نتایج جستجو برای: repairing

تعداد نتایج: 5797  

Journal: :Interactive cardiovascular and thoracic surgery 2013
Yasuyuki Kato Toshihiro Fukui Minoru Tabata Shuichiro Takanashi

The mortality of postinfarction left ventricular free wall rupture is still high. Several surgical techniques have been used for repairing such ruptures. Here, we describe using an infarction exclusion technique to successfully treat a case of a blow-out type postinfarction left ventricular free wall rupture. This technique has frequently been used for repairing postinfarction ventricular septa...

1995
Michael Gertz Udo W. Lipeck

Repairing violations of integrity constraints in databases can be seen as an interleaving diagnostic/repair process. In this paper we introduce a new approach on repairing constraint violations by adopting existing techniques from model{based diagnosis. Violations of integrity constraints observed in an inconsistent database state are diagnosed and repair actions are deduced from diagnoses. By ...

1995
Michael Gertz Udo W. Lipeck

Repairing violations of integrity constraints in databases can be seen as an in-terleaving diagnostic/repair process. In this paper we introduce a new approach on repairing constraint violations by adopting existing techniques from model{based diagnosis. Violations of integrity constraints observed in an inconsistent database state are diagnosed and repair actions are deduced from diagnoses. By...

2013
Fuyang Chen Rui Hou Bin Jiang Gang Tao

In this paper, a novel direct self-repairing controller via quantum information technique and nonlinear fault observer is designed, which addresses tracking control and convergence rate problem of a helicopter. First, a nonlinear fault observer is designed to diagnose the helicopter’s fault. Next, in order to improve the convergence rate and stabilization of the helicopter system, an exponentia...

2011
Che-Wei Lee Wen-Hsiang Tsai

A new grayscale image authentication method with a pixel-level self-recovering capability for tampered region repairing is proposed. By dividing the grayscale range into bins, a 3-bit bin code is generated as the authentication signal for each pixel in the input cover image. The authentication signals then are embedded randomly into the image pixels for the double purposes of tampering localiza...

Journal: :Sci. Comput. Program. 2005
Michael Eonsuk Shin

This paper describes an approach to designing self-healing component for robust, concurrent and distributed software architecture. A self-healing component is able to detect object anomalies inside of the component, reconfigure inter-component and intra-components before and after repairing the sick object, repair it, and then test the healed object. For this, each self-healing component is str...

Journal: :Des. Codes Cryptography 2016
Douglas R. Stinson Ruizhong Wei

In this paper, we consider methods whereby a subset of players in a (k, n)-threshold scheme can “repair” another player’s share in the event that their share has been lost or corrupted. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the (unconditional) security of the threshold scheme, and it should be efficient, ...

Journal: :Journal of The Adhesion Society of Japan 2012

Journal: :The International Journal of Advanced Manufacturing Technology 2013

Journal: :South African Historical Journal 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید