期刊文献+
共找到1,105篇文章
< 1 2 56 >
每页显示 20 50 100
Application of a jigsaw puzzle flap based on free-style perforator to repair large scalp defects after tumor resection:A case series
1
作者 Daojiang Yu Jing Wang +6 位作者 Lei Chen Lu An Yahui Feng Sheng Jiang Shuyu Zhang Xiaoming Chen Guozhong Lv 《Chinese Journal Of Plastic and Reconstructive Surgery》 2023年第3期109-114,共6页
Background:Reconstruction of large scalp defects after tumor resection is common and challenging.Free skin grafting or free flap transfer is always performed.However,these techniques can result in poor functional and ... Background:Reconstruction of large scalp defects after tumor resection is common and challenging.Free skin grafting or free flap transfer is always performed.However,these techniques can result in poor functional and cosmetic outcomes.Methods:In the Second Affiliated Hospital of Soochow University and the Second Affiliated Hospital of Chengdu Medical College,35 patients underwent jigsaw puzzle flap procedures based on a free-style perforator to repair large scalp defects after tumor resection from May 2013 to November 2022.The key to this procedure was to divide a large defect into several smaller parts that correspond to adjacent free-style perforators around the scalp defect.The free-style perforator flaps were designed in different ways,such as propeller flaps,rotation flaps,and V-Y advancement flaps,which were pedicled with free-style perforators.All of the small flaps were then mobilized to the defect and sutured to each other to create a new,large jigsaw puzzle-like flap to cover the large scalp defect.Finally,all the donor sites were closed directly.Results:Overall,35 patients were treated.The average defect size was 72 cm^(2)(range,25-91 cm^(2)).All flaps had a satisfactory appearance after follow-up periods of 6 months-10 years.Local tumor recurrence occurred in one case.Conclusion:The application of a jigsaw puzzle flap based on a free-style perforator is a suitable option for the reconstruction of large scalp defects after resection,yielding satisfactory functional and cosmetic results. 展开更多
关键词 Scalp defect Free-style perforator Jigsaw puzzle flap
下载PDF
Resolving the“Matteo Ricci Puzzle”:Top-Level Design of the Grand Canal of China Based on the Ternary Leadership Theory
2
作者 LI Jing TIAN Dexin 《Journalism and Mass Communication》 2023年第1期1-16,共16页
Guided by the ternary leadership theory from the perspective of social psychology,this paper explores the impacts of authoritarian,benevolent,and moral leadership on the top design of the Grand Canal of China in terms... Guided by the ternary leadership theory from the perspective of social psychology,this paper explores the impacts of authoritarian,benevolent,and moral leadership on the top design of the Grand Canal of China in terms of its water management practice,while providing reference for resolving the“Matteo Ricci Puzzle”.The research findings are threefold:first,authoritarian as it is,the central government of China formulates relevant laws and regulations to provide legal system insurance for the construction of the Grand Canal Cultural Belt,thus providing the blueprint for constructing the“bright cultural belt,green ecological belt and colorful tourism belt of the Grand Canal”.Second,led by the Central Government,sticking to benevolent and moral leadership,China advocates scientific water management concepts and methods,and gives long-term and comprehensive care to the well-being of the people along the banks of the Grand Canal.Finally,the top-level design of the Grand Canal of China is based on the ternary leadership theory rooted in social psychology and has formulated a set of properly-scheduled,reasonably-coordinated,and flexibly-operated management system for the fundamental interests of the people and long-term goals of the country. 展开更多
关键词 social psychology ternary leadership theory top design management of the Grand Canal of China Matteo Ricci’s puzzle
下载PDF
Client Puzzle协议在防御资源耗尽型DoS攻击中的应用 被引量:2
3
作者 邱科宁 郭清顺 张小波 《计算机工程与应用》 CSCD 北大核心 2005年第35期114-117,共4页
文章在研究现有的被动式Client Puzzle协议(CPP)对防御资源耗尽型DoS攻击的基础上,结合分类服务的基本思想,在应用层提出了一个基于主动式CPP协议的HTTP请求分类服务系统模型(CPPWQ)。在对模型的分析和设计基础上,给出了它的一个实现原... 文章在研究现有的被动式Client Puzzle协议(CPP)对防御资源耗尽型DoS攻击的基础上,结合分类服务的基本思想,在应用层提出了一个基于主动式CPP协议的HTTP请求分类服务系统模型(CPPWQ)。在对模型的分析和设计基础上,给出了它的一个实现原型,并在局域网条件下对原型系统的性能进行了测试和分析,验证了模型在防御资源耗尽型DoS攻击中的应用效果。 展开更多
关键词 CLIENT puzzle协议 资源耗尽型DoS攻击 分类服务
下载PDF
基于量子衍生算法的8-puzzle问题分析 被引量:1
4
作者 许精明 阮越 《量子电子学报》 CAS CSCD 北大核心 2015年第4期459-465,共7页
阐述了量子编码形式的多样性,概述了8-puzzle启发式搜索问题的量子衍生算法与计算策略。通过设置扩展深度界限,运用量子计数器和酉变换操作进行8-puzzle问题的量子计算,比较了量子衍生算法与经典算法,对启发式智能搜索在量子计算机上的... 阐述了量子编码形式的多样性,概述了8-puzzle启发式搜索问题的量子衍生算法与计算策略。通过设置扩展深度界限,运用量子计数器和酉变换操作进行8-puzzle问题的量子计算,比较了量子衍生算法与经典算法,对启发式智能搜索在量子计算机上的实现方式作了进一步的讨论。 展开更多
关键词 量子信息 8-puzzle 量子衍生算法 启发函数 智能搜索
下载PDF
3-puzzle量子计算的酉变换矩阵及逻辑线路 被引量:1
5
作者 许精明 阮越 《量子电子学报》 CAS CSCD 北大核心 2016年第4期469-475,共7页
针对3-puzzle问题,运用量子计算方法分析了节点扩展的酉变换矩阵。对一个3-puzzle问题实例进行了元素编码和节点状态编码,描述了具体的节点扩展酉变换矩阵,并运用量子受控非门逻辑线路实现了酉变换矩阵。讨论了N-puzzle量子计算的线路模... 针对3-puzzle问题,运用量子计算方法分析了节点扩展的酉变换矩阵。对一个3-puzzle问题实例进行了元素编码和节点状态编码,描述了具体的节点扩展酉变换矩阵,并运用量子受控非门逻辑线路实现了酉变换矩阵。讨论了N-puzzle量子计算的线路模型,对量子位的基态和最佳基态的制备作了分析,阐述了N-puzzle启发式搜索量子计算框架。 展开更多
关键词 量子信息 N-puzzle 受控非门 酉变换矩阵 量子计算 启发式搜索
下载PDF
基于AJAX的Client Puzzle协议框架的研究与实现
6
作者 邱科宁 《计算机系统应用》 2007年第10期27-30,共4页
本文在研究了基于主动式Client Puzzle协议的HTTP请求分类服务系统模型(CPPWQ)的基础上,结合AJAX技术,实现了一个改进的ACPP模型。在对该模型的分析和设计基础上,本文给出了它的一个实现原型,并与原有模型做比较。
关键词 AJAX CLIENT puzzle 协议 请求分类服务系统模型
下载PDF
在AutoCAD中编程实现Sudoku puzzle的求解及生成 被引量:1
7
作者 张宗科 《电脑编程技巧与维护》 2008年第17期16-18,21,共4页
"数独"游戏目前颇为流行,日常见诸于各类报纸之端。其游戏规则较为简单,有利于计算机编程加以处理。本文利用AutoCAD附带的二次开发工具AutoLISP语言,编制了求解及生成数独谜题的程序,并用实例验证了程序的有效性。本文程序借... "数独"游戏目前颇为流行,日常见诸于各类报纸之端。其游戏规则较为简单,有利于计算机编程加以处理。本文利用AutoCAD附带的二次开发工具AutoLISP语言,编制了求解及生成数独谜题的程序,并用实例验证了程序的有效性。本文程序借助AutoCAD强大的界面功能,所编制的程序具有较好的用户交互性能。 展开更多
关键词 数独谜题 AUTOLISP 二次开发
下载PDF
基于Puzzle的DHCP安全机制研究与实现
8
作者 何智勇 《南京工业职业技术学院学报》 2017年第1期9-11,23,共4页
在深入研究DHCP协议的基础上,针对动态主机配置协议DHCP本身缺乏安全控制机制所导致的服务器端受Do S攻击时存在计算开销和存储开销过大等问题,提出了基于Puzzle的DHCP安全机制,通过Puzzle机制的谜题认证,利用资源平衡机制,对Puzzle难... 在深入研究DHCP协议的基础上,针对动态主机配置协议DHCP本身缺乏安全控制机制所导致的服务器端受Do S攻击时存在计算开销和存储开销过大等问题,提出了基于Puzzle的DHCP安全机制,通过Puzzle机制的谜题认证,利用资源平衡机制,对Puzzle难度系数动态调整,从而达到保护DHCP服务器的目的,并在Linux平台下实现和分析了改进的DHCP安全机制。 展开更多
关键词 DHCP协议 安全机制 谜题认证
下载PDF
用计算机解决8 puzzle problem
9
作者 王兴宇 《江西化工》 2004年第4期196-198,共3页
本文介绍的是在计算机的发展过程中 ,利用不同的方法对同一个问题的解决。首先是在传统的图灵机模型下通过建立完整的求解模型后再通过程序运算完成问题的求解 ;
关键词 计算机 图灵机模型 智能推理 链表 (8 puzzle problem)
下载PDF
Client Puzzle协议综述
10
作者 邱科宁 《计算机安全》 2006年第5期19-22,共4页
该文首先综述了现有的被动式 CPP 协议的理论和在防御资源耗尽型 Dos 攻击中的应用,在此基础上,结合分类服务的基本思想,在应用层提出了一个防御资源耗尽型 DoS 攻击的基于主动式 CPP 协议的 HTTP 请求分类服务系统模型(CPPWQ)。
关键词 CLIENT puzzle协议 资源耗尽型DoS攻击 分类服务
下载PDF
等权Hanoi puzzle解的充分必要条件
11
作者 祁燕申 李葆频 《沈阳建筑工程学院学报》 1993年第4期412-415,共4页
提出等权 Hanoi Puzzle 的基本概念,并且推导出 Hanoi Puzzle 解的充分必要条件。
关键词 幻方 组合数学 充要条件
下载PDF
基于Client Puzzle的公有链接入控制模型 被引量:4
12
作者 巫岱玥 李强 +1 位作者 余祥 黄海军 《计算机科学》 CSCD 北大核心 2019年第4期129-136,共8页
公有链无集中控制节点、去中心化和允许任意节点加入的特点使其拥有高效、低成本和高数据安全性的优势,但由于其允许任意节点接入,因此将增加公有链网络的脆弱性。基于Client Puzzle,提出一种节点接入控制模型CPACM(Client Puzzle based... 公有链无集中控制节点、去中心化和允许任意节点加入的特点使其拥有高效、低成本和高数据安全性的优势,但由于其允许任意节点接入,因此将增加公有链网络的脆弱性。基于Client Puzzle,提出一种节点接入控制模型CPACM(Client Puzzle based Access Control Model),使新节点接入公有链前利用算力进行工作量证明,完成工作量证明后才可接入公有链。该模型在维持公有链去中心化的同时,增加了接入控制。实验证明,该模型在不影响诚实节点加入的情况下,能以较高成功率限制低诚意节点和低算力节点的加入,并且能防止节点间的伙同,防范了恶意行为,提高了公有链网络的安全性。 展开更多
关键词 公有链 区块链 接入控制 计算谜题 工作量证明
下载PDF
Commentary on“Solving the benign prostatic hyperplasia puzzle” 被引量:2
13
作者 Dominique Thomas Bilal Chughtai Steven Kaplan 《Asian Journal of Urology》 2018年第1期10-11,共2页
Benign prostatic hyperplasia(BPH)is a common condition affecting over 50% of men as they reach the 5th decade of their life[1].While over half of these patients have symptoms,it is not clear why some of these men do w... Benign prostatic hyperplasia(BPH)is a common condition affecting over 50% of men as they reach the 5th decade of their life[1].While over half of these patients have symptoms,it is not clear why some of these men do while others do not.The article Solving the benign prostatic hyperplasia puzzle by Keong Tatt Foo[2],delves into the different conundrums urologists face when trying to treat their patients. 展开更多
关键词 ving WHILE puzzle
下载PDF
The puzzle of the missing meat: Food away from home and China's meat statistics 被引量:3
14
作者 XIAO Hong-bo CHEN Qiong +2 位作者 WANG Ji-min Les Oxley MA Heng-yun 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2015年第6期1033-1044,共12页
From 1985, an increasing gap has emerged between the official statistical measures of meat production and meat consumption in China, which has raised concerns from many researchers using such data. In this paper we re... From 1985, an increasing gap has emerged between the official statistical measures of meat production and meat consumption in China, which has raised concerns from many researchers using such data. In this paper we report the results of 428 observations(survey of 107 urban and rural households×4 quarters) from 7 provinces conducted in 2010, and compare them with the official statistical data from the National Bureau of Statistics of China(NBSC). We conclude that the main reason for the discrepancy is due to the underreporting of consumption, which is due mainly to the omission of consumption away from home. 展开更多
关键词 consumed quarters capita official household income missing puzzle Bureau raised
下载PDF
Coverless Image Steganography Based on Jigsaw Puzzle Image Generation 被引量:2
15
作者 Al Hussien Seddik Saad M.S.Mohamed E.H.Hafez 《Computers, Materials & Continua》 SCIE EI 2021年第5期2077-2091,共15页
Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego image.However,the left traces that are caused by these ... Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels,creating the stego image.However,the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload.A coverless data hiding concept is proposed to solve this issue.Coverless does not mean that cover is not required,or the payload can be transmitted without a cover.Instead,the payload is embedded by cover generation or a secret message mapping between the cover file and the payload.In this paper,a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret message.Firstly,the image is divided into equal rows then further divided into equal columns,creating blocks(i.e.,sub-images).Then,according to secret message bits and a proposed mapping function,each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle stego-image.After that,the generated jigsaw puzzle image is sent to the receiver.Experimental results and analysis show a good performance in the hiding capacity,security,and robustness compared with existing coverless image steganography methods. 展开更多
关键词 Coverless information hiding Jigsaw puzzle image image steganography data hiding
下载PDF
Facial microcystic adnexal carcinoma-treatment with a “jigsaw puzzle” advancement flap and immediate esthetic reconstruction: A case report 被引量:3
16
作者 Yi-Ding Xiao Ming-Zi Zhang Ang Zeng 《World Journal of Clinical Cases》 SCIE 2021年第3期607-613,共7页
BACKGROUND Microcystic adnexal carcinoma(MAC)is a rare malignant tumor of the skin that is commonly found on the face.It grows slowly and has a low mortality rate.However,for various reasons,including strong histologi... BACKGROUND Microcystic adnexal carcinoma(MAC)is a rare malignant tumor of the skin that is commonly found on the face.It grows slowly and has a low mortality rate.However,for various reasons,including strong histological invasiveness,clinical inexperience and inadequate procedure design,immediate or permanent facial deformity may occur after surgical operations.CASE SUMMARY This article describes a middle-aged female artist who was diagnosed with MAC on the left upper lip.She declined the recommended treatment plan,which included two-stage reconstruction,skin grafting,or surgery that could have resulted in obvious facial dysfunction or esthetic deformity.We accurately designed a personalized procedure involving a“jigsaw puzzle advancement flap”for the patient based on the lesion location and the estimated area of skin loss.The procedure was successful;both pathological R0 resection and immediate and long-term esthetic reconstruction effects were achieved.CONCLUSION This study suggests that when treating facial MAC or other skin malignancies,a surgical team should have sufficient plastic surgery-related knowledge and skills.An optimal surgical plan for an individual is needed to achieve good facial esthetics and functional recovery and shorten the treatment course. 展开更多
关键词 Microcystic adnexal carcinoma Esthetic reconstruction Jigsaw puzzle advancement flap Plastic surgery RECONSTRUCTION ESTHETICS Case report
下载PDF
Rotate-N-Puzzle问题可解性分析及求解
17
作者 陈云川 徐峥 罗克露 《计算机工程与应用》 CSCD 北大核心 2010年第15期37-40,108,共5页
Rotate-N-Puzzle问题与N-Puzzle问题类似,问题空间也具有组合爆炸性质。经证明,Rotate-N-Puzzle的任何一个初始布局都是可解的。在此结论的基础上,给出了解长度的上界。提出了一种分治算法,在算法中的每一步,采用贪心策略求解问题。实... Rotate-N-Puzzle问题与N-Puzzle问题类似,问题空间也具有组合爆炸性质。经证明,Rotate-N-Puzzle的任何一个初始布局都是可解的。在此结论的基础上,给出了解长度的上界。提出了一种分治算法,在算法中的每一步,采用贪心策略求解问题。实验结果表明,该算法能够在多项式时间内快速求解规模很大的Rotate-N-Puzzle问题。 展开更多
关键词 搜索算法 Rotate-N-puzzle 可解性 解上界 分治算法 贪心策略
下载PDF
第二类广义Hanoi Puzzle图论解法
18
作者 金荣福 霍金荣 李葆频 《沈阳建筑工程学院学报》 1989年第3期73-77,共5页
本文由两部分组成:前部分讨论具有4个数据库不等长字在数据库中最优移动方案的理论问题;后部分给出第二类广义Hano Puzzle的一个系统实现方法.
关键词 数据库 Hanoi-puzzle 图论算法
下载PDF
第二类广义Hanoi Puzzle求解公式及其实现方法
19
作者 金荣福 刘玉柱 段文娟 《沈阳建筑工程学院学报》 1993年第2期208-217,共10页
在文献[3]的基础上,论证了它们的求解公式,并且给出了它的实现方法——分组移法.
关键词 Hanoi问题 解析解 数据库
下载PDF
Hanoi Puzzle解的唯一性及其实现方法
20
作者 金荣福 刘玉柱 祁燕申 《沈阳建筑工程学院学报》 1991年第1期112-115,共4页
先讨论Hanoi Puzzle的解存在唯一性,后给出Hanoi Puzzle的实现方法。此方法是处理具体Hanoi Puzzle的一种实现方法,能随时检查每个工作程序是否正确,从而正确解决Hanoi Puzzle的实现问题。
关键词 解析解 唯一性 数据库 流向表
下载PDF
上一页 1 2 56 下一页 到第
使用帮助 返回顶部