Stud Health Technol Inform
June 2018
This paper introduces the characteristics and complexity of traditional Chinese medicine (TCM) data, considers that modern big data processing technology has brought new opportunities for the research of TCM, and gives some ideas and methods to apply big data technology in TCM.
View Article and Find Full Text PDFStud Health Technol Inform
June 2018
Maximizing the effectiveness of prescriptions and minimizing adverse effects of drugs is a key component of the health care of patients. In the practice of traditional Chinese medicine (TCM), it is important to provide clinicians a reference for dosing of prescribed drugs. The traditional Cheng-Church biclustering algorithm (CC) is optimized and the data of TCM prescription dose is analyzed by using the optimization algorithm.
View Article and Find Full Text PDFBackground: Epidemiologic studies are inconsistent regarding the association between tea consumption and the risk of coronary artery disease (CAD).
Objective: The objective was to perform a meta-analysis to determine whether an association exists between tea consumption and total CAD endpoints in observational studies.
Design: We searched PUBMED and EMBASE databases for studies conducted from 1966 through November 2009.
Background: There is still conflicting evidence that green tea may protect against coronary atherosclerosis therefore the present study investigated the association between green tea consumption and arteriographically determined coronary atherosclerosis in a Chinese population.
Methods And Results: The study population consisted of 520 consecutive patients (379 men and 141 women) who underwent coronary arteriography for the first time. Patients were divided into 2 groups (Non-coronary artery disease [CAD] and CAD groups) according to the results of coronary arteriography.
Zhongguo Yi Liao Qi Xie Za Zhi
March 2008
It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies.
View Article and Find Full Text PDF