期刊文献+
共找到550篇文章
< 1 2 28 >
每页显示 20 50 100
不同电子病历系统间的数据交换—通过HL7messages交换MML(MedicalMarkup Language)3.0医疗文档 被引量:7
1
作者 郭锦秋 高田彰 +6 位作者 田中亨治 佐藤纯三 铃木斋王 铃木利明 中岛裕生 荒木贤二 吉原博幸 《医学信息(医学与计算机应用)》 2004年第6期313-319,共7页
MML (Medical Markup L anguage) ,作为一套不同医疗信息系统之间的交换规格于 1995年在日本被开发。 1999年正式公布版本 2 .2 1,使用 XML作为标记语言。之后随着大规模的实证实验 ,版本 2 .2 1被进一步修改 ,2 0 0 1年升级为包含 12... MML (Medical Markup L anguage) ,作为一套不同医疗信息系统之间的交换规格于 1995年在日本被开发。 1999年正式公布版本 2 .2 1,使用 XML作为标记语言。之后随着大规模的实证实验 ,版本 2 .2 1被进一步修改 ,2 0 0 1年升级为包含 12个模块的版本 2 .3。而最新版本 3.0是在 HL 7Clinical Docum ent Architecture (CDA)基础上开发而成 ,它将版本 2 .3的结构分割并重新定义 ,以便于用 MML记述的信息能在 HL 7CDAL evel One中表达。开发的结果表明 ,采用 MML版本 3.0形式记述的医疗文档可以通过 HL 7m essages来进行信息交换。 MML完整的规格及有关数据由日本非营利组织 Med XML委员会公开和管理 ,具体可参照 http:/ / www.m edxm l.net/。目前 ,我们正在进行 MML 3.0的中国本地化作业 ,主要包括 MML中所参照的表格的追加和修改以及医疗保险模块等的制作。 展开更多
关键词 电子病历系统 数据交换 HL7messages MML 医疗文档 CDA HL7 XML
下载PDF
Identifying Smartphone Based Intelligent Messages for Worker’s Crossing in Work Zones 被引量:1
2
作者 Fengxiang Qiao Ruksana Rahman +1 位作者 Qing Li Lei Yu 《Journal of Transportation Technologies》 2016年第2期76-85,共10页
A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety i... A smartphone warning system is a feasible option to notify motorists about a safety threat and/or pedestrian crossings ahead. In this paper, a smartphone-based warning system was proposed to enhance workers’ safety in work zones. Three different warning message systems, including sound, male voice and female voice, were designed to alert drivers. Twenty-four subjects were recruited for a total of ninety-six rounds driving simulator test in a work zone to investigate the impacts of smartphone-based warning messages on subjects’ driving performance, in terms of driving speed, speed variation, acceleration, and brake reaction distance. The outcome showed that, with the assistance of the sound and voice (either female or male) warning messages, drivers could effectively reduce their accelerations and speeds. Meanwhile, such a warning system can induce subjects to shorten their brake reaction distances for worker crossings. All participants found that this warning system is applicable to enhance their defensive driving behaviors while driving through a work zone. 展开更多
关键词 Simulator Test Smartphone messages Vehicle-to-Infrastructure (V2I) Work Zones
下载PDF
Digital communication of two-dimensional messages in a chaotic optical system
3
作者 周云 吴亮 朱士群 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2196-2201,共6页
The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity differ... The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly. 展开更多
关键词 digital communication multi-mode laser two-dimensional messages chaotic synchronization
下载PDF
OTT Messages Modeling and Classification Based on Recurrent Neural Networks
4
作者 Guangyong Yang Jianqiu Zeng +3 位作者 Mengke Yang Yifei Wei Xiangqing Wang Zulfiqar Hussain Pathan 《Computers, Materials & Continua》 SCIE EI 2020年第5期769-785,共17页
A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectivel... A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages.In this paper,we propose a nine-rectangle-grid information model according to the information value and privacy,and then present information use policies based on the rough set theory.Recurrent neural networks were employed to classify OTT messages.The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages,ending with a reliable trained classification model.Experimental results showed that the proposed method yielded an accurate classification performance and hence can be used for effective distribution and control of OTT messages. 展开更多
关键词 OTT messages information privacy nine-rectangle-grid hierarchical classification recurrent neural networks
下载PDF
Messages from the International Symposium on Ayurveda & Other Traditional Medicines,Jamnagar,India,January 2000
5
作者 K.P.Skandhan Anup Thakar 《Asian Journal of Andrology》 SCIE CAS CSCD 2000年第4期276-276,共1页
Ayurveda is one of the most ancient medical prac-tice in the world with a history of 5000 years. Vajikaranais a branch of Ayurveda dealing with male potency andfertility. Almost all male diseases and therapeutic mea-s... Ayurveda is one of the most ancient medical prac-tice in the world with a history of 5000 years. Vajikaranais a branch of Ayurveda dealing with male potency andfertility. Almost all male diseases and therapeutic mea-sures have been described here. In the International Symposium on Ayurveda andOther Traditional Medicines, two scientific Sessions wereexclusively devoted to Rasayana (rejuvenation) and Va-jikarana, conducted on January 5- 6, 2000 at GujaratAyurved University, Jamnagar under the patronship ofthe Honorable Vice-Chancellor, Dr. P. N. V. Kurup.Besides the Indian specialists, scientists from Australia, 展开更多
关键词 In messages from the International Symposium on Ayurveda Other Traditional Medicines Jamnagar India January 2000
下载PDF
Model of Overlapping Messages with Degenerate Coding
6
作者 Valery Kirzhner Zeev Volkovich 《Applied Mathematics》 2012年第2期188-197,共10页
Superposition of signals in DNA molecule is a sufficiently general principle of information coding. The necessary re-quirement for such superposition is the degeneracy of the code, which allows placing different messa... Superposition of signals in DNA molecule is a sufficiently general principle of information coding. The necessary re-quirement for such superposition is the degeneracy of the code, which allows placing different messages on the same DNA fragment. Code words that are equivalent in the informational sense (i.e., synonyms) form synonymous group and the entire set of code words is partitioned into synonymous groups. This paper is dedicated to constructing and analyzing the model of synonymous coding. We evaluate some characteristics of synonymous coding as applied to code words of length two although many definitions may be extended for words of arbitrary length. 展开更多
关键词 OVERLAPPING messages DEGENERATE CODING Sequence COMPACTING De Bruijn Graph DNA TRIPLET Code
下载PDF
Adapting LTE M-2-M Protocol Standard to Fulfil Latency Requirements for IEC 61850 GOOSE Messages
7
作者 Ali M. Allam Mohamed Saied Ihab Aly 《International Journal of Communications, Network and System Sciences》 2015年第5期154-160,共7页
Generic Object Oriented Substation Event (GOOSE) Messages face a great challenge in its communication requirements especially in latency point of view. The appearance of the Long-Term Evolution (LTE) has opened a new ... Generic Object Oriented Substation Event (GOOSE) Messages face a great challenge in its communication requirements especially in latency point of view. The appearance of the Long-Term Evolution (LTE) has opened a new way that can be used due to its great performance, compared with previous wireless technologies. In order to use LTE technology within the GOOSE message transfer, several points must be put into consideration, and additional requirements need to be within both LTE User Equipment (UE) side and network side. In this paper, we are going to adapt part of the LTE standards to fulfil the requirements of GOOSE messages which needs latency more than or equal to 20 ms, using an experimental approach. The results show that LTE can satisfy the target requirements of latency within the acceptable Bit Error Rate (BER). 展开更多
关键词 M2M LTE-A GOOSE messages Smart Grid
下载PDF
Calibration of Car-Following Models Considering the Impacts of Warning Messages from Tablet/Smartphone Application
8
作者 Qing Li Fengxiang Qiao Lei Yu 《Journal of Transportation Technologies》 2016年第2期61-75,共15页
The phenomenon of car-following is special in traffic operations. Traditional car-following models can well describe the reactions of the movements between two concessive vehicles in the same lane within a certain dis... The phenomenon of car-following is special in traffic operations. Traditional car-following models can well describe the reactions of the movements between two concessive vehicles in the same lane within a certain distance. With the invention of connected vehicle technologies, more and more advisory messages are in development and applied in our daily lives, some of which are related to the measures and warnings of speed and headway distance between the two concessive vehicles. Such warnings may change the conventional car-following mechanisms. This paper intends to consider the possible impacts of in-vehicle warning messages to improve the traditional car-following models, including the General Motor (GM) Model and the Linear (Helly) Model, by calibrating model parameters using field data from an arterial road in Houston, Texas, U.S.A. The safety messages were provided by a tablet/smartphone application. One exponent was applied to the GM model, while another one applied to the Linear (Helly) model, both were on the stimuli term “difference in velocity between two concessive vehicles”. The calibration and validation were separately conducted for deceleration and acceleration conditions. Results showed that, the parameters of the traditional GM model failed to be properly calibrated with the interference of in-vehicle safety messages, and the parameters calibrated from the traditional Linear (Helly) Model with no in-vehicle messages could not be directly used in the case with such messages. However, both updated models can be well calibrated even if those messages were provided. The entire research process, as well as the calibrated models and parameters could be a reference in the on-going connected vehicle program and micro/macroscopic traffic simulations. 展开更多
关键词 Car-Following Model SMARTPHONE TABLET Warning messages Connected Vehicles
下载PDF
Congratulatory Messages For The New Year
9
《China's Foreign Trade》 2009年第1期36-41,共6页
Bulgaria Dear Chinese Friends, It is a true honor for me to use the pages of china's Foreign Trade and ad- dress this Chinese Lunar New Year wishes to you and your families on my behalf and on behalf of the people... Bulgaria Dear Chinese Friends, It is a true honor for me to use the pages of china's Foreign Trade and ad- dress this Chinese Lunar New Year wishes to you and your families on my behalf and on behalf of the people of Bulgaria. I am aware of the significance of this year of'ox',when the working peo- ple in China can take weeks of holidays so that they can ioin the company 展开更多
关键词 Congratulatory messages For The New Year AS
下载PDF
CONGUATULATORY MESSAGES FROM AMBASSADORS TO CHINA
10
《China's Foreign Trade》 2004年第19期6-25,共20页
As the Chinese people are celebrating the 55th anniversary of the founding of the People's Republic of China, the Chinese government has taken important steps toward political, social, economical, and cultural dev... As the Chinese people are celebrating the 55th anniversary of the founding of the People's Republic of China, the Chinese government has taken important steps toward political, social, economical, and cultural developments and has made it possible for its people to live in prosperity and as part of a peaceful society. The people of China are proud of their cultural heritage and the positive contributions they have made to world civilization over the past 4000 years. 展开更多
关键词 CONGUATULATORY messages FROM AMBASSADORS TO CHINA 口口
下载PDF
Extracts of Congratulatory Messages from Domestic and Overseas Organizations on the 30^(th) Anniversary of CAFIU
11
作者 Shi Dongmei 《International Understanding》 2011年第3期51-56,共6页
All-China Federation of Trade Unions On this occasion of the 30th anniversary of the Chinese Association for International Understanding (CAFIU), the All-China Federation of Trade Unions would like to send its warmest... All-China Federation of Trade Unions On this occasion of the 30th anniversary of the Chinese Association for International Understanding (CAFIU), the All-China Federation of Trade Unions would like to send its warmest congratulations. Since its founding, CAFIU 展开更多
关键词 Anniversary of CAFIU Extracts of Congratulatory messages from Domestic and Overseas Organizations on the 30 th
下载PDF
Messages on the Path
12
作者 Corey Amaro 《疯狂英语(初中天地)》 北大核心 2008年第10期66-67,共2页
There is a message in each step on the path. Gathered in the bold stones and softened by the moss, Rising to meet you in the leaf that sprouts from the crack,
关键词 messages on the Path
下载PDF
Congratulatory Messages For The New Year
13
《China's Foreign Trade》 2008年第1期16-21,共6页
Embassy of the United States Of America Beijing,China Dear friends, On behalf of the United States Government and especially the men and women of the United States Embassy in Beijing,I wish to extend to the staff,memb... Embassy of the United States Of America Beijing,China Dear friends, On behalf of the United States Government and especially the men and women of the United States Embassy in Beijing,I wish to extend to the staff,members and readers of China's For- eign Trade our warmest wishes and greetings for holiday season. 2007 was a great year for United States-Chinese 展开更多
关键词 Congratulatory messages For The New Year
下载PDF
CONGRATULATORY MESSAGES FROM CHINESE AND SOUTH AFRICAN PRESIDENTS
14
《ChinAfrica》 2015年第4期14-14,共1页
Your Excellency Mr. Jacob Gedleyihlekisa Zuma, President of the Republic of South Africa. Thanks to the concerted efforts of our two sides, following the success of the Year of South Africa in China in 2014. the Year ... Your Excellency Mr. Jacob Gedleyihlekisa Zuma, President of the Republic of South Africa. Thanks to the concerted efforts of our two sides, following the success of the Year of South Africa in China in 2014. the Year of China in South Africa 2015 is now solemnly launched in the beautiful city of Pretoria. On behalf of the Chinese Government and people, I would like to extend to you our warm congratulations. I have designated Mr. Luo Shugang. Minister of Culture, to attend the opening ceremony as the repre-sentative of the Chinese Government. 展开更多
关键词 CONGRATULATORY messages FROM CHINESE AND SOUTH AFRICAN PRESIDENTS
下载PDF
THE APPLICATION OF THE CODE MESSAGES THEORY IN ACUPUNCTURE AND MOXIBUSTION
15
作者 Nabil H. N. Elmadi, International College of TCM, Tianjin, China 《World Journal of Acupuncture-Moxibustion》 1993年第1期57-60,共4页
The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kind... The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kinds of energy:such as: Electrical, Magnetic, Electromagnetic,Chemical, Thermic, Gravity & antigravity, Light,Sound vibration and motor, etc. These messages are sent by specialized cells(transmitters)through the communication system tospecialized receptors which can perform the transformation and the transportation and code modifica-tion of the message energy and the message to another energy and code understandable by the masterof the human body "the Brain". "The Brain" will analyse the message and responds accordingly by sending order messages to dif-ferent parts of the body following the same role, i. e., by an electrical messages which can be trans-formed to another type of energy messages, like, chemical, motor, thermal, etc. by special receptorsand transmitters in the organ or the related tissues. 展开更多
关键词 MESSAGE CODES sending TRANSMITTER accordingly specialized CODE TRANSPORTATION transmitting resemble
下载PDF
Secure authentication of classical messages with single photons
16
作者 王天银 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3189-3192,共4页
This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid me... This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. 展开更多
关键词 message authentication codes single photons hash function
下载PDF
A Robust Emergency Messages Routing Scheme for Urban VANETs
17
作者 Mumtaz Ali Shah Farrukh Zeeshan Khan Ghulam Abbas 《Computers, Materials & Continua》 SCIE EI 2022年第8期2617-2632,共16页
Vehicular ad-hoc networks(VANETs)play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities.Direction-based greedy protocols pick the ne... Vehicular ad-hoc networks(VANETs)play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities.Direction-based greedy protocols pick the next route vehicle for transmitting emergency messages(EMs)depending upon the present location of adjacent vehicles towards sink vehicles by using an optimal uni-directional road traffic approach.Nevertheless,such protocols suffer performance degradation by ignoring the moving directions of vehicles in bi-directional road traffic where topological changes happen continuously.Due to the high number of vehicles,it is essential to broadcast EMs to all vehicles to prevent traffic delays and collisions.A cluster-based EM transmitting technique is proposed in this paper.For urban VANETs,this paper pioneers the clustering of bi-directional road traffic for robust and efficient routing of EMs.In this regard,this paper introduces a routing protocol,namely,the bi-directional urban routing protocol(BURP).In addition to the paths and relative locations of vehicles,BURP takes account of the distance parameter by using the Hamming distance function to determine the direction ofmotion of vehicles and communicates EMs through the cluster head(CH).Amodified k-medoids algorithm is presented for the clustering of bi-directional road traffic.A median method is presented for selecting CH to ensure the longrunning of a cluster.Simulation results show that BURP provides enhanced throughput,a maximized packet delivery ratio,low energy consumption,and network delay relative to eminent routing protocols. 展开更多
关键词 Vehicular ad hoc networks bi-directional road traffic routing protocol emergency message broadcasting direction-based greedy forwarding
下载PDF
Drivers’ Reaction of Warning Messages in Work Zone Termination Areas with Left Turn
18
作者 Boya You Fengxiang Qiao Lei Yu 《Journal of Transportation Technologies》 2016年第3期139-147,共9页
Work-zone crashes have always drawn public attention. A number of fatalities are recorded every year nationwide within work zone areas. Most existing countermeasures have been dedicated more to the advance warning are... Work-zone crashes have always drawn public attention. A number of fatalities are recorded every year nationwide within work zone areas. Most existing countermeasures have been dedicated more to the advance warning areas, transition areas, and activity areas of work zone, than the termination areas, where drivers might play less attention to safety threats. In this study, the vehicle-to-vehicle communication based left turn warning system was applied at a work zone termination area, which is immediately followed by a T-intersection. The work-zone is located on the minor road side, while left turn vehicles will be appearing from the major street through the said T-intersection. A smart phone application was designed using Android coding system to provide several types of warning messages to drivers. Corresponding scenarios were designed in a driving simulator, and 20 subjects were recruited to participate in the simulation test followed by a questionnaire survey. The subjects received a warning message when driving to the termination area of a work zone on the coming left turn vehicles. Twenty test drivers’ driving speed, acceleration rates, and break reaction distance to the warning messages were studied in four different scenarios. Results show that the smartphone application has a great impact on driving behaviors, especially the female voice and the beep tone warning, which are recommended for possible field tests. Besides, the developed smartphone applications can be further updated for practical applications of similar needs. 展开更多
关键词 Left-Turn Warning Message Drivers’ Smart Advisory System (DSAS) Driving Simulator Test Smartphone Application Workzone Termination Area
下载PDF
Digital tildes ("~") may convey more: analyzing innovative uses of tildes in Chinese WeChat messages
19
作者 Huan Xu Dengshan Xia 《Language and Semiotic Studies》 2023年第3期443-460,共18页
Innovative uses of punctuation in online communication have become increasingly visible in research and public awareness since the 2000s,whereas studies on the innovative use of tildes("~")in digital use rem... Innovative uses of punctuation in online communication have become increasingly visible in research and public awareness since the 2000s,whereas studies on the innovative use of tildes("~")in digital use remain scarce.Drawing on a data set of 543 Chinese WeChat messages with sentence-final tildes,this article investigates the uses and functions of innovative tildes in online communication using quantitative data and follow-up interviews.The findings suggest that:(1)The innovative tildes are deployed in messages implying sounds and performing speech acts in online communication,and they are more frequently used in speech acts(e.g.,expressives and directives in particular).(2)The innovative tildes convey sound extension,ie.,to compensate for the loss of audio information in online communication and reproduce elongated sounds;pragmatic function,i.e.,to enhance or mitigate the illocutionary forces of speech acts;and entertaining function,i.e.,to make messages informal,vivid,joyful,and interesting.(3)The innovative tildes are pragmalicalized as a result of their semiotic features and politeness motivation of messengers for maintaining rapport and achieving successful online communication. 展开更多
关键词 innovative uses of tildes online communication POLITENESS pragmatic-alization WeChat messages
原文传递
BDSec:Security Authentication Protocol for BeiDou-II Civil Navigation Message
20
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-II civil navigation message(BDII-CNAV)are vulnerable to spoofing attack and replay attack.To solve this problem,we present a se... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-II civil navigation message(BDII-CNAV)are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM)series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDII-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism)to protect the integrity of the BDII-CNAV,adopts the SM2 algorithm(Public key cryptosystem)to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm)to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDII-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
上一页 1 2 28 下一页 到第
使用帮助 返回顶部