-
21
Incidence of Coronary Obstruction During Aortic Valve Implantation: Meta-Analysis and Mixt-Treatment Comparison of Self-Expandable Versus Balloon-Expandable Valve Prostheses
Published 2025-07-01“…Background: Recently, the transcatheter aortic valve replacement (TAVR) indications have expanded; meanwhile, valve systems have continuously evolved and improved. …”
Get full text
Article -
22
-
23
Identification of important objectives of networked system based on propagation characteristics
Published 2025-07-01“…This approach aims to provide a more comprehensive and accurate reflection of the importance of nodes within the network.The proposed method effectively evaluates key propagation nodes in different networks through improved K-shell decomposition and network constraint coefficients. …”
Get full text
Article -
24
Non-Palpable Breast Cancer: A Targeting Challenge–Comparison of Radio-Guided vs. Wire-Guided Localization Techniques
Published 2024-10-01“…Among the available tumor localization techniques, radio-guided occult lesion localization (ROLL) has largely replaced wire-guided localization (WGL). The aim of this study was to compare the ROLL and WGL techniques in terms of the effectiveness of isotopic marking of axillary sentinel lymph nodes and to assess patient perspectives along with surgeon and radiologist preferences. …”
Get full text
Article -
25
Quantifying the Long and Short Axes of the External Iliac Lymph Nodes Using Dual-Energy Computed Tomography: A Potential Diagnostic Approach for Periprosthetic Joint Infection &nda...
Published 2024-12-01“…The diagnostic value of lymph node size for PJI was assessed using receiver operating characteristic curves.Results: The AUC (Area Under the Curve) quantifies the diagnostic method’s ability to distinguish between positive and negative outcomes in this study. …”
Get full text
Article -
26
The application of indocyanine green in guiding prostate cancer treatment
Published 2023-01-01“…Even though there are encouraging results, it does not carry sufficient sensitivity and specificity in replacing extended pelvic lymph node dissection during radical prostatectomy. …”
Get full text
Article -
27
Impact of Hepatic Arterial Anomalies on Postoperative Outcomes following Pancreaticoduodenectomy: A Retrospective Case-control Analysis
Published 2025-07-01“…Introduction: Arterial anomalies are frequent occurrences and pose challenges during major surgeries like Pancreaticoduodenectomy (PD), especially during gastroduodenal artery ligation and lymph node dissection. Aim: To analyse the influence of arterial anomalies on mortality and morbidity, as well as oncological adequacy in terms of R0 rate and lymph node retrieval. …”
Get full text
Article -
28
Maintaining Cyber Resilience in the Reconfigurable Networks with Immunization and Improved Network Game Methods
Published 2024-11-01“…This model allows quickly identifying nodes that require disconnection or replacement when a cyber attack occurs, and understanding which network sectors might be affected by an attack. …”
Get full text
Article -
29
Simplified method for estimating the first natural frequency of a symmetric arch truss
Published 2024-09-01“…The Dunkerley method and a variant of the Rayleigh method are proposed to be used to estimate the first natural frequency of the truss. …”
Get full text
Article -
30
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
31
Selection method for hybrid energy storage schemes for supply reliability improvement in distribution networks
Published 2025-03-01“…We propose an improved utility value calculation method based on enhanced utility combination rules. …”
Get full text
Article -
32
A Comparative Study of Coverage Hole Detection Techniques in Wireless Sensor Networks
Published 2023-12-01“…Early identification of coverage holes enables prompt maintenance and troubleshooting, which minimizes the need for future major and expensive replacements or reconfigurations. The loss on the region of interest may be calculated by locating the coverage holes and identifying the malfunctioning node that created it. …”
Get full text
Article -
33
Methods of Current Limitation in Low Voltage (up to 1 kV) Electric Networks
Published 2021-12-01“…The variants of the implementation of these current limiting methods recommended for study at the design stage or when replacing equipment that has exhausted its resource, are considered. …”
Get full text
Article -
34
Power System Transient Stability Assessment Based on Intelligent Enhanced Transient Energy Function Method
Published 2024-11-01“…Based on the k-means clustering method, the IEEE-39 node system generator synchronization units are grouped according to the power angle change trend of each generator after the fault. …”
Get full text
Article -
35
-
36
ANALYSIS OF CAUSES OF BEARING DAMAGE OF BRIDGE SUPPORT OF STACKER-RECLAIMER ZGOT 15400.120
Published 2014-06-01Get full text
Article -
37
Kinematic Characteristics of Deformed Porous Structures
Published 2024-03-01“…Experimental and computational methods of studying the stress state in the plastic region are characterized by various methods and accuracy of measurements, methods of mathematical processing of experimental information, and interpretation of results. …”
Get full text
Article -
38
Problems of creating a promising biaxial bogie of a shunting diesel locomotive
Published 2020-07-01“…The need has been established to conduct research on irregularities of access tracks of industrial enterprises to determine the effect of dynamic unloading of diesel locomotive axles on coupling properties and to study its horizontal dynamics by modeling methods with experimental verification of the result on diesel locomotives already produced in order to determine typical options for cross-link nodes between the bogie and the body. …”
Get full text
Article -
39
Application of Special Calculation Techniques in the Design of All-Welded Gastight Structures of Boiler Units
Published 2024-03-01“…The accompanying task was to verify the developed procedure based on comparing the results of calculations using the developed technique and the normative method.Materials and Methods. The developed technique is based on the replacement of the membrane wall with an orthotropic plate or shell. …”
Get full text
Article -
40
Diversified caching algorithm with cooperation between edge servers
Published 2025-04-01“…After the service request reaches the server, if it misses, the proposed algorithm will judge whether the neighbor node can provide services through the cache information of the neighbor node, and then the server and the neighbor node jointly decide how to cache the service. …”
Get full text
Article