期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
不同入路冠状动脉介入治疗术围手术期周围血管并发症发生率的对比 被引量:11
1
作者 张树清 崔磊 +4 位作者 祁荣兴 sanjeev kumar P S 黄胜 葛莉 钱澄 《中国临床医学》 2017年第5期789-792,共4页
目的:比较经股动脉和桡动脉入路冠状动脉介入治疗(percutaneous coronary intervention,PCI)术中周围血管并发症的发生率,为其临床诊治提供参考。方法:分析2014年7月至2016年12月在我院心血管介入治疗中心进行冠状动脉造影及介入治疗的... 目的:比较经股动脉和桡动脉入路冠状动脉介入治疗(percutaneous coronary intervention,PCI)术中周围血管并发症的发生率,为其临床诊治提供参考。方法:分析2014年7月至2016年12月在我院心血管介入治疗中心进行冠状动脉造影及介入治疗的780例患者的临床资料,比较周围血管并发症发生情况。结果:经股动脉途径471例,经桡动脉途径309例。经股动脉途径总体并发症发生率13.2%,高于经桡动脉途径的4.5%,差异有统计学意义(P<0.001)。经股动脉途径出血并发症发生率为7.9%,高于经桡动脉途径2.6%,差异有统计学意义(P=0.002)。经股动脉途径患者重大并发症(后腹膜血肿、假性动脉瘤、动静脉瘘、动脉夹层形成)发生率高于经桡动脉途径(2.1%vs 0%),但差异无统计学意义。结论:经股动脉途径冠状动脉介入治疗术围手术期周围血管并发症发生率高于经桡动脉途径,临床入路选择时需综合考虑。 展开更多
关键词 经皮冠状动脉介入治疗 并发症 手术人路
下载PDF
原发性眼附属器淋巴瘤的诊断及鉴别诊断 被引量:5
2
作者 苗焕民 胡粟 +2 位作者 sanjeev kumar P.S 刘钊 叶爱华 《医学影像学杂志》 2018年第7期1065-1068,共4页
目的搜集原发性眼附属器淋巴瘤患者的影像资料,进行影像学分析,总结其影像特点,从而提高对该疾病的认识。方法回顾性分析经手术病理证实的19例原发性眼附属器淋巴瘤患者的CT及MRI特点,其中CT检查18例,MRI检查12例,同时进行CT及MRI检查... 目的搜集原发性眼附属器淋巴瘤患者的影像资料,进行影像学分析,总结其影像特点,从而提高对该疾病的认识。方法回顾性分析经手术病理证实的19例原发性眼附属器淋巴瘤患者的CT及MRI特点,其中CT检查18例,MRI检查12例,同时进行CT及MRI检查者11例。结果 19例分别位于眼睑(n=10)、泪腺(n=5)、泪囊(n=3),眼外肌(n=1)。CT表现为眼附属器高密度软组织占位,CT值50~56HU,病灶无包膜,呈匍匐铸型生长,MRI呈等T1WI、等或稍长T2WI信号,增强扫描后明显强化。CT及MRI均可显示肿瘤与周围结构的关系,眼环受累(n=3),眼外肌受累(n=6)、泪腺受累(n=4),同时累及泪腺、眼环及眼外肌(n=2),以包绕为主,占位效应不明显。结论原发性眼附属器淋巴瘤较少见,临床工作中需不断总结经验,提高认识,以减少误诊。 展开更多
关键词 原发性 附属器 淋巴瘤 体层摄影术 X线计算机 磁共振成像
下载PDF
CT平扫“PE窗”对急性肺动脉栓塞的诊断价值 被引量:1
3
作者 王宁 刘佳 +5 位作者 尹剑兵 sanjeev kumar PS 沈月红 季娟 毛咪咪 崔磊 《徐州医科大学学报》 CAS 2019年第11期819-822,共4页
目的以肺动脉CT造影(CTPA)为金标准,通过与常规纵隔窗的比较,评估肺动脉栓塞特定窗(PE窗)对急性肺动脉栓塞(PE)的诊断价值。方法回顾分析102例中心或近端叶间PE阳性者,102例CTPA正常者作为阴性对照。2位住院医师首先观察常规纵隔软组织... 目的以肺动脉CT造影(CTPA)为金标准,通过与常规纵隔窗的比较,评估肺动脉栓塞特定窗(PE窗)对急性肺动脉栓塞(PE)的诊断价值。方法回顾分析102例中心或近端叶间PE阳性者,102例CTPA正常者作为阴性对照。2位住院医师首先观察常规纵隔软组织窗(窗宽350 Hu,窗位50 Hu),然后观察“PE窗”(窗宽120 Hu,窗位65 Hu),分别记录诊断信心指数,确定PE是阳性还是阴性,只有精确定位的中央或近端叶间P E被认为是真阳性结果。使用两配对样本的非参数检验比较使用纵隔窗和“PE窗”诊断PE的诊断信心指数。结果102例PE阳性者68.6%累及中心肺动脉,31.4%单独累及叶间肺动脉,70.2%累及双侧。2位阅片者获得的真实敏感度分别为62.7%和55.9%,特异度分别为67.6%和70.6%。通过CT平扫“PE窗”,PE的诊断信心均显著提高(P值分别为0.016和0.014)。结论使用CT平扫“PE窗”对急性PE有中等度的诊断价值,但使用“PE窗”诊断信心更高。 展开更多
关键词 肺动脉栓塞 体层摄影术 X线计算机
下载PDF
Analyzing Computational Components of Standard Block Encryption Schemes
4
作者 Chu-Wen Cheng Miranda Heather Cantu sanjeev kumar 《Journal of Computer and Communications》 2022年第6期81-89,共9页
Encryption is used to secure sensitive computer data which may be at rest or in motion. There are several standard encryption algorithms that have been used to encrypt and protect blocks of sensitive data to ensure co... Encryption is used to secure sensitive computer data which may be at rest or in motion. There are several standard encryption algorithms that have been used to encrypt and protect blocks of sensitive data to ensure confidentiality. The most popular standard block encryption schemes are the Advanced Encryption Standard (AES), Triple Data Encryption Standard (3DES), and the first standardized encryption scheme, which is no longer the standard scheme now, namely the Data Encryption Standard (DES). AES is the current standard for block encryption used worldwide and is implemented on many processors. In this work, we compare the hardware performance of these three encryption schemes. First, we identified the underlying computational components for these three encryption schemes, and then we analyzed to what extent these computational components were being used in these block encryption schemes to encrypt and decrypt a given message. In this paper, we compared the contribution of these computational components to evaluate the overall encryption efficiency in terms of speed and computational delays for encrypting a given block of data for a given hardware platform. AES was found to be the faster scheme in terms of hardware computation speed in accomplishing the same encryption task compared to the other two block encryption schemes, namely, the DES and 3DES schemes. 展开更多
关键词 Data Encryption DES 3DES AES
下载PDF
Land Use/Land Cover Change Detection in Pokhara Metropolitan, Nepal Using Remote Sensing
5
作者 sanjeev kumar Raut Puran Chaudhary Laxmi Thapa 《Journal of Geoscience and Environment Protection》 2020年第8期25-35,共11页
Land use and land cover are essential for maintaining and managing the natural resources on the earth surface. A complex set of economic, demographic, social, cultural, technological, and environmental processes usual... Land use and land cover are essential for maintaining and managing the natural resources on the earth surface. A complex set of economic, demographic, social, cultural, technological, and environmental processes usually result in the change in the land use/land cover change (LULC). Pokhara Metropolitan is influenced mainly by the combination of various driving forces: geographical location, high rate of population growth, economic opportunity, globalization, tourism activities, and political activities. In addition to this, geographically steep slope, rugged terrain, and fragile geomorphic conditions and the frequency of earthquakes, floods, and landslides make the Pokhara Metropolitan region a disaster-prone area. The increment of the population along with infrastructure development of a given territory leads towards the urbanization. It has been rapidly changing due to urbanization, industrialization and internal migration since the 1970s. The landscapes and ground patterns are frequently changing on time and prone to disaster. Here a study has been carried to study on LULC for the last 18 years (2000-2018). The supervised classification on Landsat Imagery was performed and verified the classification through computing the error matrix. Besides, the water bodies and vegetation area were extracted through the Normalized Difference Water Index (NDWI) and Normalized Difference Vegetation Index (NDWI) respectively. This research shows that during the last 18 years the agricultural areas diminishing by 15.66% while urban area is increasing by 13.2%. This research is beneficial for preparing the plan and policy in the sustainable development of Pokhara Metropolitan. 展开更多
关键词 Error Matrix Land Use/Land Cover (LULC) Normalized Difference Vegeta-tion Index (NDVI) Normalized Difference Water Index (NDWI) Supervised Image Classification Remote Sensing Urban Growth
下载PDF
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
6
作者 Koushicaa Sundar sanjeev kumar 《Journal of Information Security》 2016年第4期225-231,共7页
Microsoft server Operating Systems are considered to have in-built, host based security features that should provide some protection against Distributed Denial of Service (DDoS) attacks. In this paper, we presented re... Microsoft server Operating Systems are considered to have in-built, host based security features that should provide some protection against Distributed Denial of Service (DDoS) attacks. In this paper, we presented results of experiments that were conducted to test the security capability of the latest server Operating System from Microsoft Inc., namely Windows Server 2012 R2. Experiments were designed to evaluate its in-built security features in defending against a common Distributed Denial of Service (DDoS) attack, namely the TCP-SYN based DDoS attack. Surprisingly, it was found that the Windows Server 2012 R2 OS lacked sufficient host-based protection and was found to be unable to defend against even a medium intensity3.1 Gbps-magnitude of TCP-SYN attack traffic. The server was found to crash within minutes after displaying a Blue Screen of Death (BSoD) under such security attacks. 展开更多
关键词 Network Security Server Security DDoS Attack TCP SYN Flood Blue Screen of Death
下载PDF
2D matrix based indexing with color spectralhistogram for efficient image retrieval
7
作者 maruthamuthu ramasamy john sanjeev kumar athisayam 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第5期1122-1134,共13页
A novel content based image retrieval (CBIR) algorithmusing relevant feedback is presented. The proposed frameworkhas three major contributions: a novel feature descriptor calledcolor spectral histogram (CSH) to ... A novel content based image retrieval (CBIR) algorithmusing relevant feedback is presented. The proposed frameworkhas three major contributions: a novel feature descriptor calledcolor spectral histogram (CSH) to measure the similarity betweenimages; two-dimensional matrix based indexing approach proposedfor short-term learning (STL); and long-term learning (LTL).In general, image similarities are measured from feature representationwhich includes color quantization, texture, color, shapeand edges. However, CSH can describe the image feature onlywith the histogram. Typically the image retrieval process starts byfinding the similarity between the query image and the imagesin the database; the major computation involved here is that theselection of top ranking images requires a sorting algorithm to beemployed at least with the lower bound of O(n log n). A 2D matrixbased indexing of images can enormously reduce the searchtime in STL. The same structure is used for LTL with an aim toreduce the amount of log to be maintained. The performance ofthe proposed framework is analyzed and compared with the existingapproaches, the quantified results indicates that the proposedfeature descriptor is more effectual than the existing feature descriptorsthat were originally developed for CBIR. In terms of STL,the proposed 2D matrix based indexing minimizes the computationeffort for retrieving similar images and for LTL, the proposed algorithmtakes minimum log information than the existing approaches. 展开更多
关键词 content based image retrieval (CBIR) color spectralhistogram (CSH) short-term learning (STL) long-term learning(LTL) similarity measures.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部