文档库 最新最全的文档下载
当前位置:文档库 › Conjunctive and Disjunctive Combination of Belief Functions Induced by Non Distinct Bodies

Conjunctive and Disjunctive Combination of Belief Functions Induced by Non Distinct Bodies

Conjunctive and Disjunctive Combination of Belief Functions Induced by Non Distinct Bodies
Conjunctive and Disjunctive Combination of Belief Functions Induced by Non Distinct Bodies

Conjunctive and Disjunctive Combination of Belief Functions Induced by Non Distinct Bodies of Evidence1

Thierry Den?ux

UMR CNRS6599Heudiasyc

Universit′e de Technologie de Compi`e gne

BP20529-F-60205Compi`e gne cedex-France

Thierry.Denoeux@hds.utc.fr

May30,2007

1This paper is an extended version of[6].

Abstract

Dempster’s rule plays a central role in the theory of belief functions.However,it assumes the combined bodies of evidence to be distinct,an assumption which is not always veri?ed in practice.In this paper,a new operator,the cautious rule of com-bination,is introduced.This operator is commutative,associative and idempotent. This latter property makes it suitable to combine belief functions induced by reliable, but possibly overlapping bodies of evidence.A dual operator,the bold disjunctive rule,is also introduced.This operator is also commutative,associative and idempo-tent,and can be used to combine belief functions issues from possibly overlapping and unreliable sources.Finally,the cautious and bold rules are shown to be particular members of in?nite families of conjunctive and disjunctive combination rules based on triangular norms and conorms.

Keywords:Evidence theory,Dempster-Shafer theory,Transferable Belief Model, Distinct Evidence,Idempotence,Information fusion.

1Introduction

Dempster’s rule of combination[3,29]is known to play a pivotal role in the theory of belief functions,together with its unnormalized version introduced by Smets in the Transferable Belief Model(TBM)[31],hereafter referred to as the TBM conjunctive rule.Justi?cations for the origins and uniqueness of these rules have been provided by several authors[9,31,23,22].However,although they appear well founded theo-retically,the need for greater?exibility through a larger choice of combination rules has been recognized by many researchers involved in real-world applications.Two limitations of Dempster’s rule and its unnormalized version seem to be their lack of robustness with respect to con?icting evidence(a criticism which mainly applies to Dempster’s rule),and the requirement that the items of evidence combined be distinct.

The issue of con?ict management has been addressed by several authors,who proposed alternative rules which,unfortunately,are generally not associative(see, e.g.,[41,12,26],and reviews in[28]and[38]).The disjunctive rule of combination [10,32](hereafter referred to as the TBM disjunctive rule)is both associative and more robust than Dempster’s rule in the presence of con?icting evidence,and its use is appropriate when the con?ict is due to poor reliability of some of the sources.It may also be argued that problems with Dempster’s rule(and,to a lesser extent,with the TBM conjunctive rule)are often due to incorrect or incomplete modelisation of the problem at hand,and that these rules often yield reasonable results when they are properly applied[18].In[38],an expert system approach is advocated in case of large con?ict,to determine its origin and revise the underlying hypotheses accordingly.

The other,and perhaps more fundamental,limitation of Dempster’s rule lies in the assumption that the items of evidence combined be distinct or,in other words, that the information sources be independent.As remarked by Dempster[3],the real-world meaning of this notion is di?cult to describe.The general idea is that,in the combination process,no elementary item of evidence should be counted twice.Thus, non overlapping random samples from a population are clearly distinct items of evi-dence,whereas“opinions of di?erent people based on overlapping experiences could not be regarded as independent sources”[3].When the nature of the interaction be-tween items of evidence can be described mathematically,then it is possible to extend Dempster’s rule or the TBM conjunctive rule so as to include this knowledge(see,e.g., [9,30]).However,it is often the case that,although two items of evidence(such as, e.g.,opinions expressed by two experts sharing some experiences,or observations of correlated random quantities)can clearly not be regarded as distinct,the interaction between them is ill known and,in many cases,almost impossible to describe.

In such a common situation,it would be very helpful to have a combination rule that would not rely on the distinctness assumption.An early attempt to provide such a rule is reported in[27],but it was limited to the combination of simple belief functions(i.e.,belief functions having at most two focal sets,including the frame of discernment).This method was extended to separable belief functions(i.e.,belief functions that can be decomposed as the conjunctive sum of simple belief functions) in[16].However,not all belief functions are separable,and the justi?cation for this approach was unclear.

A natural requirement for a rule allowing the combination of overlapping bodies of evidence is idempotence.The arithmetic mean does possess this property,but it is not

1

associative,another requirement often regarded as essential.Following an approach initiated by Dubois and Prade in[9],Cattaneo[1]studied a family of rules gener-alizing the TBM conjunctive rule,based on the de?nition of a joint belief function on a product space,whose marginals are the belief functions to be combined.Inside this family,he proposed a rule minimizing the con?ict,which happens to be idempo-tent.However,he showed that,within this particular family of rules,associativity is incompatible both with idempotency,and with con?ict minimization.

In contrast,associative and idempotent operators exist in possibility theory,based on the minimum triangular norm and its dual,the maximum triangular conorm. Dubois and Yager[15]showed that agregation operators for possibility distributions (or,equivalently,fuzzy set connectives)can be deduced from assumptions on multi-valued mappings underlying the possibility distributions viewed as consonant belief functions.This approach,however,has not made it possible to extend possibilistic agregation operators to arbitrary belief functions while maintaining such properties as associativity and idempotency.New operators satisfying these properties are pro-posed in this paper,following a completely di?erent approach based on some ideas suggested to the author by the late Philippe Smets[36].

The rest of this paper is organized as follows.The underlying fundamental con-cepts,including the canonical decomposition and the relative information content of belief functions,are?rst recalled in Section2.The cautious conjunctive rule and its dual,the bold disjunctive rule are then introduced in Sections3and4,respectively. The cautious and bold rules are shown in Section5to be particular members of in?nite families of conjunctive and disjunctive combination rules based on triangular norms and conorms.Finally,the e?ciency of the cautious rule to combine information from dependent features in a classi?er fusion problem is demonstrated experimentally in Section6,and Section7concludes the paper.

2Fundamental Concepts

In this section,the main building blocks of new combination rules de?ned later are introduced.The basic concepts and terminology related to belief functions are?rst summarized in Section2.1.Section2.2then focuses on the canonical conjunctive decomposition of non dogmatic belief functions,which allows their representation in the form of conjunctive weight functions taking values in(0,+∞).This section is essential,as the cautious conjunctive rule introduced in this paper will be expressed as a function of conjunctive weights.Finally,Section2.3recalls known de?nitions and results related to the ordering of belief functions according to their information content;a new partial ordering relation based on conjunctive weights is also intro-duced.This ordering relation will play an important role in the derivation of the new combination rules.

2.1Basic De?nitions and Notations

In this paper,the TBM[39,34]is accepted as a model of uncertainty.An agent’s state of belief expressed on a?nite frame of discernmentΩ={ω1,...,ωK}is represented by a basic belief assignment(BBA)m,de?ned as a mapping from2Ωto[0,1]verifying

2

A?Ωm(A)=1.Subsets A ofΩsuch that m(A)>0are called focal sets of m.A

BBA m is said to be

?normal if?is not a focal set(this condition is not imposed in the TBM);

?subnormal is?is a focal set;

?dogmatic ifΩis not a focal set;

?vacuous ifΩis the only focal set;

?simple if it has at most two focal sets and,if it has two,Ωis one of those;

?categorical if it has only one focal set;

?Bayesian if its focal sets are singletons.

A subnormal BBA m can be transformed into a normal BBA m?by the normalization operation de?ned as follows:

m?(A)=

k·m(A)if A=?,

0otherwise,

(1)

for all A?Ω,with k=(1?m(?))?1.

A simple BBA(SBBA)m such that m(A)=1?w for some A=Ωand m(Ω)=w can be noted A w(the advantage of this notation will become apparent later).The vacuous BBA can thus be noted A1for any A?Ω,and a categorical BBA can be noted A0for some A=Ω.A BBA m can equivalently be represented by its associated belief,implicability,plausibility and commonality functions de?ned,respectively,as:

bel(A)=

? =B?A

m(B),(2)

b(A)=

B?A

m(B)=bel(A)+m(?),(3)

pl(A)=

B∩A=?

m(B),(4)

and

q(A)=

B?A

m(B),(5) for all A?Ω.BBA m can be recovered from any of these functions.For instance:

m(A)=

B?A

(?1)|B|?|A|q(B),?A?Ω,(6)

and

m(A)=

B?A

(?1)|A|?|B|b(B),?A?Ω,(7) where|A|denotes the cardinality of A.

3

The negation(or complement)m of a BBA m is de?ned as the BBA verifying m(A)=m(A)for all A?Ω,where A denotes the complement of A[10].It may easily be shown that the implicability function b associated to m and the commonality function q associated to m are linked by the following relation:

b(A)=q(A),?A?Ω.(8)

A BBA m is said to be consonant if its focal sets are nested.This is known to be equivalent to the following condition[29]:

pl(A∪B)=pl(A)∨pl(B),?A,B?Ω,

where∨denote the maximum operator.The above equation de?nes a possibility measure[42].Consequently,a consonant BBA uniquely de?nes a possibility measure. The corresponding possibility distribution is then given by

π(ω)=pl({ω})=q({ω}),?ω∈Ω.

Given a BBA m and a coe?cientα∈[0,1],the discounting of m with discount rateαyields the new BBAαm de?ned by:

αm=(1?α)m+αmΩ,

where mΩdenotes the vacuous BBA[29,page252].The discounting operation is used to model a situation where a source S provides a BBA m,and the reliability of S is measured by1?α.If S is fully reliable(1?α=1),then m is left unchanged.If S is not reliable at all,m is transformed into the vacuous BBA.In intermediate situations, m is replaced by a convex combination of m and the vacuous BBA.

The TBM conjunctive rule and Dempster’s rule are noted∩ and⊕,respectively. They are de?ned as follows.Let m1and m2be two BBAs,and let m1∩ 2and m1⊕2 be the result of their combination by∩ and⊕.We have:

m1∩ 2(A)=

B∩C=A

m1(B)m2(C),?A?Ω,(9) and,assuming that m1∩ 2(?)=1:

m1⊕2(A)=

0if A=?,

m1∩ 2(A)

1?m1∩ 2(?)otherwise.

(10)

Dempster’s rule is just equivalent to the TBM conjunctive rule followed by normaliza-tion using(1).Both rules are commutative,associative,and admit a unique neutral element:the vacuous BBA.They both assume the combined items of evidence to be distinct.Let A w1and A w2be two SBBAs with the same focal element A=Ω.The result of their∩ -combination is the SBBA A w1w2.The⊕operator yields the same result as long as A=?.The TBM conjunctive rule has a simple expression in terms of commonality functions:with obvious notations,we have:

q1∩ 2=q1·q2.(11)

4

In the TBM,conditioning by B?Ωis equivalent to conjunctive combination with a categorical BBA m B focused on B.The result is noted m[B],with m[B]=m∩ m B. This conditional BBA quanti?es our belief onΩ,in a context where B holds.

Let us now assume that m1∩ 2has been obtained by combining two BBAs m1and m2,and then we learn that m2is in fact not supported by evidence and should be “removed”from m1∩ 2.This“decombination”operation was introduced in[33].It is well de?ned if m2is non dogmatic.Denoting∩ this operator,we can write:

m1∩ 2∩ m2=m1.

Decombination can easily be computed for any two BBAs m1and m2using the cor-responding commonality functions as:

q1∩ 2(A)=q1(A)

q2(A)

,?A?Ω.(12)

Note that q2(A)>0for all A as long as m2is non dogmatic.One should also be aware that the quotient of two commonality functions is not always a commonality function.Consequently,m1∩ m2is not necessarily a BBA.

A disjunctive rule of combination∪ also exists[10,32]:it is de?ned as

m1∪ 2(A)=

B∪C=A

m1(B)m2(C),?A?Ω.(13)

This rule,called the TBM disjunctive rule,is also commutative and associative.It has a simple expression in terms of implicability functions,which is the counterpart of(11):

b1∪ 2=b1·b2.(14) As for the TBM conjunctive rule,an inverse operation may also be de?ned for the

TBM disjunctive rule:

b1∪ 2(A)=b1(A)

b2(A)

,?A?Ω.(15)

This operation is well-de?ned as long as m2is subnormal(in which case we have b2(A)>0for all A).However,it does not necessarily produce a belief function.Its interpretation is similar to that of∩ :it removes,or“decombines”’,evidence which has been combined disjunctively with prior knowledge.

The dual nature of∩ and∪ becomes apparent when one notices that these two operators are linked by De Morgan’s laws[10]:

m1∪ m2=m1∩ m2,(16)

m1∩ m2=m1∪ m2,(17) for all m1and m2.

As remarked by Smets[32],the TBM conjunctive rule is based on the assumption that the belief functions to be combined are induced by reliable sources of information, whereas the TBM disjunctive rule only assume that at least one source of information is reliable,but we do not know which one.Both rules assume the sources of information to be independent(i.e.,they are assumed to provide distinct,non overlapping pieces of evidence).

5

In the TBM,combination rules belong to the credal level where evidence aggre-gation takes place,whereas decisions are made at the pignistic level[39],where each BBA m is mapped to a pignistic probability function Betp m de?ned by

Betp m(ω)=

{A:ω∈A}m?(A)

|A|,?ω∈Ω,(18)

where m?denotes the normalized version of m.

2.2Canonical Conjunctive Decomposition of a Belief Function Shafer[29,Chapter4]de?ned a separable BBA as the result of the⊕combination of SBBAs.For every separable BBA in the sense of Shafer,one has:

m=

? =A?Ω

A w(A),(19)

with w(A)∈[0,1]for all A?Ω,A=?.This representation is unique if m is non dogmatic.Shafer named this representation the canonical decomposition of m.

The concept of separability can be extended to subnormal BBAs in two ways:?We will say that a BBA m is u-separable(where“u”stands for“unnormalized”) if we have

m=∩ A?ΩA w(A),(20) with w(A)∈[0,1]for all A?Ω;

?We will say that a BBA m is n-separable(where“n”stands for“normalized”) if we have

m?=

? =A?Ω

A w(A),(21)

where w(A)∈[0,1]for all A?Ω,A=?,and m?is the normalized form of m. Again,the decompositions(20)and(21)are unique as long as m is non dogmatic. Clearly,(20)implies(21),but the converse is not true,as will be shown below.Con-sequently,u-separability is a stronger notion than n-separability.

2.2.1Extension to non dogmatic BBAs

The canonical decomposition of a separable BBA was extended to any non dogmatic BBA by Smets[33].The key to such a generalization is the notion of generalized simple BBA(GSBBA),de?ned as a functionμfrom2Ωto R verifying

μ(A)=1?w,(22)

μ(Ω)=w,(23)

μ(B)=0?B∈2Ω\{A,Ω},(24) for some A=Ωand some w∈[0,+∞).Any GSBBAμcan thus be noted A w for some A=Ωand w∈[0,+∞).When w≤1,μis a SBBA.When w>1,μis not a BBA,since it is no longer a mapping from2Ωto[0,1].Such a function can be

6

referred to as an inverse simple BBA (ISBBA),using a terminology similar to that used in [33].The TBM conjunctive rule can be trivially extended to combine SBBAs

and ISBBAs alike.In particular,the relationship A w 1∩

A w 2=A w 1w 2still holds for w 1,w 2∈[0,+∞).

In [33],Smets proposed an interpretation of an ISBBA as representing a state of belief in which one has some reasons not to believe in A .By combining A w for some w >1with the SBBA A 1/w using the TBM conjunctive rule,one obtains the vacuous bba A 1.Hence,the ISBBA A w corresponds to a situation where the agent has a “debt of belief”in A ,and some evidence has to be accumulated before it starts to believe in A .

Using the concept of GSBBA,and extending Shafer’s approach,Smets showed that any non dogmatic BBA can be uniquely represented as the conjunctive combination of GSBBAs:

m =∩

A ?ΩA w (A ),(25)with w (A )∈(0,+∞)for all A ?Ω.Equation (25)is clearly an extension of (19).It de?nes the canonical conjunctive decomposition of m (we will see in Section 4.1that a canonical disjunctive decomposition also exists).The weights w (A )for every A ?Ωcan be obtained from the commonalities using the following formula:w (A )=

B ?A q (B )(?1)|B |?|A |+1,(26)=????????????? B ?A,|B | ∈2N q (B ) B ?A,|B |∈2N q (B )

if |A |∈2N B ?A,|B |∈2N q (B ) B ?A,|B | ∈2N q (B )otherwise,

(27)where 2N denotes the set of even natural numbers.Eq.(26)can be equivalently written ln w (A )=?

B ?A

(?1)|B |?|A |ln q (B ),?A ?Ω.(28)One notices the similarity with (6).Hence,any procedure for transforming q to m (such as the Fast M¨o bius Transform [21]or matrix multiplication [35])can be used to compute ln w from ?ln q .

The function w :2Ω\{Ω}→(0,+∞)(hereafter referred to as the conjunctive weight function)is thus yet another equivalent representation of any non dogmatic BBA (together with bel ,pl ,q ,etc.).This concept of conjunctive weight function can be extended to a dogmatic BBA m by discounting it with some discount rate and letting tend towards 0[33].However,this extension requires some mathematical subtleties.Furthermore,it may be argued that most (if not all)states of belief,being based on imperfect and not entirely conclusive evidence,should be represented by non dogmatic belief functions,even if the mass m (Ω)is very small.For instance,consider a coin tossing experiment.It is natural to de?ne a BBA on Ω={Heads,T ails }as m ({Heads })=0.5and m ({T ails })=0.5.However,this assumes the coin to be perfectly balanced,a condition never exactly veri?ed in practice.So,a more appropriate BBA may be m ({Heads })=0.5(1? ),m ({T ails })=0.5(1? )and m (Ω)= for some small >0.

7

Example 1Let Ω={a,b,c }be a frame of discernment,and m the BBA shown in Table 1.The weights can be computed from the commonalities using (26)as follows:

w (?)=

q ({a })q ({b })q ({c })q ({a,b,c })q (?)q ({a,b })q ({a,c })q ({b,c })=0.5×1×0.7×0.21×0.5×0.2×0.7=1w ({a })=

q ({a,b })q ({a,c })q ({a })q ({a,b,c })=0.5×0.20.5×0.2=1w ({b })=

q ({a,b })q ({b,c })q ({b })q ({a,b,c })=0.5×0.71×0.2=7/4w ({a,b })=

q ({a,b,c })q ({a,b })=0.20.5=2/5w ({c })=

q ({a,c })q ({b,c })q ({c })q ({a,b,c })=0.2×0.20.7×0.2=1

w ({a,c })=

q ({a,b,c })q ({a,c })=0.20.1=1w ({b,c })=q ({a,b,c })q ({b,c })=0.20.7=2/7.We can see that m can be represented as the conjunctive combination of two SBBAs {a,b }2/5and {b,c }2/7,and an ISBBA {b }7/4.

Table 1:A BBA with its commonality and weight functions.

A m (A )q (A )w (A )?011{a }00.51{b }017/4{a,b }0.30.52/5{c }00.71{a,c }00.21{b,c }

0.50.72/7

Ω0.20.22.2.2Special cases

In the following two propositions,we provide analytical formulas for the conjunctive weight functions associated to two important classes of BBAs.

Proposition 1Let A 1,...,A n be n subsets of Ωsuch that A i ∩A j =?for all i,j ∈{1,...,n },and let m be a BBA on Ωwith focal sets A 1,...,A n ,and Ω.We assume that m (Ω)+ n k =1m (A k )≤1,so that ?may also be a focal set.The conjunctive weight function associated to m is:w (A )=?????m (A k )m (A k )+m (Ω),A =A k ,m (Ω) n k =1 1+m (A k )m (Ω) ,A =?,1,otherwise.

8

Proof:We have:

q(A)=?

?

?

m(A k)+m(Ω),A?A k,

1,A=?,

m(Ω),otherwise.

Consequently,m may be expressed as a function of q as follows:

m(A k)=q(A k)?q(Ω),k=1,...,n,(29)

m(Ω)=q(Ω)(30)

m(?)=q(?)?q(Ω)?

n

k=1

(q(A k)?q(Ω))(31)

m(A)=0,?A/∈{A1,...,A n,Ω,?}.(32) As explained above,ln w may be obtained from?ln q using any procedure that transforms q to m.Consequently,we may,in the above equations,replace m by ln w and q by?ln q(except in(30),because w(Ω)is not de?ned).We obtain from(29):

ln w(A k)=?ln q(A k)+ln q(Ω)=ln q(Ω) q(A k)

,

which implies

w(A k)=

m(A k)

m(A k)+m(Ω)

,k=1,...,n.

Now,from(31)we get

ln w(?)=?ln q(?)+ln q(Ω)+

n

k=1

(ln q(A k)?ln q(Ω)),

=ln

q(Ω)1?n

n

k=1

q(A k)

,

=ln

m(Ω)1?n

n

k=1

(m(Ω)+m(A k))

,

which implies

w(?)=m(Ω)

n

k=1

1+

m(A k)

m(Ω)

.

Finally,(32)implies that w(A)=1,for all A/∈{A1,...,A n,Ω,?}.

The BBAs studied in Proposition1may be termed“quasi-Bayesian”,as they can be obtained by discounting Bayesian BBAs de?ned on a coarsening ofΩ.This class of BBAs is closed under the TBM conjunctive rule.Quasi-Bayesian BBAs are de?ned by a small number of masses,and are frequently encountered in applications.

Another important case concerns consonant BBAs,whose focal sets are nested. The following proposition provides formulas to compute the weight function associated to a consonant BBA.

9

Proposition 2Let m be a consonant BBA,with associated possibility distribution π(ωk )=q ({ωk }),k =1,...,K .We note πk =π(ωk )and we assume that the elements of Ωhave been arranged in decreasing order of plausibility,i.e.,we have

1≥π1≥π2≥...≥πK >0.

Let A k ={ω1,...,ωk },k =1,...,K .The focal sets of m are in {A 1,...,A K ,?}(m is subnormal if π1<1,and it is non dogmatic since we have assumed πK >0).The conjunctive weight function associated to m is:

w (A )=???π1A =?,πk +1πk ,A =A k ,1≤k

Proof .As shown in [8],m can be computed from π1,...,πK as:

m (A )=???????1?π1,A =?,πk ?πk +1,A =A k ,1≤k

Since πk =q ({ωk }),we may deduce that ln w (A )=???ln π1,A =?,?ln πk +ln πk +1,A =A k ,1≤k

from which the desired expression of w can be easily derived.

2.2.3Normalization and combination It may be remarked that normalizing a subnormal BBA m using (1)amounts to combining it with the ISBBA ?k :

m ?=m ∩

?k .Consequently,the weight function w ?associated to m ?is identical to w ,except for

the weight assigned to ?.If m =∩

A ?ΩA w (A ),we have m ?=?k ∩ ?w (?)∩ ∩ ? =A ?ΩA w (A ) =?

k ·w (?)∩ ∩ ? =A ?ΩA w (A ) ,=∩ A ?ΩA w ?(A )

with w ?(?)=k ·w (?)and w ?(A )=w (A )for all A ∈2Ω\{?,Ω}.We can write,equivalently:m ?=

? =A ?Ω

A w (A ).(33)As a direct consequence of the above remark,it is easy to formulate criteria for u-separability and n-separability:

10

?A BBA m is u-separable i?w (A )≤1,for all A ?Ω;

?A BBA m is n-separable i?w (A )≤1,for all A ?Ω,A =?.

For instance,quasi-Bayesian BBAs studied in Proposition 1are n-separable,but they are not u-separable in general (we may have w (?)>1).In contrast,consonant BBAs are u-separable,since they satisfy the condition w (A )≤1for all A ?Ω.

The w representation appears particularly interesting when it comes to combining BBAs using the TBM conjunctive rule or Dempster’s rule.Indeed,let m 1and m 2be two BBAs with weight functions w 1and w 2.We have:

m 1∩ m 2= ∩ A ?ΩA w 1(A ) ∩ ∩ A ?ΩA w 2(A ) (34)

=∩ A ?ΩA w 1(A )w 2(A ).(35)

We can thus write,with obvious notations:

w 1∩ 2=w 1·w 2,

which is reminiscent of (11).The inverse TBM conjunctive rule ∩

also has a simple expression in the w -space,similar to (33):we have w 1∩ 2=w 1/w 2.Hence,

m 1∩

m 2= ∩ A ?ΩA w 1(A ) ∩ ∩ A ?ΩA w 2(A ) (36)=∩ A ?ΩA w 1(A )/w 2(A ).(37)

Finally,using (33),it is easy to see that

m 1⊕m 2=

? =A ?ΩA w 1(A )w 2(A ).(38)

2.2.4Latent belief structure

Let m be a non dogmatic belief function,and w its associated conjunctive weight function.For each weight w (A )let us de?ne the following two quantities:

w c (A )=1∧w (A ),

(39)and

w d (A )=1∧1w (A ),(40)

where ∧denotes the minimum operator.It is clear that we have

w (A )=w c (A )w d (A )

.(41)Consequently,we can write

m =∩ A ?ΩA w c (A )/w d (A )(42)=

∩ A ?ΩA w c (A ) ∩ ∩ A ?ΩA w d (A ) (43)=m c ∩ m d .(44)

11

Any non dogmatic BBA m can thus be decomposed into two u-separable BBAs m c and m d called,respectively,its con?dence and di?dence components.The pair(m c,m d) forms what Smets called a latent belief structure(LBS)[33].He proposed to interpret m c as representing positive evidence,i.e.,good reasons to believe in various propo-sitions A?Ω,and m d as representing negative evidence,i.e.,good reasons not to believe in the same propositions.The BBA m is obtained by removing the negative evidence m d from the positive evidence m c.Note that we have the following property with respect to the TBM conjunctive rule:if(m c1,m d1)and(m c2,m d2)are two LBSs associated to non dogmatic BBAs m1and m2,respectively,then(m c1∩ m c2,m d1∩ m d2) is a LBS associated to m1∩ m2.

2.3Informational Comparison of Belief Functions

In the TBM,the Least commitment Principle(LCP)plays a role similar to the prin-ciple of maximum entropy in Bayesian Probability Theory.As explained in[32],the LCP indicates that,given two belief functions compatible with a set of constraints, the most appropriate is the least informative.To make this principle operational,it is necessary to de?ne ways of comparing belief functions according to their information content.Three such partial orderings,generalizing set inclusion,were proposed in the 1980’s by Yager[40]and Dubois and Prade[10];they are de?ned as follows:?pl-ordering:m1 pl m2i?pl1(A)≤pl2(A),for all A?Ω;

?q-ordering:m1 q m2i?q1(A)≤q2(A),for all A?Ω;

?s-ordering:m1 s m2i?there exists a square matrix S with general term S(A,B),A,B∈2Ωverifying

S(A,B)=1,?A?Ω,

B?Ω

S(A,B)>0?A?B,A,B?Ω,

such that

S(A,B)m2(B),?A?Ω.(45)

m1(A)=

B?Ω

The term S(A,B)may be seen as the proportion of the mass m2(B)which is transferred(“?ows down”)to A.Matrix S is named a specialization matrix [23,35],and m1is said to be a specialization of m2.

As shown in[10],these three de?nitions are not equivalent:m1 s m2implies m1 pl m2and m1 q m2,but the converse is not true.Additionally,pl-ordering and q-ordering are not comparable.However,in the set of consonant BBAs,these three partial orders are equivalent.The interpretation of these ordering relations is discussed in[10]from a set-theoretical perspective,and in[13]from the point of view of the TBM.Whenever we have m1 x m2,with x∈{pl,q,s},we will say that m1is x-more committed than m2.

Another concept which leads to an alternative de?nition of informational order-ing is that of Dempsterian specialization[23].m1is said to be a Dempsterian spe-cialization of m2,which we note m1 d m2,i?there exists a BBA m such that

12

m 1=m ∩

m 2.As shown in [23],this is a stronger condition than specialization,i.e.,we have m 1 d m 2?m 1 s m 2,but the converse is false.If m 1=m ∩

m 2,then there is a specialization matrix S m de?ned as a function of m ,called a Dempsterian specialization matrix,allowing to compute m 1from m 2using relation (45).

Finally,we can think of one more de?nition of informational ordering based on the weight function recalled in Section 2.2:given two non dogmatic BBAs m 1and m 2,we can say that m 1is w -more committed than m 2,which we note m 1 w m 2,i?w 1(A )≤w 2(A ),for all A ?Ω.Because of (35),this is equivalent to the existence

of a u-separable BBA m ,with weight function w =w 1/w 2,such that m 1=m ∩

m 2.Consequently,w -ordering is strictly stronger than d -ordering.The meaning of d and w is clear:if m 1 d m 2or m 1 w m 2,it means that m 1is the result of the combination of m 2with some BBA m ;consequently,m 1has a higher information content than m 2.In the case of w ,the requirement that m be u-separable may seem arti?cial.However,it may be argued that most belief functions encountered in practice result from the pooling of simple evidence,and are therefore u-separable.As shown in Section 2.2.2,this is also the case for consonant belief funtions,a class of belief functions often encountered in applications because of its simplicity.Furthermore,we will see that w -ordering happens to be a simpler and more convenient notion,for some purposes,than other orderings.A slightly weaker notion based on n-separability will be de?ned later in Section 3.3.We defer the introduction of this additional notion for clarity of presentation.

In summary,we thus have,for any two non dogmatic BBAs m 1and m 2:m 1 w m 2?m 1 d m 2?m 1 s m 2? m 1 pl m 2m 1 q m 2,

(46)where all implications are strict.

The vacuous BBA m Ω(with weight function w Ω(A )=1,for all A ?Ω)is the unique greatest element for partial orderings x with x ∈{pl,q,s,d },i.e.,we have

m x m Ω,?m,?x ∈{pl,q,s,d }.

In contrast,m Ωis only a maximal element for w ,i.e.,we have the following weaker property

m Ω w m ?m =m Ω.

The BBAs that are w -less speci?c than m Ωare the u-separable ones.Non u-separable BBAs are not comparable with m Ωaccording to relation w .

As emphasized by Dubois and Prade in [10],relations x with x ∈{pl,q,s }generalize set inclusion:if m A and m B are two categorical BBAs such that m A (A )=1and m B (B )=1,then m A x m B ,with x ∈{pl,q,s },if and only if A ?B .The same is true for relation d .For relation w ,this property does not hold,since categorical BBAs,being dogmatic,cannot be compared according to w .However,we can still have a similar property if we consider a categorical BBA as the limit of a sequence of non dogmatic BBAs.More precisely,let ( n ),n =1,2,...,∞be a real sequence such that n ∈[0,1]for all n ,and lim n →∞ n =0.For any A ?Ω,let m n A the BBA with following weight function:w n A (C )= n if C ?A 1otherwise,

13

for all C?Ω.It is clear that m n A(A)≥1? n.Consequently,we have lim n→∞m n A(A)= 1and lim n→∞m n A(C)=0,for all C=A.This means that the categorical BBA m A may seen as the limit of the sequence(m n A),this sequence being uniquely de?ned, given( n).Using this representation,we can state the following proposition. Proposition3Let A and B be two subsets ofΩ,m A and m B the categorical BBAs focused on A and B,and(m n A)and(m n B)their representations as sequences of BBAs as de?ned above.Then,we have

A?B?m n A w m n B,?n≥1.

Proof:Assume that A?B.Let C be an arbitrary subset ofΩ:

?if C?B,then C?A,and we have w n A(C)=w n B(C)= n;

?if C?B,then w n B(C)=1≥w n A(C).

Conversely,assume that w n A(C)≤w n B(C)for all C?Ω.Then w n A(B)≤w n B(B)= n. Consequently,w n A(B)= n,and A?B.

Equipped with these de?nitions of the relative information content of belief func-tions,it is possible to give an operational meaning of the LCP.Let M be a set of BBA compatible with a set of constraints.The LCP dictates to choose a greatest element in M,if one such element exists,according to one of the partial ordering x,for some x∈{pl,q,s,d,w}.These partial orderings seem equally well justi?ed and reasonable and,in the absence of any decisive argument to discard any of them,considerations of simplicity,existence of a solution and tractability of calculations can be invoked to choose a particular ordering for a given problem.For instance,q-ordering is adopted in[13]to derive the expression of the q-least committed BBA with given pignistic probability function.In the following section,the same principle is used to derive a rule of combination,using partial ordering w.

3The Cautious Conjunctive Rule

3.1Derivation from the LCP

Just as relations x may be seen as generalizing set inclusion,it is possible to conceive conjunctive combination rules generalizing set intersection,by reasoning as follows. Assume that we have two sources of information,one of which indicates that the true value of the variable of interestωlies in A?Ω,while the other one indicates that it lies in B?Ω,with A=B.If we consider both sources as reliable,then we can deduce thatωlies in some set C such that C?A,and C?B.The largest of these subsets is the intersection A∩B of A and B.

Let us now assume that the two sources provide BBAs m1and m2,and the sources are both considered to be reliable.The agent’s state of belief,after receiving these two pieces of information,should then be represented by a BBA m12more informative than m1,and more informative than m2.Let us denote by S x(m)the set of BBAs m such that m x m,for some x∈{pl,q,s,d,w}.We thus have m12∈S x(m1) and m12∈S x(m2)or,equivalently,m12∈S x(m1)∩S x(m2).According to the LCP,

one should select the x-least committed element in S x(m1)∩S x(m2).This de?nes

14

a conjunctive combination rule,provided that an x-least committed element(i.e.,a greatest element with respect with partial order x)exists and is unique.

In[13],this approach was used to justify the minimum rule for combining possibil-ity distributions,from the point of view of the TBM.Let m1and m2be two consonant BBAs,and let q1and q2be their respective commonality functions.Then,the con-sonant BBA m12with commonality function q12(A)=q1(A)∧q2(A)for all A?Ωis claimed in[13]to be the s-least committed element in the set S s(m1)∩S s(m2).This approach,however,cannot be blindly transposed to non consonant BBAs,since the minimum of two commonality functions is not,in general,a commonality function.

However,applying this approach with the w ordering does yield an interesting solution,as shown by the following lemma and proposition.

Lemma1Let m by a non dogmatic BBA with conjunctive weight function w,and let w be a mapping from2Ω\Ωto(0,+∞)such that w (A)≤w(A)for all A?Ω.Then

w is the conjunctive weight function of some BBA m .

Proof:We have

w (A)=w(A)·w (A)

w(A)

,?A?Ω.

Since w (A)/w(A)≤1for all A?Ω,w /w is the weigth function of a u-separable BBA.Consequently,w is the weigth function of a BBA m obtained by combining m with a u-separable BBA using the TBM conjunctive rule. Proposition4Let m1and m2be two non dogmatic BBAs.The w-least committed element in S w(m1)∩S w(m2)exists and is unique.It is de?ned by the following weight function:

w1∧ 2(A)=w1(A)∧w2(A),?A?Ω.(47) Proof:For i=1and i=2,we have m∈S w(m i)i?w(A)≤w i(A)for all A?Ω. Hence,m∈S w(m1)∩S w(m2)i?w(A)≤w1(A)∧w2(A)for all A?Ω.Let us consider function w1∧ 2de?ned by w1∧ 2(A)=w1(A)∧w2(A),for all A?Ω.This is the conjunctive weight function of a valid BBA,as a consequence of Lemma1. Consequently,it corresponds to the unique w-least committed element in S w(m1)∩S w(m2).

Equation(47)de?nes a new rule which can be formally de?ned as follows. Definition1(Cautious conjunctive rule)Let m1and m2be two non dogmatic BBAs.Their combination using the cautious conjunctive rule(or cautious rule for short)is noted m1∧ 2=m1∧ m2.It is de?ned as the BBA with the following weight

function:

w1∧ 2(A)=w1(A)∧w2(A),?A?Ω.

We thus have

m1∧ m2=∩ A?ΩA w1(A)∧w2(A).(48) Note that this rule happens to generalize a method proposed by Kennes[20]for combining u-separable BBAs induced by non distinct items of evidence,based on an application of category theory to evidential https://www.wendangku.net/doc/636788445.html,ing the canonical decompo-sition of non dogmatic belief functions and the concept of w-ordering,the new rule

15

described in this paper proves to be well justi?ed for combining the wider class of non dogmatic belief functions.

As another remark,it must also be emphasized that the cautious rule provides a BBA m1∧ m2which is the w-least committed in the set S w(m1)∩S w(m2)of BBAs that are w-more committed than both m1and m2.When either m1or m2is not u-separable,then m1∩ m2does not belong to that set(because,e.g.,w1(A)w2(A)> w1(A)whenever w2(A)>1).Consequently,we do not have m1∩ m2 w m1∧ m2in general,except when both m1and m2are separable.

In practice,the cautious combination of two non dogmatic BBAs m1and m2can thus be computed as follows:

?Compute the commonality functions q1and q2using(5);

?Compute the weight functions w1and w2using(26);

?Compute m1∧ 2=m1∧ m2as the∩ combination of GSBBAs A w1(A)∧w2(A),for all A?Ωsuch that w1∧w2(A)=1.

Example2Table2shows the weight functions of two BBAs m1and m2onΩ= {a,b,c},a well as the combined weight function w1∧ 2and BBA m1∧ m2.In this case,m1∧ 2is obtained as the TBM conjunctive combination of three SBBAs:{b}0.7, {a,b}2/5and{b,c}2/7.By combining the?rst two we get a mass0.3on{b},3/5×0.7= 0.42on{a,b}and2/5×0.7=0.28onΩ.Combination with{b,c}2/7then yields

m1∧ 2({b})=0.3×(2/7+5/7)+0.42×5/7=0.6,

m1∧ 2({a,b})=0.42×2/7=0.12,

m1∧ 2({b,c})=0.28×5/7=0.2,

m1∧ 2(Ω)=0.28×2/7=0.08.

The result of the combination of m1and m2using the TBM conjunctive rule directly from(9)is shown in the last column of Table2for comparison.

Table2:Combination of two BBAs using the cautious rule.

A m1(A)w1(A)m2(A)w2(A)w1∧ 2(A)m1∧ 2(A)m1∩ 2(A)

?0101100

{a}0101100

{b}07/40.30.70.70.60.42

{a,b}0.32/5012/50.120.09

{c}0101100

{a,c}0101100

{b,c}0.52/70.43/72/70.20.43

Ω0.20.30.080.06

3.2Properties

Proposition5The cautious conjunctive rule has the following properties:

16

Commutativity:for all m1and m2,m1∧ m2=m2∧ m1;

Associativity:for all m1,m2and m3,m1∧ (m2∧ m3)=(m1∧ m2)∧ m3; Idempotence:for all m,m∧ m=m;

Distributivity of∩ with respect to∧ :for all m1,m2and m3,

m1∩ (m2∧ m3)=(m1∩ m2)∧ (m1∩ m3).

Proof:Commutativity,associativity and idempotence result directly from correspond-

ing properties of the minimum operator.Distributivity of∩ with respect to∧ is a

consequence of distribution of the product with respect to the minimum:

w1(w2∧w3)=(w1w2)∧(w1w3),?w1,w2,w3.

The last property(distributivity)is actually quite important,as it explains why

the cautious rule can be considered to be more relevant than the TBM conjunctive

rule∩ when combining non distinct items of evidence:if two sources provide BBAs

m1∩ m2and m1∩ m3having some evidence m1in common,the shared evidence is not counted twice.

The following proposition is linked to the notion of LBS introduced in Section

2.2.4.It will be useful to explain some additional properties of the cautious rule. Proposition6Let m1and m2be two non dogmatic BBAs with conjunctive weight functions w1and w2.Let(m c1,m d1)and(m c2,m d2)denote the LBSs associated to m1 and m2,respectively,and let(w c1,w d1)and(w c2,w d2)denote the corresponding weights. Then the LBS(m c1

,m d1∧ 2)associated to m1∧ m2is de?ned by

∧ 2

m c1∧ 2=∩ A?ΩA w c1∧w c2,

m d1∧ 2=∩ A?ΩA w d1∨w d2,

where∨denotes the maximum operation.

Proof:For any A?Ω,we have

w c1∧ 2(A)=1∧w1∧ 2(A)

=1∧w1(A)∧w2(A)

=(1∧w1(A))∧(1∧w2(A))

=w c1(A)∧w c2(A),

17

and

w d1∧ 2(A)=1∧

1

w1∧ 2(A)

=1∧

1

w1(A)∧w2(A)

=1∧

1

w1(A)

∨1

w2(A)

=

1∧

1

w1(A)

1∧

1

w2(A)

=w d1(A)∨w d2(A).

We thus see that,using the cautious rule,the con?dence parts are combined con-junctively,whereas the di?dence parts are combined disjunctively by taking the maxi-mum of the two weight functions w d1and w d2.Note that such a disjunctive combination is well de?ned only for u-separable BBAs(see Section4for further discussion on this issue and the de?nition of a disjunctive counterpart of the cautious rule).Combining the di?dence components disjunctively does seem to make sense,as shown by the following informal argument.According to Smets[33],m d(A)should be interpreted as the strength of evidence that one should not believe A.If I receive two pieces of evidence,one of which tells me not to believe A while the other tells me not to believe B,then I am inclined not to believe A∪B,hence the disjunctive nature of the combi-nation.Consequently,there seems to be some form of duality between the con?dence and di?dence components of a LBS,which translates into di?erent mechanisms for combining each of the two components.

As is well known,the vacuous BBA is the neutral element for the TBM con-junctive rule,whereas it is an absorbing element for the TBM disjunctive rule.As a consequence of the dual conjunctive/disjunctive nature of the cautious rule,cau-tious combination of a BBA m with the vacuous BBA has the e?ect of absorbing the di?dence component,while leaving the con?dence component unchanged.This is formalized in the following proposition.

Proposition7For any non dogmatic BBA m with corresponding LBS(m c,m d):

m∧ mΩ=m c.

Proof.This is a direct consequence of Proposition6.Let w c and w d denote,respec-tively,the weight functions of m c and m d.The weights associated to the con?dence component of m∧ mΩare w c(A)∧1=w c(A)for all A?Ω,whereas those associated to the di?dence component are w d(A)∨1=1for all A?Ω.

The following proposition follows directly from the previous one.

Proposition8For any non dogmatic BBA m,mΩ∧ m=m i?m is u-separable. Proof.m is u-seperable i?it is equal to its con?dence component,i.e.m=m c,hence the result.

18

智能存包柜(储物柜)产品技术说明书

条码式寄存柜(储物柜)产品技术说明 一、适用范围 自助行李寄存柜,用于高效率、规范化且消费群体较密集的高档公共场所,如:超市、学校、机场、俱乐部、游泳馆、健身房、超市、大卖场、商场、事业单位等。客户可根据自身特点选择不同类型的机组,有条码型、指纹型、IC卡、条形码卡、磁卡、射频卡以及TM扣等,或者使用客户各自所持有的会员卡。 二、基本组成 自助行李寄存柜,是由嵌入式计算机进行控制,具有管理功能的小件物品寄存系统。主要由输入设备(条码阅读器)、输出设备(如中文液晶显示)、嵌入式计算机处理中心、管理软件以及电源组成。 三、结构、材料、钣金说明 寄存柜柜体选用0.8mm以上优质冷轧板,经冷加工成形后,用二氧化碳气体保护焊焊接装配而成,柜体结构坚固结实。箱体表面经除锈、除油、打磨、磷化处理后喷塑,塑面的颜色可由用户选定。?箱门背面增加纵向加强筋,提高箱门的防撞击能力;能有效防止和降低使用者因疏忽碰伤、磕伤,电控锁采用360度具有防撬、带防软片插入装置。 四、元器件说明 1)电控锁:经过10万次寿命测试无故障,性能可靠稳定。部件的表面均作热 涂锌防锈处理,装配成形后每把锁均作电气绝缘试验和开启试验,并按加工批量的1%作寿命试验。 2)扫描枪:台湾欣技C1000,性能稳定,读码速度快。 3)液晶显示屏:3.5寸彩色显示屏。例如:

表示:空箱,顾客可以存入的箱子 表示:满箱,有合法密码,箱内有物 4)打印机:自主研发使用日本精工打印机芯。 5)控制主板:自主研发生产。 6)切纸刀:自主研发生产、10万次寿命测试,性能稳定,配有走纸导向。 7)控制芯片:采用国际上著名大公司的工业级产品,有ATMEL公司、INTEL公 司、日立公司、德州公司等。 8)键盘:选用电话机水晶键盘,工作可靠,永不退色,使用寿命长。 五、常规技术指标 (1)功率-待机:25W 开箱:60W (2)电源电压:AC110V—AC240V 50HZ (3)后备电源(可选):18V 7AH (4)打印速度:35mm/s (5)打印机寿命:50Km (6)柜体冷轧钢板厚度:0.8mm (7)读码速度:<0.4s (8)显示分辨率:3.5寸彩色液晶屏(可定制显示LOGO) 六、条码寄存柜主要功能说明 ?大屏幕液晶显示屏 操作步骤提示、箱门5种状态显示、时钟显示、常规故障指示、设置菜单、管理界面、工作状态显示等。 在现场安装就位后,确认各个部件正常后,即可上电开机,完整的显示: ?全开放式中文设置菜单(可定制多国语言、语音) 寄存柜的各个管理参数全部面向客户开放,客户可选择相应的菜单进行设置。设有三级管理密码,方便不同级别的管理要求。 ?快捷管理员管理菜单 在管理模式下,管理快捷菜单可应急开启箱门、清除箱门ID、查询箱门状态等操作。可设置500位管理员进行管理,每个管理员可根据自己的用户号及管

脐带干细胞综述

脐带间充质干细胞的研究进展 间充质干细胞(mesenchymal stem cells,MSC S )是来源于发育早期中胚层 的一类多能干细胞[1-5],MSC S 由于它的自我更新和多项分化潜能,而具有巨大的 治疗价值 ,日益受到关注。MSC S 有以下特点:(1)多向分化潜能,在适当的诱导条件下可分化为肌细胞[2]、成骨细胞[3、4]、脂肪细胞、神经细胞[9]、肝细胞[6]、心肌细胞[10]和表皮细胞[11, 12];(2)通过分泌可溶性因子和转分化促进创面愈合;(3) 免疫调控功能,骨髓源(bone marrow )MSC S 表达MHC-I类分子,不表达MHC-II 类分子,不表达CD80、CD86、CD40等协同刺激分子,体外抑制混合淋巴细胞反应,体内诱导免疫耐受[11, 15],在预防和治疗移植物抗宿主病、诱导器官移植免疫耐受等领域有较好的应用前景;(4)连续传代培养和冷冻保存后仍具有多向分化潜能,可作为理想的种子细胞用于组织工程和细胞替代治疗。1974年Friedenstein [16] 首先证明了骨髓中存在MSC S ,以后的研究证明MSC S 不仅存在于骨髓中,也存在 于其他一些组织与器官的间质中:如外周血[17],脐血[5],松质骨[1, 18],脂肪组织[1],滑膜[18]和脐带。在所有这些来源中,脐血(umbilical cord blood)和脐带(umbilical cord)是MSC S 最理想的来源,因为它们可以通过非侵入性手段容易获 得,并且病毒污染的风险低,还可冷冻保存后行自体移植。然而,脐血MSC的培养成功率不高[19, 23-24],Shetty 的研究认为只有6%,而脐带MSC的培养成功率可 达100%[25]。另外从脐血中分离MSC S ,就浪费了其中的造血干/祖细胞(hematopoietic stem cells/hematopoietic progenitor cells,HSCs/HPCs) [26, 27],因此,脐带MSC S (umbilical cord mesenchymal stem cells, UC-MSC S )就成 为重要来源。 一.概述 人脐带约40 g, 它的长度约60–65 cm, 足月脐带的平均直径约1.5 cm[28, 29]。脐带被覆着鳞状上皮,叫脐带上皮,是单层或复层结构,这层上皮由羊膜延续过来[30, 31]。脐带的内部是两根动脉和一根静脉,血管之间是粘液样的结缔组织,叫做沃顿胶质,充当血管外膜的功能。脐带中无毛细血管和淋巴系统。沃顿胶质的网状系统是糖蛋白微纤维和胶原纤维。沃顿胶质中最多的葡萄糖胺聚糖是透明质酸,它是包绕在成纤维样细胞和胶原纤维周围的并维持脐带形状的水合凝胶,使脐带免受挤压。沃顿胶质的基质细胞是成纤维样细胞[32],这种中间丝蛋白表达于间充质来源的细胞如成纤维细胞的,而不表达于平滑肌细胞。共表达波形蛋白和索蛋白提示这些细胞本质上肌纤维母细胞。 脐带基质细胞也是一种具有多能干细胞特点的细胞,具有多项分化潜能,其 形态和生物学特点与骨髓源性MSC S 相似[5, 20, 21, 38, 46],但脐带MSC S 更原始,是介 于成体干细胞和胚胎干细胞之间的一种干细胞,表达Oct-4, Sox-2和Nanog等多

精神分裂症的病因及发病机理

精神分裂症的病因及发病机理 精神分裂症病因:尚未明,近百年来的研究结果也仅发现一些可能的致病因素。(一)生物学因素1.遗传遗传因素是精神分裂症最可能的一种素质因素。国内家系调查资料表明:精神分裂症患者亲属中的患病率比一般居民高6.2倍,血缘关系愈近,患病率也愈高。双生子研究表明:遗传信息几乎相同的单卵双生子的同病率远较遗传信息不完全相同 的双卵双生子为高,综合近年来11项研究资料:单卵双生子同病率(56.7%),是双卵双生子同病率(12.7%)的4.5倍,是一般人口患难与共病率的35-60倍。说明遗传因素在本病发生中具有重要作用,寄养子研究也证明遗传因素是本症发病的主要因素,而环境因素的重要性较小。以往的研究证明疾病并不按类型进行遗传,目前认为多基因遗传方式的可能性最大,也有人认为是常染色体单基因遗传或多源性遗传。Shields发现病情愈轻,病因愈复杂,愈属多源性遗传。高发家系的前瞻性研究与分子遗传的研究相结合,可能阐明一些问题。国内有报道用人类原癌基因Ha-ras-1为探针,对精神病患者基因组进行限止性片段长度多态性的分析,结果提示11号染色体上可能存在着精神分裂症与双相情感性精神病有关的DNA序列。2.性格特征:约40%患者的病前性格具有孤僻、冷淡、敏感、多疑、富于幻想等特征,即内向

型性格。3.其它:精神分裂症发病与年龄有一定关系,多发生于青壮年,约1/2患者于20~30岁发病。发病年龄与临床类型有关,偏执型发病较晚,有资料提示偏执型平均发病年龄为35岁,其它型为23岁。80年代国内12地区调查资料:女性总患病率(7.07%。)与时点患病率(5.91%。)明显高于男性(4.33%。与3.68%。)。Kretschmer在描述性格与精神分裂症关系时指出:61%患者为瘦长型和运动家型,12.8%为肥胖型,11.3%发育不良型。在躯体疾病或分娩之后发生精神分裂症是很常见的现象,可能是心理性生理性应激的非特异性影响。部分患者在脑外伤后或感染性疾病后发病;有报告在精神分裂症患者的脑脊液中发现病毒性物质;月经期内病情加重等躯体因素都可能是诱发因素,但在精神分裂症发病机理中的价值有待进一步证实。(二)心理社会因素1.环境因素①家庭中父母的性格,言行、举止和教育方式(如放纵、溺爱、过严)等都会影响子女的心身健康或导致个性偏离常态。②家庭成员间的关系及其精神交流的紊乱。③生活不安定、居住拥挤、职业不固定、人际关系不良、噪音干扰、环境污染等均对发病有一定作用。农村精神分裂症发病率明显低于城市。2.心理因素一般认为生活事件可发诱发精神分裂症。诸如失学、失恋、学习紧张、家庭纠纷、夫妻不和、意处事故等均对发病有一定影响,但这些事件的性质均无特殊性。因此,心理因素也仅属诱发因

脐带血造血干细胞库管理办法(试行)

脐带血造血干细胞库管理办法(试行) 第一章总则 第一条为合理利用我国脐带血造血干细胞资源,促进脐带血造血干细胞移植高新技术的发展,确保脐带血 造血干细胞应用的安全性和有效性,特制定本管理办法。 第二条脐带血造血干细胞库是指以人体造血干细胞移植为目的,具有采集、处理、保存和提供造血干细胞 的能力,并具有相当研究实力的特殊血站。 任何单位和个人不得以营利为目的进行脐带血采供活动。 第三条本办法所指脐带血为与孕妇和新生儿血容量和血循环无关的,由新生儿脐带扎断后的远端所采集的 胎盘血。 第四条对脐带血造血干细胞库实行全国统一规划,统一布局,统一标准,统一规范和统一管理制度。 第二章设置审批 第五条国务院卫生行政部门根据我国人口分布、卫生资源、临床造血干细胞移植需要等实际情况,制订我 国脐带血造血干细胞库设置的总体布局和发展规划。 第六条脐带血造血干细胞库的设置必须经国务院卫生行政部门批准。 第七条国务院卫生行政部门成立由有关方面专家组成的脐带血造血干细胞库专家委员会(以下简称专家委

员会),负责对脐带血造血干细胞库设置的申请、验收和考评提出论证意见。专家委员会负责制订脐带血 造血干细胞库建设、操作、运行等技术标准。 第八条脐带血造血干细胞库设置的申请者除符合国家规划和布局要求,具备设置一般血站基本条件之外, 还需具备下列条件: (一)具有基本的血液学研究基础和造血干细胞研究能力; (二)具有符合储存不低于1 万份脐带血的高清洁度的空间和冷冻设备的设计规划; (三)具有血细胞生物学、HLA 配型、相关病原体检测、遗传学和冷冻生物学、专供脐带血处理等符合GMP、 GLP 标准的实验室、资料保存室; (四)具有流式细胞仪、程控冷冻仪、PCR 仪和细胞冷冻及相关检测及计算机网络管理等仪器设备; (五)具有独立开展实验血液学、免疫学、造血细胞培养、检测、HLA 配型、病原体检测、冷冻生物学、 管理、质量控制和监测、仪器操作、资料保管和共享等方面的技术、管理和服务人员; (六)具有安全可靠的脐带血来源保证; (七)具备多渠道筹集建设资金运转经费的能力。 第九条设置脐带血造血干细胞库应向所在地省级卫生行政部门提交设置可行性研究报告,内容包括:

古代汉语词类活用例句列举

古代汉语词类活用例句列举 古代汉语词类活用例句列举《郑伯克段于鄢》1、例:壮公生,惊姜氏。P97 惊:用作使动,使。。。惊。2、例:无生民心。P99 生:用作使动,使。。。产生。3、例:若阙地及泉,隧而相见。P101 隧:名词动用。《公孙无知之乱》4、豕立而啼,P109 立:名词作状语,像人一样丫立。〈安之战〉5、皆主?献子。P117 主:名词动用,以。。。为主。6、君无所辱命。P119 辱:动词使动,使。。。受辱。7、从左右,皆肘之。P123 肘:名词使动,表示用胳膊推撞。8、臣辱戎士。123 辱:动词使动。9、人不难以死免其君。P123 免:用作使动,使。。。免于。10、故中御而从齐候。P123 中:方位名词做状语。〈子产说范宣子轻敝〉11、三周华不注。P122 周:

名词动用。12、郑人病之。P129 病:名词用作意动。13、象有齿而焚其身。P130 焚:动词用作使动。14、宣子说,乃轻弊。P130 轻:形容词用作使动,使。。。轻。〈苏秦连横约纵〉15、今先生俨然不运千里而庭教之。P182 远:形容词用作意动。16、明言章理,兵甲愈起。P183 明、章:用作使动。 1 17、辨言伟服。攻战不息。P183 辩、伟:都用作使动,使。。。雄辩,使。。。华美。18、繁称文辞,天下不冶。P183 文:名词用作使动。19、夫徒处而致利,安坐而广地。P183 广:形容词用作使动,使。。。广。20、言语相结,天下为一。P183 言语:名词作状语。21、今欲并天下,凌万乘,诎敌国。制海内,子元元。臣诸候。非兵不可。P183 诎:用作使动,使。。。屈服;子:名词用作使动,使。。。成为子女;臣:名词用作使动,使。。。成为臣子。22、约纵散横,以抑强秦。

存包柜项目方案说明

存包柜项目方案说明 一、项目基本信息 (一)项目名称 存包柜项目 (二)项目建设单位 xxx有限公司 (三)法定代表人 于xx (四)公司简介 本公司奉行“客户至上,质量保障”的服务宗旨,树立“一切为客户着想” 的经营理念,以高效、优质、优惠的专业精神服务于新老客户。 公司依托集团公司整体优势、发展自身专业化咨询能力,以助力产业提高运营效率为使命,提供全方面的业务咨询服务。 公司将加强人才的引进和培养,尤其是研发及业务方面的高级人才,健全研发、管理和销售等各级人员的薪酬考核体系,完善激励制度,提高公司员工创造力,为公司的持续快速发展提供强大保障。

上一年度,xxx(集团)有限公司实现营业收入7026.99万元,同比增长25.92%(1446.42万元)。其中,主营业业务存包柜生产及销售收入为5749.34万元,占营业总收入的81.82%。 根据初步统计测算,公司实现利润总额1653.53万元,较去年同期相比增长375.52万元,增长率29.38%;实现净利润1240.15万元,较去年同期相比增长139.78万元,增长率12.70%。 (五)项目选址 xx新兴产业示范基地 (六)项目用地规模 项目总用地面积12559.61平方米(折合约18.83亩)。 (七)项目用地控制指标 该工程规划建筑系数71.28%,建筑容积率1.01,建设区域绿化覆盖率7.20%,固定资产投资强度188.57万元/亩。 项目净用地面积12559.61平方米,建筑物基底占地面积8952.49平方米,总建筑面积12685.21平方米,其中:规划建设主体工程7943.44平方米,项目规划绿化面积913.28平方米。 (八)设备选型方案 项目计划购置设备共计91台(套),设备购置费1292.40万元。 (九)节能分析 1、项目年用电量486324.58千瓦时,折合59.77吨标准煤。

古代汉语练习题 词类活用

古代汉语练习(词类活用) 班级:姓名:学号: 一、简答: 1、什么是古代汉语的词类活用?古代汉语中的词类活用有哪几种? 2、怎样区别使动用法和意动用法?试举例说明。并说明如何翻译。 3、试说明名词做状语主要有哪几种情况。 4、名词、形容词用作动词的情况主要有哪些?应该如何辨认? 二、多项选择题(在每小题的四个备选答案中,选出二个至四个正确的答案,并将其号码分别填在题干后的括号内,多选、少选、错选均无分。每小题1分,共5分) 1.下列各句中加着重号的词,属于词类活用的是() A.斩一首者爵一级B.能富贵将军者,上也 C.曹人凶俱,为其所得者棺而出之 D.夫鼠,昼伏夜动,不穴于寝庙,畏人故也 2.下列各句中加着重号的词属于名词作状语的是() A.裂裳衣疮,手往善药 B.其经承子厚口讲指画为文词者,悉有法度可观 C.范增数目项王D.诸侯宾至 3.下列各句含宾语前置现象的是() A.姜氏何厌之有B.楚君之惠,末之敢忘 C.除君之恶,唯力是视D.昭王南征而不复,寡人是问 4.对下列各句中加着重号的词组分析错误的是() A.子重使太宰伯州犁待于王后(动宾)B.将塞井夷灶而为行也(连动) C.臣之壮也犹不如人(主谓)D.以勇力之所加而治智能之官(偏正) 5.下列句子中有使动用法的是() A.秋九月,晋侯饮赵盾酒,伏甲将攻之 B.是时万石君奋为汉王中涓,受手谒,人见平

C.见灵辄饿,问其病,曰:“不食三日矣。”食之,舍其半 D.仓廪实而知礼节,衣食足而知荣辱 四、指出并具体说明下列文句中的词类活用现象: 1.秦数败赵军,赵军固壁不战。(秦与赵兵相距长平) 2.赵王不听,遂将之。(秦与赵兵相距长平) 3.身所奉饭饮而进食者以十数,所友者以百数。(秦与赵兵相距长平) 4.括军败,数十万之众遂降秦,秦悉阬之。(秦与赵兵相距长平) 5.信数与萧何语,何奇之。(韩信拜将) 6.王必欲长王汉中,无所事信。(韩信拜将) 7.吾亦欲东耳,安能郁郁久居此乎?(韩信拜将) 8.何闻信亡,不及以闻,自追之。(韩信拜将) 9.今大王举而东,三秦可传檄而定也。(韩信拜将) 10.遇有以梦得事白上者,梦得于是改刺连州。(柳子厚墓志铭) 11.自子厚之斥,遵从而家焉,逮其死不去。(柳子厚墓志铭) 12.以如司农治事堂,栖之梁木上。(段太尉逸事状) 13.踔厉风发,率常屈其座人。(柳子厚墓志铭) 14.晞一营大噪,尽甲。(段太尉逸事状) 15.即自取水洗去血,裂裳衣疮,手注善药。(段太尉逸事状) 16.黄罔之地多竹,大者如椽。竹工破之,刳去其节,用代陶瓦。(黄冈竹楼记)17.晋灵公不君。厚敛以彫墙。(晋灵公不君) 18.既而与为公介,倒戟以御公徒而免之。(晋灵公不君) 19.盛服将朝,尚早,坐而假寐。(晋灵公不君) 20.晋侯饮赵盾酒,伏甲将攻之。(晋灵公不君) 五、说明下列文句中的词类活用现象,并将全文译为现代汉语:

精神分裂症的发病原因是什么

精神分裂症的发病原因是什么 精神分裂症是一种精神病,对于我们的影响是很大的,如果不幸患上就要及时做好治疗,不然后果会很严重,无法进行正常的工作和生活,是一件很尴尬的事情。因此为了避免患上这样的疾病,我们就要做好预防,今天我们就请广州协佳的专家张可斌来介绍一下精神分裂症的发病原因。 精神分裂症是严重影响人们身体健康的一种疾病,这种疾病会让我们整体看起来不正常,会出现胡言乱语的情况,甚至还会出现幻想幻听,可见精神分裂症这种病的危害程度。 (1)精神刺激:人的心理与社会因素密切相关,个人与社会环境不相适应,就产生了精神刺激,精神刺激导致大脑功能紊乱,出现精神障碍。不管是令人愉快的良性刺激,还是使人痛苦的恶性刺激,超过一定的限度都会对人的心理造成影响。 (2)遗传因素:精神病中如精神分裂症、情感性精神障碍,家族中精神病的患病率明显高于一般普通人群,而且血缘关系愈近,发病机会愈高。此外,精神发育迟滞、癫痫性精神障碍的遗传性在发病因素中也占相当的比重。这也是精神病的病因之一。 (3)自身:在同样的环境中,承受同样的精神刺激,那些心理素质差、对精神刺激耐受力低的人易发病。通常情况下,性格内向、心胸狭窄、过分自尊的人,不与人交往、孤僻懒散的人受挫折后容易出现精神异常。 (4)躯体因素:感染、中毒、颅脑外伤、肿瘤、内分泌、代谢及营养障碍等均可导致精神障碍,。但应注意,精神障碍伴有的躯体因素,并不完全与精神症状直接相关,有些是由躯体因素直接引起的,有些则是以躯体因素只作为一种诱因而存在。 孕期感染。如果在怀孕期间,孕妇感染了某种病毒,病毒也传染给了胎儿的话,那么,胎儿出生长大后患上精神分裂症的可能性是极其的大。所以怀孕中的女性朋友要注意卫生,尽量不要接触病毒源。 上述就是关于精神分裂症的发病原因,想必大家都已经知道了吧。患上精神分裂症之后,大家也不必过于伤心,现在我国的医疗水平是足以让大家快速恢复过来的,所以说一定要保持良好的情绪。

基于单片机的自动存包系统设计

基于单片机的自动存包系统设计 摘要 近年来,随着生活水平的提高,人们对于社会消费品的质量和数量的要求也在逐渐增加。为了更好的为广大顾客服务,在一些商场、影院、超市等公共场合通常设置有自动存包柜,本次便是针对这一现象进行设计。 本文详细介绍了国内自动存包控制系统的发展现状,发展中所面临的问题。并详细介绍了本系统采用的AT89S52单片机做控制器,可以同时管理四个存包柜。柜门锁是由继电器控制,当顾客需要存包的时候,可以自行到存包柜前按“开门”键,需要顾客向光学指纹识别系统输入个指纹,然后通过继电器进行开门(用亮灯表示),顾客即可存包,并需将柜门关上。当顾客需要取包时,要将只要将之前输入的指纹放置于指纹识别器前方,指纹识别器采集到指纹信息输出相应的高低电平信号传给单片机,系统比较密码一致后,发出开箱信号至继电器将柜门打开,顾客即可将包取出。它具有功能实用、操作简便、安全可靠、抗干扰性强等特点。 关键词:自动存包柜,单片机,指纹识别器

李少鹏:基于单片机的自动存包系统设计 Based on single chip microcomputer automatic package design Abstract In recent years, with the improvement of living standards, people for social consumer goo ds quality and quantity requirements are to increase gradually. In order to better service for the g eneral customers, in some stores, movie theaters, supermarkets public Settings are to be put auto matically usually bag ark, it is functional practical, simple operation, safe and reliable, anti-jamm ing strong sexual characteristics. Domestic deposit automatic control system are introduced in detail in this paper the development of the status quo, problems faced in the development of. And introduces in detail the system adopts single chip microcomputer controller, can simultaneously manage multiple pack ark. Cupboard door lock controlled by relay, when customers need to save package, will be allowed to save package before the ark according to the "open" button, need customer to the system input fingerprint, and then through the relay to open the door (with lighting), customers can save package, and the cupboard door must be closed. When customers need to pick up package, as long as before the input fingerprint should be placed on the fingerprint recognizer, fingerprint recognizer collecting to the fingerprint information and output the corresponding high and low level signal to the microcontroller, the system is password consistent, signal out of the box to the relay Key words: Automatic Storage Bag, Microcontroller, Fingerprint recognizer。

初中所学文言文中的五类常见词类活用现象

初中所学文言文中的五类常见词类活用现象

古代汉语中的词类活用现象 五种类型:名词用作动词 动词、形容词、名词的使动用法 形容词、名词的意动用法 名词用作状语 动词用作状语 (一)名词用如动词 古代汉语名词可以用如动词的现象相当普遍。如: 从左右,皆肘.之。(左传成公二年) 晋灵公不君.。(左传宣公二年) 孟尝君怪其疾也,衣冠 ..而见之。(战国策·齐策四) 马童面.值,指王翳曰:“此项王也。”(史记·项羽本纪) 夫子式.而听之。(礼记·檀弓下) 曹子手.剑而从之。(公羊传庄公十三年) 假舟楫者,非能水.也,而绝江河。(荀子·劝学) 左右欲刃.相如。(史记·廉颇蔺相如列传) 秦师遂东.。(左传僖公三十二年) 汉败楚,楚以故不能过荥阳而西.。(史记·项羽本纪) 以上所举的例子可以分为两类:前八个例子是普通名词用如动词,后两个例子是方位名词用如动词。 名词用作动词是由上下文决定的。我们鉴别某一个名词是不是用如动词,须要从整个意思来考虑,同时还要注意它在句中的地位,以及它前后有哪些词类的词和它相结合,跟他构成什么样的句法关系。一般情况有如下四种:

①代词前面的名词用如动词(肘之、面之),因为代词不受名词修饰; ②副词尤其是否定副词后面的名词用如动词(“遂东”、“不君”); ③能愿动词后面的名词也用如动词(“能水”、“欲刃”); ④句中所确定的宾语前面的名词用如动词(“脯鄂侯”“手剑”) (二)动词、形容词、名词的使动用法 一、动词的使动用法。 定义:主语所代表的人物并不施行这个动词所表示的动作,而是使宾语所代表的人或事物施行这个动作。例如:《左传隐公元年》:“庄公寤生,惊姜氏。”这不是说庄公本人吃惊,而是说庄公使姜氏吃惊。 在古代汉语里,不及物动词常常有使动用法。不及物动词本来不带宾语,当它带有宾语时,则一定作为使动用法在使用。如: 焉用亡.郑以陪邻?《左传僖公三十年》 晋人归.楚公子榖臣与连尹襄老之尸于楚,以求知罃。(左传成公三年) 大车无輗,小车无杌,其何以行.之哉?《论语·为政》 小子鸣.鼓而攻之可也。《论语·先进》 求也退,故进.之;由也兼人,故退.之。《论语·先进》 故远人不服,则修文德以来.之。《论语·季氏》 有时候不及物动词的后面虽然不带宾语,但是从上下文的意思看,仍是使动用法。例如《论语·季氏》:“远人不服而不能来也”这个“来”字是使远人来的意思。 古代汉语及物动词用如使动的情况比较少见。及物动词本来带有宾语,在形式上和使动用法没有什么区别,区别只在意义上。使动的宾语不是动作的接受者,而是主语所代表的人物使它具有这种动作。例如《孟子·梁惠王上》“朝秦楚”,不食齐宣王朝见秦楚之君,相反的,是齐宣王是秦楚之君朝见自己。 下面各句中的及物动词是使动用法: 问其病,曰:“不食三日矣。”食.之。《左传·宣公二年》

精神分裂症的病因是什么

精神分裂症的病因是什么 精神分裂症是一种精神方面的疾病,青壮年发生的概率高,一般 在16~40岁间,没有正常器官的疾病出现,为一种功能性精神病。 精神分裂症大部分的患者是由于在日常的生活和工作当中受到的压力 过大,而患者没有一个良好的疏导的方式所导致。患者在出现该情况 不仅影响本人的正常社会生活,且对家庭和社会也造成很严重的影响。 精神分裂症常见的致病因素: 1、环境因素:工作环境比如经济水平低低收入人群、无职业的人群中,精神分裂症的患病率明显高于经济水平高的职业人群的患病率。还有实际的生活环境生活中的不如意不开心也会诱发该病。 2、心理因素:生活工作中的不开心不满意,导致情绪上的失控,心里长期受到压抑没有办法和没有正确的途径去发泄,如恋爱失败, 婚姻破裂,学习、工作中不愉快都会成为本病的原因。 3、遗传因素:家族中长辈或者亲属中曾经有过这样的病人,后代会出现精神分裂症的机会比正常人要高。 4、精神影响:人的心里与社会要各个方面都有着不可缺少的联系,对社会环境不适应,自己无法融入到社会中去,自己与社会环境不相

适应,精神和心情就会受到一定的影响,大脑控制着人的精神世界, 有可能促发精神分裂症。 5、身体方面:细菌感染、出现中毒情况、大脑外伤、肿瘤、身体的代谢及营养不良等均可能导致使精神分裂症,身体受到外界环境的 影响受到一定程度的伤害,心里受到打击,无法承受伤害造成的痛苦,可能会出现精神的问题。 对于精神分裂症一定要配合治疗,接受全面正确的治疗,最好的 疗法就是中医疗法加心理疗法。早发现并及时治疗并且科学合理的治疗,不要相信迷信,要去正规的医院接受合理的治疗,接受正确的治 疗按照医生的要求对症下药,配合医生和家人,给病人创造一个良好 的治疗环境,对于该病的康复和痊愈会起到意想不到的效果。

自动存包柜的设计与仿真

自动存包柜的设计与仿真 摘要 本课题是基于单片机的自动存包柜设计。自动存包柜是新一代的存包柜,具有功能实用、操作简单、管理方便、安全可靠等特点,能够更好的服务于不同市场的广大群众,使用者可以根据简明清晰的操作说明自行完成存包取包工作。本系统由MCS-51单片机构成核心控制系统,整个系统由主控部分、键盘显示控制部分、执行部分三部分组成,通过随机密码的产生和核对完成自动存包取包过程。本设计中各元器件便于安装且操作简单,能基本实现存包取包功能。 关键词:自动存包柜;单片机;随机密码

Design and Simulation of Automatic Lockers ABSTRACT This topic is microcontroller-based automatic lockers.Automatic lockers is a new generation of lockers, with a practical, simple operation, easy management, safe and reliable, able to better serve the broad masses of the different markets, users are based on a clear and concise instructions to complete the deposit bags to take the package. The system consists of MCS-51 microcontroller core control system, the entire system from the main section, the keyboard display control part of the implementation of some of the three-part composition, random password generation and check completed automatically save the package to take the package process. Various components of this design is easy to install and easy to operate, can basically save the package to take package function. Key words :Automatic lockers; microcontroller; random password

卫生部办公厅关于印发《脐带血造血干细胞治疗技术管理规范(试行)

卫生部办公厅关于印发《脐带血造血干细胞治疗技术管理规 范(试行)》的通知 【法规类别】采供血机构和血液管理 【发文字号】卫办医政发[2009]189号 【失效依据】国家卫生计生委办公厅关于印发造血干细胞移植技术管理规范(2017年版)等15个“限制临床应用”医疗技术管理规范和质量控制指标的通知 【发布部门】卫生部(已撤销) 【发布日期】2009.11.13 【实施日期】2009.11.13 【时效性】失效 【效力级别】部门规范性文件 卫生部办公厅关于印发《脐带血造血干细胞治疗技术管理规范(试行)》的通知 (卫办医政发〔2009〕189号) 各省、自治区、直辖市卫生厅局,新疆生产建设兵团卫生局: 为贯彻落实《医疗技术临床应用管理办法》,做好脐带血造血干细胞治疗技术审核和临床应用管理,保障医疗质量和医疗安全,我部组织制定了《脐带血造血干细胞治疗技术管理规范(试行)》。现印发给你们,请遵照执行。 二〇〇九年十一月十三日

脐带血造血干细胞 治疗技术管理规范(试行) 为规范脐带血造血干细胞治疗技术的临床应用,保证医疗质量和医疗安全,制定本规范。本规范为技术审核机构对医疗机构申请临床应用脐带血造血干细胞治疗技术进行技术审核的依据,是医疗机构及其医师开展脐带血造血干细胞治疗技术的最低要求。 本治疗技术管理规范适用于脐带血造血干细胞移植技术。 一、医疗机构基本要求 (一)开展脐带血造血干细胞治疗技术的医疗机构应当与其功能、任务相适应,有合法脐带血造血干细胞来源。 (二)三级综合医院、血液病医院或儿童医院,具有卫生行政部门核准登记的血液内科或儿科专业诊疗科目。 1.三级综合医院血液内科开展成人脐带血造血干细胞治疗技术的,还应当具备以下条件: (1)近3年内独立开展脐带血造血干细胞和(或)同种异基因造血干细胞移植15例以上。 (2)有4张床位以上的百级层流病房,配备病人呼叫系统、心电监护仪、电动吸引器、供氧设施。 (3)开展儿童脐带血造血干细胞治疗技术的,还应至少有1名具有副主任医师以上专业技术职务任职资格的儿科医师。 2.三级综合医院儿科开展儿童脐带血造血干细胞治疗技术的,还应当具备以下条件:

大件寄存管理流程

大件寄存程序 一、大件寄存流程 1、当顾客提出大件寄存需求时,服务中心员工应先查看物品大小,如果可自助存包柜寄存的物品,请顾客优先使用自动存包柜,并提醒顾客不要寄放贵重物品。 2、如果物品过大,自助存包柜寄存不下的物品或顾客坚持要求寄存服务台的商品,服务台员工应与顾客确认是否有贵重物品,如有,请顾客将贵重物品取出自行保管,其它物品则办理寄存手续。 3、员工将顾客物品放置在指定区域,挂好存包牌,将另一块号码牌交予顾客,并告知顾客于当天营业结束前凭此号码牌领取寄存物品,请顾客妥善保管。 4、当顾客前来领取寄存物品时,服务中心员工请顾客出示号码牌,员工收回号码牌,根据号码牌查找物品上对应的号码牌,核对无误后交还顾客物品。存包牌两块互绑在一起放回存放盒内。 5、若核对号码牌时发现物品与存放时不符或丢失,应立即告知客服主管或值班经理前来处理(具体处理方法请参照客诉处理办法) 6、如顾客遗失号码牌时,服务中心员工处理程序: A、通知广播寻找遗失的号码牌。 B、询问顾客具体号码牌号或所寄存物品形状、颜色、特征。 C、询问顾客是否有任何的证件,并请顾客提供有效证件证明所寄存物品确为其所属。 D、请顾客在《寄存物异常登记表》上留下地址、电话、证件号等信息。 E、向顾客适当收取号码牌工本费并在退换货收银机做销售操作,将寄存物品归还于顾客。 7、每日营业结束后盘点号码牌,每块号码牌要求一个号码两块互绑在一起,如已不齐全的号码牌则不再使用。号码牌需定期全部更换。 二、大件寄存顾客告示 1、请您在存包后主动索取存包牌,并保存好自己的存包牌,不要遗失。 2、现金、手机、照相机、存折等超过200元的贵重物品及有效证件如身份证、户口本等物品请随身携带,请勿寄存,由此造成的损失,自行承担。 3、当您领取所存物品时,请出示存包牌,并当面点清您所存的物品,离柜本商场不再负责。 4、如存包牌丢失,应及时持有效证件领取所存物品,并付工本费5元,未及时挂失,导致所存物品丢失,不予负责。

词类活用例子

文言实词词类活用 活用为一般动词 (一)名词活用为一般动词 1.两个名词连用,既不是并列关系,又不是修饰关系,便是动宾或主谓,其中一个必然活用为动词。 a .有一老父,衣褐,至良所。 b.籍吏民,封府库。 c.我有嘉宾,鼓瑟吹笙。 d.冬雷震震夏雨雪。 2.名词后紧跟代词,该名词活用为动词。 a.驴不胜怒,蹄之。 b.以其乃华山之阳名之。 c.名余曰正则兮。 3.名词放在副词后,便活用为动词。 a.日将暮,取儿槁葬。 b.太子及宾客知其事者,皆白衣冠以送之。 c.从弟子女十人所,皆衣缯单衣,立大巫后。 4.名词放在“能”“可”“足”“欲”等呢过愿动词后,便活用为动词。 a.假舟楫者,非能水也。 b.云青青兮欲雨。 c.其力尚足以入,火尚足以明。 d.子谓公冶长:“可妻也。” 5.名词带介宾结构做补语,这个名词活用为动词。 a.晋军(于)函陵,秦军(于)氾南。 b.唐浮图慧褒始舍于其址。 6.名词用“而”同动词或动宾词组连接时,活用为动词。 a.三代不同礼而王,五霸不同法而霸。 7.名词在“所”“者”结构中便活用为动词。 a.置人所罾鱼腹中。

a.是以,令吏人完客所馆。 形容词活用为一般动词 1.形容词用在“所”字之后,便活用为动词。 故俗之所贵,主之所贱;吏之所卑,法之所尊也。 (认为宝贵、认为低贱、认为卑下、认为高贵) 2.形容词在能愿动词后,活用为动词。 问其深,则其好游者不能穷也。(走到尽头) 3.形容词在“之”“我”能代词前,活用为动词。 稍出近之。(靠近) 4.形容词后带介宾结构做补语,它活用为动词。 令尹子兰……率使上官大夫短屈原于顷襄王。 (诋毁) 数词活用做一般动词 六王毕,四海一。(统一) 名词做状语 一、普通名词作状语 1.表比喻 a.嫂蛇行匍匐。 b.狐鸣呼曰。 c .赢粮而景从。 d .天下云集响应。 e.常以身翼蔽沛公。 f.一狼径去,其一犬坐于前。 2.表对人的态度 a.君为我呼入,吾得兄事之。 b.人人皆得以隶使之。 3.表动作行为的处所 a.夫以秦王之威,相如廷叱之,辱其群臣廷:在朝廷上 b.童子隅坐而执烛. 隅:在墙角 4.表动作行为的工具、凭借、方式

精神分裂症应该怎么治疗

精神分裂症应该怎么治疗 1、坚持服药治疗 服药治疗是最有效的预防复发措施临床大量统计资料表明,大多数精神分裂症的复发与自行停药有关。坚持维持量服药的病人复发率为40%。而没坚持维持量服药者复发率高达80%。因此,病人和家属要高度重视维持治疗。 2、及时发现复发的先兆,及时处理 精神分裂症的复发是有先兆的,只要及时发现,及时调整药物和剂量,一般都能防止复发,常见的复发先兆为:病人无原因出现睡眠不好、懒散、不愿起床、发呆发愣、情绪不稳、无故发脾气、烦躁易怒、胡思乱想、说话离谱,或病中的想法又露头等。这时就应该及时就医,调整治疗病情波动时的及时处理可免于疾病的复发。 3、坚持定期门诊复查 一定要坚持定期到门诊复查,使医生连续地、动态地了解病情,使病人经常处于精神科医生的医疗监护之下,及时根据病情变化调整药量。通过复查也可使端正人及时得到咨询和心理治疗解除病人在生活、工作和药物治疗中的各种困惑,这对预防精神分裂症的复发也起着重要作用。 4、减少诱发因素 家属及周围人要充分认识到精神分裂症病人病后精神状态的薄弱性,帮助安排好日常的生活、工作、学习。经常与病人谈心,帮助病人正确对待疾病,正确对待现实生活,帮助病人提高心理承受能力,学会对待应激事件的方法,鼓励病人增强信心,指导病人充实生活,使病人在没有心理压力和精神困扰的环境中生活。 首先是性格上的改变,塬本活泼开朗爱玩的人,突然变得沉默寡言,独自发呆,不与人交往,爱干净的人也变的不注意卫生、生活

懒散、纪律松弛、做事注意力不集中,总是和患病之前的性格完全 相悖。 再者就是语言表达异常,在谈话中说一些无关的谈话内容,使人无法理解。连最简单的话语都无法准确称述,与之谈话完全感觉不 到重心。 第三个就是行为的异常,行为怪异让人无法理解,喜欢独处、不适意的追逐异性,不知廉耻,自语自笑、生活懒散、时常发呆、蒙 头大睡、四处乱跑,夜不归宿等。 还有情感上的变化,失去了以往的热情,开始变的冷淡、对亲人不关心、和友人疏远,对周围事情不感兴趣,一点消失都可大动干戈。 最后就是敏感多疑,对任何事情比较敏感,精神分裂症患者,总认为有人针对自己。甚至有时认为有人要害自己,从而不吃不喝。 但是也有的会出现难以入眠、容易被惊醒或睡眠不深,整晚做恶梦或者长睡不醒的现象。这些都有可能是患上了精神分裂症。 1.加强心理护理 心理护理是家庭护理中的重要方面,由于社会上普遍存在对精神病人的歧视和偏见,给病人造成很大的精神压力,常表现为自卑、 抑郁、绝望等,有的病人会因无法承受压力而自杀。家属应多给予 些爱心和理解,满足其心理需求,尽力消除病人的悲观情绪。病人 生活在家庭中,与亲人朝夕相处,接触密切,家属便于对病人的情感、行为进行细致的观察,病人的思想活动也易于向家属暴露。家 属应掌握适当的心理护理方法,随时对病人进行启发与帮助,启发 病人对病态的认识,帮助他们树立自信,以积极的心态好地回归社会。 2.重视服药的依从性 精神分裂症病人家庭护理的关键就在于要让病人按时按量吃药维持治疗。如果不按时服药,精神病尤其是精神分裂症的复发率很高。精神病人在医院经过一系统的治疗痊愈后,一般需要维持2~3年的

卫生部关于印发《脐带血造血干细胞库设置管理规范(试行)》的通知

卫生部关于印发《脐带血造血干细胞库设置管理规范(试行)》的通知 发文机关:卫生部(已撤销) 发布日期: 2001.01.09 生效日期: 2001.02.01 时效性:现行有效 文号:卫医发(2001)10号 各省、自治区、直辖市卫生厅局: 为贯彻实施《脐带血造血干细胞库管理办法(试行)》,保证脐带血临床使用的安全、有效,我部制定了《脐带血造血干细胞库设计管理规范(试行)》。现印发给你们,请遵照执行。 附件:《脐带血造血干细胞库设置管理规范(试行)》 二○○一年一月九日 附件: 脐带血造血干细胞库设置管理规范(试行) 脐带血造血干细胞库的设置管理必须符合本规范的规定。 一、机构设置 (一)脐带血造血干细胞库(以下简称脐带血库)实行主任负责制。 (二)部门设置 脐带血库设置业务科室至少应涵盖以下功能:脐带血采运、处理、细胞培养、组织配型、微生物、深低温冻存及融化、脐带血档案资料及独立的质量管理部分。 二、人员要求

(一)脐带血库主任应具有医学高级职称。脐带血库可设副主任,应具有临床医学或生物学中、高级职称。 (二)各部门负责人员要求 1.负责脐带血采运的人员应具有医学中专以上学历,2年以上医护工作经验,经专业培训并考核合格者。 2.负责细胞培养、组织配型、微生物、深低温冻存及融化、质量保证的人员应具有医学或相关学科本科以上学历,4年以上专业工作经历,并具有丰富的相关专业技术经验和较高的业务指导水平。 3.负责档案资料的人员应具相关专业中专以上学历,具有计算机基础知识和一定的医学知识,熟悉脐带血库的生产全过程。 4.负责其它业务工作的人员应具有相关专业大学以上学历,熟悉相关业务,具有2年以上相关专业工作经验。 (三)各部门工作人员任职条件 1.脐带血采集人员为经过严格专业培训的护士或助产士职称以上卫生专业技术人员并经考核合格者。 2.脐带血处理技术人员为医学、生物学专业大专以上学历,经培训并考核合格者。 3.脐带血冻存技术人员为大专以上学历、经培训并考核合格者。 4.脐带血库实验室技术人员为相关专业大专以上学历,经培训并考核合格者。 三、建筑和设施 (一)脐带血库建筑选址应保证周围无污染源。 (二)脐带血库建筑设施应符合国家有关规定,总体结构与装修要符合抗震、消防、安全、合理、坚固的要求。 (三)脐带血库要布局合理,建筑面积应达到至少能够储存一万份脐带血的空间;并具有脐带血处理洁净室、深低温冻存室、组织配型室、细菌检测室、病毒检测室、造血干/祖细胞检测室、流式细胞仪室、档案资料室、收/发血室、消毒室等专业房。 (四)业务工作区域应与行政区域分开。

相关文档