Objective:A computer-based STS(simulative training system) in providing pre-hospital trauma care at a disaster site was applied to teaching nursing students in the Second Military Medical University,China.This article...Objective:A computer-based STS(simulative training system) in providing pre-hospital trauma care at a disaster site was applied to teaching nursing students in the Second Military Medical University,China.This article reports on the teaching effectiveness of this system.Methods:Among 92 participants,46 were in the study group and 46 were in the 'control' group. Each student completed a multiple-choice quiz after completing 18 hours(six three-hour sessions) of the study module,and a score was recorded.The simulative training module was completed only by the study group;the 'control' group was assigned in-class discussions for the same amount of time covering the same content as the study group.The final course scores,which included both comprehensive and group task-based tests were compared between these two groups.The study used a descriptive and comparative approach for quantitative data analysis.Tests of independency between the multiple choice scores and the simulation scores were also performed.Finally,anonymous surveys were conducted.Results:The study group performed better than the 'control' group with a significantly higher average score for the group scenario task-based test score,and consequently the study group's final course score was significantly higher than the 'control' group.As per chi-square tests,no significant associations were found between the multiple choice scores and the simulated training scores.The final surveys showed students overwhelmingly agreed that STS training improved their knowledge and skills,their ability to recognize a potential critical event, and their initial response for trauma care at pre-hospital settings.The survey responses of the study group were noteworthy as they indicated that students recognized the importance of simulative training,appreciated the realism of the simulation,and were able to fight/adjust to the stressful feelings in order to focus on the task.Conclusion:Computer-based STS may be an effective teaching model to help students improve their capability in providing pre-hospital trauma care,and in their effectiveness in disaster response.展开更多
An expert decision support system (EDSS) for multi-bins balance and contro1 of orequality in production ore bins of some large-scale open pit iron mine in China has been developed byexpert svitem tool software VP-EXPE...An expert decision support system (EDSS) for multi-bins balance and contro1 of orequality in production ore bins of some large-scale open pit iron mine in China has been developed byexpert svitem tool software VP-EXPERT and integration software LOTUS 1-2-3 in this paper. Itis known by practicing that a medium-scale EDSS constructed on microcomputer is completcly, feaasible by means of VP-EXEPERT to construct knowledge base system (KBS), LOTUS 1-2-3 tomake decision support system (DSS) and link them with BAT.展开更多
The expert system MUST (Mining Under Structures) shown in this paper and established by the authors is a preliminary expert system to solve the policy-making problems for mining under structures by means of computers ...The expert system MUST (Mining Under Structures) shown in this paper and established by the authors is a preliminary expert system to solve the policy-making problems for mining under structures by means of computers instead of humanbeing. Based on the experience of relative experts,the authors established a knowledge base about the minings under structures,researched into reasonable method to simulate thinking processes of human experts when they are solving the problems, established the network of an expert system and named it ' MUST system' . MUST system uses the method of the structural system analysis approach. A kind of methods of Turbo Prolog and Fortran 77 language alternations is designed to meet the needs of exchange information within the MUST system. Based on this kind of methods MUST system has been constructed and realised on IBM-PC computer. For verifying the correctness, suitability and reliablity of MUST system,some practical examples of minings under structures were tentatively solved using MUST system,whose results are satisfactory.展开更多
From the view of robotics, kinematical and dynamical analyses of the WD400 Mechanical Forward Excavator are carried out in this paper. Transformation of the manipulator abstracted from the excavator is determined. For...From the view of robotics, kinematical and dynamical analyses of the WD400 Mechanical Forward Excavator are carried out in this paper. Transformation of the manipulator abstracted from the excavator is determined. Forward and Inverse kinematical analyses are given and the trajectories of bucket movement and their mathematic descriptions are derived. The kinematical and dynamical models as well as the excavating resistance along the trajectories are obtained. The computer simulations are included in this paper.展开更多
Using the services provided by virtual enterprises, we presented a solution to implement flexible inter-enterprise workflow management. Services were the responses of events that can be accessed programmatically on th...Using the services provided by virtual enterprises, we presented a solution to implement flexible inter-enterprise workflow management. Services were the responses of events that can be accessed programmatically on the Internet by HTTP protocol. Services were obtained according to some standardized service templates. The workflow engine's flexible control to a request was bound to appropriate services and their providers by using a constraint-based, dynamic binding mechanism. Hence, a flexible and collaborative business was achieved. The workflow management system supports virtual enterprise, and the styles of virtual enterprises can be adjusted readily to adapt various situations.展开更多
In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, forrml security model of property-based remote attestation is proposed, with which we prove that the user p...In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, forrml security model of property-based remote attestation is proposed, with which we prove that the user platform satis- fies the security property requirements predefmed by a remote relying party. Under the co-Corrtautational Diffie-Helknan (CDH) assumption, the proposed scheme is proved to be secure in the random oracle model. Compared with the existing schemes, the proposed scheme has a short property certificate and signature size, and requires less computational cost.展开更多
文摘Objective:A computer-based STS(simulative training system) in providing pre-hospital trauma care at a disaster site was applied to teaching nursing students in the Second Military Medical University,China.This article reports on the teaching effectiveness of this system.Methods:Among 92 participants,46 were in the study group and 46 were in the 'control' group. Each student completed a multiple-choice quiz after completing 18 hours(six three-hour sessions) of the study module,and a score was recorded.The simulative training module was completed only by the study group;the 'control' group was assigned in-class discussions for the same amount of time covering the same content as the study group.The final course scores,which included both comprehensive and group task-based tests were compared between these two groups.The study used a descriptive and comparative approach for quantitative data analysis.Tests of independency between the multiple choice scores and the simulation scores were also performed.Finally,anonymous surveys were conducted.Results:The study group performed better than the 'control' group with a significantly higher average score for the group scenario task-based test score,and consequently the study group's final course score was significantly higher than the 'control' group.As per chi-square tests,no significant associations were found between the multiple choice scores and the simulated training scores.The final surveys showed students overwhelmingly agreed that STS training improved their knowledge and skills,their ability to recognize a potential critical event, and their initial response for trauma care at pre-hospital settings.The survey responses of the study group were noteworthy as they indicated that students recognized the importance of simulative training,appreciated the realism of the simulation,and were able to fight/adjust to the stressful feelings in order to focus on the task.Conclusion:Computer-based STS may be an effective teaching model to help students improve their capability in providing pre-hospital trauma care,and in their effectiveness in disaster response.
文摘An expert decision support system (EDSS) for multi-bins balance and contro1 of orequality in production ore bins of some large-scale open pit iron mine in China has been developed byexpert svitem tool software VP-EXPERT and integration software LOTUS 1-2-3 in this paper. Itis known by practicing that a medium-scale EDSS constructed on microcomputer is completcly, feaasible by means of VP-EXEPERT to construct knowledge base system (KBS), LOTUS 1-2-3 tomake decision support system (DSS) and link them with BAT.
文摘The expert system MUST (Mining Under Structures) shown in this paper and established by the authors is a preliminary expert system to solve the policy-making problems for mining under structures by means of computers instead of humanbeing. Based on the experience of relative experts,the authors established a knowledge base about the minings under structures,researched into reasonable method to simulate thinking processes of human experts when they are solving the problems, established the network of an expert system and named it ' MUST system' . MUST system uses the method of the structural system analysis approach. A kind of methods of Turbo Prolog and Fortran 77 language alternations is designed to meet the needs of exchange information within the MUST system. Based on this kind of methods MUST system has been constructed and realised on IBM-PC computer. For verifying the correctness, suitability and reliablity of MUST system,some practical examples of minings under structures were tentatively solved using MUST system,whose results are satisfactory.
文摘From the view of robotics, kinematical and dynamical analyses of the WD400 Mechanical Forward Excavator are carried out in this paper. Transformation of the manipulator abstracted from the excavator is determined. Forward and Inverse kinematical analyses are given and the trajectories of bucket movement and their mathematic descriptions are derived. The kinematical and dynamical models as well as the excavating resistance along the trajectories are obtained. The computer simulations are included in this paper.
文摘Using the services provided by virtual enterprises, we presented a solution to implement flexible inter-enterprise workflow management. Services were the responses of events that can be accessed programmatically on the Internet by HTTP protocol. Services were obtained according to some standardized service templates. The workflow engine's flexible control to a request was bound to appropriate services and their providers by using a constraint-based, dynamic binding mechanism. Hence, a flexible and collaborative business was achieved. The workflow management system supports virtual enterprise, and the styles of virtual enterprises can be adjusted readily to adapt various situations.
基金This work was supported by the National Natural Science Foundation of China under Crants No. 60842002, No. 61272542, No. 60903018, No. 61103183, No. 61103184 the National High- Tech Research and Development Plan of China under Ca'ant No. 2007AA01Z409+1 种基金 the Fundamental Research Funds for the Central Universities under Crants No. 2009B21114, No. 20101307114 the "Six Talent Peaks Program" of Jiangsu Province of China under Crant No. 2009182 and Program for New Century Excellent Talents in Hohai University.
文摘In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, forrml security model of property-based remote attestation is proposed, with which we prove that the user platform satis- fies the security property requirements predefmed by a remote relying party. Under the co-Corrtautational Diffie-Helknan (CDH) assumption, the proposed scheme is proved to be secure in the random oracle model. Compared with the existing schemes, the proposed scheme has a short property certificate and signature size, and requires less computational cost.