期刊文献+
共找到13,738篇文章
< 1 2 250 >
每页显示 20 50 100
An Identity-Based Strong Designated Verifier Proxy Signature Scheme 被引量:3
1
作者 WANG Qin CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1633-1635,共3页
In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ... In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements. 展开更多
关键词 strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing
在线阅读 下载PDF
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT 被引量:2
2
作者 Kyungroul Lee Kangbin Yim 《Digital Communications and Networks》 SCIE CSCD 2022年第2期124-131,共8页
With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking servic... With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking services.For this reason,a countermeasure is required to improve the security of the online identification process.The current security and authentication mechanisms applied to financial services,such as Internet banking services for 5G-enabled IoT,do not ensure security.In this paper,a transaction-linkage technique with which the designated terminal is combined is proposed to solve this fundamental problem.The technique improves the security of online identification mechanisms because it is possible to counteract all of the existing security threats.The proposed technique supports mutual authentication and is safe from eavesdropping attacks,replay attacks,spoofing attacks,and service-denial attacks.Moreover,the technique supports non-repudiation by storing the transaction history in a transaction-linkage device.We believe that the security of Internet-banking services for 5G-enabled IoT will be increased through the utilization of the proposed technique. 展开更多
关键词 Transaction-linkage technique designated terminal Internet banking Online-authentication mechanism 5G-enabled IoT
在线阅读 下载PDF
Threshold Subliminal Channel Based on Designated Verifier Signature 被引量:1
3
作者 SU Li CUI Guohua YANG Muxiang CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1485-1488,共4页
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess... The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient. 展开更多
关键词 THRESHOLD subliminal channel designated verifier signature digital signature
在线阅读 下载PDF
Universal Designated Multi Verifier Signature Scheme without Random Oracles 被引量:1
4
作者 MING Yang WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期685-691,共7页
In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) ba... In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) based on Waters' signature scheme. In this setting, a signature holder can to designate the signature to multi verifiers. Moreover, the security of our proposed scheme is based on the Gap Bilinear Difffie-Hellman assumption. 展开更多
关键词 universal designated multi verifier signature random oracle bilinear pairing
原文传递
GROWTH OF NEW DESIGNATED CITIES IN CHINA
5
作者 顾朝林 甄峰 +1 位作者 邱友良 叶舜赞 《Chinese Geographical Science》 SCIE CSCD 1999年第2期1-10,共10页
The opening of the economy has contributed to the rapid urban development in China over the last 17 years from 1979 to 1996. It is worthwhile to note three new development trends of Chinese urban system. The first tr... The opening of the economy has contributed to the rapid urban development in China over the last 17 years from 1979 to 1996. It is worthwhile to note three new development trends of Chinese urban system. The first trend identifies the emergence of mega urbanization regions. The second trend rebuilds a closer tie between the Chinese urban system and the global urban system through the development of the world (global) cities and international cities. The third trend shows the fast polarized development in hinterlands and peripheries around advanced economic regions. However, the research literature on Chinese urbanization in English has shown the scarcity of good databanks and the analysis results are incomplete. Some researchers also always question the quality of the data. Using the most completed and most recent data, this paper reviews the growth of China's new designated cities since 1949. This paper also seeks to examine the various policies and to explore the underlying factors that have affected the growth of China new cities. From the development of China's cities in the past 47 years from 1949 to 1996, it is easy to find that metropolitan cities developed with a relatively high rate compared with smaller ones, but the ratio of number and population to whole country cities remained stable; Chinese urban system development had entered a phase of small cities development; in terms of cities regional distribution, the south and east region is still the central area of urban development. 展开更多
关键词 URBANIZATION NEW designated CITY China CITIES URBAN development
在线阅读 下载PDF
Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
6
作者 ZHANG Jianhong ZOU Wei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1903-1906,共4页
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the... Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable. 展开更多
关键词 oblivious transfer designated verifier EFFICIENCY
在线阅读 下载PDF
Multi-Hazard Evaluation Using Cluster Analysis—For Designated Evacuation Centers of Yokohama
7
作者 Tsutomu Ochiai Takahisa Enomoto 《Journal of Geographic Information System》 2021年第2期243-259,共17页
Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are lik... Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are likely not aware of the specific types of disaster. So, first of all, we need to know what kind<span style="font-family:;" "="">s</span><span style="font-family:;" "=""> of hazards are important. However, the information that integrates multiple hazards is not well maintained, and there are few such studies. On the other hand, in Japan, a lot of hazard information is being released on the Internet. So, we summarized and assessed hazard data that can be accessed online regarding shelters (where evacuees live during disasters) and their catchments (areas assigned to each shelter) in Yokohama City, Kanagawa Prefecture. Based on the results, we investigated whether a grouping by cluster analysis would allow for multi-hazard assessment. We used four natural disasters (seismic, flood, tsunami, sediment disaster) and six parameters of other population and senior population. However, since the characteristics of the population and the senior population were almost the same, only population data was used in the final examination. From the cluster analysis, it was found that it is appropriate to group the designated evacuation centers in Yokohama City into six groups. In addition, each of the six groups was found <span>to have explainable characteristics, confirming the effectiveness of multi-hazard</span> creation using cluster analysis. For example, we divided, all hazards are low, both flood and Seismic hazards are high, sediment hazards are high, etc. In many Japanese cities, disaster prevention measures have been constructed in consideration of ground hazards, mainly for earthquake disasters. In this paper, we confirmed the consistency between the evaluation results of the multi-hazard evaluated here and the existing ground hazard map and examined the usefulness of the designated evacuation center. Finally, the validity was confirmed by comparing this result with the ground hazard based on the actual measurement by the past research. In places where the seismic hazard is large, the two are consistent with the fact that the easiness of shaking by actual measurement is also large.</span> 展开更多
关键词 Multi Hazard Cluster Analysis Open Data designated Evacuation Center GIS
在线阅读 下载PDF
Exploration of Infection Prevention and Control Practice of Designated Hospitals in During Corona Virus Disease 2019 Epidemic Period
8
作者 Haiquan Luo Maojun Fu +5 位作者 Xiantao Chen Yunliang Chen Yichuan Li Xiaochuan Liu Xiaolan Su Yanling Chen 《Journal of Clinical and Nursing Research》 2020年第4期80-90,共11页
Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance wi... Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance with the principle of"concentrating patients,experts,resources and treatment".Designated hospitals are often the strength of the general hospital and general hospital complex layers of various kinds of personnel,campus area is large,multi-channel,ordinary outpatient accepts people more,for emergency and severe cases treatment in patients with normal difficulty pressuure big,suspected/confirmed cases,combined with the COVID-19 occurred when the traditional holiday,the country launched the emergency response since,process reform faces a difficult labor,shortage of mampower,protective shortages,short time limit,and many other difficulties,hospital infection prevention and control is facing unprecedented pressure.In this paper,the West China-Guang'an Hospital,Sichuan University(Guang'an people's hospital)as a designated hospital,on the basis of the relevant scheme of the national health committee,epidemic prevention and control of the actual,combined with comprehensive hospital leadership,mampower allocation,protection,security,patient management,disinfection isolation,preview triage,preventive measures,training,monitoring,etc.,with practical experience summary for the COVID-19 diring the hospital infection prevention and control to improve the practice exploration. 展开更多
关键词 Corona Vius Disease 2019(COVID-19) designated hospitals Nosocomial infection prevention and control Protective measuures
暂未订购
Practice and Thoughts on due Statistics for Four Classes of Enterprises Above Designated Size
9
作者 Yan Qinglan 《Economics World》 2021年第3期139-143,共5页
“Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,... “Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,including four classes in national economy,namely,industrial enterprises above designated size,construction and real estate development and management enterprises above qualifications,wholesale and retail,catering and accommodation enterprises,and service enterprises above designated size,which are the primary part of national economic and social development activities.This paper is focused on analyzing the practice and difficulties in the current statistics work of four-classes enterprises,and then this paper proposes some recommendations. 展开更多
关键词 four classes of enterprises above designated size method of statistics statistics system
在线阅读 下载PDF
New Sites to be Designated on the World Heritage List
10
《China & The World Cultural Exchange》 1999年第5期48-48,共1页
关键词 World New Sites to be designated on the World Heritage List
在线阅读 下载PDF
Multi-designated geoparks face challenges in China’s heritage conservation 被引量:1
11
作者 WANG Lianyong 《Journal of Geographical Sciences》 SCIE CSCD 2007年第2期187-196,共10页
The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National ... The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National Geoparks of China in Sichuan Province, 18 UNESCO Global Geoparks in China, and 219 World Heritage sites in China and 8 European nations. Through analysis and synthesis, the author concludes that doubled designation, which also leads to unbalanced park distribution, is particularly prevalent in China other than in Europe. Therefore, on-site management agencies and related governments in China should carefully translate the doubled designations into responsibilities and harmonious partnerships between all stakeholders in order to enhance the management effectiveness and avoid paper park phenomenon. 展开更多
关键词 SICHUAN national geopark of China UNESCO Global Geopark World Heritage doubled designation heritage conservation
在线阅读 下载PDF
A cluster-plus-glue-atom composition design approach designated for multi-principal element alloys
12
作者 Xuan Liu Hui-Bin Ke +6 位作者 Liang Wang Yao-Jian Liang Lin-Jing Wang Ben-Peng Wang Lu Wang Qun-Bo Fan Yun-Fei Xue 《Rare Metals》 SCIE EI CAS CSCD 2022年第11期3839-3849,共11页
Multi-principal element alloys(MPEAs)have shown extraordinary properties in different fields.However,the composition design of MPEAs is still challenging due to the complicated interactions among principal elements(PE... Multi-principal element alloys(MPEAs)have shown extraordinary properties in different fields.However,the composition design of MPEAs is still challenging due to the complicated interactions among principal elements(PEs),and even more challenging with precipitates formation.Precipitation can be either beneficial or detrimental in alloys,thus it is important to control precipitates formation on purpose during alloy design.In this work,cluster-plus-glue-atom model(CGM)composition design method which is usually used to describe short-range order in traditional alloys has been successfully extended to MPEAs for precipitation design.The key challenge of extending CGM to MPEAs is the determination of center atom since there are no solvent or solute in MPEAs.Research has found that the element type of center atom was related not only with chemical affinity,but also with atomic volume difference in MPEAs,which has inevitable effect on atomic arrangement.Based on experimental data of MPEAs with precipitates,it was found that elements with either stronger chemical affinity or larger volume difference with other PEs would occupy the center site of clusters.Therefore,a cluster index(P_(C)),which considers both chemical affinity and atomic volume factors,was proposed to assist the determination of center atom in MPEAs.Based on the approach,a solid-solution Zr-Ti-V-Nb-Al BCC alloy was obtained by inhibiting the precipitation,while precipitation-strengthened Al-Cr-FeNi-V FCC alloy and Al-Co-Cr-Fe-Ni BCC alloy were designed by promoting the precipitation.Corresponding experimental results demonstrated that the approach could provide a relatively simple and accurate predication of precipitation and the compositions of precipitations were in line with PEs in cluster in MPEAs.The research may open an effective way for composition design of MPEAs with desired phase structure. 展开更多
关键词 Multi-principal element alloy(MPEA) Composition design Phase structure Cluster-plus-glue-atom model(CGM)
原文传递
The Optimal Design of Lighting Systems for Designated Office Building in Thailand
13
作者 Surasak Panjavaranont Pomrapeepat Phasaputra +6 位作者 Woraratana Pattaraprakom Arthit Sode-Yome Kitti Tirawannavit Chaiyapat Kumpeerakupt Somkhun Rimsmutchai Wichit Krueasuk Natapongkom Pawanawichien 《Journal of Energy and Power Engineering》 2013年第4期798-804,共7页
This paper proposes the financial index of payback period analysis in order to evaluate the economic performance of lighting system. Conventional designs and proposed optimal design using the Energy Conversation Promo... This paper proposes the financial index of payback period analysis in order to evaluate the economic performance of lighting system. Conventional designs and proposed optimal design using the Energy Conversation Promotion Act (No. 2) B.E. 2550 of Ministry of Energy (Section--The Type or Size of Building Standards and Rules and Procedures, Building Design for Energy Conservation, Act B.E. 2552) are compared based on illumination standard for office building in term of energy consumption, return of investment and environmental impact. Firstly, the Type or Size of Building Standards and Rule and Procedures, Building Design for Energy Conservation, Act B.E. 2552 is reviewed and compared with the conventional designs of lighting system for office building. Next, the lifetime energy consumption of fluorescent lamp T5 with electronic ballast, fluorescent lamp T8 with standard ballast and fluorescent lamp T8 with electronic ballast are simulated using DIALux software program in three sizes office buildings. Then, the payback period and CO2 emission of lighting system for selected office building are simulated by various scenarios, which the analytical results show are the optimal lighting system for office building under the present situation. Finally, the optimal design of lighting system for designated office building in Thailand will be discussed with respect to the energy performance with environmental friendly. 展开更多
关键词 Energy management FINANCE ENVIRONMENT lighting system design.
在线阅读 下载PDF
Certificateless universal designated verifier signature schemes 被引量:8
14
作者 MING Yang SHEN Xiao-qin WANG Yu-min 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第3期85-90,94,共7页
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unabl... Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact. The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required. This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed. The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system. Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve. 展开更多
关键词 certificateless cryptography universal designated verifier signature bilinear pairing
原文传递
Cloud data auditing with designated verifier 被引量:4
15
作者 Solomon Guadie WORKU Chunxiang XU Jining ZHAO 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第3期503-512,共10页
An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build... An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappy with this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.'s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oracle model assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps. 展开更多
关键词 cloud data storage designated verifier data privacy storage correctness cloud computing
原文传递
A Designated Query Protocol for Serverless Mobile RFID Systems with Reader and Tag Privacy 被引量:4
16
作者 Jiwhan Lim Sangjin Kim +1 位作者 Heekuck Oh Donghyun Kim 《Tsinghua Science and Technology》 SCIE EI CAS 2012年第5期521-536,共16页
Recently, a new type of Radio Frequency IDentification (RFID) system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus ... Recently, a new type of Radio Frequency IDentification (RFID) system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus it is frequently referred as a serverless mobile RFID system. In this paper, we formalize a serverless mobile RFID system model and propose a new encryption-based system that preserves the privacy of both tags and readers in the model. In addition, we define a new adversary model for the system model and show the security of the proposed system. Throughout comparisons between ours and the other alternatives, we show that our proposed system provides a stronger reader privacy and robustness against a reader forgery attack than the competitors. 展开更多
关键词 Radio Frequency IDentification (RFID) serverless designated query protocol reader privacyencryption-based
原文传递
基于MATLAB App Designer的数字岩心建模软件设计与开发
17
作者 左艳彤 邢兰昌 +1 位作者 贾宁洪 刘宝 《计算机测量与控制》 2026年第1期235-243,共9页
为解决现有商用数字岩心建模软件功能可扩展性弱、成本高等问题,文章基于MATLAB App Designer工具开发了一款集成化的数字岩心建模软件,该软件包括图像处理、图像分析和孔隙网络提取等三大功能模块;图像处理模块集成了中值滤波、高斯滤... 为解决现有商用数字岩心建模软件功能可扩展性弱、成本高等问题,文章基于MATLAB App Designer工具开发了一款集成化的数字岩心建模软件,该软件包括图像处理、图像分析和孔隙网络提取等三大功能模块;图像处理模块集成了中值滤波、高斯滤波、SUSAN平滑、图像锐化及阈值分割等多种图像处理算法;图像分析模块采用多平面切片与序列叠加方法、借助三维交互技术实现了岩心结构的三维可视化、切面展示与旋转浏览;孔隙网络提取模块采用最大球法提取孔隙网络,从而获取配位数、孔隙半径、孔隙体积等关键结构参数,利用直方图对结构参数分布进行统计分析;利用典型岩心样本对所开发的软件进行功能测试,结果表明:该软件功能集成度高、界面友好、操作简便,能够有效提升图像质量、对岩心图像进行三维可视化展示以及准确提取三维岩心的孔隙网络结构特征;软件具备良好的可扩展性和二次开发潜力,为后续开发数字岩心电学、声学、核磁共振等响应的数值仿真模块提供了前提。 展开更多
关键词 数字岩心 MATLAB App Designer 图像处理 图像分析 孔隙网络提取
在线阅读 下载PDF
Analysis of CO2 Emissions and the Mechanism of the Industrial Enterprises above Designated Size(IEDS) in Resource-based Cities by Application of Geographical Detector Technology 被引量:3
18
作者 ZHANG Wang 《Journal of Resources and Ecology》 CSCD 2019年第5期537-545,共9页
Resource-based cities are the most important players in responding to climate change and achieving low carbon development in China.An analysis of relevant data(such as the energy consumption)showed an inter-city diffe... Resource-based cities are the most important players in responding to climate change and achieving low carbon development in China.An analysis of relevant data(such as the energy consumption)showed an inter-city differentiation of CO2 emissions from energy consumption,and suggested an influence of the Industrial Enterprises above Designated Size(IEDS)in resource-based industrial cities at the prefecture level and above in different regions.Then by geographical detector technology,the sizes of each influencing mechanism on CO2 emissions from energy consumption of the IEDS were probed.This analysis showed that significant spatial differences exist for CO2 emissions from energy consumption and revealed several factors which influence the IEDS in resource-based cities.(1)In terms of unit employment,Eastern and Western resource-based cities are above the overall level of all resource-based cities;and only Coal resource-based cities far exceeded the overall level among all of the cities in the analysis.(2)In terms of unit gross industrial output value,the Eastern,Central and Western resources-based cities are all above the overall level for all the cities.Here also,only Coal resource-based cities far exceeded the overall level of all resources-based cities.Economic scale and energy structure are the main factors influencing CO2 emissions from energy consumption of the IEDS in resource-based cities.The factors influencing CO2 emissions in different regions and types of resource-based cities show significant spatial variations,and the degree of influence that any given factor exerts varies among different regions and types of resource-based cities.Therefore,individualized recommendations should be directed to different regions and types of resource-based cities,so that the strategies and measures of industrial low carbon and transformation should vary greatly according to the specific conditions that exist in each city. 展开更多
关键词 resource-based cities Industrial enterprises above designated size CO2 emissions from energy consumption mechanism analysis geographical detector
原文传递
Information technology and artificial intelligence support in management experiences of the pediatric designated hospital during the COVID-19 epidemic in 2022 in Shanghai 被引量:2
19
作者 Yu Shi Jin Fu +8 位作者 Mei Zeng Yanling Ge Xiangshi Wang Aimei Xia Weijie Shen Jiali Wang Weiming Chen Siyuan Jiang Xiaowen Zhai 《Intelligent Medicine》 CSCD 2023年第1期16-21,共6页
Objective:To describe the information technology and artificial intelligence support in management experiences of the pediatric designated hospital in the wave of COVID-19 in Shanghai.Methods:We retrospectively conclu... Objective:To describe the information technology and artificial intelligence support in management experiences of the pediatric designated hospital in the wave of COVID-19 in Shanghai.Methods:We retrospectively concluded the management experiences at the largest pediatric designated hospital from March 1st to May 11th in 2022 in Shanghai.We summarized the application of Internet hospital,face recognition technology in outpatient department,critical illness warning system and remote consultation system in the ward and the structed electronic medical record in the inpatient system.We illustrated the role of the information system through the number and prognosis of patients treated.Results:The COVID-19 designated hospitals were built particularly for critical patients requiring high-level medical care,responded quickly and scientifically to prevent and control the epidemic situation.From March 1st to May 11th,2022,we received and treated 768 children confirmed by positive RT-PCR and treated at our center.In our management,we use Internet Information on the Internet Hospital,face recognition technology in outpatient department,critical illness warning system and remote consultation system in the ward,structed electronic medical record in the inpatient system.No deaths or nosocomial infections occurred.The number of offline outpatient visits dropped,from March to May 2022,146,106,48,379,57,686 respectively.But the outpatient volume on the internet hospital increased significantly(3,347 in March 2022 vs.372 in March 2021;4,465 in April 2022 vs.409 in April 2021;4,677 in May 2022 vs.538 in May 2021).Conclusions:Information technology and artificial intelligence has provided significant supports in the management.The system might optimize the admission screening process,increases the communication inside and outside the ward,achieves early detection and diagnosis,timely isolates patients,and timely treatment of various types of children. 展开更多
关键词 Coronavirus disease2019 Information technology Artificial intelligence Closed-loop management Pediatric designated hospital
原文传递
How to signcrypt a message to designated group 被引量:1
20
作者 MA Chun-bo LI Jian-hua AO Jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第4期57-63,共7页
In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distr... In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distributed networks, Anyone in this scheme can signcrypt a message and distribute it to a designated group, and any member in the receiving group can unsigncrypt the ciphertext. The ciphertext and public key in the scheme are of constant size. In addition, this new scheme offers public verification of the ciphertext. This property is very important to the large-scale group communication since the gateway can filter the incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given to show that the scheme is secure against chosen ciphertext attack and existential forgery. 展开更多
关键词 BROADCAST SIGNCRYPTION designated group chosen ciphertext attack existential forgery random oracle model
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部