Zobrazeno 1 - 10
of 10 932
pro vyhledávání: '"LIU Pei"'
Publikováno v:
Chinese Journal of Contemporary Neurology and Neurosurgery, Vol 24, Iss 8, Pp 613-618 (2024)
Cerebral vascular bypass is a key method for the treatment of complex intracranial aneurysms. After nearly 60 years of exploration, its application range now covers the whole cerebral vascular region. With the advent of detachable coils and the matur
Externí odkaz:
https://doaj.org/article/2f420467b5f9494bb2397dd9c723f204
Publikováno v:
Chinese Journal of Contemporary Neurology and Neurosurgery, Vol 24, Iss 8, Pp 644-650 (2024)
Objective To explore the efficacy and safety of intracranial-intracranial bypass for the treatment of complex intracranial aneurysms. Methods and Results A total of 32 patients with complex intracranial aneurysms who were hospitalized for treatment a
Externí odkaz:
https://doaj.org/article/f9f86e85692b4f90b99b04ffdd9352a9
Publikováno v:
Sichuan jingshen weisheng, Vol 37, Iss 4, Pp 307-311 (2024)
BackgroundComorbid attention-deficit/hyperactivity disorder (ADHD) and emotional dysregulation may represent a distinct subtype of ADHD, which is characterized by an increased risk of anxiety or depressive disorder and a poor clinical prognosis
Externí odkaz:
https://doaj.org/article/e722e5de02304cd98835edee08dc5c64
Autor:
Liu Pei, Chu Zhaojie, Li Bo, Lin Xuemei, Liu Yan, Song Chensheng, Suo Yan, Zhao Jun, Wu Songdi
Publikováno v:
Guoji Yanke Zazhi, Vol 24, Iss 7, Pp 1173-1178 (2024)
AIM: To explore the neuro-ophthalmological characteristics of acute macular neuroretinopathy(AMN)after SARS-CoV-2 infection.METHODS: A total of 8 patients(14 eyes), including 6 females and 2 males, who were diagnosed with AMN in the neuro-ophthalmolo
Externí odkaz:
https://doaj.org/article/83d0c83127524f6d94abe78abecadbaf
Publikováno v:
Guoji Yanke Zazhi, Vol 24, Iss 5, Pp 816-820 (2024)
AIM:To compare the differences of ocular biometric parameters of age-related cataract between Tibetan and Han ethnic groups, and to analyze the distribution characteristics of ocular biometric parameters in Tibetan cataract patients.METHODS:Retrospec
Externí odkaz:
https://doaj.org/article/531b7132c2bd4c81a571f5c4727484fb
Autor:
Liu Pei
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
This paper explores the relationship between college students’ consumption views and their consumption views under Civic Education in the context of multiple datasets. Secondly, a multi-agent, multi-source heterogeneous data collection model is use
Externí odkaz:
https://doaj.org/article/e5fb739810ce4857a17ebac81b536609
Publikováno v:
Nanotechnology Reviews, Vol 12, Iss 1, Pp 117585-97 (2023)
In this work, the nucleation and growth behavior of Ti2AlC and Ti3AlC nano-precipitates in Ti–44Al–1.2C alloys were systematically studied by observing their distribution, morphology, and interface atomic structure. The experiment results show th
Externí odkaz:
https://doaj.org/article/321b438227744ec88f4aacc9a914e98e
Autor:
LIU Pei⁃pei, WU Jia⁃ling
Publikováno v:
Chinese Journal of Contemporary Neurology and Neurosurgery, Vol 23, Iss 1, Pp 35-39 (2023)
The combination of medicine and engineering is gradually becoming a new model for clinical diagnosis and treatment of Parkinson's disease (PD). Intelligent assisted diagnosis and treatment is attracting more and more attention from clinicians, among
Externí odkaz:
https://doaj.org/article/5c2e3145d20d4475ab1270302926fff3
Publikováno v:
中国工程科学, Vol 24, Iss 2, Pp 113-122 (2022)
The cruise industry is an important driving force for China’s economic supply-side reforms during the 14th Five-Year Plan period. The construction of a large cruise ship is a complex, customized, and giant project, and it is the only high-tech ship
Externí odkaz:
https://doaj.org/article/4d26cea30ea8412da362ad58c59419e1
Publikováno v:
Jisuanji kexue, Vol 49, Iss 11, Pp 326-334 (2022)
Kernel vulnerability attack is a common attack way for operating systems,and the analysis of each attack stage is the key to defend against such attacks.Due to the complexity and variety of kernel vulnerability types,trigger paths,and exploit modes,i
Externí odkaz:
https://doaj.org/article/d1815a885ef84d1faa6b9dd62065afbc