期刊文献+
共找到61,970篇文章
< 1 2 250 >
每页显示 20 50 100
BC-PC-Share:Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing
1
作者 Caihui Lan Haifeng Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2985-3010,共26页
Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver sett... Sharing of personal health records(PHR)in cloud computing is an essential functionality in the healthcare system.However,how to securely,efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed.For instance,since the trust domain of the cloud server is not identical to the data owner or data user,the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource,to pursue maximum economic interest or other malicious purposes.Thus,the PHRs data storing or sharing via the cloud server should be performed with consistency and integrity verification.Fortunately,the emergence of blockchain technology provides new ideas and prospects for ensuring the consistency and integrity of shared PHRs data.To this end,in this work,we leverage the consortiumblockchain technology to enhance the trustworthiness of each participant and propose a blockchain-based patient-centric data sharing scheme for PHRs in cloud computing(BC-PC-Share).Different from the state-of-art schemes,our proposal can achieve the following desired properties:(1)Realizing patient-centric PHRs sharing with a public verification function,i.e.,which can ensure that the returned shared data is consistent with the requested shared data and the integrity of the shared data is not compromised.(2)Supporting scalable and fine-grained access control and sharing of PHRs data with multiple domain users,such as hospitals,medical research institutes,and medical insurance companies.(3)Achieving efficient user decryption by leveraging the transformation key technique and efficient user revocation by introducing time-controlled access.The security analysis and simulation experiment demonstrate that the proposed BC-PC-Share scheme is a feasible and promising solution for PHRs data sharing via consortium blockchain. 展开更多
关键词 Blockchain patient-centric personal health records data sharing attribute-based encryption
下载PDF
A New Double Layer Multi-Secret Sharing Scheme
2
作者 Elavarasi Gunasekaran Vanitha Muthuraman 《China Communications》 SCIE CSCD 2024年第1期297-309,共13页
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i... Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods. 展开更多
关键词 genetic algorithm oppositional whale optimization algorithm rectangle block cipher secret sharing scheme SHARES universal share
下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
3
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing Internet of Things ORACLE
下载PDF
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
4
作者 高甘 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期254-257,共4页
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three... In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David. 展开更多
关键词 security loophole rearranging orders semi-quantum secret sharing single particles
原文传递
Prevalence and Factors Associated with Sharing of Human Immunodeficiency Seropositivity Status among Serodiscordant Couples in the City of Parakou (Benin)
5
作者 Djossou Sègnon Eurydice Elvire Damien Georgia Barikissou +7 位作者 Meba Bio Mamatou Tokpanoude Ignace Ahanhanzo-Glele Rhonel Ataigba Iretinethania Elie Agossoukpe Benoit Kakpo-Zannou Rodrigue Kamoutchoni Corneille Aguemon Badirou 《Open Journal of Epidemiology》 2024年第1期1-18,共18页
Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing am... Introduction: In serodiscordant couples, sharing serostatus is a crucial step in the HIV risk management process. The aim of this study was to determine the prevalence and factors associated with serostatus sharing among HIV serodiscordant couples in the city of Parakou. Setting and methods: This study was carried out in the city of Parakou, capital of northern Benin. It was a descriptive, analytical cross-sectional study with non-probability sampling for convenience. Socio-demographic data, as well as data on antecedents, behaviours, social and marital life, were collected using a questionnaire gave to the participants. Clinical and therapeutic data were collected from patients’ medical records and follow-up charts. Data were analyzed and processed using R 4.3.1 software. The significance level was set at 5%, and logistic regression was used to identify potential predictors of shared serostatus among serodiscordant couples in the city of Parakou in 2022. Results: A total of 299 participants in long-term serodiscordant relationships were included in our study. The average age of the subjects was 37.55 ± 10.25 years. Women were the infected partner in 80.27% of cases. The most common level of education was secondary (33.45%). Most respondents (230 subjects, 76.92%) were married. The average duration of the couple’s relationship was 121.68 months ± 96.32. The most frequent screening circumstances were: Prevention of mother-to-child transmission (PMTCT) (50.84%) and hospital screening (26.09%). The infected partner shared his or her serostatus with his or her spouse in 47.83% of cases. Potential predictors of serostatus sharing within the couple were: marital status (p Conclusion: The sharing of serostatus within serodiscordant couples needs to be managed in a way that takes into account the social and marital characteristics of the couple. 展开更多
关键词 Serodiscordance sharing of Serostatus HIV PARTNER BENIN
下载PDF
Blockchain-Based MCS Detection Framework of Abnormal Spectrum Usage for Satellite Spectrum Sharing Scenario
6
作者 Ning Yang Heng Wang +3 位作者 Jingming Hu Bangning Zhang Daoxing Guo Yuan Liu 《China Communications》 SCIE CSCD 2024年第2期32-48,共17页
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit... In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework. 展开更多
关键词 blockchain hypothesis test mobile crowdsensing satellite communication spectrum sharing
下载PDF
Layered Coded Cache Placement and Cooperative Delivery with Sharing Links in Satellite-Terrestrial Integrated Networks
7
作者 Gu Shushi Chen Zihan +2 位作者 Wu Yaonan Zhang Qinyu Wang Ye 《China Communications》 SCIE CSCD 2024年第3期217-229,共13页
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver... Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances. 展开更多
关键词 coded content placement cooperative delivery energy efficiency sharing links STINs
下载PDF
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms
8
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data
9
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Impact of Sharing Marketing on Marketing Willingness of Employees in Internet Decoration Industry
10
作者 Zhongxin LI 《Asian Agricultural Research》 2024年第1期10-13,共4页
With the development of information technology,sharing marketing,as an innovative marketing method,plays an important role in promoting the marketing willingness and enthusiasm of employees in the Internet decoration ... With the development of information technology,sharing marketing,as an innovative marketing method,plays an important role in promoting the marketing willingness and enthusiasm of employees in the Internet decoration industry.Based on the data obtained from the ques-tionnaire survey,this paper makes an empirical analysis of the impact of the economic value,social value,perceived ease of use,perceived convenience,enabling conditions and subjective norms of sharing marketing on the marketing willingness of employees in the Internet decoration industry.The results showed that the questionnaire had good internal consistency and construct validity.Through empirical analysis,it can be found that the economic value,social value,perceived ease of use,perceived convenience,enabling conditions and subjective norms of sharing marketing have a significant positive impact on employees'marketing willingness. 展开更多
关键词 MARKETING sharing marketing Internet decoration Marketing willingness
下载PDF
A study on the influencing factors of rural tourism promoting households'shared prosperity in Yinan County of Shandong Province
11
作者 YU Feng XIE Ai-liang 《Ecological Economy》 2024年第1期72-84,共13页
This study examines the influencing factors of rural tourism in promoting shared prosperity among households,using the case study of Yinan County in Shandong province,China.The research aims to provide insights into t... This study examines the influencing factors of rural tourism in promoting shared prosperity among households,using the case study of Yinan County in Shandong province,China.The research aims to provide insights into the economic benefits experienced by low-income households in the context of rural tourism development.Based on field research conducted from April 8,2023,to May 17,2023,including interviews and site visits,the study constructs an evaluation index system to assess the influencing factors.Through expert scoring and the application of a weighted set-valued mathematical statistical model,the importance and quantification of each factor are determined.The results indicate that the current stage of promoting shared prosperity through rural tourism in Yinan County is primarily influenced by the scale of tourist consumption of external visitors.This factor outweighs others such as the participation capacity and willingness of low-income households,the capacity of investment enterprises,and the policies and financial allocation of the local government.The findings emphasize the significance of external visitor spending and highlight the need to address the obstacles faced by low-income households in accessing economic benefits.The evaluation index system and measurement model presented in this study offer a scientific basis for assessing and improving the income situation of low-income households in rural tourism development initiatives.However,it is crucial to note that the importance of these influencing factors may evolve with the lifecycle of the tourism destination.Future research should include long-term tracking and consider a broader range of indicators to deepen our understanding of their mechanisms and significance.Furthermore,alternative approaches and theories may provide valuable perspectives for further exploration in this field. 展开更多
关键词 rural tourism households shared prosperity influencing factors economic benefits
原文传递
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
12
作者 Yan Dong 《Journal of Computer and Communications》 2024年第3期101-106,共6页
The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, e... The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities. 展开更多
关键词 Intelligent Security System Higher Education Park Open sharing
下载PDF
A Novel Agricultural Data Sharing Mode Based on Rice Disease Identification
13
作者 Mengmeng ZHANG Xiujuan WANG +3 位作者 Mengzhen KANG Jing HUA Haoyu WANG Feiyue WANG 《Plant Diseases and Pests》 2024年第2期9-16,共8页
In this paper,a variety of classical convolutional neural networks are trained on two different datasets using transfer learning method.We demonstrated that the training dataset has a significant impact on the trainin... In this paper,a variety of classical convolutional neural networks are trained on two different datasets using transfer learning method.We demonstrated that the training dataset has a significant impact on the training results,in addition to the optimization achieved through the model structure.However,the lack of open-source agricultural data,combined with the absence of a comprehensive open-source data sharing platform,remains a substantial obstacle.This issue is closely related to the difficulty and high cost of obtaining high-quality agricultural data,the low level of education of most employees,underdeveloped distributed training systems and unsecured data security.To address these challenges,this paper proposes a novel idea of constructing an agricultural data sharing platform based on a federated learning(FL)framework,aiming to overcome the deficiency of high-quality data in agricultural field training. 展开更多
关键词 Rice disease and pest identification Convolutional neural networks Distributed training Federated learning(FL) Open-source data sharing platform
下载PDF
Research on the Optimization of Enterprise Financial Management under the Financial Sharing Model
14
作者 Feiyang Zhang 《Proceedings of Business and Economic Studies》 2024年第1期180-185,共6页
With the advancement of globalization and information technology,the financial sharing mode has gradually emerged as a crucial means for enterprises to optimize their financial management.Particularly within the conte... With the advancement of globalization and information technology,the financial sharing mode has gradually emerged as a crucial means for enterprises to optimize their financial management.Particularly within the context of economic globalization,informatization,and digital transformation,enterprises find themselves navigating a rapidly evolving market environment by intensifying competition.To enhance efficiency and competitiveness,many enterprises have embraced the financial sharing model to streamline financial management processes,curtail costs,and bolster the execution of corporate strategies.This article aims to dissect the definition and essence of the financial sharing model and its significance in the realm of enterprise financial management.Drawing upon this analysis and aligning with the needs of enterprise financial management,the article proposes ideas for optimizing management practices,aspiring to foster reform and innovation in enterprise financial management while enhancing its level of financial management and ability to respond to financial risks.This contribution seeks to provide valuable insights for practitioners in the field. 展开更多
关键词 Financial sharing Enterprise management Financial management Management optimization
下载PDF
基于改进Theil指数和Shift-Share模型的2012—2021年中国产业偏离分析
15
作者 高孝伟 张颖昆 +1 位作者 李华 王苏梦 《资源与产业》 2024年第1期15-24,共10页
文章首先通过对现有文献的梳理和分析,发现针对产业偏离的测算,传统的产业偏离度E系数、Theil指数及Shift-Share模型均存在一定的缺陷,E系数和Theil指数的缺陷主要体现在计算原理方面,而Shift-Share模型的缺陷主要表现在参照系选择的合... 文章首先通过对现有文献的梳理和分析,发现针对产业偏离的测算,传统的产业偏离度E系数、Theil指数及Shift-Share模型均存在一定的缺陷,E系数和Theil指数的缺陷主要体现在计算原理方面,而Shift-Share模型的缺陷主要表现在参照系选择的合理性和数据采集的可行性方面。然后,基于现有模型的基本原理,提出了更为合理和更具可操作性的产业偏离测算方法,再采用实证研究的方法,根据2012—2021年的数据,对中国的产业偏离情况进行具体分析,得出尽管中国存在产业偏离,但产业偏离度在逐渐减小。最后,基于修正模型的计算结果,并结合当前的国际国内环境,提出如下政策建议:1)第一产业要依靠创新和科技引领,促进农村劳动力在城乡间有序转移,实现农业生产的规模化和现代化;2)第二产业要加快产业的升级换代,建立和保持独立、自主、完整的工业体系,加大在基础研究方面的投入,尽早突破美西方的技术封锁;3)第三产业的发展重点应该在金融和科教两个方面,要进一步提升香港地区、上海和北京等城市的世界金融中心地位,依靠金融创新来规避现行国际金融体系的不利约束和影响,同时要将科教兴国战略落到实处,努力探索适合中国国情的从小学到大学各阶段的教育模式。 展开更多
关键词 三次产业 偏离度 THEIL系数 Shift-Share模型 产业结构优化
原文传递
SHARE交接班模型在术后患者转运中的应用及临床获益分析
16
作者 丁晓兰 张晨霞 +1 位作者 王金兰 张玉娟 《中国研究型医院》 2023年第5期46-50,共5页
目的建立术后患者SHARE转运交接班模型,并评价其临床应用效果。方法选取2022年10月—2023年3月于我院住院的手术患者200例。随机分为观察组和对照组,每组100例。观察组采用SHARE转运交接班模型,对照组采用传统术后转运交接模型。比较两... 目的建立术后患者SHARE转运交接班模型,并评价其临床应用效果。方法选取2022年10月—2023年3月于我院住院的手术患者200例。随机分为观察组和对照组,每组100例。观察组采用SHARE转运交接班模型,对照组采用传统术后转运交接模型。比较两组患者采取不同的转运交接模型的不良事件发生率、转运时间、转运规范性和满意率。符合正态分布的计量资料以xˉ±s表示,组间比较采用t检验;计数资料以例数(%)表示,采用χ^(2)检验或Fisher确切概率法。结果观察组患者的引流管打折固定不规范、导尿管受压、留置针拔脱的发生率较对照组均明显下降,差异均有统计学意义(χ^(2)分别为4.613、6.157、5.158,P均<0.05)。观察组患者的手术室至复苏室所用时间为(3.48±0.38)min,从复苏室至病房所用时间为(5.94±0.24)min,均显著小于对照组的(3.85±0.39)min、(7.46±0.39)min,差异均有统计学意义(t值分别为-3.29、-16.77,P均<0.05)。观察组转运患者的规范性明显提高(χ^(2)=10.317,P<0.01)。观察组患者、医师及护士对于医疗过程的满意率均明显高于对照组,差异均有统计学意义(χ^(2)分别为12.374、4.500、7.791,P均<0.05)。结论SHARE转运交接班模型有利于降低术后患者不良事件发生率、节约转运时间、提高转运规范性及满意率。 展开更多
关键词 医院 手术后期间 护理管理研究 SHARE交接班模型
下载PDF
SHARE数据库介绍与数据提取方法
17
作者 李静 田国祥 +5 位作者 郭佳钰 陈冲 乔萌萌 程洪涛 吕军 李媛洁 《中国循证心血管医学杂志》 2023年第9期1036-1039,共4页
人口老龄化是人类社会成功的标志之一,同时全球医疗服务体系也面临着老龄化带来的巨大冲击和挑战。SHARE数据库是研究欧洲公民生命历程中健康、社会、经济和环境等因素对老龄化的影响的基础研究数据库,同时也是最大的欧洲社会科学小组研... 人口老龄化是人类社会成功的标志之一,同时全球医疗服务体系也面临着老龄化带来的巨大冲击和挑战。SHARE数据库是研究欧洲公民生命历程中健康、社会、经济和环境等因素对老龄化的影响的基础研究数据库,同时也是最大的欧洲社会科学小组研究,该数据库提供了国际可比的纵向微观数据,使人们能够了解欧洲个人的公共卫生和社会经济生活条件。本文将对SHARE数据库架构进行介绍,指引用户在官网上如何下载提取数据,旨在为医学科研者提供一个高质量的医学公共数据资源平台。 展开更多
关键词 SHARE数据库 数据挖掘 纵向研究 老龄化
下载PDF
Artificial intelligence promotes shared decision-making through recommending tests to febrile pediatric outpatients 被引量:1
18
作者 Wei-hua Li Bin Dong +9 位作者 Han-song Wang Jia-jun Yuan Han Qian Ling-ling Zheng Xu-lin Lin Zhao Wang Shi-jian Liu Bo-tao Ning Dan Tian Lie-bin Zhao 《World Journal of Emergency Medicine》 SCIE CAS CSCD 2023年第2期106-111,共6页
BACKGROUND:To promote the shared decision-making(SDM)between patients and doctors in pediatric outpatient departments,this study was designed to validate artificial intelligence(AI)-initiated medical tests for childre... BACKGROUND:To promote the shared decision-making(SDM)between patients and doctors in pediatric outpatient departments,this study was designed to validate artificial intelligence(AI)-initiated medical tests for children with fever.METHODS:We designed an AI model,named Xiaoyi,to suggest necessary tests for a febrile child before visiting a pediatric outpatient clinic.We calculated the sensitivity,specificity,and F1 score to evaluate the efficacy of Xiaoyi’s recommendations.The patients were divided into the rejection and acceptance groups.Then we analyzed the rejected examination items in order to obtain the corresponding reasons.RESULTS:We recruited a total of 11,867 children with fever who had used Xiaoyi in outpatient clinics.The recommended examinations given by Xiaoyi for 10,636(89.6%)patients were qualified.The average F1 score reached 0.94.A total of 58.4%of the patients accepted Xiaoyi’s suggestions(acceptance group),and 41.6%refused(rejection group).Imaging examinations were rejected by most patients(46.7%).The tests being time-consuming were rejected by 2,133 patients(43.2%),including rejecting pathogen studies in 1,347 patients(68.5%)and image studies in 732 patients(31.8%).The difficulty of sampling was the main reason for rejecting routine tests(41.9%).CONCLUSION:Our model has high accuracy and acceptability in recommending medical tests to febrile pediatric patients,and is worth promoting in facilitating SDM. 展开更多
关键词 Artificial intelligence Pediatric outpatient Medical examinations Shared decision-making
下载PDF
SHARE模式在我国癌症患者不幸消息告知中的应用 被引量:2
19
作者 王慧琳 白杨 +6 位作者 张永明 覃胜灵 邹宝华 王超 孙瑞 丛明华 杨敏 《中国医刊》 CAS 2023年第2期141-143,共3页
不幸消息告知(breaking bad news,BBN)是医务工作者必备且极具挑战的重要医患沟通技能,应用恰当的沟通模式进行BBN操作,可以有效提高癌症患者对病情的正确认知、治疗依从性和满意度,同时缓解不幸消息对患者情绪的不良影响等。国内外近... 不幸消息告知(breaking bad news,BBN)是医务工作者必备且极具挑战的重要医患沟通技能,应用恰当的沟通模式进行BBN操作,可以有效提高癌症患者对病情的正确认知、治疗依从性和满意度,同时缓解不幸消息对患者情绪的不良影响等。国内外近年来开展了大量BBN相关研究及实践,并形成了多种沟通模式,其中SHARE模式被认为相对更适用于我国医疗环境繁忙及家属参与决策的文化背景。为了更好地适应当前我国知情权和决定权逐渐回归患者自身的趋势,提高我国医务工作者的医患沟通能力,本研究概述了SHARE模式在我国癌症患者BBN中的应用,重点阐述了其在我国的沟通对象,以及BBN对癌症患者心理状态等方面的影响。 展开更多
关键词 不幸消息告知 SHARE模式 癌症患者 医患沟通
下载PDF
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
20
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 量子秘密共享 协议 格林 可重复使用 物理学 GHZ 窃听
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部