期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
Method of acquiring web features and its application in web search 被引量:1
1
作者 薛晔伟 沈钧毅 +1 位作者 张云 鲍军鹏 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期330-334,共5页
Focusing on the problem that it is hard to utilize the web multi-fields information with various forms in large scale web search,a novel approach,which can automatically acquire features from web pages based on a set ... Focusing on the problem that it is hard to utilize the web multi-fields information with various forms in large scale web search,a novel approach,which can automatically acquire features from web pages based on a set of well defined rules,is proposed.The features describe the contents of web pages from different aspects and they can be used to improve the ranking performance for web search.The acquired feature has the advantages of unified form and less noise,and can easily be used in web page relevance ranking.A special specs for judging the relevance between user queries and acquired features is also proposed.Experimental results show that the features acquired by the proposed approach and the feature relevance specs can significantly improve the relevance ranking performance for web search. 展开更多
关键词 web search relevance ranking retrieval effectiveness
下载PDF
基于GIS的燃气爆管分析
2
作者 韩丽 《科技信息》 2012年第20期62-63,共2页
本文基于GIS技术,通过工程项目实例,结合燃气管网的特点,利用网络追踪算法,建立了爆管分析系统,即在燃气管网发生爆管后,通过该系统可以及时、准确地搜索出停气调压器、关闭阀门以及停气用户等信息。
关键词 燃气泄露 爆管分析 搜索
下载PDF
Parameter optimization of gravity density inversion based on correlation searching and the golden section algorithm 被引量:1
3
作者 孙鲁平 刘展 首皓 《Applied Geophysics》 SCIE CSCD 2012年第2期131-138,233,共9页
For density inversion of gravity anomaly data, once the inversion method is determined, the main factors affecting the inversion result are the inversion parameters and subdivision scheme. A set of reasonable inversio... For density inversion of gravity anomaly data, once the inversion method is determined, the main factors affecting the inversion result are the inversion parameters and subdivision scheme. A set of reasonable inversion parameters and subdivision scheme can, not only improve the inversion process efficiency, but also ensure inversion result accuracy. The gravity inversion method based on correlation searching and the golden section algorithm is an effective potential field inversion method. It can be used to invert 2D and 3D physical properties with potential data observed on flat or rough surfaces. In this paper, we introduce in detail the density inversion principles based on correlation searching and the golden section algorithm. Considering that the gold section algorithm is not globally optimized. we present a heuristic method to ensure the inversion result is globally optimized. With a series of model tests, we systematically compare and analyze the inversion result efficiency and accuracy with different parameters. Based on the model test results, we conclude the selection principles for each inversion parameter with which the inversion accuracy can be obviously improved. 展开更多
关键词 Density inversion correlation searching golden section algorithm inversion parameter optimization
下载PDF
A Novel Parallel Scheme for Fast Similarity Search in Large Time Series 被引量:6
4
作者 YIN Hong YANG Shuqiang +2 位作者 MA Shaodong LIU Fei CHEN Zhikun 《China Communications》 SCIE CSCD 2015年第2期129-140,共12页
The similarity search is one of the fundamental components in time series data mining,e.g.clustering,classification,association rules mining.Many methods have been proposed to measure the similarity between time serie... The similarity search is one of the fundamental components in time series data mining,e.g.clustering,classification,association rules mining.Many methods have been proposed to measure the similarity between time series,including Euclidean distance,Manhattan distance,and dynamic time warping(DTW).In contrast,DTW has been suggested to allow more robust similarity measure and be able to find the optimal alignment in time series.However,due to its quadratic time and space complexity,DTW is not suitable for large time series datasets.Many improving algorithms have been proposed for DTW search in large databases,such as approximate search or exact indexed search.Unlike the previous modified algorithm,this paper presents a novel parallel scheme for fast similarity search based on DTW,which is called MRDTW(MapRedcuebased DTW).The experimental results show that our approach not only retained the original accuracy as DTW,but also greatly improved the efficiency of similarity measure in large time series. 展开更多
关键词 similarity DTW warping path time series MapReduce parallelization cluster
下载PDF
Intussusception due to inflammatory fibroid polyp:A case report and comprehensive literature review 被引量:3
5
作者 Sami Akbulut 《World Journal of Gastroenterology》 SCIE CAS CSCD 2012年第40期5745-5752,共8页
AIM:To give an overview of the literature on intussusception due to inflammatory fibroid polyp(IFP).METHODS:We present a new case of ileal intussusception due to IFP and a literature review of studies published in Eng... AIM:To give an overview of the literature on intussusception due to inflammatory fibroid polyp(IFP).METHODS:We present a new case of ileal intussusception due to IFP and a literature review of studies published in English language on intussusception due to IFP,accessed via PubMed and Google Scholar databases.For the search,the keywords used were:intussusception,IFP,intussusception and IFP,intussusception due to IFP,and IFP presenting as intussusception.The search covered all articles from 1976 to November 2011.RESULTS:We present a 38-year-old woman who was admitted 10 d after experiencing abdominal pain,vomiting,and nausea.Ultrasonography demonstrated small bowel intussusception.An ileal intussusception due to a mass lesion 50 cm proximal to the ileocecal junction was found during laparotomy.Partial ileal resection and anastomosis were performed.A diagnosis of ileal IFP was made based on the immunohistochemical findings.In addition,a total of 56 reports concerning 85 cases of intussusception due to IFP meeting the aforementioned criteria was included in the literature review.The patients were aged 4 to 81 years(mean,49 ± 16.2 years);44 were women(mean,51.8 ± 14.3 years) and 41 were men(mean,46 ± 17.5 years).According to the location of the IFP,ileal intussusception was found in 63 patients,while 17 had jejunal,three had colonic,and two had ileojejunal intussusception.CONCLUSION:Although IFPs are rare and benign,surgery is the only solution in case of intestinal obstruction.Differential diagnosis should be made via immunohistochemical examination. 展开更多
关键词 INTUSSUSCEPTION Inflammatory fibroid pol-yp Vanek's tumor Immunohistochemical stain
下载PDF
Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers 被引量:5
6
作者 Kai Zhang Jie Guan Bin Hu 《China Communications》 SCIE CSCD 2018年第2期54-66,共13页
In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible... In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible differential cryptanalysis and zero-correlation linear cryptanalysis are among the most powerful attacks, and the key problems for these two attacks are discovering more and longer impossible differentials(IDs) and zero-correlation linear hulls(ZCLHs). However, finding new IDs and ZCLHs for ARX ciphers has been a manual work for a long time, which has been an obstacle in improving these two attacks. This paper proposes an automatic search method to improve the efficiency of finding new IDs and ZCLHs for ARX ciphers. In order to prove the efficiency of this new tool, we take HIGHT, LEA, SPECK three typical ARX algorithms as examples to explore their longer and new impossible differentials and zero-correlation linear hulls. To the best of our knowledge, this is the first application of automatic search method for ARX ciphers on finding new IDs and ZCLHs. For HIGHT, we find more 17 round IDs and multiple 17 round ZCLHs. This is the first discovery of 17 round ZCLHs for HIGHT. For LEA, we find extra four 10 round IDs and several 9 round ZCLHs. In the specification of LEA, the designers just identified three 10 round IDs and one 7round ZCLH. For SPECK, we find thousands of 6 round IDs and forty-four 6 round ZCLHs. Neither IDs nor ZCLHs of SPECK has been proposed before. The successful application of our new tool shows great potential in improving the impossible differential cryptanalysis and zero-correlation linear cryptanalysis on ARX ciphers.. 展开更多
关键词 automatic search tool impossibledifferential cryptanalysis zero-correlation lin-ear cryptanalysis ARX ciphers modes opera-tion
下载PDF
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
7
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 Peer-to-peer (P2P) Keyword-set search (KSS) Keyword relationship
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:24
8
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ... Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 provable secure certificateless public key encryption keyword search
下载PDF
Identity-Based Encryption with Keyword Search from Lattice Assumption 被引量:6
9
作者 Xiaojun Zhang Chunxiang Xu +1 位作者 Liming Mu Jie Zhao 《China Communications》 SCIE CSCD 2018年第4期164-178,共15页
Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor... Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor corresponding to the keyword. The PEKS is useful to keep the management of large data storages secure such as those in a cloud. In this paper, to protect against quantum computer attacks, we present a lattice-based identity-based encryption scheme with key- word search. We have proved that our scheme can achieve ciphertext indistinguishability in the random oracle model, and our scheme can also achieve trapdoor security. In particular, our scheme can designate a unique tester to test and return the search results, therefore it does not need a secure channel. To the best of our knowledge, our scheme is the first iden- tity-based encryption scheme with keyword search from lattice assumption. 展开更多
关键词 public key encryption keywordsearch ciphertext indistinguishability latticeassumption.
下载PDF
Research and simulation on synchronization algorithm of PSS in a 5G system based on block cross-correlation 被引量:1
10
作者 Zheng Ruimen Wang Xiaojun +1 位作者 Pan Wei Chen Xiaoshu 《Journal of Southeast University(English Edition)》 EI CAS 2021年第3期245-250,共6页
In response to the downlink synchronization requirements of the user equipment(UE)or third-party radio equipment in fifth-generation(5G)mobile communication systems,a synchronization algorithm of primary synchroni-zat... In response to the downlink synchronization requirements of the user equipment(UE)or third-party radio equipment in fifth-generation(5G)mobile communication systems,a synchronization algorithm of primary synchroni-zation signal(PSS)was designed and developed in the 5G system based on block cross-correlation.According to the new characteristics of the 5G synchronization channel and broadcast channel,starting from the traditional downlink synchronization algorithm of long-term evolution(LTE),the detection performance of the algorithm under a low signal-to-noise ratio(SNR)is improved by introducing an incoherent accumulation,and the new scheme of joint coarse frequency offset estimation is used to improve the frequency offset estimation performance.Finally,the performance of the proposed synchronization algorithm is verified by conducting a simulation on a 5G downlink simulation platform based on MATLAB software.Simulation results show that the improved downlink synchronization algorithm has stable performance in the tapped delay line-C(TDL-C)and additive white Gaussian noise(AWGN)channels with large frequency deviation and low SNR. 展开更多
关键词 fifth-generation(5G)cell search downlink synchronization cross-correlation detection frequency offset estimation
下载PDF
Word Search and Its Results in Oral Speech of Elderly People
11
作者 N.V.Orlova 《Journal of Literature and Art Studies》 2018年第6期951-956,共6页
The author studies the markers of searching for a word in spontaneous oral speech of Russian-speaking elderly women. The paper puts a question about age-related features of searching strategies of elderly people. Wh... The author studies the markers of searching for a word in spontaneous oral speech of Russian-speaking elderly women. The paper puts a question about age-related features of searching strategies of elderly people. While searching the informants, as a rule, recollect the only word (a noun, including their own name), they do not choose the most suitable nominations from the available options. They often refuse to search and realize an alternative speech strategy. 展开更多
关键词 oral speech elderly people speech hesitations the searching strategy
下载PDF
Academic Study of Religion in Universities, Southwest Nigeria: In Search of Social Identity/Relevance
12
作者 Danoye Oguntola-Laguda 《History Research》 2013年第3期147-153,共7页
Social theorists have engaged religion as a social agent and submitted that it has the capacity to foster positive and negative changes in the society. Milton Yinger, Emile Durkheim, and Karl Marx lead the pack among ... Social theorists have engaged religion as a social agent and submitted that it has the capacity to foster positive and negative changes in the society. Milton Yinger, Emile Durkheim, and Karl Marx lead the pack among other sociologists. The need to therefore interrogate religion as an agent of social engineering cannot be overemphasized normatively and functionally. One of the implications of such engagement is that religion; study and practice need to respond to issues in the society. Basic challenges facing the Nigerian nation are issues of poverty, diseases, corruption, and illiteracy. However, in Nigerian universities, the situation posits that religion is studied with theological intentions based on the curriculum bequeathed by the missionaries that laid the foundation for the academic study of religion in Nigeria leading to exclusive and reductionist approaches to its study. There is also government policy that placed emphasis on science and management courses for development. The situation has led to reduction in students' enrolments for the study of religion in Nigerian universities. Therefore, this paper seeks explanations for the non-functional design(s) of the curriculum for the academic study of religion in universities, southwest of Nigeria. Descriptive and analytic methods were adopted in the study to pursue the thesis that the academic study of religion in Nigeria should be rebranded and repackaged to respond and interrogate social challenges/problems, such as the scourge of HIV/AIDS plaguing the society thereby recreating a new social identity and relevance for its study. 展开更多
关键词 social theorists academic study university social identity and relevance interrogate
下载PDF
Expert Classification Method Based on Patch-Based Neighborhood Searching Algorithm 被引量:1
13
作者 CHEN Xiaoling CAI Xiaobin LI Hui 《Geo-Spatial Information Science》 2007年第1期37-43,共7页
The expert knowledge has been widely used to improve the remotely sensed classification accuracy. Generally, the ex-pert classification system mainly depends on DEM and some thematic maps. The spatial relationship inf... The expert knowledge has been widely used to improve the remotely sensed classification accuracy. Generally, the ex-pert classification system mainly depends on DEM and some thematic maps. The spatial relationship information in pixel level was commonly introduced into the expert classification. Because the geographic objects were found spatially dependent relationship to a certain degree, the commonly used basic unit of spatial relationship information in pixel greatly limited the efficiency of spatial in-formation. A patch-based neighborhood searching algorithm was proposed to implement the expert classification. The homogene-ous spectral unit, patch, was used as the basic unit in the spatial object granularity, and different types of patches' relationship in-formation were obtained through a spatial neighborhood searching algorithm. And then the neighborhood information and DEM data were added into the expert classification system and used to modify the primitive classification errors. In this case, the classi-fication accuracies of wetland, grassland and cropland were obviously improved. In this work, water was used as base object, and different types of water extraction methods were tested to get a result in a high accuracy. 展开更多
关键词 classified patches spatial relationship expert knowledge
下载PDF
Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data 被引量:1
14
作者 TENG Yiping CHENG Xiang +2 位作者 SU Sen WANG Yulong SHUANG Kai 《China Communications》 SCIE CSCD 2015年第12期109-121,共13页
In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all... In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution. 展开更多
关键词 similarity keyword preserving cloud collection privacy validity files ranking separate
下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
15
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 keyword search cloud security secure channels proxy re-encryption
下载PDF
Web Information Retrieval: Problem and Prospects
16
作者 Monika Arora Uma Kanjilal Dinesh Varshney 《Computer Technology and Application》 2011年第1期48-57,共10页
The information access is the rich data available for information retrieval, evolved to provide principle approaches or strategies for searching. For building the successful web retrieval search engine model, there ar... The information access is the rich data available for information retrieval, evolved to provide principle approaches or strategies for searching. For building the successful web retrieval search engine model, there are a number of prospects that arise at the different levels where techniques, such as Usenet, support vector machine are employed to have a significant impact. The present investigations explore the number of problems identified its level and related to finding information on web. The authors have attempted to examine the issues and prospects by applying different methods such as web graph analysis, the retrieval and analysis of newsgroup postings and statistical methods for inferring meaning in text. The proposed model thus assists the users in finding the existing formation of data they need. The study proposes three heuristics model to characterize the balancing between query and feedback information, so that adaptive relevance feedback. The authors have made an attempt to discuss the parameter factors that are responsible for the efficient searching. The important parameters can be taken care of for the future extension or development of search engines. 展开更多
关键词 Information retrieval web information retrieval search engine USENET support vector machine relevance feedback.
下载PDF
A color image tracking method based on target characteristic hue decision
17
作者 Xu Yiming Liu Xiaoli Liu Yixin 《Engineering Sciences》 EI 2010年第4期70-73,共4页
Conventional correlation matching algorithms waste great time in invalid area search. This paper proposes a color tracking method based on correlation search area optimization on target characteristic hue decision. By... Conventional correlation matching algorithms waste great time in invalid area search. This paper proposes a color tracking method based on correlation search area optimization on target characteristic hue decision. By quantifying and reducing dimensions of HSV( hue saturation value) color space, a one-dimensional hue space is constructed. In the space, the target characteristic hue granule set is constructed, which contains attributes such as value, area and average distance between pixels and aiming center. By using granular computing method, the similarity between target and search blocks is obtained and the invalid search areas can be removed. The color tracking experiment has proved that the algorithm can improve real time performance for conventional matching algorithms without precision lost. 展开更多
关键词 color image tracking correlation matching characteristic hue granular computing
下载PDF
事故状态下供水管网的拓扑分析 被引量:7
18
作者 陈芃 庄宝玉 赵新华 《中国给水排水》 CAS CSCD 北大核心 2012年第9期48-51,共4页
当供水管网发生类似于爆管或水质污染等事故时,通过拓扑分析快速找到并关闭相应阀门以孤立事故源进而开展事故抢修是非常必要的。结合事故发生时管网的拓扑结构特点,以图论的理论和方法为基础,提出了一种可用于事故状态下供水管网拓扑... 当供水管网发生类似于爆管或水质污染等事故时,通过拓扑分析快速找到并关闭相应阀门以孤立事故源进而开展事故抢修是非常必要的。结合事故发生时管网的拓扑结构特点,以图论的理论和方法为基础,提出了一种可用于事故状态下供水管网拓扑分析的方法。该方法首先利用深度优先搜索算法找到距离事故源最近的阀门,然后通过剔除冗余阀门而确定最优关阀方案及关阀后的事故影响区域,最后调整管网水力模型以适应关阀后管网需水量和拓扑结构的变化。该方法不仅可用于供水管网事故时的关阀调度,还可用于供水系统污染控制分析以及供水管网的性能评价。 展开更多
关键词 供水管网 搜索 拓扑分析 图论 深度搜索算法
原文传递
搜罗天下的小技巧
19
《大视野》 2008年第1期32-32,共1页
"我们若能更妥善地搜寻资料,实在已经改变世界。"搜索引擎为用户查找信息提供了极大的方便,你只需输入几个关键词,任何想要的资料都会从世界各个角落汇集到你的电脑前。然而如果操作不当,搜索效率也是会大打折扣的。尝试下面... "我们若能更妥善地搜寻资料,实在已经改变世界。"搜索引擎为用户查找信息提供了极大的方便,你只需输入几个关键词,任何想要的资料都会从世界各个角落汇集到你的电脑前。然而如果操作不当,搜索效率也是会大打折扣的。尝试下面的小方法,来提高你的搜索效率吧! 展开更多
关键词 键词查询 英文字符 站内搜索 匹配搜索 多媒体元素 查询内容 FURNITURE 搜索精度 搜索关
原文传递
Comparative literature study between investigations in foreign Science Citation Index journals and Chinese core domestic journals in the treatment of low back pain with acupuncture 被引量:2
20
作者 Xiangjun Lin Rui Li 《Journal of Traditional Chinese Medicine》 SCIE CAS CSCD 2014年第3期373-380,共8页
OBJECTIVE: To investigate the quality and meth- ods of clinical research literature published in for- eign Science Citation Index (SCI) journals studying the treatment of low back pain with acupuncture. To conduct ... OBJECTIVE: To investigate the quality and meth- ods of clinical research literature published in for- eign Science Citation Index (SCI) journals studying the treatment of low back pain with acupuncture. To conduct a comparative study with clinical re- search literature published in Chinese core domes- tic journals, and to understand the prospects of cur- rent research trends of acupuncture clinical studies in Western countries and China. METHODS: Studies on clinical acupuncture treat- ment of low back pain in English SCI journals and four Chinese core domestic journals dated from 2002 to 2012 were sourced and summarized for this study. Objective analysis and evaluation on the differences in subject and scope of study on low back pain by foreign and Chinese researchers were conducted. RESULTS: Forty-seven English studies and 115 Chi- nese studies met our inclusion criteria. A keyword search revealed different kinds of low back pain re- lated conditions in English and Chinese studies. The English studies were broad in scope, while the Chinese studies were more focused. There were al-so differences in the understanding and definition of concepts and study orientation. CONCI.IJSION: More study should be undertaken to understand the contradictions that acupuncture faces in view of modern research to further ad- vance the field. 展开更多
关键词 Low back pain Journal impact factor Comparative research
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部