期刊文献+
共找到60篇文章
< 1 2 3 >
每页显示 20 50 100
血液透析患者管理移動應用程式的設計與實現
1
作者 禤偉振 武健勛 +3 位作者 郁青 余嘉寶 歐陽國向 彭莉 《镜湖医学》 2020年第1期34-36,55,共4页
目的探討血液透析患者管理移動應用程式的設計理念和實現方法。方法分析血液透析患者管理需求,設計移動應用程式進行醫患互動。提供多元化宣教内容,加強健康宣教。結果應用程式自動調取血液透析信息系統中的數據,根據預設閾值自動觸發... 目的探討血液透析患者管理移動應用程式的設計理念和實現方法。方法分析血液透析患者管理需求,設計移動應用程式進行醫患互動。提供多元化宣教内容,加強健康宣教。結果應用程式自動調取血液透析信息系統中的數據,根據預設閾值自動觸發危機值預警;患者可自行查閱抽血報告,了解透析時間計劃,了解透析治療中體重及血壓變化;醫護可推送透析階段評估及個體化衛教材料。結論血液透析患者管理移動應用程序可以對血液透析患者進行更有效,更安全的精确管理,加強醫患溝通。 展开更多
关键词 血液透析 血透病人自我管理 手機移動應用程式
下载PDF
项目管理理论在电力基建工程管理中的应用 被引量:5
2
作者 丘康尧 《建材与装饰》 2020年第7期201-202,共2页
电力基建工程项目与整体电力资源配送网络的规划建设、电力资源的使用息息相关,尤其是配送网络与资源终端有效连接的桥梁。本文阐述了电力基建工程管理现状,然后对项目管理理论在电力基建工程管理中的结合和运用展开分析,仅供参考。
关键词 项目管理理论 电力基建工程 应用程式
下载PDF
综合型旅游型小城镇导视系统调研分析——以古北水镇为例 被引量:1
3
作者 张路 赵真 《美术大观》 2015年第11期113-113,共1页
本文以北京市密云县古北水镇旅游景区为例,探析了旅游型小城镇导视系统带给游客的体验,可增加游客对景区的忠诚度,并促进景区经济的发展。
关键词 综合型旅游小城镇 导视系统设计 手机应用程式(APP)
下载PDF
Authorware中Windows标准菜单的实现 被引量:2
4
作者 薛纪文 石美红 《微机发展》 2003年第4期22-23,27,共3页
介绍了在Authorware环境下,利用WindowsAPI函数实现Windows标准菜单的方法。所设计的标准菜单具有灵活性和使用方便等特色。
关键词 AUTHORWARE WINDOWS 标准菜单 多媒体 应用程序 应用程式界面 消息钩子 API函数
下载PDF
中国资源型旅游小城镇导视系统设计方向研究
5
作者 张路 赵真 《美术大观》 2016年第8期137-137,共1页
本文从游客基本信息以及现有导视系统设计问题点着手,对代表资源型旅游小城镇的浙江省乌镇、浙江省溪口镇以及北京市古北水镇进行实地调研和问卷调研,获取解决问题的切入点及旅游小城镇导视系统的设计方向。
关键词 资源型旅游小城镇 导视系统设计 智能手机应用程式(App)
下载PDF
法国推出Web Demo互联网通讯解决方案
6
《世界科技研究与发展》 CSCD 2001年第4期107-107,共1页
关键词 法国 WEB DEMO 互联网 应用程式 电子会议 电子培训 网上合作
下载PDF
On the Training Modes of Interdisciplinary and Application-oriented Talents of Business English 被引量:3
7
作者 郝钦海 《Sino-US English Teaching》 2006年第8期7-11,共5页
This paper focuses on the training modes of interdisciplinary and application-oriented talents of business English and the constructions of curriculum. In the light of our socialist market-oriented economy characteris... This paper focuses on the training modes of interdisciplinary and application-oriented talents of business English and the constructions of curriculum. In the light of our socialist market-oriented economy characteristics, the discussion proceeds, in theory and practice, by putting forward a relatively profound approach according to the trend in the demands for business English talents and to the operational patterns of business English discipline, with some suggestions about the training modes of interdisciplinary and application-oriented talents and the construction of curriculum. 展开更多
关键词 business English interdisciplinary and application-oriented talents training modes CURRICULUM
下载PDF
浅谈装配式建筑工程施工中BIM技术的运用
8
作者 胡东亮 《中华传奇(上旬)》 2021年第4期24-25,共2页
在当前中国良好经济形势的因素下,装配式建筑项目建设规模不断扩大。在完成该类建筑项目的过程中,为提高其技术优势,提升装配式建筑的施工效果,应当需要考虑应用BIM技术来满足该项目的高效施工要求,最适合装配式建筑在技术层面为BIM发... 在当前中国良好经济形势的因素下,装配式建筑项目建设规模不断扩大。在完成该类建筑项目的过程中,为提高其技术优势,提升装配式建筑的施工效果,应当需要考虑应用BIM技术来满足该项目的高效施工要求,最适合装配式建筑在技术层面为BIM发展予以科学保障,避免对其施工效率和应用效果形成不利影响,更好地体现BIM技术的借助价值,拓展了装配式建筑可持续发展的思路。为提升建筑工程施工过程中信息数据的收集和传输效率,合理运用BIM技术,推进分析速度和信息效果,监督和控制施工过程各个环节的施工作业,确保施工前计划的制定和生产过程以及施工过程中的工作质量。根据此,本文将系统阐述BIM技术在装配式建筑建造中的应用。 展开更多
关键词 装配式建筑 BIM技术 应用程式
下载PDF
Web前端开发的项目化课程教学实践
9
作者 杨国光 《爱情婚姻家庭》 2022年第21期98-99,共2页
随着信息时代的到来,随着网络的广泛应用,人们对电脑软件的开发要求也越来越多元化。因此,要提高软件的开发效率,就必须充分利用 Web 前端的技术。在运维管理系统的开发与设计中,首先要对系统的功能要求进行全面的分析,考虑到系统的工... 随着信息时代的到来,随着网络的广泛应用,人们对电脑软件的开发要求也越来越多元化。因此,要提高软件的开发效率,就必须充分利用 Web 前端的技术。在运维管理系统的开发与设计中,首先要对系统的功能要求进行全面的分析,考虑到系统的工作环境和不同的工作权限,以便对前端的操作接口进行优化,为以后的运维管理系统的升级和优化提供支撑。结合网络应用系统开发课程的教学实践,说明了网络前端开发的职业资格认证标准、课程设计、教学方法和手段、课证融合、评价体系等。 展开更多
关键词 电脑软体 应用程式 专案课程
下载PDF
Study on destressing technology for a roadway driven along goaf in a fully mechanized top-coal caving face 被引量:4
10
作者 瞿群迪 《Journal of Coal Science & Engineering(China)》 2003年第1期33-37,共5页
Based on the deformation characteristics of the roadways driven along goaf in fully mechanized top coal caving faces, the author considers that it is the key to ensure the stability of surrounding rocks of roadway dri... Based on the deformation characteristics of the roadways driven along goaf in fully mechanized top coal caving faces, the author considers that it is the key to ensure the stability of surrounding rocks of roadway driven along goaf to control the deformation during the period affected by mining. Considering the characteristics of the roadway layout in fully mechanized top coal caving faces, a technical scheme of destressing is put forward and the destressing effect is analyzed by using the software of Universal Distinct Element Code 3 0(UDEC 3 0). 展开更多
关键词 fully mechanized top coal caving gob side entry driving roadway layout
下载PDF
A numerical analysis to the non-linear fin problem 被引量:1
11
作者 Rafael CORTELL 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第5期648-653,共6页
In this paper a numerical analysis is carried out to obtain the temperature distribution within a single fin. It is assumed that the heat transfer coefficient depends on the temperature. The complete highly non-linear... In this paper a numerical analysis is carried out to obtain the temperature distribution within a single fin. It is assumed that the heat transfer coefficient depends on the temperature. The complete highly non-linear problem is solved numerically and the variations of both, dimensionless surface temperature and dimensionless surface temperature gradient as well as heat transfer characteristics with the governing non-dimensional parameters of the problem are graphed and tabulated. 展开更多
关键词 FINS Ordinary differential equations (ODEs) Numerical solution Heat transfer
下载PDF
MobiGemini:Sensitive-Based Data and Resource Protection Framework for Mobile Device 被引量:1
12
作者 Shuangxi Hong Chuanchang Liu +2 位作者 Bo Cheng Bingfei Ren Junliang Chen 《China Communications》 SCIE CSCD 2017年第7期67-77,共11页
With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. I... With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP(Ali Pay) on mobile device. Therefore, only encryption cannot protect sensitive APP and privacy data stored on user's smartphone. To address these obstacles, we design a protection system called Mobi Gemini. It enables automatic uninstalling service that can immediately uninstall multiple APP at same time, and also enabling plausibly deniable encryption(PDE) on mobile devices by hiding encrypted volume within random data in free space of cache partition. We improve the key store way of previous PDE schemes on mobile device. The evaluation results show that the scheme introduces a few overhead compared with original android system enabling full disk encryption. 展开更多
关键词 mobile security privacy protection storage encryption deniable encryption
下载PDF
A Comprehensive Method for Evaluating Precision of Transfer Alignment on a Moving Base 被引量:2
13
作者 Hongliang Yin Bo Xu Dezheng Liu 《Journal of Marine Science and Application》 CSCD 2017年第3期344-351,共8页
In this study, we propose the use of the Degree of Alignment(DOA) in engineering applications for evaluating the precision of and identifying the transfer alignment on a moving base. First, we derive the statistical f... In this study, we propose the use of the Degree of Alignment(DOA) in engineering applications for evaluating the precision of and identifying the transfer alignment on a moving base. First, we derive the statistical formula on the basis of estimations. Next, we design a scheme for evaluating the transfer alignment on a moving base, for which the attitude error cannot be directly measured. Then, we build a mathematic estimation model and discuss Fixed Point Smoothing(FPS), Returns to Scale(RTS), Inverted Sequence Recursive Estimation(ISRE), and Kalman filter estimation methods, which can be used when evaluating alignment accuracy. Our theoretical calculations and simulated analyses show that the DOA reflects not only the alignment time and accuracy but also differences in the maneuver schemes, and is suitable for use as an integrated evaluation index. Furthermore, all four of these algorithms can be used to identify the transfer alignment and evaluate its accuracy. We recommend RTS in particular for engineering applications. Generalized DOAs should be calculated according to the tactical requirements. 展开更多
关键词 transfer alignment precision assessment degree of alignment Kalman smoothing returns to scale moving base engineering applications comprehensive method
下载PDF
Invited Paper: The Audacity of Fiber-Wireless(FiWi) Networks: Revisited for Clouds and Cloudlets 被引量:5
14
作者 Martin Maier Bhaskar Prasad Rimal 《China Communications》 SCIE CSCD 2015年第8期33-45,共13页
There is a growing awareness among industry players of reaping the benefits of mobile-cloud convergence by extending today's unmodified cloud to a decentralized two-level cloud-cloudlet architecture based on emerg... There is a growing awareness among industry players of reaping the benefits of mobile-cloud convergence by extending today's unmodified cloud to a decentralized two-level cloud-cloudlet architecture based on emerging mobile-edge computing(MEC) capabilities. In light of future 5G mobile networks moving toward decentralization based on cloudlets, intelligent base stations, and MEC, the inherent distributed processing and storage capabilities of radio-and-fiber(R&F) networks may be exploited for new applications, e.g., cognitive assistance, augmented reality, or cloud robotics. In this paper, we first revisit fiber-wireless(Fi Wi) networks in the context of conventional clouds and emerging cloudlets, thereby highlighting the limitations of conventional radio-overfiber(Ro F) networks such as China Mobile's centralized cloud radio access network(C-RAN) to meet the aforementioned trends. Furthermore, we pay close attention to the specific design challenges of data center networks and revisit our switchless arrayedwaveguide grating(AWG) based network with efficient support of east-west flows and enhanced scalability. 展开更多
关键词 CLOUDLET computation offloading east-west flows intelligent base station mobile-cloud convergence mobile dataoffloading mobile-edge computing (MEC) SCALABILITY
下载PDF
Application of Rational Expansion Method for Differential-Difference Equation
15
作者 王琪 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期981-986,共6页
In this paper, we applied the rational formal expansion method to construct a series of sofiton-like and period-form solutions for nonlinear differential-difference equations. Compared with most existing methods, the ... In this paper, we applied the rational formal expansion method to construct a series of sofiton-like and period-form solutions for nonlinear differential-difference equations. Compared with most existing methods, the proposed method not only recovers some known solutions, but also finds some new and more general solutions. The efficiency of the method can be demonstrated on Toda Lattice and Ablowitz-Ladik Lattice. 展开更多
关键词 rational expansion method Toda lattice Ablowitz-Ladik lattice
下载PDF
A New Differential Quadrature Methodology Based on Bernstein Polynomials for Solving the Equations Governing the Unsteady Flow of a Polytropic Gas
16
作者 Abdul-Sattar J. A1-Saif Firas A. Al-Saadawi 《Journal of Physical Science and Application》 2015年第1期38-47,共10页
Aims of this paper are to improve ADI differential quadrature method (ADI-DQM) based on Bernstein polynomials and add a new application to the differential quadrature method. By using the new methodology, the numeri... Aims of this paper are to improve ADI differential quadrature method (ADI-DQM) based on Bernstein polynomials and add a new application to the differential quadrature method. By using the new methodology, the numerical solutions of the governing equations of unsteady two-dimensional flow of a polytropic gas are investigated. The numerical results reveal that the new technique is very effective and gives high accuracy, good convergence and reasonable stability. 展开更多
关键词 Differential quadrature method polytropic gas Bemstein polynomial ADI accuracy.
下载PDF
Use of mobile-stroke risk scale and lifestyle guidance promote healthy lifestyles and decrease stroke risk factors
17
作者 Kelana Kusuma Dharma Parellangi 《International Journal of Nursing Sciences》 CSCD 2020年第4期401-407,I0003,共8页
Objective:The purpose of this study was to determine the effectiveness of Mobile-Stroke Risk Scale and Life Style Guidance(M-SRSguide)in promoting a healthy lifestyle and reducing stroke risk factors in atrisk persons... Objective:The purpose of this study was to determine the effectiveness of Mobile-Stroke Risk Scale and Life Style Guidance(M-SRSguide)in promoting a healthy lifestyle and reducing stroke risk factors in atrisk persons.Methods:This research was an clinical trial with a pre-test and post-test control group design.The accessible population is persons at risk of stroke in the community(West and East Kalimantan Province,Indonesia).Thirty-two participants in the intervention group and 32 participants in the control group participated in this study.The sampling method was systematic random sampling.We allocate the sample into the intervention and control groups using a randomized block design.The intervention group used the M-SRSguide.The control group used manual book for a self-assessment of stroke risk.The measurement of a healthy lifestyle and the stroke risk factors was performed before and six months after the intervention.Results:There are no significant differences in healthy lifestyle and stroke risk factors between the two groups after the intervention(P>0.05).Analysis of healthy lifestyle behavior assessment items in the intervention group showed an increase in healthy diets,activity patterns,and stress control after the use of the M-SRSguide(P<0.01).Conclusion:The use of M-SRSguide is effective in promoting a healthy lifestyle. 展开更多
关键词 Health promotion Life style Mobile applications Risk factors STROKE
下载PDF
Interactive English Reading Community Based on Social Network Sites
18
作者 CHEN Min 《Sino-US English Teaching》 2015年第5期341-346,共6页
One of the major trends in the reform of English language teaching is the application of network technologies. This paper discusses the application of social network sites in building an interactive English reading co... One of the major trends in the reform of English language teaching is the application of network technologies. This paper discusses the application of social network sites in building an interactive English reading community under the guidance of the constructivist learning theory and its influence on the learners' English reading. This SNS-aided reading community puts the students as the center and the teacher the guide, embodying students' subjectivity, equality, and interactivity. The study shows that the interactive English reading community can motivate students to read, improve their reading skills, and thus develop a new SNS-aided English reading model for English learners. 展开更多
关键词 social network sites reading models interactive reading motivation of reading
下载PDF
Existence and Uniqueness of Solution of Some Increasing Operators and Applications
19
作者 HAO Jian-li 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2008年第2期240-244,共5页
By using the cone theory and the monotone succession skills, it is studied the existence uniqueness of fixed point for a class of increasing operators without continuity and compactness and concave or convex condition... By using the cone theory and the monotone succession skills, it is studied the existence uniqueness of fixed point for a class of increasing operators without continuity and compactness and concave or convex conditions in Banach spaces. The results presented here improve and generalize some corresponding results for increasing operator. 展开更多
关键词 cone and partial ordering increasing operators operator equations
下载PDF
Research on the Application Security Isolation Model
20
作者 Gong Lei Zhao Yong Liao Jianhua 《China Communications》 SCIE CSCD 2010年第6期153-156,共4页
Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the desi... Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the design ideas of NASI, gives out formal description and safety analysis for the model, and finally describes the implementation of prototype system based on NASI. 展开更多
关键词 application isolation security model application security protection
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部