The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Treatment based on the syndrome differentiation is the key of Traditional Chinese Medicine (TCM) treating the disease of acquired immune deficiency syndrome (AIDS). Therefore, a feasible way of improving the clinical therapy effectiveness is to correctly explore the syndrome classifications. Recently, more and more AIDS researchers are focused on exploring the syndrome classifications. In this paper,...
To help researchers selecting appropriate data mining models to provide better evidence for the clinical practice of Traditional Chinese Medicine (TCM) diagnosis and therapy. Clinical issues based on data mining models were comprehensively summarized from four significant elements of the clinical studies: symptoms, symptom patterns, herbs, and efficacy. Existing problems were further generalized...
Traditional Chinese Medicine (TCM) is a discipline of clinical medicine, which focuses on individualized diagnosis and treatment based on observation of the clinical manifestations of real-world patients. The complicated interactions between different medical entities play significant role for individualized treatment. In this paper, we aim to find out the meaningful herb-symptom relationship from...
Traditional Chinese medicine (TCM) is developed from clinical practice. Rich information can be obtained from the medical record of TCM. National clinical research data center of TCM is constructed to collect the clinical medical data of TCM from hospitals all over the country. The construction framework of national clinical data center of TCM includes infrastructure construction, software construction,...
This paper provides a survey of data mining methods that have been commonly applied to real-world TCM clinical data in recent years, and sets forth the requirements of data mining on real-world TCM clinical diagnosis and treatment data, in order to provide reference for better analyzing the syndrome differentiation and treatment principle hidden in the massive TCM clinical data in the future.
Purpose: To discuss the principles and procedures of building TCM conceptual system framework. Method: Using the experiences of the top-level structure in Western medicine to analyze the conceptual connotation of TCM basic theory, then to classify and determine the relations between ups and downs. Result: to form a conceptual system framework based on TCM basic theory with the characteristics of TCM...
Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. We propose FaceCloak, an architecture that protects user privacy on a social networking site by...
Recently, Lu and Cao proposed a novel three-party key exchange protocol. Guo et al pointed out that their protocol cannot resist man-in-the-middle attack and undetectable on-line dictionary attack, and then an improved protocol was proposed in 2008.However, we show that Guo et alpsilas protocol is still vulnerable to undetectable on-line dictionary attack. To overcome the security flaw, an improved...
Most remote user authentication schemes are designed by encryption or hash-function techniques. In terms of computational cost, the hash-function-based scheme is more simple and efficient. In 2008, under the conditions of using tamper-resistant smart card device and the verifier table storage technique, Chen-Lee proposed a novel mutual authentication protocol using hash function to solve remote user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.