首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20篇
  免费   0篇
电工技术   1篇
无线电   7篇
一般工业技术   1篇
冶金工业   9篇
自动化技术   2篇
  2019年   1篇
  2014年   1篇
  2013年   2篇
  2011年   1篇
  2007年   2篇
  2001年   1篇
  1998年   2篇
  1997年   3篇
  1996年   2篇
  1994年   3篇
  1993年   1篇
  1981年   1篇
排序方式: 共有20条查询结果,搜索用时 15 毫秒
1.
Rosai-Dorfman disease, first described in 1969, is a rare idiopathic histioproliferative disease affecting the lymph nodes. Typical clinical features include bilateral painless lymphadenopathy, fever and polyclonal hypergammaglobulinemia. In approximately 43% of cases, extranodal sites may be involved and occasionally represent the initial or sole manifestation of the disease. Central nervous system manifestations are exceedingly rare, and only 17 cases have been recorded, among which there are merely seven isolated intracranial cases without concurrent nodal or other extranodal involvement. Herein, we report a 38-year-old male presenting with generalized tonic-clonic seizure and radiological findings indicative of meningioma. Complete physical examinations and laboratory surveys demonstrate the absence of involvement at other body sites. Microscopically, the lesion consists of proliferative histiocytes exhibiting emperipolesis coupled with the characteristic cytoplasmic staining against S-100 protein. The differential diagnosis of polymorphic inflammatory meningioma-mimicking masses is discussed, and a review of previously reported intracranial Rosai-Dorfman disease is presented.  相似文献   
2.
It is now established that certain nutrients have a significant effect on cellular metabolism and growth, tissue repair and regeneration, and modulation of host defences. So far, however, potential clinical benefits have been difficult to demonstrate. Nevertheless, the use of nutrients in combinations seems to have promise and may be associated with a reduction in infectious complications and length of hospital stay. Nutritional pharmacology in the future may be able to improve tumour response to chemotherapy and may minimize the metabolic effect of cachexia.  相似文献   
3.
Five cases of acute intestinal ischaemia due to occlusion of the superior mesenteric artery, all with a delay in diagnosis, are reported here. These cases illustrate the continuing difficulties, in clinical practice, in recognizing mesenteric ischaemia before intestinal infarction has occurred, despite the clinical awareness of this condition.  相似文献   
4.
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library.  相似文献   
5.
From January 1980 to December 1992, sixty-two Hartmann's procedures were performed for septic complications of sigmoid diverticular disease, in the Professorial Unit at Aberdeen Royal Infirmary. Colorectal continuity was subsequently restored in 53% of the fifty-three surviving patients. The overall morbidity and mortality was 34% and 0% respectively. There were two anastomotic leaks (7%) while two patients (7%) developed anastomotic stenoses requiring multiple dilations. Closure of Hartmann's colostomy was carried out by consultants (48%), senior registrars (38%) and registrars with consultant supervision (14%). Fifteen anastomoses were hand sewn and fourteen were stapled. Twenty-one per cent of patients had closure of colostomy in less than 3 months, 48% between 3 and 6 months and 31% of reversals were carried out more than 6 months following their formation. The grade of surgeon had no influence on the outcome of reversal. Although the numbers were small, the morbidity was found to be highest in those patients in whom colostomy closure was carried out within 3 months of colostomy formation. Also, there was an increased incidence (7%) of anastomotic stenoses in the stapled anastomosis group.  相似文献   
6.
Howard M. Heys 《Cryptologia》2013,37(3):189-221
In this paper, we present a detailed tutorial on linear cryptanalysis and differential cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The intent of the paper is to present a lucid explanation of the attacks, detailing the practical application of the attacks to a cipher in a simple, conceptually revealing manner for the novice cryptanalyst. The tutorial is based on the analysis of a simple, yet realistically structured, basic Substitution-Permutation Network cipher. Understanding the attacks as they apply to this structure is useful, as the Rijndael cipher, recently selected for the Advanced Encryption Standard (AES), has been derived from the basic SPN architecture. As well, experimental data from the attacks is presented as confirmation of the applicability of the concepts as outlined.  相似文献   
7.
In this paper we examine a class of product ciphers referred to as substitution-permutation networks. We investigate the resistance of these cryptographic networks to two important attacks: differential cryptanalysis and linear cryptanalysis. In particular, we develop upper bounds on the differential characteristic probability and on the probability of a linear approximation as a function of the number of rounds of substitutions. Further, it is shown that using large S-boxes with good diffusion characteristics and replacing the permutation between rounds by an appropriate linear transformation is effective in improving the cipher security in relation to these two attacks.This work was supported by the Natural Sciences and Engineering Research Council of Canada and the Telecommunications Research Institute of Ontario, and was presented at the rump session of CRYPTO '93. Howard Heys is now with Electrical Engineering, Faculty of Engineering and Applied Science, Memorial University of Newfoundland, St. John's, Newfoundland, Canada A1B 3X5.  相似文献   
8.
Previous studies of the bonding capabilities of glass-ionomer cements have concentrated on the use of in vitro testing conditions. Since early moisture contamination appears to have adverse effects on the physical properties of glass-ionomer cements, and with the probability of pulpally derived dentinal fluid being present under in vivo conditions, the objective of this study was to compare in vivo tensile bond strength with in vitro tensile bond strength of a glass-ionomer cement to dentin utilizing the same teeth under similar test conditions. A glass-ionomer lining cement was placed on freshly exposed labial dentin of the maxillary incisor on 10 Rhesus monkeys. Immediately following placement, an orthodontic button was placed over the cement and left undisturbed for 1 hour. The teeth were then extracted and stored in 100% relative humidity for 23 hours. An Instron testing machine was used to register in kilograms the force required to cause tensile bond failure of the cement. Identical methodology was then used on the same teeth for in vitro testing. The concluding results indicate that a statistically significant difference (P < or = 0.05) exists between in vivo and in vitro tensile bond strengths of the glass-ionomer lining cement and that the bond failure was cohesive in character for all cases both in vivo and in vitro. These findings suggest that clinically, tensile bond strengths of glass-ionomer cements to cut dentin can be expected to be weaker in vital teeth than in devital teeth.  相似文献   
9.
This paper presents the performance evaluation of a new cell‐based multicast switch for broadband communications. Using distributed control and a modular design, the balanced gamma (BG) switch features high performance for unicast, multicast and combined traffic under both random and bursty conditions. Although it has buffers on input and output ports, the multicast BG switch follows predominantly an output‐buffered architecture. The performance is evaluated under uniform and non‐uniform traffic conditions in terms of cell loss ratio and cell delay. An analytical model is presented to analyse the performance of the multicast BG switch under multicast random traffic and used to verify simulation results. The delay performance under multicast bursty traffic is compared with those from an ideal pure output‐buffered multicast switch to demonstrate how close its performance is to that of the ideal but impractical switch. Performance comparisons with other published switches are also studied through simulation for non‐uniform and bursty traffic. It is shown that the multicast BG switch achieves a performance close to that of the ideal switch while keeping hardware complexity reasonable. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
10.
Heys  H.M. 《Electronics letters》1997,33(10):836-838
The author examines the application of linear cryptanalysis to the RC5 private-key cipher and shows that there are expected to be weak keys for which the attack is applicable to many rounds. It is demonstrated that, for the 12-round nominal RC5 version with a 64 bit block size and a 128 bit key, there are 228 weak keys for which only ~217 known plaintexts are required to break the cipher. There are 268 keys for which the cipher is theoretically breakable, requiring ~257 known plaintexts. The analysis highlights the sensitivity of RC5 security to its key scheduling algorithm  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号