Showing 21 - 40 results of 126 for search 'node replacement methods', query time: 0.11s Refine Results
  1. 21

    Incidence of Coronary Obstruction During Aortic Valve Implantation: Meta-Analysis and Mixt-Treatment Comparison of Self-Expandable Versus Balloon-Expandable Valve Prostheses by Yu Fei Wang, Zai Qiang Liu, Xiao Teng Ma, Li Xia Yang, Zhi Jian Wang, Yu Jie Zhou

    Published 2025-07-01
    “…Background: Recently, the transcatheter aortic valve replacement (TAVR) indications have expanded; meanwhile, valve systems have continuously evolved and improved. …”
    Get full text
    Article
  2. 22
  3. 23

    Identification of important objectives of networked system based on propagation characteristics by Jieyong Zhang, Wei Liang, Peng Sun, Liang Zhao

    Published 2025-07-01
    “…This approach aims to provide a more comprehensive and accurate reflection of the importance of nodes within the network.The proposed method effectively evaluates key propagation nodes in different networks through improved K-shell decomposition and network constraint coefficients. …”
    Get full text
    Article
  4. 24

    Non-Palpable Breast Cancer: A Targeting Challenge–Comparison of Radio-Guided vs. Wire-Guided Localization Techniques by András Drozgyik, Dániel Kollár, Levente Dankházi, István Á. Harmati, Krisztina Szalay, Tamás F. Molnár

    Published 2024-10-01
    “…Among the available tumor localization techniques, radio-guided occult lesion localization (ROLL) has largely replaced wire-guided localization (WGL). The aim of this study was to compare the ROLL and WGL techniques in terms of the effectiveness of isotopic marking of axillary sentinel lymph nodes and to assess patient perspectives along with surgeon and radiologist preferences. …”
    Get full text
    Article
  5. 25

    Quantifying the Long and Short Axes of the External Iliac Lymph Nodes Using Dual-Energy Computed Tomography: A Potential Diagnostic Approach for Periprosthetic Joint Infection &nda... by Yang Y, Zhou H, Kang R, Zhao C, Li J, Li F, Shen Y, Chen Y, Huang W, Qin L

    Published 2024-12-01
    “…The diagnostic value of lymph node size for PJI was assessed using receiver operating characteristic curves.Results: The AUC (Area Under the Curve) quantifies the diagnostic method’s ability to distinguish between positive and negative outcomes in this study. …”
    Get full text
    Article
  6. 26

    The application of indocyanine green in guiding prostate cancer treatment by Donghua Xie, Di Gu, Ming Lei, Cong Cai, Wen Zhong, Defeng Qi, Wenqi Wu, Guohua Zeng, Yongda Liu

    Published 2023-01-01
    “…Even though there are encouraging results, it does not carry sufficient sensitivity and specificity in replacing extended pelvic lymph node dissection during radical prostatectomy. …”
    Get full text
    Article
  7. 27

    Impact of Hepatic Arterial Anomalies on Postoperative Outcomes following Pancreaticoduodenectomy: A Retrospective Case-control Analysis by Puvvada Prashanth, Sankareswaran Sugaprakash, Raju Prabhakaran, Chidambaranathan Sugumar

    Published 2025-07-01
    “…Introduction: Arterial anomalies are frequent occurrences and pose challenges during major surgeries like Pancreaticoduodenectomy (PD), especially during gastroduodenal artery ligation and lymph node dissection. Aim: To analyse the influence of arterial anomalies on mortality and morbidity, as well as oncological adequacy in terms of R0 rate and lymph node retrieval. …”
    Get full text
    Article
  8. 28

    Maintaining Cyber Resilience in the Reconfigurable Networks with Immunization and Improved Network Game Methods by Maxim Kalinin, Evgeny Pavlenko, Georgij Gavva, Maxim Pakhomov

    Published 2024-11-01
    “…This model allows quickly identifying nodes that require disconnection or replacement when a cyber attack occurs, and understanding which network sectors might be affected by an attack. …”
    Get full text
    Article
  9. 29

    CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES by Petro Klimushyn, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Vitaliy Svitlychny

    Published 2022-06-01
    “…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
    Get full text
    Article
  10. 30

    Simplified method for estimating the first natural frequency of a symmetric arch truss by Kirsanov Mikhail, Luong Cong

    Published 2024-09-01
    “…The Dunkerley method and a variant of the Rayleigh method are proposed to be used to estimate the first natural frequency of the truss. …”
    Get full text
    Article
  11. 31

    Selection method for hybrid energy storage schemes for supply reliability improvement in distribution networks by Qian Li, Yuanbao Zhou, Yunxiao Zhang, Yuxin Fu

    Published 2025-03-01
    “…Using the IEEE-33 node as an example, we configure the optimal scheme. …”
    Get full text
    Article
  12. 32

    Methods of Current Limitation in Low Voltage (up to 1 kV) Electric Networks by A. Yu. Kapustsinski, S. V. Kanstantsinava

    Published 2021-12-01
    “…The variants of the implementation of these current limiting methods recommended for study at the design stage or when replacing equipment that has exhausted its resource, are considered. …”
    Get full text
    Article
  13. 33

    A Comparative Study of Coverage Hole Detection Techniques in Wireless Sensor Networks by Anitha Christy Angelin, Salaja Silas

    Published 2023-12-01
    “…Early identification of coverage holes enables prompt maintenance and troubleshooting, which minimizes the need for future major and expensive replacements or reconfigurations. The loss on the region of interest may be calculated by locating the coverage holes and identifying the malfunctioning node that created it. …”
    Get full text
    Article
  14. 34

    Power System Transient Stability Assessment Based on Intelligent Enhanced Transient Energy Function Method by Tianxiao Mo, Jun Liu, Jiacheng Liu, Guangyao Wang, Yuting Li, Kaiwei Lin

    Published 2024-11-01
    “…Based on the k-means clustering method, the IEEE-39 node system generator synchronization units are grouped according to the power angle change trend of each generator after the fault. …”
    Get full text
    Article
  15. 35

    Problems of creating a promising biaxial bogie of a shunting diesel locomotive by A. S. Kosmodamianskiy, V. I. Vorob’ev, M. Yu. Kapustin, O. V. Izmerov, D. N. Shevchenko

    Published 2020-07-01
    “…The need has been established to conduct research on irregularities of access tracks of industrial enterprises to determine the effect of dynamic unloading of diesel locomotive axles on coupling properties and to study its horizontal dynamics by modeling methods with experimental verification of the result on diesel locomotives already produced in order to determine typical options for cross-link nodes between the bogie and the body. …”
    Get full text
    Article
  16. 36
  17. 37
  18. 38

    Kinematic Characteristics of Deformed Porous Structures by Veselovska N., Sivak R., Paladiychuk Y., Bandura V., Telyatnik I., Bohatiuk M., Savkiv V., Edl M.

    Published 2024-03-01
    “…Experimental and computational methods of studying the stress state in the plastic region are characterized by various methods and accuracy of measurements, methods of mathematical processing of experimental information, and interpretation of results. …”
    Get full text
    Article
  19. 39

    Application of Special Calculation Techniques in the Design of All-Welded Gastight Structures of Boiler Units by M. P. Kurepin, M. Yu. Serbinovskiy

    Published 2024-03-01
    “…The accompanying task was to verify the developed procedure based on comparing the results of calculations using the developed technique and the normative method.Materials and Methods. The developed technique is based on the replacement of the membrane wall with an orthotropic plate or shell. …”
    Get full text
    Article
  20. 40

    Improved Artificial Bee Colony Optimization Underwater Localization Algorithm by Logistic Chaos Mapping and Differential Evolution by Jiaxing CHEN, Yang LIU, Xiaoqian LIU, Zhihua LIU

    Published 2025-01-01
    “…Objective Localization algorithms for underwater acoustic sensor networks typically depend on distance estimation methods, such as point-to-point distance estimation or angle estimation, to achieve node localization between nodes. …”
    Get full text
    Article