Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Añadir filtros








Intervalo de año
1.
Artículo en Chino | WPRIM | ID: wpr-690826

RESUMEN

- () is the earliest and existed well-known work on acupuncture and moxibustion, with irreplaceable literature values and huge impacts on the later generations. Feiyang (BL 58) is the -connecting point of the bladder meridian and recorded 11 times in -. This book is the representative for the exploration on the acupoint nomenclature and clinical connotation. Through the investigation on the textual connotation of the specified terms and the alias of Feiyang (BL 58), it was discovered that the nomenclature of this acupoint was based on the main symptoms, the characters of the running course of meridian and acupuncture effects. It was proved that the unique property of this acupoint was as rising, dispersing and flying of meridian . In comparison of -- () of the printed edition of the Dynasty version and - (), it was found that the indications and connotation of Feiyang (BL 58) were more extensively richer than the records in teaching materials. Those study results contribute to the extension of the clinical application of this acupoint.


Asunto(s)
Humanos , Acupuntura , Puntos de Acupuntura , Meridianos , Moxibustión , Terminología como Asunto
2.
Artículo en Coreano | WPRIM | ID: wpr-228955

RESUMEN

OBJECTIVE: The consolidation of health information has led to the creation of a national network of medical institutions. In this wireless and hard-line communication web, patients' medical information, which is extremely private and must be kept in secret, may leak out, and the risk of dangers such as privacy infringement and misuse of information has increased. METHODS: For this dissertation, a patient information protection algorithm was designed for a hospital information system in order to improve the untraceability and anonymity of patients' individual information in a ubiquitous computing environment. RESULTS: Additionally, analyzing the computing load showed that the computing load of the entire system did not increase, and since 57 percent of the sensor node's computing load was transferred to the secure server, the sensor node's load was minimized. Thus, the system can also be applied to low performance sensor networks. CONCLUSION: In conclusion, improving the security level of identification information transmissions while minimizing the computing and communication load of sensor nodes in a ubiquitous computing environment did not lead to an increase in the system's overall computing or communication load. Thus, a system with improved security features for identification information and communication information was developed and established.


Asunto(s)
Humanos , Anónimos y Seudónimos , Seguridad Computacional , Registros Electrónicos de Salud , Sistemas de Información en Salud , Sistemas de Información en Hospital , Privacidad
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA