-
121
To replace or not to replace the aortic valve during Type A Aortic Dissection surgery: early and mid-term results
Published 2025-06-01“…Although it was not statistically significant, the false lumen patency rate was higher and the survival time was lower in the valve replaced group. In the postoperative controls, moderate-to-severe aortic regurgitation was not seen in any of the patients who had preoperative moderate-to-severe aortic regurgitation in the not valve replaced group and there was no sinus valsalva aneurysm in any patient.ConclusionWhen the intraoperative and postoperative results in our study were evaluated, it was concluded that the not valve replaced was superior to the valve replaced procedures for TYPE A AORTIC DISSECTION patients.…”
Get full text
Article -
122
A Robot Tool Calibration Method Based on Laser Displacement Sensor
Published 2020-01-01Get full text
Article -
123
Application of EDG AOT Extension Based on the Risk-Informed Method in NPPs
Published 2023-01-01“…In order to avoid stopping the reactor for maintenance of NPP due to insufficient of EDG AOT, based on risk-informed method analysis feasibility of extending AOT for EDG to 28 days, we quantitatively calculate the impact of extension of AOT on risk level of nuclear power plants (NPPs). …”
Get full text
Article -
124
IDE-SVM algorithm and it's usage in physical layer security method for IoT
Published 2024-10-01“…In this paper, an improved differential evolutionary algorithm is proposed to obtain a DE algorithm with faster convergence and higher accuracy by using the circular arc function for adaptive control of the variance scaling factor F and the crossover probability factor R, combining with the random newborn individual replacement operation. …”
Get full text
Article -
125
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
Get full text
Article -
126
Application of CIPP flipped lining method in the rehabilitation of old gas pipelines
Published 2025-04-01“…By comparing the characteristics of different trenchless pipeline repair techniques, the technical adaptability of CIPP flipped lining method was analyzed, and the construction parameter design, key process flow, and construction difficulties of using CIPP flipped lining to repair gas pipelines were explored and revealed, as well as the control of engineering quality impact. …”
Get full text
Article -
127
Method for Determining Pyrogenicity Using Monocytes: Prospects and Features of Application (Review)
Published 2025-07-01“…The test is a worthy example of implementing the strategy of replacing animal tests, it allows determining impurities in cases where control using other methods causes difficulties or cannot be performed. …”
Get full text
Article -
128
Damage Detection Method for Road Ancillary Facilities Integrating Attention Mechanism
Published 2025-01-01Get full text
Article -
129
Maximum Power Point Tracking Based on Improved Perturbation and Observation Method
Published 2014-01-01“…Through simulating PV cells control system, the simulation curve of the maximum power point tracking was compared based on the conventional and improved methods. …”
Get full text
Article -
130
Visual Automatic Localization Method Based on Multi-level Video Transformer
Published 2024-11-01“…The industrial camera is strategically mounted on the robotic arm, which meticulously controls the camera’s downward trajectory, ensuring the capture of varying image qualities. …”
Get full text
Article -
131
Multi-Vehicle Object Recognition Method Based on YOLOv7-W
Published 2025-01-01Get full text
Article -
132
-
133
-
134
Research on Multi-crane Cooperative Micro-motion Control of Combined Gantry Cranes for Turnout Laying and Replacement of High-speed Railways Based on Self-learning
Published 2024-02-01“…In view of bottlenecks encountered in the process of turnout laying and replacement on high-speed railways such as substantial construction difficulties, low efficiency, intensive labor workload, and high risk, this paper proposes a control method of intelligent turnout laying and replacement equipment with combined gantry cranes for high-speed railways. …”
Get full text
Article -
135
-
136
-
137
Extension of an Eighth-Order Iterative Technique to Address Non-Linear Problems
Published 2024-11-01“…However, the method can converge. This indicates that the most sufficient convergence conditions required by the Taylor approach can be replaced by weaker ones. …”
Get full text
Article -
138
Methods of ensuring the operational stability of dc-dc power supply in arctic conditions
Published 2021-10-01“…With modular construction principle the entire electrical complex consists of parallel-connected cells, placed in one hermetic and heated case (a case with connectors on the surface, as well as the control and display units). CONCLUSION. Parallel connection of the cells allows to provide a significant power reserve in the power supply, to perform a quick replacement of faulty modules without interrupting the power supply process, to increase/reduce the system power easily by changing the number of working cells. …”
Get full text
Article -
139
-
140
Several steganographic methods using for embedding of hidden data in electronic text documents
Published 2019-08-01“…Depending on the capacity of the steganographic container a method can be chosen to embed the message anda method to control the integrity of the message. …”
Get full text
Article