期刊文献+
共找到719篇文章
< 1 2 36 >
每页显示 20 50 100
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding
1
作者 王一铭 黄树锋 +2 位作者 陈煌 杨健 蔡述庭 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期287-302,共16页
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete... A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality. 展开更多
关键词 visual security image encryption parallel compressive sensing edge detection embedding
原文传递
How Sense of Ritual in Tourism Impacts Tourists’Co-Creation of Tourism Experience Values:A Study Based on the Theory of Value Co-Creation
2
作者 Yi Min Zhang Guangyu Sun Genjin 《Contemporary Social Sciences》 2024年第2期67-84,共18页
Establishing a sense of ritual within tourism consumption scenarios offers tourists the opportunity for interactive engagement.Drawing upon the value co-creation theory,this study constructed an influence mechanism mo... Establishing a sense of ritual within tourism consumption scenarios offers tourists the opportunity for interactive engagement.Drawing upon the value co-creation theory,this study constructed an influence mechanism model to examine tourists'active engagement in the process of co-creating tourism experience values.It employed Partial Least Squares Structural Equation Modeling(PLS-SEM)to empirically test the proposed hypotheses.The findings demonstrate that the model constructed in the present study exhibits robust reliability,validity,and explanatory power.The perception of the sense of ritual in tourism exerts a significant positive influence on tourists’co-creation of tourism experience values,thereby significantly enhancing both the communitas and flow experienced by tourists during their travels.Moreover,such communitas and flow can mediate the influence of the sense of ritual in tourism on tourists’co-creation of tourism experience values.This study contributes to advancing the current research on tourists’co-creation of tourism experience values and the sense of ritual in tourism,thereby providing theoretical foundations for cultivating a sense of ritual within tourism consumption scenarios. 展开更多
关键词 sense of ritual in tourism tourists’co-creation of tourism experience values theory of value co-creation theory of Interaction Ritual Chains
下载PDF
Ecological Security Assessment and the Sustainable Development of Tourist Destination—A Case Study of Taining Scenic Area 被引量:1
3
作者 景秀艳 《Journal of Landscape Research》 2010年第10期61-65,75,共6页
With Taining national scenic area as the case study, the guidance of ecological footprint analysis on the sustainable development of tourist destination was expounded.
关键词 ECOLOGICAL security tourist ECOLOGICAL FOOTPRINT tourist SUSTAINABLE development Taining SCENIC area
下载PDF
Framework of SAGI Agriculture Remote Sensing and Its Perspectives in Supporting National Food Security 被引量:16
4
作者 SHI Yun JI Shun-ping +5 位作者 SHAO Xiao-wei TANG Hua-jun WU Wen-bin YANG Peng ZHANG Yong-jun Shibasaki Ryosuke 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2014年第7期1443-1450,共8页
Remote sensing, in particular satellite imagery, has been widely used to map cropland, analyze cropping systems, monitor crop changes, and estimate yield and production. However, although satellite imagery is useful w... Remote sensing, in particular satellite imagery, has been widely used to map cropland, analyze cropping systems, monitor crop changes, and estimate yield and production. However, although satellite imagery is useful within large scale agriculture applications (such as on a national or provincial scale), it may not supply sufifcient information with adequate resolution, accurate geo-referencing, and specialized biological parameters for use in relation to the rapid developments being made in modern agriculture. Information that is more sophisticated and accurate is required to support reliable decision-making, thereby guaranteeing agricultural sustainability and national food security. To achieve this, strong integration of information is needed from multi-sources, multi-sensors, and multi-scales. In this paper, we propose a new framework of satellite, aerial, and ground-integrated (SAGI) agricultural remote sensing for use in comprehensive agricultural monitoring, modeling, and management. The prototypes of SAGI agriculture remote sensing are ifrst described, followed by a discussion of the key techniques used in joint data processing, image sequence registration and data assimilation. Finally, the possible applications of the SAGI system in supporting national food security are discussed. 展开更多
关键词 SAGI agriculture remote sensing multi-platform data processing food security
下载PDF
Integrated Evaluation of Ecological Security at Different Scales Using Remote Sensing: A Case Study of Zhongxian County, the Three Gorges Area, China 被引量:27
5
作者 ZUO Wei ZHOU Hui-Zhen +3 位作者 ZHU Xiao-Hua WANG Qiao WANG Wen-Jie WU Xiu-Qin 《Pedosphere》 SCIE CAS CSCD 2005年第4期456-464,共9页
Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-... Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-pressure, state and exposure to pollution-response (DPSER) model as a basis, a conceptual framework of regional ecological evaluation and an index system were established. The extraction and standardization of evaluation indices were carried out with GIS techniques, an information extraction model and a data standardization model. The conversion of regional ecological security results from the pixel scale to a small watershed or county scale was obtained with an evaluation model and a scaling model. Two conceptual scale conversion models of regional ecological security from the pixel scale to the county scale were proposed: 1) scale conversion of ecological security regime results from plxel to small watershed; and 2) scale conversion from pixel to county. These research results could provide useful ideas for regional ecological security evaluation as well as ecological and environmental management. 展开更多
关键词 ecological security integrated evaluation MODELS remote sensing SCALING
下载PDF
ROLE OF REMOTE SENSING IN ACHIEVING NATIONAL FOOD SELF-SUFFICIENCY AND FOOD SECURITY 被引量:1
6
作者 LI Deren 《Geo-Spatial Information Science》 2000年第2期1-5,共5页
This paper seeks to explore the role of Remote Sensing in solving the agriculture related problems, which are the basic issues of sustainable development.
关键词 remote sensing food self-sufficiency food security
下载PDF
Promoting sense of security in old-age care 被引量:14
7
作者 Martina Bostrom Marie Ernsth Bravell +1 位作者 Dan Lundgren Anita Bjorklund 《Health》 2013年第6期56-63,共8页
Purpose: The concept of security is related to the experience of health but has ever so often been argued from a risk perspective rather than from a promotional perspective. The experience of older persons’ sense of ... Purpose: The concept of security is related to the experience of health but has ever so often been argued from a risk perspective rather than from a promotional perspective. The experience of older persons’ sense of security in private homes and in nursing homes seems to be missing when it comes to promote aging well throughout the life span. This study aimed to describe and analyze factors related to the sense of security of older persons receiving care in nursing homes in Sweden. Design and Methods: The study was based on a questionnaire from a total of 495 persons aged ≥ 65 in private homes (n = 350) or nursing homes (n = 145) in Sweden. Results: Secure relationships, sense of control, and perceived health were significantly related to the subjects’ sense of security. No significant relationships were found between sense of security and having a personal emergency response alarm. Implications: Experience of sense of security from the older person perspective differs depending on the context. To promote the sense of security within the care of older persons, methods on how to establish secure relations as well as the sense of control and knowledge need to be further tested, developed and analyzed together with older persons. 展开更多
关键词 sense of security Nursing Homes Regression Analysis Health Promotion
下载PDF
Experiment Study of Fiber Optic Sensing in Railway Security Monitoring 被引量:1
8
作者 Dian Fan De-Sheng Jiang Wei-Lai Li 《Journal of Electronic Science and Technology of China》 2008年第4期499-501,共3页
Aiming at some security problems in railway running and the application condition of existing technology, this paper studies some issues of using fiber optic sensing technology in railway security monitoring. Through ... Aiming at some security problems in railway running and the application condition of existing technology, this paper studies some issues of using fiber optic sensing technology in railway security monitoring. Through field experiment measuring the strain of the rail and analyzing the experiment data, the method of diagnosing the health condition of rail and wheel is investigated. 展开更多
关键词 Fiber optic sensing health monitor railway security.
下载PDF
Digital Watermarking Secure Scheme for Remote Sensing Image Protection 被引量:7
9
作者 Guanghui Yuan Qi Hao 《China Communications》 SCIE CSCD 2020年第4期88-98,共11页
As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying i... As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying it to remote sensing data recently. Because of the particularity of remote sensing image, higher requirements are put forward for its security and management, especially for the copyright protection, illegal use and authenticity identification of remote sensing image data. Therefore, this paper proposes to use image watermarking technology to achieve comprehensive security protection of remote sensing image data, while the use of cryptography technology increases the applicability and security of watermarking technology. The experimental results show that the scheme of remote sensing image digital watermarking technology has good performance in the imperceptibility and robustness of watermarking. 展开更多
关键词 data security WATERMARK REMOTE sensing image PROTECTION
下载PDF
Secure Mobile Crowdsensing Based on Deep Learning
10
作者 Liang Xiao Donghua Jiang +3 位作者 Dongjin Xu Wei Su Ning An Dongming Wang 《China Communications》 SCIE CSCD 2018年第10期1-11,共11页
To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing(MCS) systems must address security threats ... To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing(MCS) systems must address security threats such as jamming, spoofing and faked sensing attacks during both sensing and information exchange processes in large-scale dynamic and heterogeneous networks. In this article, we investigate secure mobile crowdsensing and present ways to use deep learning(DL) methods, such as stacked autoencoder, deep neural networks, convolutional neural networks, and deep reinforcement learning, to improve approaches to MCS security, including authentication, privacy protection, faked sensing countermeasures, intrusion detection and anti-jamming transmissions in MCS. We discuss the performance gain of these DLbased approaches compared to traditional security schemes and identify the challenges that must be addressed to implement these approaches in practical MCS systems. 展开更多
关键词 mobile crowdsensing security deep learning reinforcement learning faked sensing
下载PDF
Relay-Assisted Secure Short-Packet Transmission in Cognitive IoT with Spectrum Sensing
11
作者 Yong Chen Yu Zhang +2 位作者 Baoquan Yu Tao Zhang Yueming Cai 《China Communications》 SCIE CSCD 2021年第12期37-50,共14页
Cognitive Internet of Things(IoT)has at-tracted much attention due to its high spectrum uti-lization.However,potential security of the short-packet communications in cognitive IoT becomes an important issue.This paper... Cognitive Internet of Things(IoT)has at-tracted much attention due to its high spectrum uti-lization.However,potential security of the short-packet communications in cognitive IoT becomes an important issue.This paper proposes a relay-assisted maximum ratio combining/zero forcing beamforming(MRC/ZFB)scheme to guarantee the secrecy perfor-mance of dual-hop short-packet communications in cognitive IoT.This paper analyzes the average secrecy throughput of the system and further investigates two asymptotic scenarios with the high signal-to-noise ra-tio(SNR)regime and the infinite blocklength.In ad-dition,the Fibonacci-based alternating optimization method is adopted to jointly optimize the spectrum sensing blocklength and transmission blocklength to maximize the average secrecy throughput.The nu-merical results verify the impact of the system pa-rameters on the tradeoff between the spectrum sensing blocklength and transmission blocklength under a se-crecy constraint.It is shown that the proposed scheme achieves better secrecy performance than other bench-mark schemes. 展开更多
关键词 cognitive Internet of Things short-packet communications physical layer security spectrum sensing
下载PDF
Cognitive J^(2)SAC:Joint Jamming,Sensing,and Communication Under Antagonistic Environment
12
作者 Jiangchun Gu Guoru Ding +3 位作者 Yizhen Yin Haichao Wang Yitao Xu Yehui Song 《China Communications》 SCIE CSCD 2023年第9期78-95,共18页
Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still fac... Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article.Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article. 展开更多
关键词 integrated sensing and communication(ISAC) information security joint jamming sensing and communication(J2SAC) cognition theory
下载PDF
Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption
13
作者 Mesfer Al Duhayyim Fatma S.Alrayes +5 位作者 Saud S.Alotaibi Sana Alazwari Nasser Allheeib Ayman Yafoz Raed Alsini Amira Sayed A.Aziz 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3209-3223,共15页
The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data g... The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches. 展开更多
关键词 Remote sensing internet of things image encryption security optimal key generation
下载PDF
至味在人间:城市烟火气游客体验的探索性研究
14
作者 蒋婷 苗莉 李春 《旅游学刊》 CSSCI 北大核心 2024年第7期40-53,共14页
烟火气是具有中国文化意蕴的词汇,与中国人的生活息息相关,城市烟火气为城市休闲、游客体验注入了新颖活力,然而,目前烟火气尚未受到学术界的关注,这也成为旅游体验理论可进一步深化研究的关键方向。文章透过烟火气这一滤镜去审视城市... 烟火气是具有中国文化意蕴的词汇,与中国人的生活息息相关,城市烟火气为城市休闲、游客体验注入了新颖活力,然而,目前烟火气尚未受到学术界的关注,这也成为旅游体验理论可进一步深化研究的关键方向。文章透过烟火气这一滤镜去审视城市游客体验,建构了传统文化意蕴下的烟火气作为城市目的地文化符号的意象和学术内涵,运用深度访谈法获悉游客体验烟火气的过程,基于“认知-情感-行为”体验的框架,构建了城市烟火气游客体验的理论模型,实现了城市旅游体验研究的创新;揭示了烟火气游客体验的过程,丰富了基于游客情感体验的基础性理论;通过发现烟火气感知下的游客“家乡”情结在目的地地方认同形成机理中的关键作用,为城市游客地方感研究的深化作出了理论贡献。此外,该研究也提出了打造烟火气体验消费、创设复合空间等有益的实践启示,以及跨文化情境下烟火气感知差异、美食和民俗活动的关键作用等未来的研究展望。 展开更多
关键词 烟火气 游客体验 情感体验 食物 地方感
下载PDF
STAR-RIS辅助通信感知一体化的多用户安全通信
15
作者 郝万明 宋亚飞 孙钢灿 《电讯技术》 北大核心 2024年第10期1621-1627,共7页
智能反射面在提高通信感知一体化系统性能和增强物理层安全方面具有极大潜力,但是其存在半空间覆盖的缺点。为此,研究了一种同时反射和透射智能反射面,并在考虑感知目标的信噪比约束条件下,建立一个联合优化基站发射波束赋形和智能反射... 智能反射面在提高通信感知一体化系统性能和增强物理层安全方面具有极大潜力,但是其存在半空间覆盖的缺点。为此,研究了一种同时反射和透射智能反射面,并在考虑感知目标的信噪比约束条件下,建立一个联合优化基站发射波束赋形和智能反射面相移的安全能效最大化问题。为求解所赋形的非凸优化问题,用Dinkelbach方法将目标函数转化为减法形式,并将该为题转化为两个子问题来解耦发射波束赋形和反射面相移,进而提出基于连续凸近似、半正定松弛的交替优化算法来求解。仿真结果表明,与传统的分组智能反射面场景相比,该方案能够提升25.6%的系统能效。 展开更多
关键词 通信感知一体化(ISAC) 智能反射面(IRS) 物理层安全 安全能效最大化
下载PDF
健全社会保障体系与人民生活品质改善
16
作者 单大圣 《行政管理改革》 CSSCI 北大核心 2024年第4期35-42,共8页
社会保障是人民生活的安全网和社会运行的稳定器。当前,我国已经建成能够有效支撑人民生活品质改善的社会保障体系,增强了人民群众的获得感、幸福感、安全感。与此同时,高品质生活需要背景下我国社会保障制度发展还面临着尚未成熟定型... 社会保障是人民生活的安全网和社会运行的稳定器。当前,我国已经建成能够有效支撑人民生活品质改善的社会保障体系,增强了人民群众的获得感、幸福感、安全感。与此同时,高品质生活需要背景下我国社会保障制度发展还面临着尚未成熟定型、制度统一性不足、管理体制亟待优化以及人口老龄化、就业非正规化的挑战。未来,以社会保障促进人民生活品质改善,需要优化社会保障制度模式,深化社会保障领域关键改革,扩大社会保障的财富储备,促进社会保障制度全国统一、规范,完善社会保障管理体制。 展开更多
关键词 社会保障 生活品质 安全感
下载PDF
基于硬件损伤的认知反向散射通信网络鲁棒安全资源分配算法
17
作者 徐勇军 姜思巧 +2 位作者 张海波 王正强 周继华 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第2期652-661,共10页
为了提高反向散射通信网络频谱效率、传输鲁棒性及信息安全性,该文提出一种基于硬件损伤的认知反向散射通信网络鲁棒安全资源分配算法。首先,考虑认知反向散射用户的最小安全速率、传输时间、能量收集和反射系数等约束,基于有界信道不... 为了提高反向散射通信网络频谱效率、传输鲁棒性及信息安全性,该文提出一种基于硬件损伤的认知反向散射通信网络鲁棒安全资源分配算法。首先,考虑认知反向散射用户的最小安全速率、传输时间、能量收集和反射系数等约束,基于有界信道不确定性和频谱感知误差模型,建立一个多变量耦合的吞吐量最大化非凸资源分配问题。其次,利用最坏准则、连续凸近似和交替优化方法,将原问题转换为凸优化问题,并提出一种基于迭代的鲁棒资源分配算法。仿真结果表明,与现有算法对比,所提算法具有较好的鲁棒性。 展开更多
关键词 认知反向散射通信 鲁棒资源分配 硬件损伤 安全通信 频谱感知误差
下载PDF
考虑信息泄露影响的光纤传感网络传输数据安全导入方法
18
作者 翟广辉 李娟 《激光杂志》 CAS 北大核心 2024年第7期193-198,共6页
为了提高对光纤传感网络传输数据安全传输能力,提出基于信息泄漏加密传输的光纤传感网络传输数据安全导入方法。采用离散混沌时间序列同步调制方法实现对光纤传感网络传输数据导入过程中调制编码处理,根据混沌随机编码特性实现对光纤传... 为了提高对光纤传感网络传输数据安全传输能力,提出基于信息泄漏加密传输的光纤传感网络传输数据安全导入方法。采用离散混沌时间序列同步调制方法实现对光纤传感网络传输数据导入过程中调制编码处理,根据混沌随机编码特性实现对光纤传感网络传输数据过程中的同步输出稳定性调节和自主随机编码,构建光纤传感网络信息传输泄漏抑制的加密密钥,通过Logistics映射实现对光纤传感网络传输数据导入过程中的信息泄漏加密重传,根据光纤传感网络传输数据的混合敏感密钥表征和算术编码,实现信息泄漏控制和数据安全导入。实验结果表明,采用该方法进行光纤传感网络传输数据导入的加密性能较好,其光纤传感网络传输数据已加密比特序列的识别率为98%,误码率仅为2.7∗10-9%,抗泄漏能力达到了0.970,并且导入后的数据完整度达到了0.996,说明该方法具备了较强的加密效果、抗泄漏能力,实现数据的安全导入和加密传输。 展开更多
关键词 信息泄露 光纤传感网络 传输数据 安全导入 加密 编码
原文传递
纳米纤维素复合水凝胶的制备及其在食品工业中的研究进展
19
作者 刘鹏涛 樊荣 汪文雪 《天津科技大学学报》 CAS 2024年第3期1-8,共8页
随着石油基聚合物的过度消耗、地球资源的日渐减少,能源枯竭、环境污染等问题逐渐显现。为了解决这些问题,寻求可持续资源、开发低成本材料的研究迫在眉睫。纳米纤维素复合水凝胶在兼具传统水凝胶良好的柔韧性、高比表面积的基础上结合... 随着石油基聚合物的过度消耗、地球资源的日渐减少,能源枯竭、环境污染等问题逐渐显现。为了解决这些问题,寻求可持续资源、开发低成本材料的研究迫在眉睫。纳米纤维素复合水凝胶在兼具传统水凝胶良好的柔韧性、高比表面积的基础上结合了纳米纤维素具有的独特纳米级结构以及相容性好、可再生、可降解等优点,同时表现出机械增强和许多其他理想的性能,从而被广泛应用于生物医药、组织工程、药物递送等领域,近年来其在食品工业中的研究也逐渐兴起。本文总结了纳米纤维素复合水凝胶的不同制备方法,介绍其在食品活性包装、智能包装和食品安全传感等方面的应用,并对纳米纤维素复合水凝胶未来的发展进行展望,为纳米纤维素复合水凝胶在食品工业中的实际应用提供参考。 展开更多
关键词 纤维素 水凝胶 智能包装 安全传感
下载PDF
脑卒中失能老年患者出院准备度现状调查与分析
20
作者 张琰 黄利宾 +3 位作者 韦红 李俊利 梁海珍 黄春丽 《临床医学研究与实践》 2024年第6期9-12,21,共5页
目的调查脑卒中失能老年患者出院准备度现状并分析其影响因素。方法采用脑卒中失能老年患者出院准备度现况调查问卷、住院老年人安全感量表对广西某三级甲等医院333例脑卒中失能老年患者进行全面评估及出院准备度现状调查,并用多元线性... 目的调查脑卒中失能老年患者出院准备度现状并分析其影响因素。方法采用脑卒中失能老年患者出院准备度现况调查问卷、住院老年人安全感量表对广西某三级甲等医院333例脑卒中失能老年患者进行全面评估及出院准备度现状调查,并用多元线性回归分析分析影响脑卒中失能老年患者出院准备度的相关因素。结果脑卒中失能老年患者出院准备度总分(101.95±13.14)分,安全感总分(96.83±11.73)分,生活自理能力总分(52.78±13.18)分。多元线性回归分析结果显示,住院次数、并发症发生情况、生活自理能力及安全感是脑卒中失能老年患者出院准备度的主要影响因素(P<0.05)。结论脑卒中失能老年患者出院准备度处于中等水平,医护人员应加强患者及家属的健康宣教和出院指导,提供优质的延续性护理服务,降低其出院后并发症发生率和再入院率。 展开更多
关键词 脑卒中 失能 出院准备度 自理能力 安全感
下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部