Search scope:
排序: Display mode:
Developing Medical Examiner Offices in China: Necessity and Administration Mode
Song Suimin, Ma Chunling, Li Shujin, Cong Bin
Strategic Study of CAE 2020, Volume 22, Issue 4, Pages 154-160 doi: 10.15302/J-SSCAE-2020.04.022
Deepening the reform of the judicial system in China and improving theunified management system for judicial authentication are important in promoting the overall law-basedauthentication.Based on this, the feasibility and necessity of establishing an administration mode of medical examinerThe medical examiner offices should be responsible for judicial authentication, scientific research,
Keywords: the administration of judicial authentication bureau of medical examiner administration mode social governance
A lightweight authentication scheme with user untraceability
Kuo-Hui YEH
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 4, Pages 259-271 doi: 10.1631/FITEE.1400232
Keywords: Authentication Privacy Security Smart card Untraceability
JIANG Limin, JIANG Du
Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2, Pages 234-239 doi: 10.1007/s11709-007-0029-8
Keywords: commonness retrospect sequence architecture individuality architect
Qi RUI, Qin LU, Dayong WANG
Frontiers of Medicine 2009, Volume 3, Issue 1, Pages 76-90 doi: 10.1007/s11684-009-0002-0
Keywords:
HE Zhongye, GUO Renxuan, LI Yang, XIE Chengyao, LIU Nan, SONG Wen
Frontiers of Medicine 2007, Volume 1, Issue 1, Pages 36-40 doi: 10.1007/s11684-007-0007-5
Keywords: control Wistar taurocholate superoxide dismutase chondroitin-sulfate therapy
Sufen ZHAO,Yuanyuan JIA,Weiwei ZHANG,Lili WANG,Yunfei MA,Kedao TENG
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 4, Pages 318-326 doi: 10.15302/J-FASE-2015080
Keywords: garlic infectious bursal disease virus (IBDV) antiviral effect IgM-bearing B lymphocyte
Parallel Authentication Modes Based on Double Blocks or Key Counter
Huang Yuhua,Huai Aiqun,Song Yubo
Strategic Study of CAE 2004, Volume 6, Issue 7, Pages 70-74
Keywords: authentication mode CBC - MAC mode PMAC mode CTR mode CCM mode
Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO
Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 3, Pages 353-357 doi: 10.15302/J-FASE-2017157
Keywords: Tongren Dahuoluo Wan molecular diagnostic assay Eospalax baileyi Panthera pardus species-specific primers
IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication
Wang Xingjian,Hu Aiqun,Huang Yuhua
Strategic Study of CAE 2006, Volume 8, Issue 9, Pages 69-73
Keywords: IEEE 802.16 mesh node multi-hops mutual authentication self-modified routing
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1, Pages 88-103 doi: 10.1631/FITEE.2200118
Keywords: Image secret sharing Shadow image authentication Public key Pixel expansion Lossless decoding
Strategic analysis of China’s geothermal energy industry
Hao GONG, Baicun WANG, Haijun LIANG, Zuoxian LUO, Yaofeng CAO
Frontiers of Engineering Management 2021, Volume 8, Issue 3, Pages 390-401 doi: 10.1007/s42524-020-0106-4
Keywords: geothermal energy strategic analysis SWOT–PEST policy administration
The Research and Implementation of WAPI Authentication on WLAN Access Point
Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili
Strategic Study of CAE 2005, Volume 7, Issue 9, Pages 65-69
Keywords: WLAN WAPI test analysis
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSThe double-authentication-preventing property means that any pair of signatures on two different messages
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security
ZHANG Jingqun, SUN Honglei, MA Yexin, WANG Daowen
Frontiers of Medicine 2008, Volume 2, Issue 1, Pages 19-24 doi: 10.1007/s11684-008-0005-2
Keywords: therapy Sprague administration cardiac hypertrophy valsartan
Foundations and Applications of Information Systems Dynamics Article
Jianfeng Xu, Zhenyu Liu, Shuliang Wang, Tao Zheng, Yashi Wang, Yingfei Wang, Yingxu Dang
Engineering 2023, Volume 27, Issue 8, Pages 254-265 doi: 10.1016/j.eng.2022.04.018
Although numerous advances have been made in information technology in the past decades, there is still a lack of progress in information systems dynamics (ISD), owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems. The value of ISD lies in its ability to guide the design, development, application, and evaluation of large-scale information system-of-systems (SoSs), just as mechanical dynamics theories guide mechanical systems engineering. This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space, improving a mathematical theory for information measurement, and proposing a dynamic configuration model for information systems. In this way, it establishes a basic theoretical framework for ISD. The proposed theoretical methodologies have been successfully applied and verified in the Smart Court SoSs Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization. The proposed ISD provides an innovative paradigm for the analysis, design, development, and evaluation of large-scale complex information systems, such as electronic government and smart cities.
Keywords: System-of-systems engineering Information theory Information measurement Information systems dynamics Judicial
Title Author Date Type Operation
Developing Medical Examiner Offices in China: Necessity and Administration Mode
Song Suimin, Ma Chunling, Li Shujin, Cong Bin
Journal Article
Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau
JIANG Limin, JIANG Du
Journal Article
Alleviation of cell damage in experimental ANP in rats by administration of chondroitin-sulfate reduces
HE Zhongye, GUO Renxuan, LI Yang, XIE Chengyao, LIU Nan, SONG Wen
Journal Article
Oral administration of
Sufen ZHAO,Yuanyuan JIA,Weiwei ZHANG,Lili WANG,Yunfei MA,Kedao TENG
Journal Article
Parallel Authentication Modes Based on Double Blocks or Key Counter
Huang Yuhua,Huai Aiqun,Song Yubo
Journal Article
Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative
Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO
Journal Article
IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication
Wang Xingjian,Hu Aiqun,Huang Yuhua
Journal Article
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Journal Article
Strategic analysis of China’s geothermal energy industry
Hao GONG, Baicun WANG, Haijun LIANG, Zuoxian LUO, Yaofeng CAO
Journal Article
The Research and Implementation of WAPI Authentication on WLAN Access Point
Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili
Journal Article
Double-authentication-preventing signatures revisited: new definition and construction from chameleon
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Journal Article
Effects of RNA interference targeting angiotensin 1a receptor on blood pressure and cardiac hypertrophy of rats with renovascular hypertension
ZHANG Jingqun, SUN Honglei, MA Yexin, WANG Daowen
Journal Article