Showing 121 - 140 results of 1,901 for search 'replacement control (method OR methods)', query time: 0.16s Refine Results
  1. 121

    To replace or not to replace the aortic valve during Type A Aortic Dissection surgery: early and mid-term results by Muhammet Selim Yaşar, Emre Külahcıoğlu, Şeref Alp Küçüker

    Published 2025-06-01
    “…Although it was not statistically significant, the false lumen patency rate was higher and the survival time was lower in the valve replaced group. In the postoperative controls, moderate-to-severe aortic regurgitation was not seen in any of the patients who had preoperative moderate-to-severe aortic regurgitation in the not valve replaced group and there was no sinus valsalva aneurysm in any patient.ConclusionWhen the intraoperative and postoperative results in our study were evaluated, it was concluded that the not valve replaced was superior to the valve replaced procedures for TYPE A AORTIC DISSECTION patients.…”
    Get full text
    Article
  2. 122
  3. 123

    Application of EDG AOT Extension Based on the Risk-Informed Method in NPPs by Yunxin Feng, Wei Hu

    Published 2023-01-01
    “…In order to avoid stopping the reactor for maintenance of NPP due to insufficient of EDG AOT, based on risk-informed method analysis feasibility of extending AOT for EDG to 28 days, we quantitatively calculate the impact of extension of AOT on risk level of nuclear power plants (NPPs). …”
    Get full text
    Article
  4. 124

    IDE-SVM algorithm and it's usage in physical layer security method for IoT by WANG Qiang, ZHU Chenming, PAN Su, QIN Yuxi

    Published 2024-10-01
    “…In this paper, an improved differential evolutionary algorithm is proposed to obtain a DE algorithm with faster convergence and higher accuracy by using the circular arc function for adaptive control of the variance scaling factor F and the crossover probability factor R, combining with the random newborn individual replacement operation. …”
    Get full text
    Article
  5. 125

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  6. 126

    Application of CIPP flipped lining method in the rehabilitation of old gas pipelines by You Yun, Wang xinxin, Wang Zhongyi, Wang Yuyan, Chen Hao

    Published 2025-04-01
    “…By comparing the characteristics of different trenchless pipeline repair techniques, the technical adaptability of CIPP flipped lining method was analyzed, and the construction parameter design, key process flow, and construction difficulties of using CIPP flipped lining to repair gas pipelines were explored and revealed, as well as the control of engineering quality impact. …”
    Get full text
    Article
  7. 127

    Method for Determining Pyrogenicity Using Monocytes: Prospects and Features of Application (Review) by E. O. Chechetova, N. P. Neugodova, O. V. Shapovalova

    Published 2025-07-01
    “…The test is a worthy example of implementing the strategy of replacing animal tests, it allows determining impurities in cases where control using other methods causes difficulties or cannot be performed. …”
    Get full text
    Article
  8. 128
  9. 129

    Maximum Power Point Tracking Based on Improved Perturbation and Observation Method by LIU Fei, LU Baochun, LI Changchao, LI Xingjin, SU Liujun

    Published 2014-01-01
    “…Through simulating PV cells control system, the simulation curve of the maximum power point tracking was compared based on the conventional and improved methods. …”
    Get full text
    Article
  10. 130

    Visual Automatic Localization Method Based on Multi-level Video Transformer by Qiping ZOU, Botao LI, Saian CHEN, Xi GUO, Taohong ZHANG

    Published 2024-11-01
    “…The industrial camera is strategically mounted on the robotic arm, which meticulously controls the camera’s downward trajectory, ensuring the capture of varying image qualities. …”
    Get full text
    Article
  11. 131
  12. 132
  13. 133
  14. 134

    Research on Multi-crane Cooperative Micro-motion Control of Combined Gantry Cranes for Turnout Laying and Replacement of High-speed Railways Based on Self-learning by LYU Maoyin, NIU Xuexin, CHEN Qishen, ZHAN Taiping

    Published 2024-02-01
    “…In view of bottlenecks encountered in the process of turnout laying and replacement on high-speed railways such as substantial construction difficulties, low efficiency, intensive labor workload, and high risk, this paper proposes a control method of intelligent turnout laying and replacement equipment with combined gantry cranes for high-speed railways. …”
    Get full text
    Article
  15. 135
  16. 136
  17. 137

    Extension of an Eighth-Order Iterative Technique to Address Non-Linear Problems by Higinio Ramos, Ioannis K. Argyros, Ramandeep Behl, Hashim Alshehri

    Published 2024-11-01
    “…However, the method can converge. This indicates that the most sufficient convergence conditions required by the Taylor approach can be replaced by weaker ones. …”
    Get full text
    Article
  18. 138

    Methods of ensuring the operational stability of dc-dc power supply in arctic conditions by V. A. Shpenst, E. A. Orel

    Published 2021-10-01
    “…With modular construction principle the entire electrical complex consists of parallel-connected cells, placed in one hermetic and heated case (a case with connectors on the surface, as well as the control and display units). CONCLUSION. Parallel connection of the cells allows to provide a significant power reserve in the power supply, to perform a quick replacement of faulty modules without interrupting the power supply process, to increase/reduce the system power easily by changing the number of working cells. …”
    Get full text
    Article
  19. 139
  20. 140

    Several steganographic methods using for embedding of hidden data in electronic text documents by E. A. Blinova, A. A. Sushchenia

    Published 2019-08-01
    “…Depending on the capacity of the steganographic container a method can be chosen to embed the message anda method to control the integrity of the message. …”
    Get full text
    Article