共查询到19条相似文献,搜索用时 125 毫秒
1.
2.
介绍了情景感知在移动图书馆的应用现状,探讨了用户情景感知是移动图书馆发展新方向的内外原因,并提出了基于情景感知的移动图书馆服务设想。 相似文献
3.
探讨情景教学法在护理学专业学生患者安全感知能力培训中的应用效果。本研究选取2022年3至12月在苏州大学附属第三医院实习的105名护理学专业学生为研究对象, 阐述了情景教学法在患者安全感知能力培训中的设计和实施过程, 采用患者安全感知能力量表评估培训效果。结果显示, 培训后学生的患者安全感知能力为(75.94±3.12)分, 高于培训前的(70.66±3.38)分, 其差异具有统计学意义(t=11.36, P<0.001)。可见, 情景教学法用于患者安全感知能力培训可有效提高护理学专业学生的患者安全感知能力。 相似文献
4.
基于情景感知的健康信息服务系统可以实时监测和分析用户生理参数,提供个性化自适应的健康信息服务。本文调查了目前基于情景感知的健康信息服务系统,总结了现有系统提供的健康信息服务内容及模式,归纳了当前研究的热点及面临的主要问题,展望了未来情景感知健康信息服务系统的发展趋势。 相似文献
5.
大石镇是心脑血管疾病社区综合防治示范区,每年对15岁以上的人群进行一次血压水平监测。用计算机管理血压水平监测数据的策略是:建立关系数据库模型,利用编程技术解决数据的准确性与连续性问题。笔用Visual FoxPro6.0语言编写的应用程序,从建立可扩展数据库、设置逻辑校检、提供灵活查询方式、集中录入与打印等方面实施了上述策略。 相似文献
6.
中医理论思辨录 总被引:3,自引:0,他引:3
贾春华 《北京中医药大学学报》2010,33(7):441-443
目的从语言、逻辑的层面思考中医理论的本质性问题,揭示中医理论概念隐喻的语言学基础;明辨这些概念隐喻从哪里来,它又将引导我们到哪里去?方法应用隐喻理论对中医理论的形成、中医学的逻辑、中医学中的体系、脏腑功能、病因病机、证候、药性方剂、经验等相关问题进行系列思考。结果中医学是一种以身体经验感知为基础而形成的理论;中医治病所涉及的逻辑是一种集知识、信念、道义为一体的动态逻辑;中医学中存在"辨证论治"与"方证论治"两大体系;中医学中的脏腑功能是生理和指派的混合体;中医病因病机是一种因"原型"而形成的概念隐喻;中医证候诊断在于主客观的同构;可能不存在所谓的"证候本质";"四气五味"与"君臣佐使"只是概念隐喻;"经验"是难以继承或不能继承的。结论中医语言是一种基于隐喻认知的语言,中医理论学家在今后相当长的一段时间内需要做的主要工作,可能就是对中医语言的分析。 相似文献
7.
基于情景感知的健康信息服务系统可以实时监测和分析用户生理参数,为用户提供个性化自适应的健康信息服务。本文对现有的基于情景感知的健康信息服务系统进行了调查研究,总结了现有系统提供的健康信息服务内容,归纳了当前研究的热点及面临的主要问题,最后展望了未来的发展趋势。 相似文献
8.
目的:探讨护理学专业开展以学生为主体编写案例的情景模拟教学的实效性.方法:对三届本科学生385人实施情景模拟教学,用Dundee教育环境评估量表从学习感知、教师感知、学术自我感知、学习气氛感知、合作学习感知等方面评价教学效果.结果:除“对环境的感知”无差异外,学生对学习感知总分和各维度得分差异均有统计学意义.结论:学生床边采集病史编写病案、示教室演练真实护理过程,这种自我学习、自我管理的教学模式提升了实践教学的实效性. 相似文献
9.
依据高职教育提出的要求,结合护理专业药理学教学中的实际情况,总结几点教学体会:创设故事情景,激发兴趣;创设语言情景,启迪思维;复习旧知,引出新知;归类比较,及时总结;创设实验情景,培养能力;创设模拟情景,提高兴趣。 相似文献
10.
目的构建基于情景教学法的护理学专业学生的患者安全感知能力培训方案。方法以文献检索为基础, 通过德尔菲法制定培训方案。结果专家积极系数为100%, 权威系数(Cr)为0.868, 两轮专家函询的肯德尔系数(Kendall’’s W)分别为0.208、0.246, 具有较高一致性, 最终形成4个一级条目, 13个二级条目的患者安全感知能力情景教学法培训方案。结论基于情景教学法的护理专业学生患者安全感知能力培训方案内容合理、构建过程科学, 可为我国护理学专业学生的患者安全相关培训提供参考依据。 相似文献
11.
云存储安全给访问控制技术带来了新的挑战。提出了一种基于安全策略的云数据访问控制优化方法,基本思想是利用数据关联关系进行安全策略精化,基于属性的安全策略中融合了角色和信誉特征。利用数据关联关系对云数据进行细粒度划分,得到相应的数据块;对策略中的规则和数据块进行匹配和冲突消除,得到精化的安全策略。理论分析和实验结果表明,本文方法对于数据量大的云数据访问控制具有较高的效率。 相似文献
12.
13.
在分析了虚拟企业访问控制需求的基础上,扩展传统的基于角色的访问控制模型(RBAC),定义了一种跨企业RBAC(CE—RBAC)模型,该模型能在虚拟企业环境中方便地实现跨企业的安全访问控制。 相似文献
14.
Personally controlled health records (PCHR) systems have emerged to allow patients to control their own medical data. In a
PCHR system, all the access privileges to a patient’s data are granted by the patient. However, in many emergency cases, it
is impossible for the patient to participate in access authorization on site when immediate medical treatment is needed. To
solve the emergency access authorization problem in the absence of patients, we consider two cases: a) the requester is already
in the PCHR system but has not obtained the access privilege of the patient’s health records, and b) the requester does not
even have an account in the PCHR system to submit its request. For each of the two cases, we present a method for emergency
access authorization, utilizing the weighted voting and source authentication cryptographic techniques. Our methods provide
an effective, secure and private solution for emergency access authorization, that makes the existing PCHR system frameworks
more practical and thus improves the patients’ experiences of health care when using PCHR systems. We have implemented a prototype
system as a proof of concept. 相似文献
15.
对权限进行了定义和分类,研究和探讨了基于角色的访问控制方法(RBAC);针对传统RBAC方法的不足,对传统RBAC进行了改进,并在此基础上提出利用ORACLE的虚拟专用数据库技术来实现用户访问控制的观点。 相似文献
16.
17.
Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications. 相似文献
18.
Chia-Hui Liu Yu-Fang Chung Tzer-Shyong Chen Sheng-De Wang 《Journal of medical systems》2012,36(3):1009-1020
Electronic anamnesis is to transform ordinary paper trails to digitally formatted health records, which include the patient’s
general information, health status, and follow-ups on chronic diseases. Its main purpose is to let the records could be stored
for a longer period of time and could be shared easily across departments and hospitals. Which means hospital management could
use less resource on maintaining ever-growing database and reduce redundancy, so less money would be spent for managing the
health records. In the foreseeable future, building up a comprehensive and integrated medical information system is a must,
because it is critical to hospital resource integration and quality improvement. If mobile agent technology is adopted in
the electronic anamnesis system, it would help the hospitals to make the medical practices more efficiently and conveniently.
Nonetheless, most of the hospitals today are still using paper-based health records to manage the medical information. The
reason why the institutions continue using traditional practices to manage the records is because there is no well-trusted
and reliable electronic anamnesis system existing and accepted by both institutions and patients. The threat of privacy invasion
is one of the biggest concerns when the topic of electronic anamnesis is brought up, because the security threats drag us
back from using such a system. So, the medical service quality is difficult to be improved substantially. In this case, we
have come up a theory to remove such security threats and make electronic anamnesis more appealing for use. Our theory is
to integrate the mobile agent technology with the backbone of electronic anamnesis to construct a hierarchical access control
system to retrieve the corresponding information based upon the permission classes. The system would create a classification
for permission among the users inside the medical institution. Under this framework, permission control center would distribute
an access key to each user, so they would only allow using the key to access information correspondingly. In order to verify
the reliability of the proposed system framework, we have also conducted a security analysis to list all the possible security
threats that may harm the system and to prove the system is reliable and safe. If the system is adopted, the doctors would
be able to quickly access the information while performing medical examinations. Hence, the efficiency and quality of healthcare
service would be greatly improved. 相似文献