期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
中医药治疗安环术后出血的体会
1
作者 刘光琼 《医学信息(中旬刊)》 2010年第9期2629-2629,共1页
关键词 中医药 安环术后出血 治疗
下载PDF
安环致子宫穿孔并肠穿孔1例
2
作者 孟玲 《世界今日医学杂志》 2006年第3期153-153,共1页
1 病例报告 女,28yr。产后3mo到我院门诊行安环术,环为金属圆环。安环术中患者曾感下腹撕裂样疼痛伴头晕,随即消失,未予重视。术后次日腹痛剧烈,伴呕吐数次,为胃内容物,再次就诊我院,行B超检查提示节育环位于右侧宫角处,但官... 1 病例报告 女,28yr。产后3mo到我院门诊行安环术,环为金属圆环。安环术中患者曾感下腹撕裂样疼痛伴头晕,随即消失,未予重视。术后次日腹痛剧烈,伴呕吐数次,为胃内容物,再次就诊我院,行B超检查提示节育环位于右侧宫角处,但官腔探查未触及节育环。进一步拍片提示环位于骨盆右下角。查体:全腹压痛、反跳痛、肌紧张均存在,以右下腹为重。请县医院妇产科及外科会诊后行剖腹探查术。 展开更多
关键词 安环术 子宫穿孔 肠穿孔 并发症
下载PDF
SATVPC:Secure-agent-based trustworthy virtual private cloud model in open computing environments 被引量:2
3
作者 徐小龙 涂群 +2 位作者 BESSIS Nik 杨庚 王新珩 《Journal of Central South University》 SCIE EI CAS 2014年第8期3186-3196,共11页
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft... Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally. 展开更多
关键词 cloud computing trustworthy computing VIRTUALIZATION agent
下载PDF
Lubricant Biodegradation Enhancers: Designed Chemistry and Engineered Technology 被引量:8
4
作者 Chen Boshui Gao Lingyue +3 位作者 Fang Jianhua Zhang Nan Wu Jiang Wang Jiu 《China Petroleum Processing & Petrochemical Technology》 SCIE CAS 2015年第3期102-110,共9页
In recent decades, a growing worldwide trend of developing the biodegradable lubricants has been prevailing to form a specific field of green chemistry and green engineering. Enhancement of biodegradability of unreadi... In recent decades, a growing worldwide trend of developing the biodegradable lubricants has been prevailing to form a specific field of green chemistry and green engineering. Enhancement of biodegradability of unreadily biodegradable petroleum-based lubricants has as such become an urgent must. For over a decade the authors have been focusing on the improvement of biodegradability of unreadily biodegradable lubricants such as petroleum-based lubricating oils and greases. A new idea of lubricant biodegradation enhancer was put forward by the authors with the aim to stimulate the biodegradation of unreadily biodegradable lubricants by incorporating the enhancer into the lubricants in order to turn the lubricants into greener biodegradable ones and to help in situ bioremediation of lubricant-contaminated environment. This manuscript summarizes our recent efforts relating to the chemistry and technology of biodegradation enhancers for lubricants. Firstly, the chemistry of lubricant biodegradation enhancers was designed based on the principles of bioremediation for the treatment of hydrocarbon contaminated environment. Secondly, the ability of the designed biodegradation enhancers for increasing the biodegradability of unreadily biodegradable industrial lubricants was investigated through biodegradability evaluation tests, microbial population analysis, and biodegradation kinetics modeling. Finally, the impact of biodegradation enhancers on some crucial performance characteristics of lubricants such as lubricity and oxidation stability was tested via tribological evaluation and oxidation determinations. Our results have shown that the designed chemistry of nitrogenous and/or phosphorous compounds such as lauroyl glutamine, oleoyl glycine, oleic diethanolamide phosphate and lauric diethanolamide borate was outstanding in boosting biodegradation of petroleum-based lubricants which was ascribed to increase the microbial population and decrease the oil-water interfacial tension during the biodegradation process. Lubricants doped with the biodegradation enhancers exhibited much better biodegradability and higher biodegradation rate in the surrounding soils which could be well modeled by the exponential biodegradation kinetics. Furthermore, as lubricant dopants, the biodegradation enhancers also provided excellent capability in reducing friction and wear and in retarding oxidation of lubricants. In the nature of things, lubricant biodegradation enhancers, which are multi-functional not only in the improvement of biodegradability, but also in the fortification of lubricity and in the inhibition of oxidation of lubricants, are expected to be promising as a new category of lubricant additives. 展开更多
关键词 LUBRICANT biodegradation enhancer BIODEGRADABILITY biodegradation kinetics lubricity.
下载PDF
UTES (Underground Thermal Energy Storage)---Applications and Market Development in Sweden
5
作者 Olof Andersson Jonas Ekkestubbe Anna Ekdahl 《Journal of Energy and Power Engineering》 2013年第4期669-678,共10页
The market for shallow geothermal solutions has been continuously growing in Sweden and is recognized as a cost effective and environmental sound way for space heating. In later years, UTES (underground thermal energ... The market for shallow geothermal solutions has been continuously growing in Sweden and is recognized as a cost effective and environmental sound way for space heating. In later years, UTES (underground thermal energy storage) systems have become fTequently installed for combined heating and cooling of commercial and institutional buildings. After 20 years, operational experiences of these systems are proved to be energy efficient, technically safe and profitable. In this paper, the current statistics of UTES applications are given as well as market trends and technical development. The goal is to encourage designers and installers in other counties to use this promising technology. 展开更多
关键词 Shallow geothermal energy storage ground source heat pumps underground thermal energy storage.
下载PDF
A Test Bed for Information Security Skill Development with Virtual Training Environment
6
作者 Alok Tripathi Abhinav Mishra Gudalur Varadarajan Raghunathan 《Computer Technology and Application》 2011年第6期449-455,共7页
New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate thes... New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate these attacks. It requires creation of practical training environment with tools and technologies available for Information Security. The design of Information Security courses involves scenario based hands-on-labs with real time security incidents and problems with global reach which could be customized quickly as per the scenario and user's requirement. In order to understand the underlying concepts as well as to learn the practical aspects of network and system security environment, an initiative has been taken and a Virtual Test Bed has been developed to meet the above objectives. It is an essential component in Information Security training concept which could be used to perform actual security attacks and remedial measures as well as to test the effectiveness of protection mechanisms and help in handling the security incidents effectively. This paper discusses the development of this Test Bed for Information Security skill development with virtual training environment using which Information Security concepts, attacks on networks/systems and practical scenarios are simulated for imparting hands on training to participants. 展开更多
关键词 ATTACKS information security test bed virtual training environment SIMULATION
下载PDF
A Concurrent Security Monitoring Method for Virtualization Environments
7
作者 TIAN Donghai JIA Xiaoqi +1 位作者 CHEN Junhua HU Changzhen 《China Communications》 SCIE CSCD 2016年第1期113-123,共11页
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani... Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead. 展开更多
关键词 security virtualization technology concurrent monitoring
下载PDF
How PDCA cycle implementation improved surgical time-out compliance rate
8
作者 Wang Hong HuangJuan Ren Ya-fang Xu Hui PangYanWei Chang Ying Ma Xiao-fei 《International Journal of Technology Management》 2013年第3期28-30,共3页
Objective: To explore the effect of PDCA-cycle in improving time-out compliance rate and improvement in quality and safety management of surgery. Methods: We improved time-out compliance rate by using PDCA-cycle (a... Objective: To explore the effect of PDCA-cycle in improving time-out compliance rate and improvement in quality and safety management of surgery. Methods: We improved time-out compliance rate by using PDCA-cycle (a quality improvement tools). Data were collected before and after the implementation of PDCA-cycle. The results were analyzed. Results: After implementation of PDCA-cycle, over all time-out compliance rate was increased from 80% to 99.8% (P=0.000). The compliance rate of identifying patient, performing site marking before surgery, verification of correct-site and correct procedure were increased from 85.1%, 79.2%, 89.7% and 89.1% to 99.8%, 99.9%, 100% and 100% (P〈0.05) respectively. Conclusion: Our study validated the PDCA-cycle methodology improves time-out compliance rate, and it is one of the most effective quality improvement tools for hospital management. 展开更多
关键词 PDCA-cycle time-out quality improvement tools experience
下载PDF
Food security from an environmental and technological point of view
9
作者 SU Li CHEN Fan 《Journal of Agricultural Science and Technology》 2009年第1期42-50,共9页
This article focuses on technology's enormous impacts in solving food security. Over the past several decades technology has made an important contribution to Chinese food production, and it will continue to have the... This article focuses on technology's enormous impacts in solving food security. Over the past several decades technology has made an important contribution to Chinese food production, and it will continue to have the widest impact on food security in China. The relationship between technology and environment is discussed in this article. It is suggested that technology is significantly related to the theme of sustainable Agriculture, and technology can achieve food security. 展开更多
关键词 food security TECHNOLOGY ENVIRONMENT sustainable agriculture
下载PDF
在基层施行节育手术的实践与体会
10
作者 康厚香 《阿坝科技》 1998年第1期48-53,共6页
关键词 节育手术 人口控制 术前准备 妇科检查 安环术 术后护理
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部