 45% of the expended funds could have been saved. Likewise, 10% of the safety management and technical staff could have been eliminated and working hours devoted to safety could have been reduced by 12%. These conditions could have Riven the same results. 展开更多
关键词 safety input coal mining enterprise efficiency assessment data envelopment analysis (DEA)
下载PDF
Performance of beacon safety message dissemination in Vehicular Ad hoc NETworks (VANETs) 被引量:4
7
作者 YOUSEFI Saleh FATHY Mahmood BENSLIMANE Abderrahim 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第12期1990-2004,共15页
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio... Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications. 展开更多
关键词 Safety applications Inter-vehicle communications Vehicular Ad hoc NETworks (VANETs) Application level QoS Effective range
下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
8
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security Trusted Computing Direct Anonymous Attestation Trusted Domain.
下载PDF
Contrastive Analysis of Software Networks Based on Different Coupling Relationships 被引量:3
9
作者 XU Guoai GAO Yang +2 位作者 QI Yana PENG Junhao TANG Xianjing 《China Communications》 SCIE CSCD 2010年第4期76-82,共7页
Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analy... Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively. 展开更多
关键词 Software System Software Networks Coupling Relationship Degree Distribution
下载PDF
Design and R&D Progress of China Lead-Based Reactor for ADS Research Facility 被引量:29
10
作者 Yican Wu 《Engineering》 SCIE EI 2016年第1期124-131,共8页
In 2011,the Chinese Academy of Sciences launched an engineering project to develop an acceleratordriven subcritical system(ADS)for nuclear waste transmutation.The China Lead-based Reactor(CLEAR),proposed by the Instit... In 2011,the Chinese Academy of Sciences launched an engineering project to develop an acceleratordriven subcritical system(ADS)for nuclear waste transmutation.The China Lead-based Reactor(CLEAR),proposed by the Institute of Nuclear Energy Safety Technology,was selected as the reference reactor for ADS development,as well as for the technology development of the Generation IV lead-cooled fast reactor.The conceptual design of CLEAR-I with 10 MW thermal power has been completed.KYLIN series lead-bismuth eutectic experimental loops have been constructed to investigate the technologies of the coolant,key components,structural materials,fuel assembly,operation,and control.In order to validate and test the key components and integrated operating technology of the lead-based reactor,the lead alloy-cooled non-nuclear reactor CLEAR-S,the lead-based zero-power nuclear reactor CLEAR-0,and the lead-based virtual reactor CLEAR-V are under realization. 展开更多
关键词 Accelerator-driven subcritical system (ADS) China Lead-based Reactor (CLEAR) Lead-bismuth eutectic (LBE)Technology R&D
下载PDF
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
11
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 secret sharing verifiable secret redistribution proactive secret sharing
下载PDF
Assessing performance of collision mitigation brake system in Chinese traffic environment 被引量:5
12
作者 ZHAO Zhi-guo ZHENG Xun-jia +2 位作者 WANG Jian-qiang XU Qing KODAKA Kenji 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第10期2854-2869,共16页
Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to bette... Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to better evaluate the performance of the CMBS in the Chinese traffic environment.First,because safety-critical situations can be diverse especially in the Chinese environment,the Chinese traffic-accident characteristics are analyzed according to accident statistics over the past 17 years.Next,10 Chinese traffic-accident scenarios accounting for more than 80%of traffic accidents are selected.For each typical scenario,353 representative cases are collected from the traffic-management department of Beijing.These real-world accident cases are then reconstructed by the traffic-accident-reconstruction software PC-Crash on the basis of accident-scene diagrams.This study also proposes a systematic analytical process for estimating the effectiveness of the technology using the co-simulation platform of PC-Crash and rateEFFECT,in which 176 simulations are analyzed in detail to assess the accident-avoidance performance of the CMBS.The overall collision-avoidance effectiveness reaches 82.4%,showing that the proposed approach is efficient for avoiding collisions,thereby enhancing traffic safety and improving traffic management. 展开更多
关键词 active-safety technology effectiveness assessment accident reconstruction autonomous emergency braking PC-CRASH
下载PDF
Improved Feistel-based ciphers for wireless sensor network security 被引量:3
13
作者 Tamara PAZYNYUK George S. OREKU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1111-1117,共7页
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor... Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on. 展开更多
关键词 SECURITY CIPHER Wireless sensor network (WSN) Feistel scheme
下载PDF
Modified Blumgart anastomosis without pancreatic duct-to-jejunum mucosa anastomosis for pancreatoduodenectomy:a feasible and safe novel technique 被引量:8
14
作者 Xiaoqing Wang Yang Bai +4 位作者 Mangmang Cui Qingxiang Zhang Wei Zhang Feng Fang Tianqiang Song 《Cancer Biology & Medicine》 SCIE CAS CSCD 2018年第1期79-87,共9页
Objective:This study proposed a modified Blumgart anastomosis(m-BA)that uses a firm ligation of the main pancreatic duct with a supporting tube to replace the pancreatic duct-to-jejunum mucosa anastomosis,with the ... Objective:This study proposed a modified Blumgart anastomosis(m-BA)that uses a firm ligation of the main pancreatic duct with a supporting tube to replace the pancreatic duct-to-jejunum mucosa anastomosis,with the aim of simplifying the complicated steps of the conventional BA(c-BA).Thus,we observe if a difference in the risk of postoperative pancreatic fistula(POPF)exists between the two methods.Methods:The m-BA anastomosis method has been used since 2010.From October 2011 to October 2015,147 patients who underwent pancreatoduodenectomy(PD)using BA in Tianjin Medical University Cancer Institute and Hospital were enrolled in this study.According to the type of pancreatojejunostomy(PJ),50 patients underwent m-BA and 97 received c-BA.The two patient cohorts were compared prospectively to some extent but not randomized,and the evaluated variables were operation time,the incidence rate of POPF,and other perioperative complications.Results:The operation time showed no significant difference(P〉0.05)between the two groups,but the time of duct-to-mucosa anastomosis in the m-BA group was much shorter than that in the c-BA group(P〈0.001).The incidence rate of clinically relevant POPF was 12.0%(6/50)in the modified group and 10.3%(10/97)in the conventional group(P〉0.05),which means that the modified anastomosis method did not cause additional pancreatic leakage.The mean length of postoperative hospital stay of the m-BA group was 23 days,and that of the c-BA group was 22 days(P〉0.05).Conclusions:Compared with the conventional BA,we suggest that the modified BA is a feasible,safe,and effective operation method for P J of PD with no sacrifice of surgical quality.In the multivariate analysis,we also found that body mass index(≥25 展开更多
关键词 Pancreatoduodenectomy pancreatojejunostomy modified Blumgart anastomosis postoperative complications postoperative pancreatic fistula
下载PDF
Vertical transportation system of solid material for backfilling coal mining technology 被引量:8
15
作者 Ju Feng Zhang Jixiong,Zhang Qiang 《International Journal of Mining Science and Technology》 2012年第1期41-45,共5页
For transportation of solid backfill material such as waste and fly ash from the surface to the bottom of the shaft in a fully mechanized backfilling coal backfilling coal mining technology, we developed a new vertica... For transportation of solid backfill material such as waste and fly ash from the surface to the bottom of the shaft in a fully mechanized backfilling coal backfilling coal mining technology, we developed a new vertical transportation system to transport this type of solid backfill material. Given the demands imposed on safely in feeding this material, we also investigated the structure and basic parameter of this system. For a mine in the Xingtai mining area the results show that: (1) a vertical transportation system should include three main parts, i.e., a feeding borehole, a maintenance chamber and a storage silo; (2) we determined that 486 mm is a suitable diameter for bore holes, the diameter of the storage silo is 6 m and its height 30 m in this vertical transportation system; (3) a conical buffer was developed to absorb the impact during the feeding process. To ensure normal implementation of fully mechanized backfilling coal mining technology and the safety of underground personnel, we propose a series of security technologies for anti-blockage, storage silo cleaning, high pressure air release and aspiration. This vertical transporting system has been applied in one this particular mine, which has fed about 4 million tons solid material with a feeding depth of 350 m and safely exploited 3 million tons of coal. 展开更多
关键词 Fully mechanized backfilling coal mining Feeding bore hole Conical buffer Security guarantee
下载PDF
Secure and efficient multi-message and multi-receiver ID-based signcryption for rekeying in ad hoc networks 被引量:5
16
作者 邱婧 BAI Jun +1 位作者 SONG Xin-chuan HOU Su-mei 《Journal of Chongqing University》 CAS 2013年第2期91-96,共6页
In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc... In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given. 展开更多
关键词 SIGNCRYPTION multi-receiver multi-message bilinear pairings provable security ad hoc networks introduction
下载PDF
Efficacy and Safety of Low Molecular Weight Heparin Prophylaxis for Venous Thromboembolism Following Lumbar Decompression Surgery 被引量:12
17
作者 Zhi-jian Sun Yu Zhao Giu-xing Qiu Yi-peng Wang Xi-sheng Weng Hong Zhao Jian-xiong Shen Yu Jiang Ye Li Xiang Li 《Chinese Medical Sciences Journal》 CAS CSCD 2011年第4期221-226,共6页
Objective To evaluate the efficacy and safety of low molecular weight heparin (LMWH) prophylaxis for venous thromboembolism (VTE) after lumbar decompression surgery. Methods Patients at high or the highest risk of VTE... Objective To evaluate the efficacy and safety of low molecular weight heparin (LMWH) prophylaxis for venous thromboembolism (VTE) after lumbar decompression surgery. Methods Patients at high or the highest risk of VTE who underwent lumbar spine surgery in Peking Union Medical College Hospital from January 2004 to April 2011 were included in the present study. All the patients received a half dose of LMWH 6 hours after surgery followed by a full dose LMWH once per day until discharge. We recorded incidences of deep venous thrombosis (DVT), pulmonary embolism (PE), bleeding complications, and medication side effects. Results Seventy-eight consecutive patients were eligible and enrolled in this study. The mean hospital stat was 8.5±4.5 days. No symptomatic DVT, PE, or major bleeding events were observed. One patient developed wound ecchymosis, another developed wound bleeding, four had mild hepatic aminotransferase level elevation, and one developed a suspicious allergic reaction. Conclusion LMWH may be applied as an effective and safe prophylaxis for VTE in high-risk patients undergoing lumbar decompression surgery. 展开更多
关键词 venous thromboembolism PROPHYLAXIS low molecular weight heparin lumbar decompression surgery
下载PDF
IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION 被引量:2
18
作者 Xie Qi Wang Jilin Yu Xiuyuan 《Journal of Electronics(China)》 2007年第6期806-811,共6页
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv... In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme. 展开更多
关键词 Digital signature Proxy signature Threshold proxy signature Threshold multi-proxy threshold multi-signature Threshold verification
下载PDF
Roles of Financial Innovation and Information Technology:Lessons from US Sub-prime Mortgage Crisis and Its Implications for China 被引量:2
19
作者 James H LENZER JR Simon Xiaobin ZHAO 《Chinese Geographical Science》 SCIE CSCD 2012年第3期343-355,共13页
The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how t... The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development. 展开更多
关键词 shadow banking US sub-prime mortgage crisis financial tsunami global financial crisis wealth man- agement vehicle China asset bubble
下载PDF
Integrated Evaluation of Ecological Security at Different Scales Using Remote Sensing: A Case Study of Zhongxian County, the Three Gorges Area, China 被引量:27
20
作者 ZUO Wei ZHOU Hui-Zhen +3 位作者 ZHU Xiao-Hua WANG Qiao WANG Wen-Jie WU Xiu-Qin 《Pedosphere》 SCIE CAS CSCD 2005年第4期456-464,共9页
Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-... Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-pressure, state and exposure to pollution-response (DPSER) model as a basis, a conceptual framework of regional ecological evaluation and an index system were established. The extraction and standardization of evaluation indices were carried out with GIS techniques, an information extraction model and a data standardization model. The conversion of regional ecological security results from the pixel scale to a small watershed or county scale was obtained with an evaluation model and a scaling model. Two conceptual scale conversion models of regional ecological security from the pixel scale to the county scale were proposed: 1) scale conversion of ecological security regime results from plxel to small watershed; and 2) scale conversion from pixel to county. These research results could provide useful ideas for regional ecological security evaluation as well as ecological and environmental management. 展开更多
关键词 ecological security integrated evaluation MODELS remote sensing SCALING
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部