-
1441
Primary bronchial leiomyosarcoma: a diagnostic challenge
Published 2025-01-01“…Surgical resection is the first-line treatment. We report a case of pulmonary bronchial leiomyosarcoma. …”
Get full text
Article -
1442
A Rare Stapes Abnormality
Published 2015-01-01“…We report the case of a 13-year-old female reporting progressive left-sided hearing loss and high resolution computed tomography was initially reported as normal. …”
Get full text
Article -
1443
A Novel Wide-Area Backup Protection Based on Fault Component Current Distribution and Improved Evidence Theory
Published 2014-01-01“…After that, the master substation will identify the actual faulty line with improved D-S evidence theory based on the action states of traditional protections and direction components of these suspicious faulty lines. …”
Get full text
Article -
1444
Gastric cancer – Clinical aspects
Published 2024-09-01“…Similarly, with the proportion of early gastric cancers increasing, a precise assessment of the individual risk for meta-chronous lesions after endoscopic resection is of high importance to allow appropriate surveillance regimens. …”
Get full text
Article -
1445
Failure to oxygenate during cardiopulmonary bypass; treatment options and intervention algorithm
Published 2024-12-01“…Successful outcomes for this low-frequency, high-risk intervention are predicated on having written institutional protocols for both the oxygenator change-out procedure as well as how often the procedure is practiced by staff perfusionists. …”
Get full text
Article -
1446
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01“…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
Get full text
Article -
1447
Role of CT in Assessment of Unresectable Wilms' Tumor Response after Preoperative Chemotherapy in Pediatrics
Published 2008-01-01“…All patients received first line of treatment. Follow-up of these patients by CT at the 6th week was reviewed. …”
Get full text
Article -
1448
POTENTIAL RISKS ASSOCIATED WITH MISMANAGEMENT OF HOSPITAL WASTEWATER IN TANZANIA
Published 2023-09-01“…These results reveal that hospitals discharge is highly polluted and hence puts aquatic organisms and downstream water users into risks. …”
Get full text
Article -
1449
Pre-Service Physical Education Teachers’ Acceptance of Mobile Learning Tools and Attitude Levels for Mobile Learning
Published 2023-04-01“…It has been observed that motivation and satisfaction variables, which are sub-factors of Attitude Towards Mobile Learning, have a high level of correlation with each other. On the other hand, it can be said that the willingness to use mobile devices mostly affects the acceptance of mobile learning tools. …”
Get full text
Article -
1450
Research on the Spatial Distribution Pattern and Influencing Factors of China’s Antipoverty (Pro-Poor Tourism) on GIS
Published 2021-01-01“…The findings revealed that the spatial distribution of pro-poor tourism villages is roughly divided by the Hu line. Pro-poor tourism villages show an uneven agglomeration pattern and present a spatial pattern of dense southeast and sparse northwest with six high-density core areas, among which some cities in the southwest are H-H agglomeration areas. …”
Get full text
Article -
1451
Compliance of thyroid nodules through ultrasound-guided trucut/core needle biopsy with Thyroid imaging, reporting, and data system score and surgical pathology
Published 2023-04-01“…Accuracy of CNB in thyroid nodules is high with low rate of drastic effects.…”
Get full text
Article -
1452
Improving Biocompatibility of Polyurethanes Apply in Medicine Using Oxygen Plasma and Its Negative Effect on Increased Bacterial Adhesion
Published 2024-01-01“…Polyurethanes (PUs) are versatile polymers used in medical applications due to their high flexibility and fatigue resistance. PUs are widely used for synthetic blood vessels, wound dressings, cannulas, and urinary and cardiovascular catheters. …”
Get full text
Article -
1453
Improving The Physical Stability Of Virgin Olive Oil Mayonnaise
Published 2022-12-01“…Extra virgin olive oil (EVOO), despite its high cost, is unique in that it has some very exceptional nutritional and sensorial properties and positive health promoting effects. …”
Get full text
Article -
1454
Study on the reliability of hypergraphs based on non-backtracking matrix centrality
Published 2024-02-01“…In recent years, there has been widespread attention on hypergraphs as a research hotspot in network science.The unique structure of hypergraphs, which differs from traditional graphs, is characterized by hyperedges that can connect multiple nodes simultaneously, resulting in more complex and higher-order relationships.Effectively identifying important nodes and hyperedges in such network structures poses a key challenge.Eigenvector centrality, a common metric, has limitations in its application due to its locality when dealing with hub nodes with extremely high degree values in the network.To address this issue, the hypergraphs were transformed into their corresponding line graphs, and non-backtracking matrix centrality was employed as a method to measure the importance of hyperedges.This approach demonstrated better uniformity and differentiation in assessing the importance of hyperedges.Furthermore, the application of both eigenvector centrality and non-backtracking matrix centrality in assessing the importance of nodes in hypergraphs was explored.Comparative analysis revealed that non-backtracking matrix centrality effectively distinguished the importance of nodes.This research encompassed theoretical analysis, model construction, and empirical studies on real-world data.To validate the proposed method and conclusion, six real-world hypergraphs were selected as experimental subjects.The application of these methods to these hypergraphs confirmed the effectiveness of non-backtracking matrix centrality in identifying important nodes and hyperedges.The findings of this research offer a fresh perspective and approach for identifying key elements in hypergraphs, holding significant theoretical and practical implications for understanding and analyzing complex network systems.…”
Get full text
Article -
1455
Influence of Geometrical Parameters on Performance of Grouted Mortise and Tenon Joints for Application in Prefabricated Underground Structures
Published 2019-01-01“…Five metro stations have been built on Line 2 of the Changchun Metro in China using this new prefabrication technology. …”
Get full text
Article -
1456
Adaptive Fixed-Time Nonsingular Terminal Sliding Mode Attitude Tracking Control for Spacecraft with Actuator Saturations and Faults
Published 2021-01-01“…Aiming at the shortcomings and deficiencies in the existing attitude fault-tolerant control system design, combined with the current research status of attitude fault-tolerant control technology, we carry out high-precision, fast-convergent attitude tracking algorithms. …”
Get full text
Article -
1457
Hypertension Detection Using Passive-Aggressive Algorithm With The PA-I And PA-II Methods
Published 2023-03-01“…From these results, PA-I shows that the model is good in diagnosing hypertension patients because its accuracy is stable and high enough. The results also show that the model is not overfitting, and the new data can be predicted well in line with the training data because, on the results of training accuracy, PA-I shows an accuracy of 81.6 - 84.56% while PA-II shows an accuracy of 71.6 - 82.71%.…”
Get full text
Article -
1458
Optimal Scheme for Process Quality and Cost Control by Integrating a Continuous Sampling Plan and the Process Yield Index
Published 2018-01-01“…The single level continuous sampling plan (CSP-1) is an in-line process control tool that has been commonly adopted in various manufacturing industries. …”
Get full text
Article -
1459
Niccolo Machiavelli’s views on public security
Published 2023-12-01“…According to the results of the study, it has been concluded that Machiavelli's security concept is characterised by rationalism, secularism, pragmatism, nationalism, an emphasis on a combination of power and legal elements with the predominance of the former, institutional and personal factors of public security with the priority of the former, instruments of psychological pressure (intimidation to keep the people in line), military force and diplomacy (to prevent external threats), separation of ethics and politics in the field of public security, a balanced attitude to the need to maintain internal and external security, and a high appreciation of the historical experience of ensuring security in antiquity and in modern centralised and absolutist states at an early stage.…”
Get full text
Article -
1460
Gamification and player type: Relationships of the HEXAD model with the learning experience
Published 2025-01-01“…The results indicate a relationship between player profiles and the variables considered: final score on the platform, number of activities completed, number of connections made, player level achieved, student satisfaction level, and learning levels. Additionally, the high percentage of socialiser profiles found among the students is perfectly in line with some of the intrinsic characteristics of the ClassCraft platform. …”
Get full text
Article