Based on the waterflooding development in carbonate reservoirs in the Middle East,in order to solve the problem of the poor development effects caused by commingled injection and production,taking the thick bioclastic...Based on the waterflooding development in carbonate reservoirs in the Middle East,in order to solve the problem of the poor development effects caused by commingled injection and production,taking the thick bioclastic limestone reservoirs of Cretaceous in Iran-Iraq as an example,this paper proposes a balanced waterflooding development technology for thick and complex carbonate reservoirs.This technology includes the fine division of development units by concealed baffles and barriers,the combination of multi well type and multi well pattern,and the construction of balanced water injection and recovery system.Thick carbonate reservoirs in Iran-Iraq are characterized by extremely vertical heterogeneity,development of multi-genesis ultra-high permeability zones,and highly concealed baffles and barriers.Based on the technologies of identification,characterization,and sealing evaluation for concealed baffles and barriers,the balanced waterflooding development technology is proposed,and three types of balanced waterflooding development modes/techniques are formed,namely,conventional stratigraphic framework,fine stratigraphic framework,and deepened stratigraphic framework.Numerical simulations show that this technology is able to realize a fine and efficient waterflooding development to recover,in a balanced manner,the reserves of thick and complex carbonate reservoirs in Iran and Iraq.The proposed technology provides a reference for the development optimization of similar reservoirs.展开更多
Medical history summary: Male, 47 years old, was admitted to the hospital due to “dizziness accompanied by chest tightness and pain for more than 8 days”. One week ago, the patient experienced chest tightness, chest...Medical history summary: Male, 47 years old, was admitted to the hospital due to “dizziness accompanied by chest tightness and pain for more than 8 days”. One week ago, the patient experienced chest tightness, chest pain accompanied by profuse sweating for 3 hours and underwent emergency percutaneous coronary intervention (PCI) at a local hospital. The procedure revealed left main stem occlusion with subsequent left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA). After the procedure, the patient experienced hemodynamic instability, recurrent ventricular fibrillation, and critical condition, thus transferred to our hospital for further treatment. Symptoms and signs: The patient is in a comatose state, unresponsive to stimuli, with bilateral dilated pupils measuring 2.0 mm, exhibiting reduced sensitivity to light reflex, and recurrent fever. Coarse breath sounds can be heard in both lungs, with audible moist rales. Irregular breathing pattern is observed, and heart sounds vary in intensity. No pathological murmurs are auscultated in any valve auscultation area. Diagnostic methods: Coronary angiography results at the local hospital showed complete occlusion of the left main stem, and left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA) was performed. However, the distal guidewire did not pass through. After admission, blood tests showed a Troponin T level of 1.44 ng/ml and a Myoglobin level of 312 ng/ml. The platelet count was 1390 × 10<sup>9</sup>/L. Von Willebrand factor (vWF) activity was measured at 201.9%. Bone marrow aspiration biopsy showed active bone marrow proliferation and platelet clustering. The peripheral blood smear also showed platelet clustering. JAK-2 gene testing was positive, confirming the diagnosis of primary thrombocytosis. Treatment methods: The patient is assisted with mechanical ventilation and intra-aortic balloon counterpulsation to improve coronary blood flow. Electrolyte levels are closely monitored, especially maintaining plasma potassium levels between 4.0 and 4.5 mmol/l. Hydroxyurea 500 mg is administered for platelet reduction. Anticoagulants and antiplatelet agents are used rationally to prevent further infarction or bleeding. Antiarrhythmic, lipid-lowering, gastroprotective, hepatoprotective, and heart failure treatment are also provided. Clinical outcome: The family members chose to withdraw treatment and signed for discharge due to a combination of reasons, including economic constraints and uncertainty about the prognosis due to the long disease course. Acute myocardial infarction has gradually become one of the leading causes of death in our country. As a “green channel” disease, corresponding diagnostic and treatment protocols have been established in China, and significant progress has been made in emergency care. There are strict regulations for the time taken from the catheterization lab to the cardiac intensive care unit, and standardized treatments are provided to patients once they enter the intensive care unit. Research results show that the incidence of acute myocardial infarction in patients with primary thrombocythemia within 10 years is 9.4%. This type of disease is rare and difficult to cure, posing significant challenges to medical and nursing professionals. In order to benefit future patients, we have documented individual cases of treatment and nursing care for these patients. The research results show that these patients exhibit resistance to traditional oral anticoagulant drugs and require alternative anticoagulants. Additionally, there are significant differences in serum and plasma potassium levels among patients. Therefore, when making clinical diagnoses, it is necessary to carefully distinguish between the two. Particularly, nursing personnel should possess dialectical thinking when supplementing potassium levels in patients in order to reduce the incidence of malignant arrhythmias and mortality rates.展开更多
The construction of modern livable cities faces challenges in karst areas,including ground collapse and engineering problems.Wuhan,with a population of 13.74×10^(6) and approximately 1161 km^(2)of soluble rocks i...The construction of modern livable cities faces challenges in karst areas,including ground collapse and engineering problems.Wuhan,with a population of 13.74×10^(6) and approximately 1161 km^(2)of soluble rocks in the urban area of 8569.15 km^(2),predominantly consists of concealed karst areas where occasional ground collapse events occur,posing significant threats to underground engineering projects.To address these challenges,a comprehensive geological survey was conducted in Wuhan,focusing on major karstrelated issues.Geophysical methods offer advantages over drilling in detecting concealed karst areas due to their efficiency,non-destructiveness,and flexibility.This paper reviewed the karst geological characteristics in Wuhan and the geophysical exploration methods for karst,selected eight effective geophysical methods for field experimentation,evaluated their suitability,and proposed method combinations for different karst scenarios.The results show that different geophysical methods have varying applicability for karst detection in Wuhan,and combining multiple methods enhances detection effectiveness.The specific recommendations for method combinations provided in this study serve as a valuable reference for karst detection in Wuhan.展开更多
The waterproof construction of subway tunnels is a crucial and challenging aspect of subway tunnel engineering.Mastering excellent waterproof construction technology is essential to ensure that the construction meets ...The waterproof construction of subway tunnels is a crucial and challenging aspect of subway tunnel engineering.Mastering excellent waterproof construction technology is essential to ensure that the construction meets design requirements and guarantees the safe operation of subway lines.This paper focuses on discussing waterproof construction technology for subway station tunnels.By analyzing the main methods and techniques of underground tunnel construction,as well as the key techniques and difficulties of waterproofing construction,this paper examines the waterproofing construction project of Guangzhou Metro Culture Park Station as a case study.It analyzes the methods,quality management practices,and safety management strategies applied in the project.This paper serves as a reference for tunnel engineering design and construction units in our country,offering insights into effective waterproof construction techniques for subway tunnels.展开更多
The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some w...The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some works can fool detectors by crafting the adversarial camouflage attached to the object,leading to wrong prediction.It is hard for military operations to utilize the existing adversarial camouflage due to its conspicuous appearance.Motivated by this,this paper proposes the Dual Attribute Adversarial Camouflage(DAAC)for evading the detection by both detectors and humans.Generating DAAC includes two steps:(1)Extracting features from a specific type of scene to generate individual soldier digital camouflage;(2)Attaching the adversarial patch with scene features constraint to the individual soldier digital camouflage to generate the adversarial attribute of DAAC.The visual effects of the individual soldier digital camouflage and the adversarial patch will be improved after integrating with the scene features.Experiment results show that objects camouflaged by DAAC are well integrated with background and achieve visual concealment while remaining effective in fooling object detectors,thus evading the detections by both detectors and humans in the digital domain.This work can serve as the reference for crafting the adversarial camouflage in the physical world.展开更多
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in bloc...The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency.展开更多
Concealed penis (CP) is a developmental anomaly in which the penis is hidden in the skin of the abdomen, thigh or scrotum. As a result of this, the penis appears shortened in length. It was first described by Keyes Jr...Concealed penis (CP) is a developmental anomaly in which the penis is hidden in the skin of the abdomen, thigh or scrotum. As a result of this, the penis appears shortened in length. It was first described by Keyes Jr. E.L. in 1919. It can be associated with voiding problem and in adults, sexual issues, among others. Objective: To show that surgery can reverse celibacy induced by CP and highlight the need for an interdisciplinary approach to correction of this anomaly. Patient and Method: A thirty-one-year male patient who had a surgical release of his buried penis by two surgeons in 2019 in a private hospital. The case note was reviewed, the data obtained analyzed and the results including photographs, were presented. The patient was followed up. Result: A 10 cm length of penis and a hundred percent (100%) take of sheet of split skin graft used to resurface the denuded penis were achieved using combined spinal and epidural anesthesia. The patient, his mother and the surgeons were satisfied with the outcome. Consequently, he resolved to marry a wife after all. Conclusion: Concealed penis can now be regarded as a known cause of celibacy and surgical correction can reverse the celibate state.展开更多
In this paper, a new method of time reversal for defect diagnosis of concealed structure has been proposed based on the detecting technique of structure acoustic wave and the theory of time reversal. The time reversal...In this paper, a new method of time reversal for defect diagnosis of concealed structure has been proposed based on the detecting technique of structure acoustic wave and the theory of time reversal. The time reversal recurrence formula for detecting the acoustic wave speed constitution of concealed structures with bilevel asynchronous test has been established. The wave speed constitution can be reconstructed in 2 D graticule form by means of this method. The result of model test shows the method is valid.展开更多
Since real world communication channels are not error free, the coded data transmitted on them may be corrupted, and block based image coding systems are vulnerable to transmission impairment. So the best neighborh...Since real world communication channels are not error free, the coded data transmitted on them may be corrupted, and block based image coding systems are vulnerable to transmission impairment. So the best neighborhood match method using genetic algorithm is used to conceal the error blocks. Experimental results show that the searching space can be greatly reduced by using genetic algorithm compared with exhaustive searching method, and good image quality is achieved. The peak signal noise ratios(PSNRs) of the restored images are increased greatly.展开更多
With the rural concealed communication cable as the study object, the shielding effectiveness of different slot shapes was analyzed by using LBEM (linear boundary element method). The engineering example results sho...With the rural concealed communication cable as the study object, the shielding effectiveness of different slot shapes was analyzed by using LBEM (linear boundary element method). The engineering example results showed that for twocore shielded cable, the coupling capacitance of trapezoid slots (asymmetric and symmetric) changed the most, followed by rectangular slots (asymmetric and symmetric), and the changes of wedge slots were the smallest, but the change tenden- cies were consistent. In addition, with the increase of slot width of different slots, the coupling capacitance of tow-cored shielded cable showed small change.展开更多
A successful case history of exploring for concealed structure using the high-resolution EM method in the investigation of the West-East Gas Pipeline Project's B Tunnel is presented in this paper. The high frequency ...A successful case history of exploring for concealed structure using the high-resolution EM method in the investigation of the West-East Gas Pipeline Project's B Tunnel is presented in this paper. The high frequency electromagnetic image system named STRATAGEM EH4, operating at frequencies ranging from 90KHz to 1Hz, was used for data acquisition. The orthogonal components of the electromagnetic field were measured during the field acquisition and the relevant electromagnetic attributes of the object body were extracted from the electromagnetic data. Hybrid sources, consisting of natural and full tensor-controlled sources, were utilized to produce high-quality electromagnetic field data. B Tunnel lies in the western part of Hubei province, at depths of less than 200m. The geologic setting of B tunnel is very complex. Following an initial geologic investigation, an outcrop considered to be a bedrock interface by investigators, collapsed during tunneling operations. A second investigation applied high-resolution EM and seismic refraction methods to reveal a more complex geologic structure along the tunnel route. The predicted rock classes and fault were encountered during the subsequent tunneling operations.展开更多
An attribute recognition model for safe thickness assessment between a concealed karst cave and a tunnel is established based on the attribute mathematic theory.The model can be applied to carrying out risk classifica...An attribute recognition model for safe thickness assessment between a concealed karst cave and a tunnel is established based on the attribute mathematic theory.The model can be applied to carrying out risk classification of the safe thickness between a concealed karst cave and a tunnel and to guarantee construction’s safety in tunnel engineering.Firstly,the assessment indicators and classification standard of safe thickness between a concealed karst cave and a tunnel are studied based on the perturbation method.Then some attribute measurement functions are constructed to compute the attribute measurement of each single index and synthetic attribute measurement.Finally,the identification and classification of risk assessment of safe thickness between a concealed karst cave and a tunnel are recognized by the confidence criterion.The results of two engineering application show that the evaluation results agree well with the site situations in construction.The results provide a good guidance for the tunnel construction.展开更多
Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittan...Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittance spectral frequency (ISF) parameters in AMR-WB codec to optimally estimate the lost ISFs based on the minimum mean square error (MMSE) rule. The estimated ISFs are weighted with the ones of their previous neighbors to smooth the speech, resulting in the actual concealed ISF vectors. They are used instead of the lost ISFs in the speech synthesis on the receiver. Comparison is made between the speech concealed by this algorithm and by Annex I of G. 722. 2 specification, and simulation shows that the proposed concealment algorithm can lead to better performance in terms of frequency-weighted spectral distortion and signal-to-noise ratio compared to the baseline method, with an increase of 2.41 dB in signal-to-noise ratio (SNR) and a reduction of 0. 885 dB in frequency-weighted spectral distortion.展开更多
In this study, four 1/5 scaled shaking table tests were conducted to investigate the seismic performance of recycled concrete frame-shear wall structures with different recycled aggregates replacement rates and concea...In this study, four 1/5 scaled shaking table tests were conducted to investigate the seismic performance of recycled concrete frame-shear wall structures with different recycled aggregates replacement rates and concealed bracing detail. The four tested structures included one normal concrete model, one recycled coarse aggregate concrete model, and two recycled coarse and fi ne aggregate concrete models with or without concealed bracings inside the shear walls. The dynamic characteristics, dynamic response and failure mode of each model were compared and analyzed. Finite element models were also developed and nonlinear time-history response analysis was conducted. The test and analysis results show that the seismic performance of the recycled coarse aggregate concrete frame-shear wall structure is slightly worse than the normal concrete structure. The seismic resistance capacity of the recycled concrete frame-shear wall structure can be greatly improved by setting up concealed bracings inside the walls. With appropriate design, the recycled coarse aggregate concrete frame-shear wall structure and recycled concrete structure with concealed bracings inside the walls can be applied in buildings.展开更多
Geogas prospecting is a new method in the search for deep and/or concealed mineral deposits.The probing depth of the method comes to 300-500 m below the surface. The method, based on nuclear aualysis and accumulation ...Geogas prospecting is a new method in the search for deep and/or concealed mineral deposits.The probing depth of the method comes to 300-500 m below the surface. The method, based on nuclear aualysis and accumulation sampling, has matured and become useful method of geogas prospecting, through authors' studies more than 10 years. The study of the mechanism for geogas prospecting has also been progressed. It bas been revealed that the geogas matter is in the form of nano-scale particles of the ores by the observation of scanning electron microscope (SEM). This paper summarizes the feature of the geogas anomaly, and describes its forming mechanism. A new example using geogas prospecting is given.展开更多
Reliable prediction of the potential collapse region of rock mass is a key challenge for deep underground cavity excavation, especially if a concealed karst cave is located above the excavated cavity. Because of the e...Reliable prediction of the potential collapse region of rock mass is a key challenge for deep underground cavity excavation, especially if a concealed karst cave is located above the excavated cavity. Because of the effect of the blast vibration, a possible collapse would occur at a certain region between the concealed karst cave and the excavated cavity. This paper aims to study the roof collapse of a deep buried cavity induced by a concealed karst cave base on a two-dimensional failure mechanism by using upper bound theorem. The failure mechanism is constituted by arbitrary curves which is similar to the collapse observed in an actual cavity excavation. The shape and range of the collapse block is determined by virtual work equation in conjunction with variational approach. The results obtained by the presented approach are approximate with the numerical results provided by finite difference code, which indicates that the proposed method in this work is valid.展开更多
Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of...Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods.Generative adversarial network(GAN)is becoming one of the highlights among these deep neural networks.GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks.One promising application of using GAN generated images would be image concealing which requires the embedded image looks like not being tampered to human vision system and also undetectable to most analyzers.Texture synthesizing has drawn lots of attention in computer vision field and is used for image concealing in steganography and watermark.The traditional methods which use synthesized textures for information hiding mainly select features and mathematic functions by human metrics and usually have a low embedding rate.This paper takes advantage of the generative network and proposes an approach for synthesizing complex texture-like image of arbitrary size using a modified deep convolutional generative adversarial network(DCGAN),and then demonstrates the feasibility of embedding another image inside the generated texture while the difference between the two images is nearly invisible to the human eyes.展开更多
To address the issues for assessing and prospecting the replaceable resource of crisis mines, a geological ore-controlling field model and a mineralization distribution field model were proposed from the viewpoint of ...To address the issues for assessing and prospecting the replaceable resource of crisis mines, a geological ore-controlling field model and a mineralization distribution field model were proposed from the viewpoint of field analysis. By dint of solving the field models through transferring the continuous models into the discrete ones, the relationship between the geological ore-controlling effect field and the mineralization distribution field was analyzed, and the quantitative and located parameters were extracted for describing the geological factors controlling mineralization enrichment. The method was applied to the 3-dimensional localization and quantitative prediction for concealed ore bodies in the depths and margins of the Daehang mine in Guangxi, China, and the 3-dimensional distribution models of mineralization indexes and ore-controlling factors such as magmatic rocks, strata, faults, lithology and folds were built. With the methods of statistical analysis and the non-linear programming, the quantitative index set of the geological ore-controlling factors was obtained. In addition, the stereoscopic located and quantitative prediction models were set up by exploring the relationship between the mineralization indexes and the geological ore-controlling factors. So far, some concealed ore bodies with the resource volume of a medium-sized mineral deposit are found in the deep parts of the Dachang Mine by means of the deep prospecting drills following the prediction results, from which the effectiveness of the predication models and results is proved.展开更多
To explore the influence of karst cavity pressure on the failure mechanisms of rock layers above water-filled caves, novel blow-out and collapse mechanisms are put forward in this study. The proposed method uses the n...To explore the influence of karst cavity pressure on the failure mechanisms of rock layers above water-filled caves, novel blow-out and collapse mechanisms are put forward in this study. The proposed method uses the nonlinear optimization to obtain the failure profiles of surrounding layered rock with water-filled cave at the bottom of the tunnel. By referring to the functional catastrophe theory, stability analysis with different properties in different rock layers is implemented with considering the incorporation of seepage forces since the groundwater cannot be ignored in the catastrophe analysis of deep tunnel bottom. Also the parametric analysis is implemented to discuss the influences of different rock strength factors on the failure profiles. In order to offer a good guide of design for the excavation of deep tunnels above the water-filled caves, the proposed method is applied to design of the minimum effective height for rock layer. The results obtained by this work agree well with the existing published ones.展开更多
The Zhuxi tungsten deposit in Jiangxi Province,South China,contains a total W reserve of about 2.86 Mt at an average grade of 0.54 wt%WO3,representing the largest W deposit in the world.Numerous studies on the metallo...The Zhuxi tungsten deposit in Jiangxi Province,South China,contains a total W reserve of about 2.86 Mt at an average grade of 0.54 wt%WO3,representing the largest W deposit in the world.Numerous studies on the metallogeny of the deposit have included its timing,the ore-controlling structures and sedimentary host rocks and their implications for mineral exploration.However,the deep nappe structural style of Taqian-Fuchun metallogenic belt that hosts the W deposit,and the spatial shape and scale of deeply concealed intrusions and their sedimentary host rocks are still poorly defined,which seriously restricts the discovery of new deposits at depth and in surrounding areas of the W deposit.Modern 3 D geological modeling is an important tool for the exploration of concealed orebodies,especially in brownfield environments.There are obvious density contrast and weak magnetic contrast in the ore-controlling strata and granite at the periphery of the deposit,which lays a physical foundation for solving the 3 D spatial problems of the ore-controlling geological body in the deep part of the study area through gravity and magnetic modeling.Gravity data(1:50000)and aeromagnetic data(1:50000)from the latest geophysical surveys of 2016-2018 have been used,firstly,to carry out a potential field separation to obtain residual anomalies for gravity and magnetic interactive inversion.Then,on the basis of the analysis of the relationship between physical properties and lithology,under the constraints of surface geology and borehole data,human-computer interactive gravity and magnetic inversion for 18 cross-sections were completed.Finally,the 3 D geological model of the Zhuxi tungsten deposit and its periphery have been established through these 18 sections,and the spatial shape of the intrusions and strata with a depth of 5 km underground were obtained,initially realizing―transparency‖for ore-controlling bodies.According the analysis of the geophysical,geochemical,and geological characteristics of the Zhuxi tungsten deposit,we discern three principles for prospecting and prediction in the research area,and propose five new exploration targets in its periphery.展开更多
基金Supported by the Major Science and Technology Project of CNPC(2023ZZ19-01).
文摘Based on the waterflooding development in carbonate reservoirs in the Middle East,in order to solve the problem of the poor development effects caused by commingled injection and production,taking the thick bioclastic limestone reservoirs of Cretaceous in Iran-Iraq as an example,this paper proposes a balanced waterflooding development technology for thick and complex carbonate reservoirs.This technology includes the fine division of development units by concealed baffles and barriers,the combination of multi well type and multi well pattern,and the construction of balanced water injection and recovery system.Thick carbonate reservoirs in Iran-Iraq are characterized by extremely vertical heterogeneity,development of multi-genesis ultra-high permeability zones,and highly concealed baffles and barriers.Based on the technologies of identification,characterization,and sealing evaluation for concealed baffles and barriers,the balanced waterflooding development technology is proposed,and three types of balanced waterflooding development modes/techniques are formed,namely,conventional stratigraphic framework,fine stratigraphic framework,and deepened stratigraphic framework.Numerical simulations show that this technology is able to realize a fine and efficient waterflooding development to recover,in a balanced manner,the reserves of thick and complex carbonate reservoirs in Iran and Iraq.The proposed technology provides a reference for the development optimization of similar reservoirs.
文摘Medical history summary: Male, 47 years old, was admitted to the hospital due to “dizziness accompanied by chest tightness and pain for more than 8 days”. One week ago, the patient experienced chest tightness, chest pain accompanied by profuse sweating for 3 hours and underwent emergency percutaneous coronary intervention (PCI) at a local hospital. The procedure revealed left main stem occlusion with subsequent left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA). After the procedure, the patient experienced hemodynamic instability, recurrent ventricular fibrillation, and critical condition, thus transferred to our hospital for further treatment. Symptoms and signs: The patient is in a comatose state, unresponsive to stimuli, with bilateral dilated pupils measuring 2.0 mm, exhibiting reduced sensitivity to light reflex, and recurrent fever. Coarse breath sounds can be heard in both lungs, with audible moist rales. Irregular breathing pattern is observed, and heart sounds vary in intensity. No pathological murmurs are auscultated in any valve auscultation area. Diagnostic methods: Coronary angiography results at the local hospital showed complete occlusion of the left main stem, and left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA) was performed. However, the distal guidewire did not pass through. After admission, blood tests showed a Troponin T level of 1.44 ng/ml and a Myoglobin level of 312 ng/ml. The platelet count was 1390 × 10<sup>9</sup>/L. Von Willebrand factor (vWF) activity was measured at 201.9%. Bone marrow aspiration biopsy showed active bone marrow proliferation and platelet clustering. The peripheral blood smear also showed platelet clustering. JAK-2 gene testing was positive, confirming the diagnosis of primary thrombocytosis. Treatment methods: The patient is assisted with mechanical ventilation and intra-aortic balloon counterpulsation to improve coronary blood flow. Electrolyte levels are closely monitored, especially maintaining plasma potassium levels between 4.0 and 4.5 mmol/l. Hydroxyurea 500 mg is administered for platelet reduction. Anticoagulants and antiplatelet agents are used rationally to prevent further infarction or bleeding. Antiarrhythmic, lipid-lowering, gastroprotective, hepatoprotective, and heart failure treatment are also provided. Clinical outcome: The family members chose to withdraw treatment and signed for discharge due to a combination of reasons, including economic constraints and uncertainty about the prognosis due to the long disease course. Acute myocardial infarction has gradually become one of the leading causes of death in our country. As a “green channel” disease, corresponding diagnostic and treatment protocols have been established in China, and significant progress has been made in emergency care. There are strict regulations for the time taken from the catheterization lab to the cardiac intensive care unit, and standardized treatments are provided to patients once they enter the intensive care unit. Research results show that the incidence of acute myocardial infarction in patients with primary thrombocythemia within 10 years is 9.4%. This type of disease is rare and difficult to cure, posing significant challenges to medical and nursing professionals. In order to benefit future patients, we have documented individual cases of treatment and nursing care for these patients. The research results show that these patients exhibit resistance to traditional oral anticoagulant drugs and require alternative anticoagulants. Additionally, there are significant differences in serum and plasma potassium levels among patients. Therefore, when making clinical diagnoses, it is necessary to carefully distinguish between the two. Particularly, nursing personnel should possess dialectical thinking when supplementing potassium levels in patients in order to reduce the incidence of malignant arrhythmias and mortality rates.
基金jointly supported by the project of Chinese National Natural Science Foundation(42107485)National Key R&D Program(2020YFC1512400,2018YFC800804)China Geological Survey(DD20190282,DD20221734,and DD20230323)。
文摘The construction of modern livable cities faces challenges in karst areas,including ground collapse and engineering problems.Wuhan,with a population of 13.74×10^(6) and approximately 1161 km^(2)of soluble rocks in the urban area of 8569.15 km^(2),predominantly consists of concealed karst areas where occasional ground collapse events occur,posing significant threats to underground engineering projects.To address these challenges,a comprehensive geological survey was conducted in Wuhan,focusing on major karstrelated issues.Geophysical methods offer advantages over drilling in detecting concealed karst areas due to their efficiency,non-destructiveness,and flexibility.This paper reviewed the karst geological characteristics in Wuhan and the geophysical exploration methods for karst,selected eight effective geophysical methods for field experimentation,evaluated their suitability,and proposed method combinations for different karst scenarios.The results show that different geophysical methods have varying applicability for karst detection in Wuhan,and combining multiple methods enhances detection effectiveness.The specific recommendations for method combinations provided in this study serve as a valuable reference for karst detection in Wuhan.
文摘The waterproof construction of subway tunnels is a crucial and challenging aspect of subway tunnel engineering.Mastering excellent waterproof construction technology is essential to ensure that the construction meets design requirements and guarantees the safe operation of subway lines.This paper focuses on discussing waterproof construction technology for subway station tunnels.By analyzing the main methods and techniques of underground tunnel construction,as well as the key techniques and difficulties of waterproofing construction,this paper examines the waterproofing construction project of Guangzhou Metro Culture Park Station as a case study.It analyzes the methods,quality management practices,and safety management strategies applied in the project.This paper serves as a reference for tunnel engineering design and construction units in our country,offering insights into effective waterproof construction techniques for subway tunnels.
基金National Natural Science Foundation of China(grant number 61801512,grant number 62071484)Natural Science Foundation of Jiangsu Province(grant number BK20180080)to provide fund for conducting experiments。
文摘The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some works can fool detectors by crafting the adversarial camouflage attached to the object,leading to wrong prediction.It is hard for military operations to utilize the existing adversarial camouflage due to its conspicuous appearance.Motivated by this,this paper proposes the Dual Attribute Adversarial Camouflage(DAAC)for evading the detection by both detectors and humans.Generating DAAC includes two steps:(1)Extracting features from a specific type of scene to generate individual soldier digital camouflage;(2)Attaching the adversarial patch with scene features constraint to the individual soldier digital camouflage to generate the adversarial attribute of DAAC.The visual effects of the individual soldier digital camouflage and the adversarial patch will be improved after integrating with the scene features.Experiment results show that objects camouflaged by DAAC are well integrated with background and achieve visual concealment while remaining effective in fooling object detectors,thus evading the detections by both detectors and humans in the digital domain.This work can serve as the reference for crafting the adversarial camouflage in the physical world.
基金This work was supported,in part,by the National Nature Science Foundation of China under grant numbers 62272236in part,by the Natural Science Foundation of Jiangsu Province under grant numbers BK20201136,BK20191401in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund。
文摘The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency.
文摘Concealed penis (CP) is a developmental anomaly in which the penis is hidden in the skin of the abdomen, thigh or scrotum. As a result of this, the penis appears shortened in length. It was first described by Keyes Jr. E.L. in 1919. It can be associated with voiding problem and in adults, sexual issues, among others. Objective: To show that surgery can reverse celibacy induced by CP and highlight the need for an interdisciplinary approach to correction of this anomaly. Patient and Method: A thirty-one-year male patient who had a surgical release of his buried penis by two surgeons in 2019 in a private hospital. The case note was reviewed, the data obtained analyzed and the results including photographs, were presented. The patient was followed up. Result: A 10 cm length of penis and a hundred percent (100%) take of sheet of split skin graft used to resurface the denuded penis were achieved using combined spinal and epidural anesthesia. The patient, his mother and the surgeons were satisfied with the outcome. Consequently, he resolved to marry a wife after all. Conclusion: Concealed penis can now be regarded as a known cause of celibacy and surgical correction can reverse the celibate state.
文摘In this paper, a new method of time reversal for defect diagnosis of concealed structure has been proposed based on the detecting technique of structure acoustic wave and the theory of time reversal. The time reversal recurrence formula for detecting the acoustic wave speed constitution of concealed structures with bilevel asynchronous test has been established. The wave speed constitution can be reconstructed in 2 D graticule form by means of this method. The result of model test shows the method is valid.
文摘Since real world communication channels are not error free, the coded data transmitted on them may be corrupted, and block based image coding systems are vulnerable to transmission impairment. So the best neighborhood match method using genetic algorithm is used to conceal the error blocks. Experimental results show that the searching space can be greatly reduced by using genetic algorithm compared with exhaustive searching method, and good image quality is achieved. The peak signal noise ratios(PSNRs) of the restored images are increased greatly.
基金Supported by the Science and Technology Program of the Education Department of Shaanxi Provincial Government(09JK378)the Key Scientific Research Fund of Shaanxi University of Technology(SLGKY12-02)~~
文摘With the rural concealed communication cable as the study object, the shielding effectiveness of different slot shapes was analyzed by using LBEM (linear boundary element method). The engineering example results showed that for twocore shielded cable, the coupling capacitance of trapezoid slots (asymmetric and symmetric) changed the most, followed by rectangular slots (asymmetric and symmetric), and the changes of wedge slots were the smallest, but the change tenden- cies were consistent. In addition, with the increase of slot width of different slots, the coupling capacitance of tow-cored shielded cable showed small change.
基金The work is sponsored by National Natural Science Foundation of China (No. 40074036).
文摘A successful case history of exploring for concealed structure using the high-resolution EM method in the investigation of the West-East Gas Pipeline Project's B Tunnel is presented in this paper. The high frequency electromagnetic image system named STRATAGEM EH4, operating at frequencies ranging from 90KHz to 1Hz, was used for data acquisition. The orthogonal components of the electromagnetic field were measured during the field acquisition and the relevant electromagnetic attributes of the object body were extracted from the electromagnetic data. Hybrid sources, consisting of natural and full tensor-controlled sources, were utilized to produce high-quality electromagnetic field data. B Tunnel lies in the western part of Hubei province, at depths of less than 200m. The geologic setting of B tunnel is very complex. Following an initial geologic investigation, an outcrop considered to be a bedrock interface by investigators, collapsed during tunneling operations. A second investigation applied high-resolution EM and seismic refraction methods to reveal a more complex geologic structure along the tunnel route. The predicted rock classes and fault were encountered during the subsequent tunneling operations.
基金Projects(51509147,51879153) supported by the National Natural Science Foundation of ChinaProjects(2017JC002,2017JC001) supported by the Fundamental Research Funds of Shandong University,China
文摘An attribute recognition model for safe thickness assessment between a concealed karst cave and a tunnel is established based on the attribute mathematic theory.The model can be applied to carrying out risk classification of the safe thickness between a concealed karst cave and a tunnel and to guarantee construction’s safety in tunnel engineering.Firstly,the assessment indicators and classification standard of safe thickness between a concealed karst cave and a tunnel are studied based on the perturbation method.Then some attribute measurement functions are constructed to compute the attribute measurement of each single index and synthetic attribute measurement.Finally,the identification and classification of risk assessment of safe thickness between a concealed karst cave and a tunnel are recognized by the confidence criterion.The results of two engineering application show that the evaluation results agree well with the site situations in construction.The results provide a good guidance for the tunnel construction.
基金The Science Foundation of Southeast University(No.XJ0704268)the Natural Science Foundation of the Education Department of Anhui Province(No.KJ2007B088)
文摘Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittance spectral frequency (ISF) parameters in AMR-WB codec to optimally estimate the lost ISFs based on the minimum mean square error (MMSE) rule. The estimated ISFs are weighted with the ones of their previous neighbors to smooth the speech, resulting in the actual concealed ISF vectors. They are used instead of the lost ISFs in the speech synthesis on the receiver. Comparison is made between the speech concealed by this algorithm and by Annex I of G. 722. 2 specification, and simulation shows that the proposed concealment algorithm can lead to better performance in terms of frequency-weighted spectral distortion and signal-to-noise ratio compared to the baseline method, with an increase of 2.41 dB in signal-to-noise ratio (SNR) and a reduction of 0. 885 dB in frequency-weighted spectral distortion.
基金National Science and Technology Support Program of China under Grant No.2011BAJ08B02Natural Science Foundation of Beijing under Grant No.8132016Beijing City University Youth Backbone Talent Training Project under Grant No.PHR201108009
文摘In this study, four 1/5 scaled shaking table tests were conducted to investigate the seismic performance of recycled concrete frame-shear wall structures with different recycled aggregates replacement rates and concealed bracing detail. The four tested structures included one normal concrete model, one recycled coarse aggregate concrete model, and two recycled coarse and fi ne aggregate concrete models with or without concealed bracings inside the shear walls. The dynamic characteristics, dynamic response and failure mode of each model were compared and analyzed. Finite element models were also developed and nonlinear time-history response analysis was conducted. The test and analysis results show that the seismic performance of the recycled coarse aggregate concrete frame-shear wall structure is slightly worse than the normal concrete structure. The seismic resistance capacity of the recycled concrete frame-shear wall structure can be greatly improved by setting up concealed bracings inside the walls. With appropriate design, the recycled coarse aggregate concrete frame-shear wall structure and recycled concrete structure with concealed bracings inside the walls can be applied in buildings.
文摘Geogas prospecting is a new method in the search for deep and/or concealed mineral deposits.The probing depth of the method comes to 300-500 m below the surface. The method, based on nuclear aualysis and accumulation sampling, has matured and become useful method of geogas prospecting, through authors' studies more than 10 years. The study of the mechanism for geogas prospecting has also been progressed. It bas been revealed that the geogas matter is in the form of nano-scale particles of the ores by the observation of scanning electron microscope (SEM). This paper summarizes the feature of the geogas anomaly, and describes its forming mechanism. A new example using geogas prospecting is given.
基金Projects(51878074,51678071)supported by the National Natural Science Foundation of China
文摘Reliable prediction of the potential collapse region of rock mass is a key challenge for deep underground cavity excavation, especially if a concealed karst cave is located above the excavated cavity. Because of the effect of the blast vibration, a possible collapse would occur at a certain region between the concealed karst cave and the excavated cavity. This paper aims to study the roof collapse of a deep buried cavity induced by a concealed karst cave base on a two-dimensional failure mechanism by using upper bound theorem. The failure mechanism is constituted by arbitrary curves which is similar to the collapse observed in an actual cavity excavation. The shape and range of the collapse block is determined by virtual work equation in conjunction with variational approach. The results obtained by the presented approach are approximate with the numerical results provided by finite difference code, which indicates that the proposed method in this work is valid.
基金This work is supported by the National Key R&D Program of China under grant 2018YFB1003205by the National Natural Science Foundation of China under grant U1536206,U1405254,61772283,61602253,61672294,61502242+2 种基金by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundby the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.
文摘Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods.Generative adversarial network(GAN)is becoming one of the highlights among these deep neural networks.GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks.One promising application of using GAN generated images would be image concealing which requires the embedded image looks like not being tampered to human vision system and also undetectable to most analyzers.Texture synthesizing has drawn lots of attention in computer vision field and is used for image concealing in steganography and watermark.The traditional methods which use synthesized textures for information hiding mainly select features and mathematic functions by human metrics and usually have a low embedding rate.This paper takes advantage of the generative network and proposes an approach for synthesizing complex texture-like image of arbitrary size using a modified deep convolutional generative adversarial network(DCGAN),and then demonstrates the feasibility of embedding another image inside the generated texture while the difference between the two images is nearly invisible to the human eyes.
基金Project(2007CB416608) supported by the National Basic Research Program of ChinaProject(2006BAB01B07) supported by the National Science and Technology Pillar Program during the 11th Five-Year Plan Period
文摘To address the issues for assessing and prospecting the replaceable resource of crisis mines, a geological ore-controlling field model and a mineralization distribution field model were proposed from the viewpoint of field analysis. By dint of solving the field models through transferring the continuous models into the discrete ones, the relationship between the geological ore-controlling effect field and the mineralization distribution field was analyzed, and the quantitative and located parameters were extracted for describing the geological factors controlling mineralization enrichment. The method was applied to the 3-dimensional localization and quantitative prediction for concealed ore bodies in the depths and margins of the Daehang mine in Guangxi, China, and the 3-dimensional distribution models of mineralization indexes and ore-controlling factors such as magmatic rocks, strata, faults, lithology and folds were built. With the methods of statistical analysis and the non-linear programming, the quantitative index set of the geological ore-controlling factors was obtained. In addition, the stereoscopic located and quantitative prediction models were set up by exploring the relationship between the mineralization indexes and the geological ore-controlling factors. So far, some concealed ore bodies with the resource volume of a medium-sized mineral deposit are found in the deep parts of the Dachang Mine by means of the deep prospecting drills following the prediction results, from which the effectiveness of the predication models and results is proved.
文摘To explore the influence of karst cavity pressure on the failure mechanisms of rock layers above water-filled caves, novel blow-out and collapse mechanisms are put forward in this study. The proposed method uses the nonlinear optimization to obtain the failure profiles of surrounding layered rock with water-filled cave at the bottom of the tunnel. By referring to the functional catastrophe theory, stability analysis with different properties in different rock layers is implemented with considering the incorporation of seepage forces since the groundwater cannot be ignored in the catastrophe analysis of deep tunnel bottom. Also the parametric analysis is implemented to discuss the influences of different rock strength factors on the failure profiles. In order to offer a good guide of design for the excavation of deep tunnels above the water-filled caves, the proposed method is applied to design of the minimum effective height for rock layer. The results obtained by this work agree well with the existing published ones.
基金jointly supported by the National Key R&D Program of China(Grant No.2016YFC0600201)China Geological Survey project(Grant Nos.DD20190012,DD20160082)the National Natural Science Foundation of China(Grant Nos.92062108,41630320,41574133)。
文摘The Zhuxi tungsten deposit in Jiangxi Province,South China,contains a total W reserve of about 2.86 Mt at an average grade of 0.54 wt%WO3,representing the largest W deposit in the world.Numerous studies on the metallogeny of the deposit have included its timing,the ore-controlling structures and sedimentary host rocks and their implications for mineral exploration.However,the deep nappe structural style of Taqian-Fuchun metallogenic belt that hosts the W deposit,and the spatial shape and scale of deeply concealed intrusions and their sedimentary host rocks are still poorly defined,which seriously restricts the discovery of new deposits at depth and in surrounding areas of the W deposit.Modern 3 D geological modeling is an important tool for the exploration of concealed orebodies,especially in brownfield environments.There are obvious density contrast and weak magnetic contrast in the ore-controlling strata and granite at the periphery of the deposit,which lays a physical foundation for solving the 3 D spatial problems of the ore-controlling geological body in the deep part of the study area through gravity and magnetic modeling.Gravity data(1:50000)and aeromagnetic data(1:50000)from the latest geophysical surveys of 2016-2018 have been used,firstly,to carry out a potential field separation to obtain residual anomalies for gravity and magnetic interactive inversion.Then,on the basis of the analysis of the relationship between physical properties and lithology,under the constraints of surface geology and borehole data,human-computer interactive gravity and magnetic inversion for 18 cross-sections were completed.Finally,the 3 D geological model of the Zhuxi tungsten deposit and its periphery have been established through these 18 sections,and the spatial shape of the intrusions and strata with a depth of 5 km underground were obtained,initially realizing―transparency‖for ore-controlling bodies.According the analysis of the geophysical,geochemical,and geological characteristics of the Zhuxi tungsten deposit,we discern three principles for prospecting and prediction in the research area,and propose five new exploration targets in its periphery.