Complicated changes occur inside the steel parts during quenching process. A three dimensional nonlinear mathematical model for quenching process has been established and the numerical simulation on temperature field,...Complicated changes occur inside the steel parts during quenching process. A three dimensional nonlinear mathematical model for quenching process has been established and the numerical simulation on temperature field, microstructure and stress field has been realized. The alternative technique for the formation of high-strength materials has been developed on the basis of intensification of heat transfer at phase transformations. The technology for the achievement of maximum compressive residual stresses on the hard surface is introduced. It has been shown that there is an optimal depth of hard layer providing the maximum compression stresses on the surface. It has also been established that in the surface hard layer additional strengthening (superstrengthening) of the material is observed. The generalized formula for the determination of the time of reaching maximum compressive stresses on the surface has been proposed.展开更多
BACKGROUND Primary squamous cell carcinoma(SCC)of the renal parenchyma is extremely rare,with only nine cases reported.CASE SUMMARY This study reports a 51-year-old man with primary SCC of the renal parenchyma.The pat...BACKGROUND Primary squamous cell carcinoma(SCC)of the renal parenchyma is extremely rare,with only nine cases reported.CASE SUMMARY This study reports a 51-year-old man with primary SCC of the renal parenchyma.The patient was admitted with recurrent dull pain and discomfort in the right lumbar region,which had worsened over 2 weeks,accompanied by painful gross hematuria.SCC antigen(SCCA)levels were elevated,and imaging revealed a renal mass with associated calculi.The patient underwent laparoscopic unilateral nephrectomy and lymph node dissection.Postoperative pathology confirmed highly differentiated SCC with necrosis in the right renal parenchyma,with negative renal pelvis and ureter.The pathological stage was Pt3aN1M0.Four months after surgery,the tumor recurred with involvement of the liver,right psoas major muscle,and inferior vena cava.The patient refused chemotherapy and succumbed to the disease 6 months postoperatively due to disease progression.CONCLUSION We report a case of primary SCC of the renal parenchyma,a rare renal malignancy.The clinical symptoms,laboratory tests,and imaging findings are nonspecific,making accurate and timely diagnosis challenging.According to the literature,for patients with renal calculi accompanied by a renal mass,elevated serum SCCA levels,and magnetic resonance imaging showing cystic or cystic-solid masses within the kidney with pseudocapsules and heterogeneous mild enhancement,the possibility of this disease should be considered.展开更多
This editorial examines a recent study that used radiomics based on computed tomography(CT)to predict the expression of the fibroblast-related gene enhancer of zeste homolog 2(EZH2)and its correlation with the surviva...This editorial examines a recent study that used radiomics based on computed tomography(CT)to predict the expression of the fibroblast-related gene enhancer of zeste homolog 2(EZH2)and its correlation with the survival of patients with hepatocellular carcinoma(HCC).By integrating radiomics with molecular analysis,the study presented a strategy for accurately predicting the expression of EZH2 from CT scans.The findings demonstrated a strong link between the radiomics model,EZH2 expression,and patient prognosis.This noninvasive approach provides valuable insights into the therapeutic management of HCC.展开更多
BACKGROUND Complicated crown–root fracture (CRF) involves severe injury to the crown, root,and pulp, and may be accompanied by multiple root fractures. The loss of a toothhas lifelong consequences for children and te...BACKGROUND Complicated crown–root fracture (CRF) involves severe injury to the crown, root,and pulp, and may be accompanied by multiple root fractures. The loss of a toothhas lifelong consequences for children and teenagers, but the maintenance of pulphealth and the calcific healing of multiple root fractures are rarely reported in theliterature.CASE SUMMARY This case reports healing of a permanent tooth with complicated crown–root andadditional root fractures, in which pulp health was maintained. A 10-year-old girlfell and fractured the root of her maxillary left central incisor at the cervical level.After the coronal fragment was repositioned, the tooth was splinted until thetooth was no longer mobile, 2 years later. Eight years after treatment, the toothhas remained asymptomatic with vital pulp and localized gingival overgrowth.Cone-beam computed tomography revealed not only calcified healing of the CRFbut also spontaneous healing in an additional undiagnosed root fracture. Thefracture line on the enamel could not be healed by hard tissue and formed agroove in the cervical crown. It was speculated that the groove was related to thelocalized gingival overgrowth.CONCLUSION This case provides a clinical perspective of the treatment of a tooth with acomplicated CRF and an additional root fracture.展开更多
In recent years, high performance scientific computing under workstation cluster connected by local area network is becoming a hot point. Owing to both the longer latency and the higher overhead for protocol processin...In recent years, high performance scientific computing under workstation cluster connected by local area network is becoming a hot point. Owing to both the longer latency and the higher overhead for protocol processing compared with the powerful single workstation capacity, it is becoming severe important to keep balance not only for numerical load but also for communication load, and to overlap communications with computations while parallel computing. Hence,our efficiency evaluation rules must discover these capacities of a given parallel algorithm in order to optimize the existed algorithm to attain its highest parallel efficiency. The traditional efficiency evaluation rules can not succeed in this work any more. Fortunately, thanks to Culler's detail discuss in LogP model about interconnection networks for MPP systems, we present a system of efficiency evaluation rules for parallel computations under workstation cluster with PVM3.0 parallel software framework in this paper. These rules can satisfy above acquirements successfully. At last, two typical synchronous,and asynchronous applications are designed to verify the validity of these rules under 4 SGIs workstations cluster connected by Ethernet.展开更多
Noise generated by civil transport aircraft during take-off and approach-to-land phases of operation is an environmental problem. The aircraft noise problem is firstly reviewed in this article. The review is followed ...Noise generated by civil transport aircraft during take-off and approach-to-land phases of operation is an environmental problem. The aircraft noise problem is firstly reviewed in this article. The review is followed by a description and assessment of a number of sound propagation methods suitable for applications with a background mean flow field pertinent to aircraft noise. Of the three main areas of the noise problem, i.e. generation, propagation, and ra- diation, propagation provides a vital link between near-field noise generation and far-field radiation. Its accurate assessment ensures the overall validity of a prediction model. Of the various classes of propagation equations, linearised Euler equations are often casted in either time domain or frequency domain. The equations are often solved numerically by computational aeroacoustics techniques, bur are subject to the onset of Kelvin-Helmholtz (K-H) instability modes which may ruin the solutions. Other forms of linearised equations, e.g. acoustic perturbation equations have been proposed, with differing degrees of success.展开更多
The mixing and merging characteristics of multiple tandem jets in crossflow are investigated by use of the Computational Fluid Dynamics (CFD) code FI,UENT. The realizable k - ε model is employed for turbulent elosu...The mixing and merging characteristics of multiple tandem jets in crossflow are investigated by use of the Computational Fluid Dynamics (CFD) code FI,UENT. The realizable k - ε model is employed for turbulent elosure of the Reynolds-averaged Navier-Stokes equations. Numerical experiments are performed for 1-, 2- and 4-jet groups, tbr jet-tocrossflow velocity ratios of R = 4.2 ~ 16.3. The computed velocity and scalar concentration field are in good agreement with experiments using Particle Image Velocimetry (PIV) and Laser Induced Fluorescence (LIF), as well as previous work. The results show that the leading jet behavior is similar to a single free jet in crossflow, while all the downstream rear jets have less bent-over jet trajectories - suggesting a reduced ambient velocity for the rear jets. The concentration decay of the leading jet is greater than that of the rear jets. When normalized by appropriate crossflow momentum length scales, all jet trajectories follow a universal relation regardless of the sequential order of jet position and the nund)er of jets. Supported by the velocity and trajectory measurements, the averaged maximum effective crossflow velocity ratio is computed to be in the range of 0.39 to 0.47.展开更多
In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square He...In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse.展开更多
The root multiple signal classification(root-MUSIC) algorithm is one of the most important techniques for direction of arrival(DOA) estimation. Using a uniform linear array(ULA) composed of M sensors, this metho...The root multiple signal classification(root-MUSIC) algorithm is one of the most important techniques for direction of arrival(DOA) estimation. Using a uniform linear array(ULA) composed of M sensors, this method usually estimates L signal DOAs by finding roots that lie closest to the unit circle of a(2M-1)-order polynomial, where L 〈 M. A novel efficient root-MUSIC-based method for direction estimation is presented, in which the order of polynomial is efficiently reduced to 2L. Compared with the unitary root-MUSIC(U-root-MUSIC) approach which involves real-valued computations only in the subspace decomposition stage, both tasks of subspace decomposition and polynomial rooting are implemented with real-valued computations in the new technique,which hence shows a significant efficiency advantage over most state-of-the-art techniques. Numerical simulations are conducted to verify the correctness and efficiency of the new estimator.展开更多
We propose an efficient and robust way to design absorbing boundary conditions in atomistic computations. An optimal discrete boundary condition is obtained by minimizing a functional of a reflection coefficient integ...We propose an efficient and robust way to design absorbing boundary conditions in atomistic computations. An optimal discrete boundary condition is obtained by minimizing a functional of a reflection coefficient integral over a range of wave numbers. The minimization is performed with respect to a set of wave numbers, at which transparent absorption is reached. Compared with the optimization with respect to the boundary condition coefficients suggested by E and Huang [Phys. Rev. Lett. 87 (2001) 133501], we reduce considerably the number of independent variables and the computing cost. We further demonstrate with numerical examples that both the optimization and the wave absorption are more robust in the proposed design.展开更多
There have been published many papers on VLF (very low frequency) characteristics to study seismo-ionospheric perturbations. Usually VLF records (amplitude and/or phase) are used to investigate mainly the temporal evo...There have been published many papers on VLF (very low frequency) characteristics to study seismo-ionospheric perturbations. Usually VLF records (amplitude and/or phase) are used to investigate mainly the temporal evolution of VLF propagation anomalies with special attention to one particular propagation path. The most important advantage of this paper is the simultaneous use of several propagation paths. A succession of earthquakes (EQs) happened in the Kumamoto area in Kyusyu Island;two strong foreshocks with magnitude of 6.5 and 6.4 on 14 April (UT) and the main shock with magnitude 7.3 on 15 April (UT). Because the EQ epicenters are not far from the VLF transmitter (with the call sign of JJI in Miyazaki prefecture), we can utilize simultaneously 8 observing stations of our network all over Japan. Together with the use of theoretical computations based on wave-hop theory, we try to trace both the temporal and spatial evolutions of the ionospheric perturbation associated with this succession of EQs. It is found that the ionospheric perturbation begins to appear about two weeks before the EQs, and this perturbation becomes most developed 5 - 3 days before the main shock. When the perturbation is most disturbed, the maximum change in vertical direction is depletion in the VLF effective ionospheric height of the order of 10 km, and its horizontal scale (or its radius) is about 1000 km. These spatio-temporal changes of the seismo-ionospheric perturbation will be investigated in details in the discus-sion, a comparison has made with the VLF characteristics of the 1995 Kobe with the same magnitude and of the same fault-type, and a brief discussion on the generation mechanism of seismo-ionospheric perturbation is finally made.展开更多
文摘Complicated changes occur inside the steel parts during quenching process. A three dimensional nonlinear mathematical model for quenching process has been established and the numerical simulation on temperature field, microstructure and stress field has been realized. The alternative technique for the formation of high-strength materials has been developed on the basis of intensification of heat transfer at phase transformations. The technology for the achievement of maximum compressive residual stresses on the hard surface is introduced. It has been shown that there is an optimal depth of hard layer providing the maximum compression stresses on the surface. It has also been established that in the surface hard layer additional strengthening (superstrengthening) of the material is observed. The generalized formula for the determination of the time of reaching maximum compressive stresses on the surface has been proposed.
文摘BACKGROUND Primary squamous cell carcinoma(SCC)of the renal parenchyma is extremely rare,with only nine cases reported.CASE SUMMARY This study reports a 51-year-old man with primary SCC of the renal parenchyma.The patient was admitted with recurrent dull pain and discomfort in the right lumbar region,which had worsened over 2 weeks,accompanied by painful gross hematuria.SCC antigen(SCCA)levels were elevated,and imaging revealed a renal mass with associated calculi.The patient underwent laparoscopic unilateral nephrectomy and lymph node dissection.Postoperative pathology confirmed highly differentiated SCC with necrosis in the right renal parenchyma,with negative renal pelvis and ureter.The pathological stage was Pt3aN1M0.Four months after surgery,the tumor recurred with involvement of the liver,right psoas major muscle,and inferior vena cava.The patient refused chemotherapy and succumbed to the disease 6 months postoperatively due to disease progression.CONCLUSION We report a case of primary SCC of the renal parenchyma,a rare renal malignancy.The clinical symptoms,laboratory tests,and imaging findings are nonspecific,making accurate and timely diagnosis challenging.According to the literature,for patients with renal calculi accompanied by a renal mass,elevated serum SCCA levels,and magnetic resonance imaging showing cystic or cystic-solid masses within the kidney with pseudocapsules and heterogeneous mild enhancement,the possibility of this disease should be considered.
文摘This editorial examines a recent study that used radiomics based on computed tomography(CT)to predict the expression of the fibroblast-related gene enhancer of zeste homolog 2(EZH2)and its correlation with the survival of patients with hepatocellular carcinoma(HCC).By integrating radiomics with molecular analysis,the study presented a strategy for accurately predicting the expression of EZH2 from CT scans.The findings demonstrated a strong link between the radiomics model,EZH2 expression,and patient prognosis.This noninvasive approach provides valuable insights into the therapeutic management of HCC.
基金Supported by 2021 Disciplinary Construction Project in School of Dentistry,Anhui Medical University,No.2021kqxkFY05.
文摘BACKGROUND Complicated crown–root fracture (CRF) involves severe injury to the crown, root,and pulp, and may be accompanied by multiple root fractures. The loss of a toothhas lifelong consequences for children and teenagers, but the maintenance of pulphealth and the calcific healing of multiple root fractures are rarely reported in theliterature.CASE SUMMARY This case reports healing of a permanent tooth with complicated crown–root andadditional root fractures, in which pulp health was maintained. A 10-year-old girlfell and fractured the root of her maxillary left central incisor at the cervical level.After the coronal fragment was repositioned, the tooth was splinted until thetooth was no longer mobile, 2 years later. Eight years after treatment, the toothhas remained asymptomatic with vital pulp and localized gingival overgrowth.Cone-beam computed tomography revealed not only calcified healing of the CRFbut also spontaneous healing in an additional undiagnosed root fracture. Thefracture line on the enamel could not be healed by hard tissue and formed agroove in the cervical crown. It was speculated that the groove was related to thelocalized gingival overgrowth.CONCLUSION This case provides a clinical perspective of the treatment of a tooth with acomplicated CRF and an additional root fracture.
文摘In recent years, high performance scientific computing under workstation cluster connected by local area network is becoming a hot point. Owing to both the longer latency and the higher overhead for protocol processing compared with the powerful single workstation capacity, it is becoming severe important to keep balance not only for numerical load but also for communication load, and to overlap communications with computations while parallel computing. Hence,our efficiency evaluation rules must discover these capacities of a given parallel algorithm in order to optimize the existed algorithm to attain its highest parallel efficiency. The traditional efficiency evaluation rules can not succeed in this work any more. Fortunately, thanks to Culler's detail discuss in LogP model about interconnection networks for MPP systems, we present a system of efficiency evaluation rules for parallel computations under workstation cluster with PVM3.0 parallel software framework in this paper. These rules can satisfy above acquirements successfully. At last, two typical synchronous,and asynchronous applications are designed to verify the validity of these rules under 4 SGIs workstations cluster connected by Ethernet.
文摘Noise generated by civil transport aircraft during take-off and approach-to-land phases of operation is an environmental problem. The aircraft noise problem is firstly reviewed in this article. The review is followed by a description and assessment of a number of sound propagation methods suitable for applications with a background mean flow field pertinent to aircraft noise. Of the three main areas of the noise problem, i.e. generation, propagation, and ra- diation, propagation provides a vital link between near-field noise generation and far-field radiation. Its accurate assessment ensures the overall validity of a prediction model. Of the various classes of propagation equations, linearised Euler equations are often casted in either time domain or frequency domain. The equations are often solved numerically by computational aeroacoustics techniques, bur are subject to the onset of Kelvin-Helmholtz (K-H) instability modes which may ruin the solutions. Other forms of linearised equations, e.g. acoustic perturbation equations have been proposed, with differing degrees of success.
基金The workis supported by a grant fromthe Hong Kong Research Grants Council (HKU7347/01E) Programfor NewCentury Excellent Talents in University (NCET-04-0494) the National Natural Science Foundation of China(Grant No.50479068)
文摘The mixing and merging characteristics of multiple tandem jets in crossflow are investigated by use of the Computational Fluid Dynamics (CFD) code FI,UENT. The realizable k - ε model is employed for turbulent elosure of the Reynolds-averaged Navier-Stokes equations. Numerical experiments are performed for 1-, 2- and 4-jet groups, tbr jet-tocrossflow velocity ratios of R = 4.2 ~ 16.3. The computed velocity and scalar concentration field are in good agreement with experiments using Particle Image Velocimetry (PIV) and Laser Induced Fluorescence (LIF), as well as previous work. The results show that the leading jet behavior is similar to a single free jet in crossflow, while all the downstream rear jets have less bent-over jet trajectories - suggesting a reduced ambient velocity for the rear jets. The concentration decay of the leading jet is greater than that of the rear jets. When normalized by appropriate crossflow momentum length scales, all jet trajectories follow a universal relation regardless of the sequential order of jet position and the nund)er of jets. Supported by the velocity and trajectory measurements, the averaged maximum effective crossflow velocity ratio is computed to be in the range of 0.39 to 0.47.
基金the support of Network Communication Technology(NCT)Research Groups,FTSM,UKM in providing facilities for this research.This paper is supported under the Dana Impak Perdana UKM DIP-2018-040 and Fundamental Research Grant Scheme FRGS/1/2018/TK04/UKM/02/7.
文摘In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse.
基金supported by the National Natural Science Foundation of China(61501142)the Shandong Provincial Natural Science Foundation(ZR2014FQ003)+1 种基金the Special Foundation of China Postdoctoral Science(2016T90289)the China Postdoctoral Science Foundation(2015M571414)
文摘The root multiple signal classification(root-MUSIC) algorithm is one of the most important techniques for direction of arrival(DOA) estimation. Using a uniform linear array(ULA) composed of M sensors, this method usually estimates L signal DOAs by finding roots that lie closest to the unit circle of a(2M-1)-order polynomial, where L 〈 M. A novel efficient root-MUSIC-based method for direction estimation is presented, in which the order of polynomial is efficiently reduced to 2L. Compared with the unitary root-MUSIC(U-root-MUSIC) approach which involves real-valued computations only in the subspace decomposition stage, both tasks of subspace decomposition and polynomial rooting are implemented with real-valued computations in the new technique,which hence shows a significant efficiency advantage over most state-of-the-art techniques. Numerical simulations are conducted to verify the correctness and efficiency of the new estimator.
基金Supported in part by the National Natural Science Foundation of China under Grant No 10872004, the National Basic Research Program of China under Grant No 2007CB814800, and the Ministry of Education of China under Grant Nos NCET-06-0011 and 200800010013.
文摘We propose an efficient and robust way to design absorbing boundary conditions in atomistic computations. An optimal discrete boundary condition is obtained by minimizing a functional of a reflection coefficient integral over a range of wave numbers. The minimization is performed with respect to a set of wave numbers, at which transparent absorption is reached. Compared with the optimization with respect to the boundary condition coefficients suggested by E and Huang [Phys. Rev. Lett. 87 (2001) 133501], we reduce considerably the number of independent variables and the computing cost. We further demonstrate with numerical examples that both the optimization and the wave absorption are more robust in the proposed design.
文摘There have been published many papers on VLF (very low frequency) characteristics to study seismo-ionospheric perturbations. Usually VLF records (amplitude and/or phase) are used to investigate mainly the temporal evolution of VLF propagation anomalies with special attention to one particular propagation path. The most important advantage of this paper is the simultaneous use of several propagation paths. A succession of earthquakes (EQs) happened in the Kumamoto area in Kyusyu Island;two strong foreshocks with magnitude of 6.5 and 6.4 on 14 April (UT) and the main shock with magnitude 7.3 on 15 April (UT). Because the EQ epicenters are not far from the VLF transmitter (with the call sign of JJI in Miyazaki prefecture), we can utilize simultaneously 8 observing stations of our network all over Japan. Together with the use of theoretical computations based on wave-hop theory, we try to trace both the temporal and spatial evolutions of the ionospheric perturbation associated with this succession of EQs. It is found that the ionospheric perturbation begins to appear about two weeks before the EQs, and this perturbation becomes most developed 5 - 3 days before the main shock. When the perturbation is most disturbed, the maximum change in vertical direction is depletion in the VLF effective ionospheric height of the order of 10 km, and its horizontal scale (or its radius) is about 1000 km. These spatio-temporal changes of the seismo-ionospheric perturbation will be investigated in details in the discus-sion, a comparison has made with the VLF characteristics of the 1995 Kobe with the same magnitude and of the same fault-type, and a brief discussion on the generation mechanism of seismo-ionospheric perturbation is finally made.