期刊文献+
共找到14,105篇文章
< 1 2 250 >
每页显示 20 50 100
Reversible Semi-Fragile Watermarking Technique for Integrity Control of Relational Database
1
作者 Ali Hamadou Abdoul Aziz Issaka Hassane +1 位作者 Lanciné Camara Harouna Naroua 《Engineering(科研)》 2024年第9期309-323,共15页
Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differ... Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differentiate between legal and malicious modifications. In this paper, we introduce a novel lossless semi-fragile scheme based on prediction-error expansion for content protection of relational database. In the proposed method, all attributes in a database relation are first classified according to their sensitivity to legitimate updates. Then, the watermark is embedded by expanding the prediction error of the two least significant digits of securely selected attributes. At watermark extraction, the proposed method has the ability to fully restore the original data while detecting and localizing tampering. The applicability of our method is demonstrated theoretically and experimentally. 展开更多
关键词 semi-fragile Watermarking Integrity Control REVERSIBILITY Prediction-Error Expansion
下载PDF
Semi-Fragile Audio Watermarking Algorithm in DWT Domain 被引量:3
2
作者 LEI Min YANG Yu +1 位作者 LUO Shoushan NIU Xinxin 《China Communications》 SCIE CSCD 2010年第4期71-75,共5页
A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many ... A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many groups.Through computing mean quantization of per group,this algorithm embeds the watermark signal into the average value of the wavelet coefficients.Experimental results show that our semi-fragile audio watermarking algorithm is not only inaudible and robust against various common images processing,but also fragile to malicious modification.Especially,it can detect the tampered regions effectively. 展开更多
关键词 semi-fragile Watermarking Wavelet Transform Mean Quantization Tamper Detection
下载PDF
SEMI-FRAGILE WATERMARKING ALGORITHM FOR IMAGE TAMPERS LOCALIZATION AND RECOVERY 被引量:2
3
作者 Jiang Xuemei Liu Quan 《Journal of Electronics(China)》 2008年第3期343-351,共9页
Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localizat... Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery watermark for tamper recovering. The original image is divided into 8 x 8 blocks and each block is transformed by Discrete Cosine Transform (DCT). For each block, some lower frequency DCT coefficients are chosen to be quantized and binary encoded so as to gain the recovery watermark of each block, and the recovery watermark is embedded into the LSB of another block by chaos encryption and authentication chain technology. After the two watermarks being detected, the location of any minute changes in image can be detected, and the tampered image data can be recovered effectively. In the paper, the number of coefficients and their bit lengths are carefully chosen in order to satisfy with the payload of each block and gain the capability of self-recovering. The proposed algorithm can well resist against possible forged attacks. Experimental results show that the watermark generated by the proposed algorithm is sensitive to tiny changes in images, and it has higher accuracy of tamper localization and good capability of the tamper recovery. 展开更多
关键词 Image authentication Tamper localization Image recovery semi-fragile watermark
下载PDF
A new semi-fragile watermarking algorithm for image authentication 被引量:1
4
作者 韩德志 《Journal of Chongqing University》 CAS 2005年第1期41-46,共6页
This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con... This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place. 展开更多
关键词 AUTHENTICATION semi-fragile watermarking FRAGILITY wavelet transform
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
5
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Countermeasure against blinding attack for single-photon detectors in quantum key distribution
6
作者 Lianjun Jiang Dongdong Li +12 位作者 Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang 《Journal of Semiconductors》 EI CAS CSCD 2024年第4期76-81,共6页
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin... Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security. 展开更多
关键词 quantum key distribution single photon detector blinding attack pulsed blinding attack COUNTERMEASURE quan-tum communication
下载PDF
Blind Recognition of Non-Binary LDPC Codes Based on Ant Colony Optimization
7
作者 Guan Mengsheng Gao Wanting +2 位作者 Chen Qi Zhu Min Bai Baoming 《China Communications》 SCIE CSCD 2024年第10期59-69,共11页
This paper introduces a novel blind recognition of non-binary low-density parity-check(LDPC)codes without a candidate set,using ant colony optimization(ACO)algorithm over additive white Gaussian noise(AWGN)channels.Sp... This paper introduces a novel blind recognition of non-binary low-density parity-check(LDPC)codes without a candidate set,using ant colony optimization(ACO)algorithm over additive white Gaussian noise(AWGN)channels.Specifically,the scheme that effectively combines the ACO algorithm and the non-binary elements over finite fields is proposed.Furthermore,an improved,simplified elitist ACO algorithm based on soft decision reliability is introduced to recognize the parity-check matrix over noisy channels.Simulation results show that the recognition rate continuously increases with an increased signalto-noise ratio(SNR)over the AWGN channel. 展开更多
关键词 ACO blind recognition non-binary LDPC codes open-set
下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
8
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
9
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology
10
作者 Chengjie Li Lidong Zhu Zhen Zhang 《China Communications》 SCIE CSCD 2024年第2期85-95,共11页
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system. 展开更多
关键词 blind source separation greedy optimization algorithm interference sensing LEO satellite communication networks signal reconstruction
下载PDF
Robust blind image watermarking based on interest points
11
作者 Zizhuo WANG Kun HU +3 位作者 Chaoyangfan HUANG Zixuan HU Shuo YANG Xingjun WANG 《虚拟现实与智能硬件(中英文)》 EI 2024年第4期308-322,共15页
Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability.However,image watermarking algorithms are weak against hybrid attacks,especially geometric attacks,such as cr... Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability.However,image watermarking algorithms are weak against hybrid attacks,especially geometric attacks,such as cropping attacks,rotation attacks,etc.We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further.First,to extract more sparse and stable interest points,we use the Superpoint algorithm for generation and design two steps to perform the screening procedure.We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability.The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework.Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks.We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks.Through extensive experimental results,we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image.Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks. 展开更多
关键词 blind watermarking Robust region selection Geometric distortion Deep learning
下载PDF
Research on blind source separation of operation sounds of metro power transformer through an Adaptive Threshold REPET algorithm
12
作者 Liang Chen Liyi Xiong +2 位作者 Fang Zhao Yanfei Ju An Jin 《Railway Sciences》 2024年第5期609-621,共13页
Purpose–The safe operation of the metro power transformer directly relates to the safety and efficiency of the entire metro system.Through voiceprint technology,the sounds emitted by the transformer can be monitored ... Purpose–The safe operation of the metro power transformer directly relates to the safety and efficiency of the entire metro system.Through voiceprint technology,the sounds emitted by the transformer can be monitored in real-time,thereby achieving real-time monitoring of the transformer’s operational status.However,the environment surrounding power transformers is filled with various interfering sounds that intertwine with both the normal operational voiceprints and faulty voiceprints of the transformer,severely impacting the accuracy and reliability of voiceprint identification.Therefore,effective preprocessing steps are required to identify and separate the sound signals of transformer operation,which is a prerequisite for subsequent analysis.Design/methodology/approach–This paper proposes an Adaptive Threshold Repeating Pattern Extraction Technique(REPET)algorithm to separate and denoise the transformer operation sound signals.By analyzing the Short-Time Fourier Transform(STFT)amplitude spectrum,the algorithm identifies and utilizes the repeating periodic structures within the signal to automatically adjust the threshold,effectively distinguishing and extracting stable background signals from transient foreground events.The REPET algorithm first calculates the autocorrelation matrix of the signal to determine the repeating period,then constructs a repeating segment model.Through comparison with the amplitude spectrum of the original signal,repeating patterns are extracted and a soft time-frequency mask is generated.Findings–After adaptive thresholding processing,the target signal is separated.Experiments conducted on mixed sounds to separate background sounds from foreground sounds using this algorithm and comparing the results with those obtained using the FastICA algorithm demonstrate that the Adaptive Threshold REPET method achieves good separation effects.Originality/value–A REPET method with adaptive threshold is proposed,which adopts the dynamic threshold adjustment mechanism,adaptively calculates the threshold for blind source separation and improves the adaptability and robustness of the algorithm to the statistical characteristics of the signal.It also lays the foundation for transformer fault detection based on acoustic fingerprinting. 展开更多
关键词 TRANSFORMER Voiceprint recognition blind source separation Mel frequency cepstral coefficients(MFCC) Adaptive threshold
下载PDF
Exploring the meaning of care among lived experiences of patients with blindness:an interpretive phenomenological study
13
作者 Mohammad Ali Mohammadi Mehdi Heidarzadeh +1 位作者 Saeed Mehri Mahmood Shamshiri 《Frontiers of Nursing》 2024年第3期319-326,共8页
Objective:To explore the meaning of care experienced by people with blindness in hospitals.Methods:Interpretive phenomenology along with the 6-step method of van Manen was used to conduct the study.Using purposeful sa... Objective:To explore the meaning of care experienced by people with blindness in hospitals.Methods:Interpretive phenomenology along with the 6-step method of van Manen was used to conduct the study.Using purposeful sampling,15 people with legal blindness were interviewed.Thematic analysis was used to isolate the meaning of care.Results:Five themes emerged:(a)nurses in the eyes of patients with blindness;(b)negligence in the caring moments;(c)being cared for in ambiguity;(d)Uncoordinated care;and(e)Psychological discomfor t.These sub-themes were condensed into an overarching theme titled as“marginalized patients inside the stereotypical healthcare system.”Conclusions:Lived experiences of patients with blindness revealed that hospitals provide stereotypic or inappropriate care for this minority group in society.Health professionals par ticularly nurses should be skilled to provide person-centered and coordinated care for patients with blindness. 展开更多
关键词 HOSPITALIZATION lived experience meaning of care people with blindness PHENOMENOLOGY
下载PDF
一种基于Blind Kriging模型和差分进化的电磁结构优化算法 被引量:2
14
作者 陈晓辉 郭欣欣 裴进明 《电子测量与仪器学报》 CSCD 北大核心 2016年第11期1694-1700,共7页
各类电磁结构日趋复杂,设计自由度不断提升.传统优化算法需要对大量的参数组合进行全波仿真试探,设计效率普遍较低。针对这一问题,提出BK(blind Kriging)模型和差分进化相结合的电磁结构优化算法.相比普通Kriging模型,BK模型通过贝叶斯... 各类电磁结构日趋复杂,设计自由度不断提升.传统优化算法需要对大量的参数组合进行全波仿真试探,设计效率普遍较低。针对这一问题,提出BK(blind Kriging)模型和差分进化相结合的电磁结构优化算法.相比普通Kriging模型,BK模型通过贝叶斯参数选择算法将影响性能的主要因子加入回归模型,提高对响应的预测精度;依据BK模型的预测结果从每代差分进化种群中选择最优个体执行电磁仿真。由于优化过程中大量的电磁计算转移到快速的BK模型,优化效率得到显著提升。通过一个圆波导多螺钉极化转换器的优化设计,表明该方法的求解质量和收敛速度优于现有算法。 展开更多
关键词 电磁结构 优化算法 blind KRIGING 差分进化
下载PDF
Blind Deconvolution Method Based on Precondition Conjugate Gradients 被引量:1
15
作者 朱振宇 裴江云 +2 位作者 吕小林 刘洪 李幼铭 《Petroleum Science》 SCIE CAS CSCD 2004年第3期37-40,共4页
In seismic data processing, blind deconvolution is a key technology. Introduced in this paper is a flow of one kind of blind deconvolution. The optimal precondition conjugate gradients (PCG) in Kyrlov subspace is als... In seismic data processing, blind deconvolution is a key technology. Introduced in this paper is a flow of one kind of blind deconvolution. The optimal precondition conjugate gradients (PCG) in Kyrlov subspace is also used to improve the stability of the algorithm. The computation amount is greatly decreased. 展开更多
关键词 blind deconvolution precondition conjugate gradients (PCG) reflectivity series
下载PDF
A new blind loach species,Triplophysa huanjiangensis(Teleostei:Balitoridae),from Guangxi,China 被引量:4
16
作者 杨剑 吴铁军 蓝家湖 《Zoological Research》 CAS CSCD 北大核心 2011年第5期566-571,共6页
A new blind loach of the genus Triplophysa was collected in 2007 from a cave in Leyi village,located near Chuanshan Town,Huangjiang County in the Guangxi Zhuang Autonomous Region of southern China.The new species,Trip... A new blind loach of the genus Triplophysa was collected in 2007 from a cave in Leyi village,located near Chuanshan Town,Huangjiang County in the Guangxi Zhuang Autonomous Region of southern China.The new species,Triplophysa huangjiangensis sp.nov,can be distinguished from its congeners by eyes and scales absent;caudalfin forked;adipose keel present;lips with furrows;distal margin of dorsal-fin truncate,dorsal fin origin much closer to caudal-fin base than snout tip;8-9 branched dorsal-fin rays;6-7 branched pelvic-fin rays;6 branched anal-fin rays;10-11 branched pectoral-fin rays;13-14 branched caudal-fin rays;pectoral-fin length 52.3%-70.7% the distance between pectoral-fin origin to pelvic-fin origin;dorsal-fin origin posterior to vertical line of pelvic-fin origin;outer rostral barbel longer than other two pairs of barbels,with 47.0%-73.8% of lateral head length;anterior nostril with elongate barbel-like tip;and posterior chamber of gas-bladder developed,reaching pelvic-fin origin. 展开更多
关键词 New species blind fish BALITORIDAE TRIPLOPHYSA GUANGXI
下载PDF
矮牵牛花器官突变体blind-like的表型和解剖结构 被引量:1
17
作者 宁国贵 包满珠 《园艺学报》 CAS CSCD 北大核心 2006年第5期1121-1124,共4页
从矮牵牛自交系中获得一个花器官变异突变体,将其命名为blind-like。该突变体的性状能够稳定遗传,主要表现为花数增多,花瓣顶端出现花药状结构,具有类似正常花药的四分室结构,并产生少量花粉。该突变体与矮牵牛花器官blind突变体相似,... 从矮牵牛自交系中获得一个花器官变异突变体,将其命名为blind-like。该突变体的性状能够稳定遗传,主要表现为花数增多,花瓣顶端出现花药状结构,具有类似正常花药的四分室结构,并产生少量花粉。该突变体与矮牵牛花器官blind突变体相似,通过自花授粉与异花授粉产生种子。 展开更多
关键词 矮牵牛 花器官 发育 blind—like突变体
下载PDF
A New Approach for on-Line Blind Equalization and Channel Identification
18
作者 刘琚 王太君 何振亚 《Journal of Southeast University(English Edition)》 EI CAS 1999年第1期22-27,共6页
A new approach for blind equalization and channel identification is proposed in this paper. The equalization scheme is based on over sampling technique and an independent component analysis network. The equalized seq... A new approach for blind equalization and channel identification is proposed in this paper. The equalization scheme is based on over sampling technique and an independent component analysis network. The equalized sequence and its higher order statistics are used to identify the channel parameters. Compared to traditional equalization methods, the proposed approach is with a simple architecture, and does not need learning sequences. Computer simulations show the validity of the proposed method. 展开更多
关键词 over sampling blind equalization higher order statistics independent component analysis
下载PDF
A Block-Adaptive Blind Separation Algorithm for Post-Nonlinear Mixture of Sub- and Super-Gaussian Signals
19
作者 陈阳 杨绿溪 何振亚 《Journal of Southeast University(English Edition)》 EI CAS 2000年第2期1-9,共9页
The problem of blind separation of signals in post nonlinear mixture is addressed in this paper. The post nonlinear mixture is formed by a component wise nonlinear distortion after the linear mixture. Hence a nonlin... The problem of blind separation of signals in post nonlinear mixture is addressed in this paper. The post nonlinear mixture is formed by a component wise nonlinear distortion after the linear mixture. Hence a nonlinear adjusting part placed in front of the linear separation structure is needed to compensate for the distortion in separating such signals. The learning rules for the post nonlinear separation structure are derived by a maximum likelihood approach. An algorithm for blind separation of post nonlinearly mixed sub and super Gaussian signals is proposed based on some previous work. Multilayer perceptrons are used in this algorithm to model the nonlinear part of the separation structure. The algorithm switches between sub and super Gaussian probability models during learning according to a stability condition and operates in a block adaptive manner. The effectiveness of the algorithm is verified by experiments on simulated and real world signals. 展开更多
关键词 blind separation neural networks nonlinear mixture sub and super Gaussian
下载PDF
基于《国际功能、残疾和健康分类》评价中国智能化辅盲设备的补偿功能
20
作者 卜楠 杨祎铖 +2 位作者 宋贝贝 柏开祥 杜芸芸 《中国组织工程研究》 CAS 北大核心 2025年第17期3650-3656,共7页
背景:辅盲设备及技术的应用是当今视力障碍人群常用的干预手段,可提高日常生活活动的参与及工作学习能力,帮助其回归家庭、回归社会。数字信息和智能化时代下辅盲设备的形式、技术和功能各有不同,其分类目前暂未能得到有效统一的讨论和... 背景:辅盲设备及技术的应用是当今视力障碍人群常用的干预手段,可提高日常生活活动的参与及工作学习能力,帮助其回归家庭、回归社会。数字信息和智能化时代下辅盲设备的形式、技术和功能各有不同,其分类目前暂未能得到有效统一的讨论和评价。目的:基于《国际功能、残疾和健康分类》评价国内视力障碍人群智能化辅盲设备的补偿功能。方法:通过计算机检索中国知网、维普和万方数据库2013-01-01/2023-12-31收录的相关文献。基于《国际功能、残疾和健康分类》理论模式和框架结构,应用术语结构和编码程序归纳相关视力障碍评估类目,整理与分析国内视力障碍的智能化辅盲设备补偿功能研究与分类。结果与结论:①共纳入197篇文献:其中身体功能1篇,包含b2(b210);身体结构1篇,包含s2(s220);活动与参与共119篇,包含d1(10篇,d110、d115、d120、d140、d166),d3(4篇,d315、d325、d345、d360),d4(102篇,d465、d470),d8(3篇,d820、d825);环境因素共76篇,包含e1(72篇,e115、e120、e125、e130、e140、e150、e155、e160),e2(4篇,e210、e240);②基于《国际功能、残疾和健康分类》的视力障碍智能化辅盲设备补偿功能研究分类包含4个部分、8个分类、25个类目,领域涉及身体补偿类、生活用品类、教育学习类、出行导盲类、布局规划类。 展开更多
关键词 国际功能、残疾和健康分类 视力障碍 辅盲设备 智能化 人工智能 功能 分类 评价
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部