Real-time prediction of the rock mass class in front of the tunnel face is essential for the adaptive adjustment of tunnel boring machines(TBMs).During the TBM tunnelling process,a large number of operation data are g...Real-time prediction of the rock mass class in front of the tunnel face is essential for the adaptive adjustment of tunnel boring machines(TBMs).During the TBM tunnelling process,a large number of operation data are generated,reflecting the interaction between the TBM system and surrounding rock,and these data can be used to evaluate the rock mass quality.This study proposed a stacking ensemble classifier for the real-time prediction of the rock mass classification using TBM operation data.Based on the Songhua River water conveyance project,a total of 7538 TBM tunnelling cycles and the corresponding rock mass classes are obtained after data preprocessing.Then,through the tree-based feature selection method,10 key TBM operation parameters are selected,and the mean values of the 10 selected features in the stable phase after removing outliers are calculated as the inputs of classifiers.The preprocessed data are randomly divided into the training set(90%)and test set(10%)using simple random sampling.Besides stacking ensemble classifier,seven individual classifiers are established as the comparison.These classifiers include support vector machine(SVM),k-nearest neighbors(KNN),random forest(RF),gradient boosting decision tree(GBDT),decision tree(DT),logistic regression(LR)and multilayer perceptron(MLP),where the hyper-parameters of each classifier are optimised using the grid search method.The prediction results show that the stacking ensemble classifier has a better performance than individual classifiers,and it shows a more powerful learning and generalisation ability for small and imbalanced samples.Additionally,a relative balance training set is obtained by the synthetic minority oversampling technique(SMOTE),and the influence of sample imbalance on the prediction performance is discussed.展开更多
In this paper we investigate the Gazeau–Klauder coherent states using a newly introduced diagonal ordering operation technique, in order to examine some of the properties of these coherent states. The results coincid...In this paper we investigate the Gazeau–Klauder coherent states using a newly introduced diagonal ordering operation technique, in order to examine some of the properties of these coherent states. The results coincide with those obtained from other purely algebraic methods, but the calculations are greatly simplified. We apply the general theory to two cases of Gazeau–Klauder coherent states: pseudoharmonic as well as the Morse oscillators.展开更多
Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to explo...Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to exploring biomimetic mechanisms of plasticity simulation in the last few years.Recent progress in various plasticity modulation techniques has pushed the research of synaptic electronics from static plasticity simulation to dynamic plasticity modulation,improving the accuracy of neuromorphic computing and providing strategies for implementing neuromorphic sensing functions.Herein,several fascinating strategies for synap-tic plasticity modulation through chemical techniques,device structure design,and physical signal sensing are reviewed.For chemical techniques,the underly-ing mechanisms for the modification of functional materials were clarified and its effect on the expression of synaptic plasticity was also highlighted.Based on device structure design,the reconfigurable operation of neuromorphic devices was well demonstrated to achieve programmable neuromorphic functions.Besides,integrating the sensory units with neuromorphic processing circuits paved a new way to achieve human-like intelligent perception under the modulation of physical signals such as light,strain,and temperature.Finally,considering that the relevant technology is still in the basic exploration stage,some prospects or development suggestions are put forward to promote the development of neuromorphic devices.展开更多
We introduce the quantum Hadamard operator in continuum state vector space and find that it can be decomposed into a single-mode squeezing operator and a position-momentum mutual transform operator. The two-mode Hadam...We introduce the quantum Hadamard operator in continuum state vector space and find that it can be decomposed into a single-mode squeezing operator and a position-momentum mutual transform operator. The two-mode Hadamard operator in bipartite entangled state representation is also introduced, which involves the two-mode squeezing operator and [η〉 ←→|ξ〉 mutual transformation operator, where [η〉 and |ξ〉 are mutual conjugate entangled states. All the discussions are proceeded by virtue of the IWOP technique.展开更多
Based on the technique of integration within an ordered product of operators, the Weyl ordering operator formula is derived and the Fresnel operators' Weyl ordering is also obtained, which together with the Weyl tran...Based on the technique of integration within an ordered product of operators, the Weyl ordering operator formula is derived and the Fresnel operators' Weyl ordering is also obtained, which together with the Weyl transformation can immediately lead to Eresnel transformation kernel in classical optics.展开更多
Using the technique of integration within an antinormally ordered product of operators we present a convenient approach for deriving some new operator identities in quantum optics theory. Based on P-representation we ...Using the technique of integration within an antinormally ordered product of operators we present a convenient approach for deriving some new operator identities in quantum optics theory. Based on P-representation we also derive a new formula for evaluating photocount distribution.展开更多
Using the coherent state representation we derive some new operator identities and study some mathematical relations in comblnatorics. The technique of integral within an ordered product (IWOP) of operators plays an...Using the coherent state representation we derive some new operator identities and study some mathematical relations in comblnatorics. The technique of integral within an ordered product (IWOP) of operators plays an essential role in realizing our goal.展开更多
BACKGROUND : Experimental animal models of intracerebral hemorrhag (ICH) are greatly needed, so the process of establishment should be ideal in hematoma formation and easy to operate. OBJECTIVE : To construct mode...BACKGROUND : Experimental animal models of intracerebral hemorrhag (ICH) are greatly needed, so the process of establishment should be ideal in hematoma formation and easy to operate. OBJECTIVE : To construct model of ICH in rats with double injection of autologous blood taken from the cut tail cut and double withdrawal of the needle (shortened as two-step injection model), and compare with those induced by single and double injections. DESIGN : A randomized controlled tria SETTING: Department of Neurology, General Hospital of Military Area Command of Chinese PLA. MATERIALS: Thirty male Wistar rats of 10 to 12 months, weighing (400±25) g, provided by the Experimental Center of Medical Animals, General Hospital of Shenyang Military Area Command of Chinese PLA, were divided randomly into 3 groups with 10 rats in each group: two-step injection group, single injection group, double injection group. METHODS : The experiment was carried out in the Department of Neurology, General Hospital of Military Area Command of Chinese PLA from March to June in 2004. Autologous blood ICH model in rats were established as follows: In the two-step injection group, 50 μL unclotted autologous blood was taken from the rat tail cut, then injected with microsyringe into the caudate nucleus, 10 μL injected at first, paused for 2 minutes, and then the rest 40 μL injected slowly and continuously within 2 minutes. After the injection, the needle was kept immovable for about 4 minutes, withdrawn 2.0 mm, again kept immovable for about 4 minute, and then removed wholly at a slow speed. In the single injection group, 50 μL unclotted tail blood was injected slowly and continuously all within 2 minutes and the needle was slowly removed;(4) In the double injection group, 10 mL blood was injected at first, paused for 2 minutes, the rest 40 μL injected evenly within 2 minutes, and then the needle was withdrawn slowly and uninterruptedly. Neurologic findings were scored in accordance with Longa's five-point scale (0-4 scores, the higher the score, the severer the neurological dysfunction). The rats were killed to remove and sections were prepared, the morphological features of hematomas were grossly observed, the maximal diameter and size of hematomas in each slice were measured with the imaging analytical system, and the volume was calculated. Meanwhile, the conveniences of the techniques were compared. MAIN OUTCOME MEASURES: The morphological features and volume of hematomas, neurologic deficit score (NDS), and the convenience of the techniques were compared. RESULTS: All the 30 rats were involved in the analysis of results without deletion. (1) Results of the morphological observation of volume of hematoma: In the two-step injection group, hematomas located in the right caudate nucleus area regularly in circular or analogously circular shape in each slice. The formation rate of hematomas in the single injection group and double injection group were lower than those in the two-step injection group [60% (6/10), 80% (8/10), 100% (10/10), P〈 0.01, 0.05]. The volume of hematomas in the single injection group and double injection group were smaller than those in the two-step injection group [(28.5±14.8), (33.4±7.4), (41.6±3.9) mm3, P〈 0.01, 0.05]. (2) NDS results: The NDS scores in the single injection group and double injection group were smaller than that in the two-step injection group (0.90±0.83, 1.30±0.78, 1.90±0.57, P〈 0.05). (3)Comparison of the convenience of the techniques: The double injection method allowed generating reproducible hematomas in rats with shortcomings that it needed autologous arterial blood from femoral artery, and precision instruments such as microinfusion pump. The two-step injection injected fresh unclotting blood taken directly from the tail cut with microsyringe into the rat brain, and it has the advantages of easy operation, no influence on the activity of thrombase, shorter duration for model establishment, and higher rate of hematoma formation, which could generate ideal and economical models of ICH. The two-step injection induced hemotoma regularly in circular or analogously circular shape in each slice, but those induced by single and double injections were mostly in strip or fusiform shapes and extending along the needle tracks or into the ventricle or subarachnoid space. CONCLUSION : The autologous blood ICH model induced by the two-step injection method is a reproducible and reliable one in regular shape, which is better than those induced by double and single injections.展开更多
By using the Chern-Finsler connection and complex Finsler metric, the Bochner technique on strong K/ihler-Finsler manifolds is studied. For a strong K/ihler-Finsler manifold M, the authors first prove that there exist...By using the Chern-Finsler connection and complex Finsler metric, the Bochner technique on strong K/ihler-Finsler manifolds is studied. For a strong K/ihler-Finsler manifold M, the authors first prove that there exists a system of local coordinate which is normalized at a point v ∈M = T1.0M/o(M), and then the horizontal Laplace operator NH for differential forms on PTM is defined by the horizontal part of the Chern-Finsler connection and its curvature tensor, and the horizontal Laplace operator H on holomorphic vector bundle over PTM is also defined. Finally, we get a Bochner vanishing theorem for differential forms on PTM. Moreover, the Bochner vanishing theorem on a holomorphic line bundle over PTM is also obtained展开更多
Concrete structures in main coal cleaning plants have been rebuilt and reinforced in the coal mines of the Shanghai Datun Energy Sources Co. Ltd., the first colliery of the Pingdingshan Coal Co. Ltd. and the Sanhejian...Concrete structures in main coal cleaning plants have been rebuilt and reinforced in the coal mines of the Shanghai Datun Energy Sources Co. Ltd., the first colliery of the Pingdingshan Coal Co. Ltd. and the Sanhejian mine of the Xuzhou Mining Group Co. Ltd. In these projects, the operating environment and reliability of concrete structures in the main plants of the three companies were investigated and the safety of the structures inspected. Qualitative and quantitative analyses were made on the special natural, technological and mechanical environments around the structures. On the basis of these analyses, we discuss the long-term, combined actions of the harsh natural (corrosive gases, liquids and solids) and mechanical environments on concrete structures and further investigated the damage and deteriorating mechanisms and curing techniques of concrete structures in the main coal cleaning plants. Our study can provide a theoretical basis for ensuring the reliability of concrete structures in main coal cleaning plants.展开更多
In our previous papers,the classical fractional Fourier transform theory was incorporated into the quantum theoretical system using the theoretical method of quantum optics,and the calculation produced quantum mechani...In our previous papers,the classical fractional Fourier transform theory was incorporated into the quantum theoretical system using the theoretical method of quantum optics,and the calculation produced quantum mechanical operators corresponding to the generation of fractional Fourier transform.The core function of the coordinate-momentum exchange operators in the addition law of fractional Fourier transform was analyzed too.In this paper,the bivariate operator Hermite polynomial theory and the technique of integration within an ordered product of operators(IWOP)are used to establish the entanglement fractional Fourier transform theory to the extent of quantum.A new function generating formula and an operator for generating quantum entangled fractional Fourier transform are obtained using the fractional Fourier transform relationship in a pair of conjugated entangled state representations.展开更多
Effectiveness evaluation of the joint operation system is an important basis for the demonstration and development of weapon equipment.With the consideration that existing models of system effectiveness evaluation sel...Effectiveness evaluation of the joint operation system is an important basis for the demonstration and development of weapon equipment.With the consideration that existing models of system effectiveness evaluation seldom describe the structural relationship among equipment clearly as well as reflect the dynamic,the analog-to-digital converter-graphical evaluation and review technique(ADC-GERT)network parameter estimation model is proposed based on the ADC model and the joint operation system structure.Firstly,analysis of the joint operation system structure and operation process is conducted to build the GERT network,where equipment subsystems are nodes and activities are directed arches.Then the mission effectiveness of equipment subsystems is calculated by the ADC model.The probability transfer parameters are modified by the mission effectiveness of equipment subsystems based on the Bayesian theorem,with the ADC-GERT network parameter estimation model constructed.Finally,a case study is used to validate the efficiency and dynamic of the ADC-GERT network parameter estimation model.展开更多
Heavily calcified coronary lesions continue to represent a challenge for percutaneous coronary intervention(PCI),as they are difficult to dilate,and it is difficult to deliver and implant drug-eluting stents(DES)prope...Heavily calcified coronary lesions continue to represent a challenge for percutaneous coronary intervention(PCI),as they are difficult to dilate,and it is difficult to deliver and implant drug-eluting stents(DES)properly.Poor stent deployment is associated with high rates of periprocedural complications and suboptimal long-term clinical outcomes.[1]Thanks to the introduction of several adjunctive PCI tools,like cutting and scoring balloons,and to the novel intravascular lithotripsy technology,the treatment of such lesions has become increasingly feasible,predictable and safe.展开更多
Using the technique of integral within an ordered product (IWOP) of operators we show that the wavelet transform can be recasted to a matrix element of squeezing-displacing operator between the mother wavelet state ve...Using the technique of integral within an ordered product (IWOP) of operators we show that the wavelet transform can be recasted to a matrix element of squeezing-displacing operator between the mother wavelet state vector and the state vector to be transformed in the context of quantum mechanics. In this way many quantum optical states'wavelet transform can be easily derived.展开更多
The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult...The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The rst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1”,it inserts the kashida but does not insert the kashida if the bit is“0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes.展开更多
The present report should summarize our experience using minimally invasive techniques in acoustic neurinoma surgery at the Neurosurgical Department, University of Vienna, Austria. Based on the experience of about 687...The present report should summarize our experience using minimally invasive techniques in acoustic neurinoma surgery at the Neurosurgical Department, University of Vienna, Austria. Based on the experience of about 687 cases in a 20 year time period our mostly used techniques will be presented. This is a minimal invasive individual adapted approach, specified intraoperative strategy and dissection techniques (e.g. water jet dissection, ultrasonic aspirator CUSA), the use of neuronavigational systems and the use of endoscope assisted surgery. With respect to the limited space of place precise citations to further textbooks of the authors handling with this topic will be given. Finally our results using these techniques are presented and further future perspectives in the treatment of these pathology (radiosurgery) will be discussed.展开更多
A ship is operated under an extremely complex environment, and waves and winds are assumed to be the stochastic excitations. Moreover, the propeller, host and mechanical equipment can also induce the harmonic response...A ship is operated under an extremely complex environment, and waves and winds are assumed to be the stochastic excitations. Moreover, the propeller, host and mechanical equipment can also induce the harmonic responses. In order to reduce structural vibration, it is important to obtain the modal parameters information of a ship. However, the traditional modal parameter identification methods are not suitable since the excitation information is difficult to obtain. Natural excitation technique-eigensystem realization algorithm (NExT-ERA) is an operational modal identification method which abstracts modal parameters only from the response signals, and it is based on the assumption that the input to the structure is pure white noise. Hence, it is necessary to study the influence of harmonic excitations while applying the NExT-ERA method to a ship structure. The results of this research paper indicate the practical experiences under ambient excitation, ship model experiments were successfully done in the modal parameters identification only when the harmonic frequencies were not too close to the modal frequencies.展开更多
The Domain Decomposition Method(DDM) is a powerful approach to solving maily types of PDE's. DDM is especially suitable for massively Parallel computers. In the past, most research on DDM has focused on the domain...The Domain Decomposition Method(DDM) is a powerful approach to solving maily types of PDE's. DDM is especially suitable for massively Parallel computers. In the past, most research on DDM has focused on the domain splitting technique. In this paper. we focus our attention on use of a combination of techniques to solve each subproblem. The central question with DDM is that of how to doal with the pseodoboundary conditions. Here, we introduce a set of operators which act on the pseudo-boundaries in the solution process, referring to this new. procedure as the 'Generalized Domain Decomposition A.Jlethod(GDDM).' We have already obtained convergence factors for GDDM with certain classes of PDE's. These ctonvergence factors show that we can derive exact solutions of the whole problem for certain types of PDE's, and can get superior speed of convergence for other types.展开更多
Objective:To develop and apply a novel surgical aseptic technique curriculum in specialty training for operating room(OR)nurses.Methods:As surgical environments were improved,related specifications were revised.The pr...Objective:To develop and apply a novel surgical aseptic technique curriculum in specialty training for operating room(OR)nurses.Methods:As surgical environments were improved,related specifications were revised.The proposed surgical aseptic procedure was discussed,improved,and recorded as procedure videos.In the new training program,traditional theoretical lecture training was replaced with sequential theoretical lessons and video demonstration,operation presentation,and skill competition.At the end of the training,the trainees were given questionnaires to assess training outcomes.Differences in student satisfaction regarding the proposed training program and conventional training programs were then compared.Results:A GPA of 3.61±0.58 was recorded after the new training program was implemented.The minimum and maximum average scores of each item were 3.05±0.43 and 4.61±0.33,respectively The satisfaction rate of the trainees in 2013 was significantly higher than that in 2011(t=2.14,P=0.039).Conclusion:Novel surgical aseptic technique and application in the curriculum design of training for OR nurses should be developed to enhance their mastery of theoretical and practical skills and to modify their behaviors.展开更多
基金funded by the National Natural Science Foundation of China(Grant No.41941019)the State Key Laboratory of Hydroscience and Engineering(Grant No.2019-KY-03)。
文摘Real-time prediction of the rock mass class in front of the tunnel face is essential for the adaptive adjustment of tunnel boring machines(TBMs).During the TBM tunnelling process,a large number of operation data are generated,reflecting the interaction between the TBM system and surrounding rock,and these data can be used to evaluate the rock mass quality.This study proposed a stacking ensemble classifier for the real-time prediction of the rock mass classification using TBM operation data.Based on the Songhua River water conveyance project,a total of 7538 TBM tunnelling cycles and the corresponding rock mass classes are obtained after data preprocessing.Then,through the tree-based feature selection method,10 key TBM operation parameters are selected,and the mean values of the 10 selected features in the stable phase after removing outliers are calculated as the inputs of classifiers.The preprocessed data are randomly divided into the training set(90%)and test set(10%)using simple random sampling.Besides stacking ensemble classifier,seven individual classifiers are established as the comparison.These classifiers include support vector machine(SVM),k-nearest neighbors(KNN),random forest(RF),gradient boosting decision tree(GBDT),decision tree(DT),logistic regression(LR)and multilayer perceptron(MLP),where the hyper-parameters of each classifier are optimised using the grid search method.The prediction results show that the stacking ensemble classifier has a better performance than individual classifiers,and it shows a more powerful learning and generalisation ability for small and imbalanced samples.Additionally,a relative balance training set is obtained by the synthetic minority oversampling technique(SMOTE),and the influence of sample imbalance on the prediction performance is discussed.
文摘In this paper we investigate the Gazeau–Klauder coherent states using a newly introduced diagonal ordering operation technique, in order to examine some of the properties of these coherent states. The results coincide with those obtained from other purely algebraic methods, but the calculations are greatly simplified. We apply the general theory to two cases of Gazeau–Klauder coherent states: pseudoharmonic as well as the Morse oscillators.
基金financial support from the National Natural Science Foundation of China(Nos.62104017 and 52072204)Beijing Institute of Technology Research Fund Program for Young Scholars.
文摘Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to exploring biomimetic mechanisms of plasticity simulation in the last few years.Recent progress in various plasticity modulation techniques has pushed the research of synaptic electronics from static plasticity simulation to dynamic plasticity modulation,improving the accuracy of neuromorphic computing and providing strategies for implementing neuromorphic sensing functions.Herein,several fascinating strategies for synap-tic plasticity modulation through chemical techniques,device structure design,and physical signal sensing are reviewed.For chemical techniques,the underly-ing mechanisms for the modification of functional materials were clarified and its effect on the expression of synaptic plasticity was also highlighted.Based on device structure design,the reconfigurable operation of neuromorphic devices was well demonstrated to achieve programmable neuromorphic functions.Besides,integrating the sensory units with neuromorphic processing circuits paved a new way to achieve human-like intelligent perception under the modulation of physical signals such as light,strain,and temperature.Finally,considering that the relevant technology is still in the basic exploration stage,some prospects or development suggestions are put forward to promote the development of neuromorphic devices.
基金The project supported by National Natural Science Foundation of China under Grant No.10475056
文摘We introduce the quantum Hadamard operator in continuum state vector space and find that it can be decomposed into a single-mode squeezing operator and a position-momentum mutual transform operator. The two-mode Hadamard operator in bipartite entangled state representation is also introduced, which involves the two-mode squeezing operator and [η〉 ←→|ξ〉 mutual transformation operator, where [η〉 and |ξ〉 are mutual conjugate entangled states. All the discussions are proceeded by virtue of the IWOP technique.
基金Supported by the National Natural Science Foundation of China under Grant No.10475056the Research Foundation of the Education Department of Jiangxi Province
文摘Based on the technique of integration within an ordered product of operators, the Weyl ordering operator formula is derived and the Fresnel operators' Weyl ordering is also obtained, which together with the Weyl transformation can immediately lead to Eresnel transformation kernel in classical optics.
基金Supported by the National Natural Science Foundation of China under Grant Nos. 10775097 and 10874174
文摘Using the technique of integration within an antinormally ordered product of operators we present a convenient approach for deriving some new operator identities in quantum optics theory. Based on P-representation we also derive a new formula for evaluating photocount distribution.
基金The project supported by National Natural Science Foundation of China under Grant No. 10475056
文摘Using the coherent state representation we derive some new operator identities and study some mathematical relations in comblnatorics. The technique of integral within an ordered product (IWOP) of operators plays an essential role in realizing our goal.
文摘BACKGROUND : Experimental animal models of intracerebral hemorrhag (ICH) are greatly needed, so the process of establishment should be ideal in hematoma formation and easy to operate. OBJECTIVE : To construct model of ICH in rats with double injection of autologous blood taken from the cut tail cut and double withdrawal of the needle (shortened as two-step injection model), and compare with those induced by single and double injections. DESIGN : A randomized controlled tria SETTING: Department of Neurology, General Hospital of Military Area Command of Chinese PLA. MATERIALS: Thirty male Wistar rats of 10 to 12 months, weighing (400±25) g, provided by the Experimental Center of Medical Animals, General Hospital of Shenyang Military Area Command of Chinese PLA, were divided randomly into 3 groups with 10 rats in each group: two-step injection group, single injection group, double injection group. METHODS : The experiment was carried out in the Department of Neurology, General Hospital of Military Area Command of Chinese PLA from March to June in 2004. Autologous blood ICH model in rats were established as follows: In the two-step injection group, 50 μL unclotted autologous blood was taken from the rat tail cut, then injected with microsyringe into the caudate nucleus, 10 μL injected at first, paused for 2 minutes, and then the rest 40 μL injected slowly and continuously within 2 minutes. After the injection, the needle was kept immovable for about 4 minutes, withdrawn 2.0 mm, again kept immovable for about 4 minute, and then removed wholly at a slow speed. In the single injection group, 50 μL unclotted tail blood was injected slowly and continuously all within 2 minutes and the needle was slowly removed;(4) In the double injection group, 10 mL blood was injected at first, paused for 2 minutes, the rest 40 μL injected evenly within 2 minutes, and then the needle was withdrawn slowly and uninterruptedly. Neurologic findings were scored in accordance with Longa's five-point scale (0-4 scores, the higher the score, the severer the neurological dysfunction). The rats were killed to remove and sections were prepared, the morphological features of hematomas were grossly observed, the maximal diameter and size of hematomas in each slice were measured with the imaging analytical system, and the volume was calculated. Meanwhile, the conveniences of the techniques were compared. MAIN OUTCOME MEASURES: The morphological features and volume of hematomas, neurologic deficit score (NDS), and the convenience of the techniques were compared. RESULTS: All the 30 rats were involved in the analysis of results without deletion. (1) Results of the morphological observation of volume of hematoma: In the two-step injection group, hematomas located in the right caudate nucleus area regularly in circular or analogously circular shape in each slice. The formation rate of hematomas in the single injection group and double injection group were lower than those in the two-step injection group [60% (6/10), 80% (8/10), 100% (10/10), P〈 0.01, 0.05]. The volume of hematomas in the single injection group and double injection group were smaller than those in the two-step injection group [(28.5±14.8), (33.4±7.4), (41.6±3.9) mm3, P〈 0.01, 0.05]. (2) NDS results: The NDS scores in the single injection group and double injection group were smaller than that in the two-step injection group (0.90±0.83, 1.30±0.78, 1.90±0.57, P〈 0.05). (3)Comparison of the convenience of the techniques: The double injection method allowed generating reproducible hematomas in rats with shortcomings that it needed autologous arterial blood from femoral artery, and precision instruments such as microinfusion pump. The two-step injection injected fresh unclotting blood taken directly from the tail cut with microsyringe into the rat brain, and it has the advantages of easy operation, no influence on the activity of thrombase, shorter duration for model establishment, and higher rate of hematoma formation, which could generate ideal and economical models of ICH. The two-step injection induced hemotoma regularly in circular or analogously circular shape in each slice, but those induced by single and double injections were mostly in strip or fusiform shapes and extending along the needle tracks or into the ventricle or subarachnoid space. CONCLUSION : The autologous blood ICH model induced by the two-step injection method is a reproducible and reliable one in regular shape, which is better than those induced by double and single injections.
基金Supported by the National Natural Science Foundation of China (10571144,10771174)Program for New Centery Excellent Talents in Xiamen University
文摘By using the Chern-Finsler connection and complex Finsler metric, the Bochner technique on strong K/ihler-Finsler manifolds is studied. For a strong K/ihler-Finsler manifold M, the authors first prove that there exists a system of local coordinate which is normalized at a point v ∈M = T1.0M/o(M), and then the horizontal Laplace operator NH for differential forms on PTM is defined by the horizontal part of the Chern-Finsler connection and its curvature tensor, and the horizontal Laplace operator H on holomorphic vector bundle over PTM is also defined. Finally, we get a Bochner vanishing theorem for differential forms on PTM. Moreover, the Bochner vanishing theorem on a holomorphic line bundle over PTM is also obtained
基金Project BK2008128 supported by the Natural Science Foundation of Jiangsu Province
文摘Concrete structures in main coal cleaning plants have been rebuilt and reinforced in the coal mines of the Shanghai Datun Energy Sources Co. Ltd., the first colliery of the Pingdingshan Coal Co. Ltd. and the Sanhejian mine of the Xuzhou Mining Group Co. Ltd. In these projects, the operating environment and reliability of concrete structures in the main plants of the three companies were investigated and the safety of the structures inspected. Qualitative and quantitative analyses were made on the special natural, technological and mechanical environments around the structures. On the basis of these analyses, we discuss the long-term, combined actions of the harsh natural (corrosive gases, liquids and solids) and mechanical environments on concrete structures and further investigated the damage and deteriorating mechanisms and curing techniques of concrete structures in the main coal cleaning plants. Our study can provide a theoretical basis for ensuring the reliability of concrete structures in main coal cleaning plants.
基金Project supported by the National Natural Science Foundation of China(Grant No.11775208)the Foundation for Young Talents at the College of Anhui Province,China(Grant Nos.gxyq2021210 and gxyq2019077)the Natural Science Foundation of the Anhui Higher Education Institutions of China(Grant Nos.KJ2020A0638 and 2022AH051586)。
文摘In our previous papers,the classical fractional Fourier transform theory was incorporated into the quantum theoretical system using the theoretical method of quantum optics,and the calculation produced quantum mechanical operators corresponding to the generation of fractional Fourier transform.The core function of the coordinate-momentum exchange operators in the addition law of fractional Fourier transform was analyzed too.In this paper,the bivariate operator Hermite polynomial theory and the technique of integration within an ordered product of operators(IWOP)are used to establish the entanglement fractional Fourier transform theory to the extent of quantum.A new function generating formula and an operator for generating quantum entangled fractional Fourier transform are obtained using the fractional Fourier transform relationship in a pair of conjugated entangled state representations.
基金supported by the National Natural Science Foundation of China(72071111,71801127,71671091)the NSFC and the UK Royal Society joint project(71811530338)+2 种基金the Special Postdoctoral Fund of China(2019TQ0150)the Fundamental Research Funds for the Central Universities of China(NC2019003)the Intelligence Introduction Base of the Ministry of Science and Technology(G20190010178)。
文摘Effectiveness evaluation of the joint operation system is an important basis for the demonstration and development of weapon equipment.With the consideration that existing models of system effectiveness evaluation seldom describe the structural relationship among equipment clearly as well as reflect the dynamic,the analog-to-digital converter-graphical evaluation and review technique(ADC-GERT)network parameter estimation model is proposed based on the ADC model and the joint operation system structure.Firstly,analysis of the joint operation system structure and operation process is conducted to build the GERT network,where equipment subsystems are nodes and activities are directed arches.Then the mission effectiveness of equipment subsystems is calculated by the ADC model.The probability transfer parameters are modified by the mission effectiveness of equipment subsystems based on the Bayesian theorem,with the ADC-GERT network parameter estimation model constructed.Finally,a case study is used to validate the efficiency and dynamic of the ADC-GERT network parameter estimation model.
文摘Heavily calcified coronary lesions continue to represent a challenge for percutaneous coronary intervention(PCI),as they are difficult to dilate,and it is difficult to deliver and implant drug-eluting stents(DES)properly.Poor stent deployment is associated with high rates of periprocedural complications and suboptimal long-term clinical outcomes.[1]Thanks to the introduction of several adjunctive PCI tools,like cutting and scoring balloons,and to the novel intravascular lithotripsy technology,the treatment of such lesions has become increasingly feasible,predictable and safe.
文摘Using the technique of integral within an ordered product (IWOP) of operators we show that the wavelet transform can be recasted to a matrix element of squeezing-displacing operator between the mother wavelet state vector and the state vector to be transformed in the context of quantum mechanics. In this way many quantum optical states'wavelet transform can be easily derived.
基金funded by MOHE(FRGS:R.K130000.7856.5F026),Received by Nilam Nur Amir Sjarif.
文摘The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The rst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1”,it inserts the kashida but does not insert the kashida if the bit is“0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes.
文摘The present report should summarize our experience using minimally invasive techniques in acoustic neurinoma surgery at the Neurosurgical Department, University of Vienna, Austria. Based on the experience of about 687 cases in a 20 year time period our mostly used techniques will be presented. This is a minimal invasive individual adapted approach, specified intraoperative strategy and dissection techniques (e.g. water jet dissection, ultrasonic aspirator CUSA), the use of neuronavigational systems and the use of endoscope assisted surgery. With respect to the limited space of place precise citations to further textbooks of the authors handling with this topic will be given. Finally our results using these techniques are presented and further future perspectives in the treatment of these pathology (radiosurgery) will be discussed.
基金Supported by the National Natural Science Foundation of China(51079027)
文摘A ship is operated under an extremely complex environment, and waves and winds are assumed to be the stochastic excitations. Moreover, the propeller, host and mechanical equipment can also induce the harmonic responses. In order to reduce structural vibration, it is important to obtain the modal parameters information of a ship. However, the traditional modal parameter identification methods are not suitable since the excitation information is difficult to obtain. Natural excitation technique-eigensystem realization algorithm (NExT-ERA) is an operational modal identification method which abstracts modal parameters only from the response signals, and it is based on the assumption that the input to the structure is pure white noise. Hence, it is necessary to study the influence of harmonic excitations while applying the NExT-ERA method to a ship structure. The results of this research paper indicate the practical experiences under ambient excitation, ship model experiments were successfully done in the modal parameters identification only when the harmonic frequencies were not too close to the modal frequencies.
文摘The Domain Decomposition Method(DDM) is a powerful approach to solving maily types of PDE's. DDM is especially suitable for massively Parallel computers. In the past, most research on DDM has focused on the domain splitting technique. In this paper. we focus our attention on use of a combination of techniques to solve each subproblem. The central question with DDM is that of how to doal with the pseodoboundary conditions. Here, we introduce a set of operators which act on the pseudo-boundaries in the solution process, referring to this new. procedure as the 'Generalized Domain Decomposition A.Jlethod(GDDM).' We have already obtained convergence factors for GDDM with certain classes of PDE's. These ctonvergence factors show that we can derive exact solutions of the whole problem for certain types of PDE's, and can get superior speed of convergence for other types.
文摘Objective:To develop and apply a novel surgical aseptic technique curriculum in specialty training for operating room(OR)nurses.Methods:As surgical environments were improved,related specifications were revised.The proposed surgical aseptic procedure was discussed,improved,and recorded as procedure videos.In the new training program,traditional theoretical lecture training was replaced with sequential theoretical lessons and video demonstration,operation presentation,and skill competition.At the end of the training,the trainees were given questionnaires to assess training outcomes.Differences in student satisfaction regarding the proposed training program and conventional training programs were then compared.Results:A GPA of 3.61±0.58 was recorded after the new training program was implemented.The minimum and maximum average scores of each item were 3.05±0.43 and 4.61±0.33,respectively The satisfaction rate of the trainees in 2013 was significantly higher than that in 2011(t=2.14,P=0.039).Conclusion:Novel surgical aseptic technique and application in the curriculum design of training for OR nurses should be developed to enhance their mastery of theoretical and practical skills and to modify their behaviors.