期刊文献+
共找到419篇文章
< 1 2 21 >
每页显示 20 50 100
A Hybrid Simulation Test Platform for Verifying the Protection Settings of SPS
1
作者 Jianjian Li Luojiang Qian 《Energy and Power Engineering》 2017年第4期346-351,共6页
To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) ... To verify the effectiveness and correctness of the protection settings in ring structure Shipboard Power System (SPS), a digital-physical hybrid simulation platform at China Ship Development and Design Center (CSDDC) has been built, which aims to give double verification effect of design scheme and physical device. The platform consists of eMEGAsim digital simulator, signal power amplifiers and digital-analog interface equipments. With this platform, the multiple protection device of ring structure grid can be accessed to form a close-loop test system. Since eMEGAsim model-simulated faults and actual protection device actions are on real time, the tripping settings of each device as well as their coordinate performance between multiple devices can be verified in this close-loop test. 展开更多
关键词 Hybrid Simulation SHIPBOARD Power System (SPS) PROTECTION SETTINGS Close-Loop TEST verify
暂未订购
A New Batch Verifying Scheme for Identifying Illegal Signatures
2
作者 Adrian Atanasiu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期144-151,共8页
The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signature... The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures. In this article, we analyze the complexity of the batch verifying schemes defined by Li, Hwang and Chen in 2010, and propose a new batch verifying multiple digital signature scheme, in two variants: one for RSA - by completing the Harn's schema with an identifying illegal signatures algorithm, and the other adapted for a modified Elliptic Curve Digital Siggnature Algorithm protocol. 展开更多
关键词 digital signature batch verifying multiple signature RSA signature elliptic curve digital signature algorithm standard
原文传递
A Measuring,Reporting and Verifying System for REDD+ Activities in China
3
作者 Xue Ming Wu Shuhong Cheng Shuqiang 《Chinese Forestry Science and Technology》 2012年第3期85-85,共1页
Challenges and focus that Measureable, Reportable and Verifiable of REDD+ activities will face are analyzed base on provisions relate to MRV for REDD+ in UNFCCC.It will face the challenges of lake of messages in estim... Challenges and focus that Measureable, Reportable and Verifiable of REDD+ activities will face are analyzed base on provisions relate to MRV for REDD+ in UNFCCC.It will face the challenges of lake of messages in estimating biomass carbon storage and reference level,certification standards, the national methodology of REDD+ activities,and financial support if measurable,reportable and verifiable REDD+ activities are developed in China. Based on the results of the analysis,the different types for REDD+ activities that adapt to Chinese situation are put forward,and it was designed that the framework on Measuring,Reporting and Verifying System for REDD+ activities in China including general indicator such as objectives, implementation,contribution to sustainable development and poverty eradication,environment effectiveness,sustainability and cost-effectiveness. 展开更多
关键词 UNFCCC REDD+ MEASURING REPORTING verifyING
原文传递
Chorion layer subretinal placement in amniotic membrane transplantation for retinal detachment
4
作者 Li Zhou Ya-Li Liu +2 位作者 Wei-Fang Ma Yu-Chuan Chen Yu Li 《International Journal of Ophthalmology(English edition)》 2025年第9期1806-1808,共3页
Dear Editor,We present a modified surgical technique to verify the chorion layer of the human amniotic membrane(hAM)in treating retinal detachment(RD)with vitrectomy.RD patients with pathological myopia where the tear... Dear Editor,We present a modified surgical technique to verify the chorion layer of the human amniotic membrane(hAM)in treating retinal detachment(RD)with vitrectomy.RD patients with pathological myopia where the tear is located within the posterior pole choroidal atrophy area are difficult to treat.Surgical procedures such as laser treatments,diathermy,cryopexy applications or long-term silicone oil endotamponade may not only be ineffective but also harmful in these cases^([1]).Amniotic membrane transplantation(AMT)is an effective technique in case of RD recurrences to seal retinal holes over high myopic chorioretinal atrophy^([2]). 展开更多
关键词 chorion layer verify chorion layer modified surgical technique laser treatmentsdiathermycryopexy applications subretinal placement posterior pole choroidal atrophy area membrane transplantat pathological myopia
原文传递
P2V-Fabric: Privacy-Preserving Video Using Hyperledger Fabric
5
作者 Muhammad Saad Ki-Woong Park 《Computers, Materials & Continua》 2025年第5期1881-1900,共20页
Theproliferation of Internet of Things(IoT)devices introduces substantial security challenges.Currently,privacy constitutes a significant concern for individuals.While maintaining privacy within these systems is an es... Theproliferation of Internet of Things(IoT)devices introduces substantial security challenges.Currently,privacy constitutes a significant concern for individuals.While maintaining privacy within these systems is an essential characteristic,it often necessitates certain compromises,such as complexity and scalability,thereby complicating management efforts.The principal challenge lies in ensuring confidentiality while simultaneously preserving individuals’anonymity within the system.To address this,we present our proposed architecture for managing IoT devices using blockchain technology.Our proposed architecture works on and off blockchain and is integrated with dashcams and closed-circuit television(CCTV)security cameras.In this work,the videos recorded by the dashcams and CCTV security cameras are hashed through the InterPlanetary File System(IPFS)and this hash is stored in the blockchain.When the accessors want to access the video,they must pass through multiple authentications which include web token authentication and verifiable credentials,to mitigate the risk of malicious users.Our contributions include the proposition of the framework,which works on the single key for every new video,and a novel chaincode algorithm that incorporates verifiable credentials.Analyses are made to show the system’s throughput and latency through stress testing.Significant advantages of the proposed architecture are shown by comparing them to existing schemes.The proposed architecture features a robust design that significantly enhances the security of blockchain-enabled Internet of Things(IoT)deviceswhile effectively mitigating the risk of a single point of failure,which provides a reliable solution for security concerns in the IoT landscape.Our future endeavors will focus on scaling the system by integrating innovative methods to enhance security measures further. 展开更多
关键词 Blockchain IOT hyperledger fabric verifiable credentials PRIVACY
在线阅读 下载PDF
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
6
作者 Yunhua He Yigang Yang +4 位作者 Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu 《Digital Communications and Networks》 2025年第2期432-441,共10页
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,com... The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix operations.However,complex functions such as matrix operations are difficult to implement on Ethereum Virtual Machine(EVM)-based smart contract platforms due to their distributed security environment limitations.Existing off-chain methods often result in a significant reduction in contract execution efficiency,thus a platform software development kit interface implementation method has become a feasible way to reduce overheads,but this method cannot verify operation correctness and may leak sensitive user data.To solve the above problems,we propose a verifiable EVM-based smart contract cross-language implementation scheme for complex operations,especially matrix operations,which can guarantee operation correctness and user privacy while ensuring computational efficiency.In this scheme,a verifiable interaction process is designed to verify the computation process and results,and a matrix blinding technology is introduced to protect sensitive user data in the calculation process.The security analysis and performance tests show that the proposed scheme can satisfy the correctness and privacy of the cross-language implementation of smart contracts at a small additional efficiency cost. 展开更多
关键词 Smart contract Blockchain Cross-language programming Bilinear pairing Publicly verifiable computation
在线阅读 下载PDF
An Efficient and Verifiable Data Aggregation Protocol with Enhanced Privacy Protection
7
作者 Yiming Zhang Wei Zhang Cong Shen 《Computers, Materials & Continua》 2025年第11期3185-3211,共27页
Distributed data fusion is essential for numerous applications,yet faces significant privacy security challenges.Federated learning(FL),as a distributed machine learning paradigm,offers enhanced data privacy protectio... Distributed data fusion is essential for numerous applications,yet faces significant privacy security challenges.Federated learning(FL),as a distributed machine learning paradigm,offers enhanced data privacy protection and has attracted widespread attention.Consequently,research increasingly focuses on developing more secure FL techniques.However,in real-world scenarios involving malicious entities,the accuracy of FL results is often compromised,particularly due to the threat of collusion between two servers.To address this challenge,this paper proposes an efficient and verifiable data aggregation protocol with enhanced privacy protection.After analyzing attack methods against prior schemes,we implement key improvements.Specifically,by incorporating cascaded random numbers and perturbation terms into gradients,we strengthen the privacy protection afforded by polynomial masking,effectively preventing information leakage.Furthermore,our protocol features an enhanced verification mechanism capable of detecting collusive behaviors between two servers.Accuracy testing on the MNIST and CIFAR-10 datasets demonstrates that our protocol maintains accuracy comparable to the Federated Averaging Algorithm.In scheme efficiency comparisons,while incurring only a marginal increase in verification overhead relative to the baseline scheme,our protocol achieves an average improvement of 93.13% in privacy protection and verification overhead compared to the state-of-the-art scheme.This result highlights its optimal balance between overall overhead and functionality.A current limitation is that the verificationmechanismcannot precisely pinpoint the source of anomalies within aggregated results when server-side malicious behavior occurs.Addressing this limitation will be a focus of future research. 展开更多
关键词 Data fusion federated learning privacy protection MASKING verifiability fault tolerance
在线阅读 下载PDF
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
8
作者 Qi Li Gaozhan Liu +4 位作者 Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong 《Digital Communications and Networks》 2025年第2期473-481,共9页
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schem... Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption. 展开更多
关键词 Access control Policy hiding Verifiable outsourced computation CLOUD IOT
在线阅读 下载PDF
3RVAV:A Three-Round Voting and Proof-of-Stake Consensus Protocol with Provable Byzantine Fault Tolerance
9
作者 Abeer S.Al-Humaimeedy 《Computers, Materials & Continua》 2025年第12期5207-5236,共30页
This paper presents 3RVAV(Three-Round Voting with Advanced Validation),a novel Byzantine Fault Tolerant consensus protocol combining Proof-of-Stake with a multi-phase voting mechanism.The protocol introduces three lay... This paper presents 3RVAV(Three-Round Voting with Advanced Validation),a novel Byzantine Fault Tolerant consensus protocol combining Proof-of-Stake with a multi-phase voting mechanism.The protocol introduces three layers of randomized committee voting with distinct participant roles(Validators,Delegators,and Users),achieving(4/5)-threshold approval per round through a verifiable random function(VRF)-based selection process.Our security analysis demonstrates 3RVAV provides 1−(1−s/n)^(3k) resistance to Sybil attacks with n participants and stake s,while maintaining O(kn log n)communication complexity.Experimental simulations show 3247 TPS throughput with 4-s finality,representing a 5.8×improvement over Algorand’s committee-based approach.The proposed protocol achieves approximately 4.2-s finality,demonstrating low latency while maintaining strong consistency and resilience.The protocol introduces a novel punishment matrix incorporating both stake slashing and probabilistic blacklisting,proving a Nash equilibrium for honest participation under rational actor assumptions. 展开更多
关键词 Byzantine fault tolerant proof-of-stake verifiable random function Sybil attack resistance Nash equilibrium committee voting
在线阅读 下载PDF
VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server
10
作者 Peizheng Lai Minqing Zhang +2 位作者 Yixin Tang Ya Yue Fuqiang Di 《Computers, Materials & Continua》 2025年第8期2935-2957,共23页
Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server i... Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension. 展开更多
关键词 Verifiable federated learning PRIVACY-PRESERVING homomorphic encryption reversible data hiding in encrypted domain secret sharing
在线阅读 下载PDF
Research on Efficient Storage Consistency Verification Technology for On-Chain and Off-Chain Data
11
作者 Wei Lin Yi Sun 《Computers, Materials & Continua》 2025年第12期5117-5134,共18页
To enable efficient sharing of unbounded streaming data,this paper introduces blockchain technology into traditional cloud data,proposing a hybrid on-chain/off-chain storage model.We design a real-time verifiable data... To enable efficient sharing of unbounded streaming data,this paper introduces blockchain technology into traditional cloud data,proposing a hybrid on-chain/off-chain storage model.We design a real-time verifiable data structure that is more suitable for streaming data to achieve efficient real-time verifiability for streaming data.Based on the notch gate hash function and vector commitment,an adaptive notch gate hash tree structure is constructed,and an efficient real-time verifiable data structure for on-chain and off-chain stream data is proposed.The structure binds dynamic root nodes sequentially to ordered leaf nodes in its child nodes.Only the vector commitment of the dynamic root node is stored on the chain,and the complete data structure is stored off-chain.This structure ensures tamperproofing against malicious off-chain cloud servers of off-chain cloud servers.Preserves storage scalability space,realizes the immediate verification of stream data upon arrival,and the computational overhead of on-chain and off-chain hybrid storage verification is only related to the current data volume,which is more practical when dealing with stream data with unpredictable data volume.We formalize this as an efficient real-time verification scheme for stream data in on-chain and off-chain hybrid storage.Finally,the technology’s security and performance were empirically validated through rigorous analysis. 展开更多
关键词 On-chain and off-chain hybrid storage verifiable technology slot gate hash function vector commitment
在线阅读 下载PDF
Improved key exchange protocol for three-party based on verifier authentication 被引量:3
12
作者 柳秀梅 周福才 常桂然 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期322-324,共3页
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w... To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient. 展开更多
关键词 key exchange for three-party password-based authentication VERIFIER
在线阅读 下载PDF
浅析人脸识别解锁系统的现状与展望 被引量:2
13
作者 李瑞琪 《计算机光盘软件与应用》 2014年第12期33-34,共2页
作为人工智能中人脸识别的技术之一,人脸识别是对人的面部特征与信息进行采集,对显示的面部影像,首先检测在拍摄镜头中是否有人脸,若检测到人脸,则进一步的给出脸的位置、形状和各个面部器官的坐标、形状等信息。处理器提取信息后,将其... 作为人工智能中人脸识别的技术之一,人脸识别是对人的面部特征与信息进行采集,对显示的面部影像,首先检测在拍摄镜头中是否有人脸,若检测到人脸,则进一步的给出脸的位置、形状和各个面部器官的坐标、形状等信息。处理器提取信息后,将其与已知的面部特征进行对比,从而识别用户的身份。它包括人脸检测、人脸跟踪、人脸对比三项主要内容。而人脸识别解锁系统就是基于人脸识别技术的基础上,通过识别人脸来对户与设备中存储的人脸信息进行比对进而判断该用户是否能够进入系统的技术。用户通过电子设备的摄像头拍摄自己的面部影像,使设备预先记录下了本人的面部信息。然后再通过摄像头对采集的影像进行比对进而开放设备。如果登录用户的脸与"预先设定的身份认证信息"比对结果成功,那么用户就可进入并使用设备。 展开更多
关键词 人脸识别 Eye verify 解锁 眼球识别
在线阅读 下载PDF
Research on Service Life Prediction Model of Concrete Structure of Sea-crossing Bridge 被引量:2
14
作者 WANG C J ZHANG G Z +3 位作者 LIU K X TU L Q LI J H QIN M Q 《武汉理工大学学报》 CAS CSCD 北大核心 2010年第17期141-146,共6页
According to the chloride corrosion environment,service life prediction model of concrete structure of sea-crossing bridge was built using modified Fick's second law and the whole probability calculation method,wh... According to the chloride corrosion environment,service life prediction model of concrete structure of sea-crossing bridge was built using modified Fick's second law and the whole probability calculation method,which was suitable for China. Furthermore,a visual service life prediction program of concrete structure was developed by optimized Monte Carlo method. Meanwhile,Life 365 program was compared,indicating reliability of the prediction program. Finally,the validity of prediction model was verified in JinTang Bridge of Zhoushan Island Mainland Linkage Project. 展开更多
关键词 sea-crossing bridge concrete structure service life PREDICTION MODEL verify
原文传递
Feature extraction of wood-hole defects using wavelet-based ultrasonic testing 被引量:9
15
作者 Huiming Yang Lei Yu 《Journal of Forestry Research》 SCIE CAS CSCD 2017年第2期395-402,共8页
The primary bottleneck to extracting wood defects during ultrasonic testing is the accuracy of identifying the wood defects. The wavelet energy moment was used to extract defect features of artificial wood holes drill... The primary bottleneck to extracting wood defects during ultrasonic testing is the accuracy of identifying the wood defects. The wavelet energy moment was used to extract defect features of artificial wood holes drilled into 120 elm samples that differed in the number of holes to verify the validity of the method. Wavelet energy moment can reflect the distribution of energy along the time axis and the amount of energy in each frequency band,which can effectively extract the energy distribution characteristics of signals in each frequency band; therefore,wavelet energy moment can replace the wavelet frequency band energy and constitute wood defect feature vectors. A principal component analysis was used to normalize and reduce the dimension of the feature vectors. A total of 16 principal component features were then obtained, which can effectively extract the defect features of the different number of holes in the elm samples. 展开更多
关键词 wavelet defects ultrasonic extracting replace validity identifying verify processed bottleneck
在线阅读 下载PDF
A New Hybrid Numerical Scheme for Two-Dimensional Ideal MHD Equations 被引量:2
16
作者 ZHOU Yu-Fen FENG Xue-Shang 《Chinese Physics Letters》 SCIE CAS CSCD 2012年第9期101-104,共4页
We present a new hybrid numerical scheme for two-dimensional(2D)ideal magnetohydrodynamic(MHD)equations.A simple conservation element and solution element(CESE)method is used to calculate the flow variables,and the un... We present a new hybrid numerical scheme for two-dimensional(2D)ideal magnetohydrodynamic(MHD)equations.A simple conservation element and solution element(CESE)method is used to calculate the flow variables,and the unknown first-order spatial derivatives involved in the CESE method are computed with a finite volume scheme that uses the solution of the derivative Riemann problem with limited reconstruction to evaluate the numerical flux at cell interface position.To show the validation and capacity of its application to 2D MHD problems,we study several benchmark problems.Numerical results verify that the hybrid scheme not only performs well,but also can retain the solution quality even if the Courant number ranges from close to 1 to less than 0.01. 展开更多
关键词 SCHEME ELEMENT verify
原文传递
Simultaneous Synchronization and Anti-Synchronization of Two Identical New 4D Chaotic Systems 被引量:2
17
作者 GUO Rong-Wei 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第4期15-18,共4页
We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D c... We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D chaotic systems.Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results. 展开更多
关键词 CHAOTIC verify identical
原文传递
Automatic Compensation of Total Phase Aberrations in Digital Holographic Biological Imaging 被引量:2
18
作者 ZHANG Yi-Zhuo WANG Da-Yong +1 位作者 WANG Yun-Xin TAO Shi-Quan 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第11期131-134,共4页
Digital holographic microscopy has been a powerful metrological technique for phase-contrast imaging.However inherent phase aberrations always exist and degrade the quality of the phase-contrast images.A surface fitti... Digital holographic microscopy has been a powerful metrological technique for phase-contrast imaging.However inherent phase aberrations always exist and degrade the quality of the phase-contrast images.A surface fitting method based on an improved mathematic model is proposed,which can be used to remove the phase aberrations without any pre-knowledge of the setup or manual operation.The improved mathematic model includes not only the usual terms but also the cross terms and the high order terms to describe the phase aberrations with high accuracy.Meanwhile,a non-iterative algorithm is used to solve the parametersand thus less computational load is imposed.The proposed method is applied to the live imaging of cells.The experimental results verify its validity. 展开更多
关键词 REMOVE HOLOGRAPHIC verify
原文传递
Study on Ship Automatic Berthing System with Mooring Lines 被引量:5
19
作者 K.U.Yang J.G.Hur +2 位作者 M.S.Choi D.J.Yeo J.H.Byun 《China Ocean Engineering》 SCIE EI CSCD 2017年第1期19-29,共11页
This study describes an automatic berthing system with mooring lines. It is designed to be berthed by using mooring device on the upper deck of a ship. It is to berth once maintaining parallel with the quay by control... This study describes an automatic berthing system with mooring lines. It is designed to be berthed by using mooring device on the upper deck of a ship. It is to berth once maintaining parallel with the quay by controlling both forward and aft breast lines. Berthing method is used through length adjustment of mooring lines connected between ship and quay by controlling the angular velocity and the torque of hydraulic motor in mooring device. The study is conducted under three changing conditions of draft, such as even-keel, rise of the gravity center and trim to stern. Variables affecting berthing stability are determined based on the control performance of each condition. Bond graphs method is used to model the system. Controller is designed as PID control method of reference-model algorithm. The control program is composed of synchronous control system based on the equations derived with the numerical analysis. The tank test is conducted to verify the usefulness of the control program. 展开更多
关键词 hydraulic maintain affecting berth torque adjustment draft attitude gravity verify
在线阅读 下载PDF
Establishment and validation of a predictive model for peripherally inserted central catheter-related thrombosis in patients with liver cancer 被引量:2
20
作者 Xiao-Fei Chen Hao-Jun Wu +3 位作者 Tang Li Jia-Bin Liu Wen-Jie Zhou Qiang Guo 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第7期2221-2231,共11页
BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombo... BACKGROUND Peripherally inserted central catheters(PICCs)are commonly used in hospitalized patients with liver cancer for the administration of chemotherapy,nutrition,and other medications.However,PICC-related thrombosis is a serious complication that can lead to morbidity and mortality in this patient population.Several risk factors have been identified for the development of PICC-related thrombosis,including cancer type,stage,comorbidities,and catheter characteristics.Understanding these risk factors and developing a predictive model can help healthcare providers identify high-risk patients and implement preventive measures to reduce the incidence of thrombosis.AIM To analyze the influencing factors of PICC-related thrombosis in hospitalized patients with liver cancer,construct a predictive model,and validate it.METHODS Clinical data of hospitalized patients with liver cancer admitted from January 2020 to December 2023 were collected.Thirty-five cases of PICC-related thrombosis in hospitalized patients with liver cancer were collected,and 220 patients who underwent PICC placement during the same period but did not develop PICC-related thrombosis were randomly selected as controls.A total of 255 samples were collected and used as the training set,and 77 cases were collected as the validation set in a 7:3 ratio.General patient information,case data,catheterization data,coagulation indicators,and Autar Thrombosis Risk Assessment Scale scores were analyzed.Univariate and multivariate unconditional logistic regression analyses were performed on relevant factors,and the value of combined indicators in predicting PICC-related thrombosis in hospitalized patients with liver cancer was evaluated using receiver operating characteristic(ROC)curve analysis.RESULTS Univariate analysis showed statistically significant differences(P<0.05)in age,sex,Karnofsky performance status score(KPS),bedridden time,activities of daily living impairment,parenteral nutrition,catheter duration,distant metastasis,and bone marrow suppression between the thrombosis group and the non-thrombosis group.Other aspects had no statistically significant differences(P>0.05).Multivariate regression analysis showed that age≥60 years,KPS score≤50 points,parenteral nutrition,stage III to IV,distant metastasis,bone marrow suppression,and activities of daily living impairment were independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer(P<0.05).Catheter duration of 1-6 months and catheter duration>6 months were protective factors for PICC-related thrombosis(P<0.05).The predictive model for PICC-related thrombosis was obtained as follows:P predictive probability=[exp(Logit P)]/[1+exp(Logit P)],where Logit P=age×1.907+KPS score×2.045+parenteral nutrition×9.467+catheter duration×0.506+tumor-node-metastasis(TNM)staging×2.844+distant metastasis×2.065+bone marrow suppression×2.082+activities of daily living impairment×13.926.ROC curve analysis showed an area under the curve(AUC)of 0.827(95%CI:0.724-0.929,P<0.001),with a corresponding optimal cut-off value of 0.612,sensitivity of 0.755,and specificity of 0.857.Calibration curve analysis showed good consistency between the predicted occurrence of PICC-related thrombosis and actual occurrence(P>0.05).ROC analysis showed AUCs of 0.888 and 0.729 for the training and validation sets,respectively.CONCLUSION Age,KPS score,parenteral nutrition,TNM staging,distant metastasis,bone marrow suppression,and activities of daily living impairment are independent risk factors for PICC-related thrombosis in hospitalized patients with liver cancer,while catheter duration is a protective factor for the disease.The predictive model has an AUC of 0.827,indicating high predictive accuracy and clinical value. 展开更多
关键词 Liver cancer Peripherally inserted central catheters THROMBOSIS Model verify
暂未订购
上一页 1 2 21 下一页 到第
使用帮助 返回顶部