- Cryptography and Residue Arithmetic
- Coding theory and cryptography
- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Infrared Thermography in Medicine
- Power Systems and Technologies
- Ophthalmology and Visual Health Research
- Cardiac and Coronary Surgery Techniques
- Robotic Path Planning Algorithms
- Cardiac, Anesthesia and Surgical Outcomes
- Distributed and Parallel Computing Systems
- Cryptographic Implementations and Security
- Sleep and Work-Related Fatigue
- Smart Grid and Power Systems
- Thermoregulation and physiological responses
- Advanced Steganography and Watermarking Techniques
- Cardiovascular Disease and Adiposity
- Anorectal Disease Treatments and Outcomes
- EEG and Brain-Computer Interfaces
- Coronary Interventions and Diagnostics
- Guidance and Control Systems
- Military Defense Systems Analysis
- Cybercrime and Law Enforcement Studies
- Technology and Security Systems
- Blockchain Technology Applications and Security
Shanxi Medical University
2025
Shanghai University of Traditional Chinese Medicine
2025
Shuguang Hospital
2025
First Hospital of Shanxi Medical University
2025
Yantai University
2024
Institute of Information Engineering
2022
Chinese Academy of Sciences
2022
Sun Yat-sen University
2004-2010
Liaoning Provincial People's Hospital
2009
China Railway Corporation
2009
Objective To investigate the short-term prognosis and risk factors associated with in-hospital mortality in patients undergoing coronary artery bypass grafting (CABG) low ejection fraction. Methods Clinical data were collected from 765 who underwent CABG an fraction of less than 40% between 2019 2023 at Anhui Chest Hospital Beijing Anzhen Hospital, Capital Medical University. The categorized into a group ( n = 38) survival 727), based on whether they died within 30 days post-operation....
Diseases of the Colon & Rectum ():10.1097/DCR.0000000000003695, February 07, 2025. | DOI: 10.1097/DCR.0000000000003695
Abstract With the wide application and development of blockchain technology in various fields such as finance, government affairs medical care, security incidents occur frequently on it, which brings great threats to users’ assets information. Many researchers have worked abnormal behavior awareness respond these threats. We summarize respectively existing public consortium methods ideas detail difference between two types blockchain. At same time, we analyze data sets related mainstream...
The large-scale reconnaissance task allocation problem of multiple unmanned aerial vehicles (UAVs) is researched. In order to simplify the problem, process divided into two independent stages: cluster stage and sequence stage. first stage, a k-means algorithm based on azimuth angle developed group large number targets. traditional wolf pack (WPA) does not fit problem. second an improved WPA decide every mainly modifies three behaviors in WPA, namely, wandering behavior, summoning besieging...
The XTR is a very effective public key cryptosystem based on 3rd order LFSR sequence. But it has the parameter corresponding problem and neglects provable security property blind signature scheme. For overcoming these problems in this paper, extended with 4-th sequence to form new called <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">+</sup> . An algorithm for computing trace elements proposed, which only depends 2 times recursive matrix not as...