期刊文献+
共找到14,103篇文章
< 1 2 250 >
每页显示 20 50 100
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
1
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Countermeasure against blinding attack for single-photon detectors in quantum key distribution
2
作者 Lianjun Jiang Dongdong Li +12 位作者 Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang 《Journal of Semiconductors》 EI CAS CSCD 2024年第4期76-81,共6页
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin... Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security. 展开更多
关键词 quantum key distribution single photon detector blinding attack pulsed blinding attack COUNTERMEASURE quan-tum communication
下载PDF
Blind Recognition of Non-Binary LDPC Codes Based on Ant Colony Optimization
3
作者 Guan Mengsheng Gao Wanting +2 位作者 Chen Qi Zhu Min Bai Baoming 《China Communications》 SCIE CSCD 2024年第10期59-69,共11页
This paper introduces a novel blind recognition of non-binary low-density parity-check(LDPC)codes without a candidate set,using ant colony optimization(ACO)algorithm over additive white Gaussian noise(AWGN)channels.Sp... This paper introduces a novel blind recognition of non-binary low-density parity-check(LDPC)codes without a candidate set,using ant colony optimization(ACO)algorithm over additive white Gaussian noise(AWGN)channels.Specifically,the scheme that effectively combines the ACO algorithm and the non-binary elements over finite fields is proposed.Furthermore,an improved,simplified elitist ACO algorithm based on soft decision reliability is introduced to recognize the parity-check matrix over noisy channels.Simulation results show that the recognition rate continuously increases with an increased signalto-noise ratio(SNR)over the AWGN channel. 展开更多
关键词 ACO blind recognition non-binary LDPC codes open-set
下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
4
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
5
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
Robust blind image watermarking based on interest points
6
作者 Zizhuo WANG Kun HU +3 位作者 Chaoyangfan HUANG Zixuan HU Shuo YANG Xingjun WANG 《虚拟现实与智能硬件(中英文)》 EI 2024年第4期308-322,共15页
Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability.However,image watermarking algorithms are weak against hybrid attacks,especially geometric attacks,such as cr... Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability.However,image watermarking algorithms are weak against hybrid attacks,especially geometric attacks,such as cropping attacks,rotation attacks,etc.We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further.First,to extract more sparse and stable interest points,we use the Superpoint algorithm for generation and design two steps to perform the screening procedure.We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability.The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework.Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks.We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks.Through extensive experimental results,we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image.Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks. 展开更多
关键词 blind watermarking Robust region selection Geometric distortion Deep learning
下载PDF
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology
7
作者 Chengjie Li Lidong Zhu Zhen Zhang 《China Communications》 SCIE CSCD 2024年第2期85-95,共11页
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system. 展开更多
关键词 blind source separation greedy optimization algorithm interference sensing LEO satellite communication networks signal reconstruction
下载PDF
Research on blind source separation of operation sounds of metro power transformer through an Adaptive Threshold REPET algorithm
8
作者 Liang Chen Liyi Xiong +2 位作者 Fang Zhao Yanfei Ju An Jin 《Railway Sciences》 2024年第5期609-621,共13页
Purpose–The safe operation of the metro power transformer directly relates to the safety and efficiency of the entire metro system.Through voiceprint technology,the sounds emitted by the transformer can be monitored ... Purpose–The safe operation of the metro power transformer directly relates to the safety and efficiency of the entire metro system.Through voiceprint technology,the sounds emitted by the transformer can be monitored in real-time,thereby achieving real-time monitoring of the transformer’s operational status.However,the environment surrounding power transformers is filled with various interfering sounds that intertwine with both the normal operational voiceprints and faulty voiceprints of the transformer,severely impacting the accuracy and reliability of voiceprint identification.Therefore,effective preprocessing steps are required to identify and separate the sound signals of transformer operation,which is a prerequisite for subsequent analysis.Design/methodology/approach–This paper proposes an Adaptive Threshold Repeating Pattern Extraction Technique(REPET)algorithm to separate and denoise the transformer operation sound signals.By analyzing the Short-Time Fourier Transform(STFT)amplitude spectrum,the algorithm identifies and utilizes the repeating periodic structures within the signal to automatically adjust the threshold,effectively distinguishing and extracting stable background signals from transient foreground events.The REPET algorithm first calculates the autocorrelation matrix of the signal to determine the repeating period,then constructs a repeating segment model.Through comparison with the amplitude spectrum of the original signal,repeating patterns are extracted and a soft time-frequency mask is generated.Findings–After adaptive thresholding processing,the target signal is separated.Experiments conducted on mixed sounds to separate background sounds from foreground sounds using this algorithm and comparing the results with those obtained using the FastICA algorithm demonstrate that the Adaptive Threshold REPET method achieves good separation effects.Originality/value–A REPET method with adaptive threshold is proposed,which adopts the dynamic threshold adjustment mechanism,adaptively calculates the threshold for blind source separation and improves the adaptability and robustness of the algorithm to the statistical characteristics of the signal.It also lays the foundation for transformer fault detection based on acoustic fingerprinting. 展开更多
关键词 TRANSFORMER Voiceprint recognition blind source separation Mel frequency cepstral coefficients(MFCC) Adaptive threshold
下载PDF
Exploring the meaning of care among lived experiences of patients with blindness:an interpretive phenomenological study
9
作者 Mohammad Ali Mohammadi Mehdi Heidarzadeh +1 位作者 Saeed Mehri Mahmood Shamshiri 《Frontiers of Nursing》 2024年第3期319-326,共8页
Objective:To explore the meaning of care experienced by people with blindness in hospitals.Methods:Interpretive phenomenology along with the 6-step method of van Manen was used to conduct the study.Using purposeful sa... Objective:To explore the meaning of care experienced by people with blindness in hospitals.Methods:Interpretive phenomenology along with the 6-step method of van Manen was used to conduct the study.Using purposeful sampling,15 people with legal blindness were interviewed.Thematic analysis was used to isolate the meaning of care.Results:Five themes emerged:(a)nurses in the eyes of patients with blindness;(b)negligence in the caring moments;(c)being cared for in ambiguity;(d)Uncoordinated care;and(e)Psychological discomfor t.These sub-themes were condensed into an overarching theme titled as“marginalized patients inside the stereotypical healthcare system.”Conclusions:Lived experiences of patients with blindness revealed that hospitals provide stereotypic or inappropriate care for this minority group in society.Health professionals par ticularly nurses should be skilled to provide person-centered and coordinated care for patients with blindness. 展开更多
关键词 HOSPITALIZATION lived experience meaning of care people with blindness PHENOMENOLOGY
下载PDF
一种基于Blind Kriging模型和差分进化的电磁结构优化算法 被引量:2
10
作者 陈晓辉 郭欣欣 裴进明 《电子测量与仪器学报》 CSCD 北大核心 2016年第11期1694-1700,共7页
各类电磁结构日趋复杂,设计自由度不断提升.传统优化算法需要对大量的参数组合进行全波仿真试探,设计效率普遍较低。针对这一问题,提出BK(blind Kriging)模型和差分进化相结合的电磁结构优化算法.相比普通Kriging模型,BK模型通过贝叶斯... 各类电磁结构日趋复杂,设计自由度不断提升.传统优化算法需要对大量的参数组合进行全波仿真试探,设计效率普遍较低。针对这一问题,提出BK(blind Kriging)模型和差分进化相结合的电磁结构优化算法.相比普通Kriging模型,BK模型通过贝叶斯参数选择算法将影响性能的主要因子加入回归模型,提高对响应的预测精度;依据BK模型的预测结果从每代差分进化种群中选择最优个体执行电磁仿真。由于优化过程中大量的电磁计算转移到快速的BK模型,优化效率得到显著提升。通过一个圆波导多螺钉极化转换器的优化设计,表明该方法的求解质量和收敛速度优于现有算法。 展开更多
关键词 电磁结构 优化算法 blind KRIGING 差分进化
下载PDF
Blind Deconvolution Method Based on Precondition Conjugate Gradients 被引量:1
11
作者 朱振宇 裴江云 +2 位作者 吕小林 刘洪 李幼铭 《Petroleum Science》 SCIE CAS CSCD 2004年第3期37-40,共4页
In seismic data processing, blind deconvolution is a key technology. Introduced in this paper is a flow of one kind of blind deconvolution. The optimal precondition conjugate gradients (PCG) in Kyrlov subspace is als... In seismic data processing, blind deconvolution is a key technology. Introduced in this paper is a flow of one kind of blind deconvolution. The optimal precondition conjugate gradients (PCG) in Kyrlov subspace is also used to improve the stability of the algorithm. The computation amount is greatly decreased. 展开更多
关键词 blind deconvolution precondition conjugate gradients (PCG) reflectivity series
下载PDF
A new blind loach species,Triplophysa huanjiangensis(Teleostei:Balitoridae),from Guangxi,China 被引量:4
12
作者 杨剑 吴铁军 蓝家湖 《Zoological Research》 CAS CSCD 北大核心 2011年第5期566-571,共6页
A new blind loach of the genus Triplophysa was collected in 2007 from a cave in Leyi village,located near Chuanshan Town,Huangjiang County in the Guangxi Zhuang Autonomous Region of southern China.The new species,Trip... A new blind loach of the genus Triplophysa was collected in 2007 from a cave in Leyi village,located near Chuanshan Town,Huangjiang County in the Guangxi Zhuang Autonomous Region of southern China.The new species,Triplophysa huangjiangensis sp.nov,can be distinguished from its congeners by eyes and scales absent;caudalfin forked;adipose keel present;lips with furrows;distal margin of dorsal-fin truncate,dorsal fin origin much closer to caudal-fin base than snout tip;8-9 branched dorsal-fin rays;6-7 branched pelvic-fin rays;6 branched anal-fin rays;10-11 branched pectoral-fin rays;13-14 branched caudal-fin rays;pectoral-fin length 52.3%-70.7% the distance between pectoral-fin origin to pelvic-fin origin;dorsal-fin origin posterior to vertical line of pelvic-fin origin;outer rostral barbel longer than other two pairs of barbels,with 47.0%-73.8% of lateral head length;anterior nostril with elongate barbel-like tip;and posterior chamber of gas-bladder developed,reaching pelvic-fin origin. 展开更多
关键词 New species blind fish BALITORIDAE TRIPLOPHYSA GUANGXI
下载PDF
矮牵牛花器官突变体blind-like的表型和解剖结构 被引量:1
13
作者 宁国贵 包满珠 《园艺学报》 CAS CSCD 北大核心 2006年第5期1121-1124,共4页
从矮牵牛自交系中获得一个花器官变异突变体,将其命名为blind-like。该突变体的性状能够稳定遗传,主要表现为花数增多,花瓣顶端出现花药状结构,具有类似正常花药的四分室结构,并产生少量花粉。该突变体与矮牵牛花器官blind突变体相似,... 从矮牵牛自交系中获得一个花器官变异突变体,将其命名为blind-like。该突变体的性状能够稳定遗传,主要表现为花数增多,花瓣顶端出现花药状结构,具有类似正常花药的四分室结构,并产生少量花粉。该突变体与矮牵牛花器官blind突变体相似,通过自花授粉与异花授粉产生种子。 展开更多
关键词 矮牵牛 花器官 发育 blind—like突变体
下载PDF
A New Approach for on-Line Blind Equalization and Channel Identification
14
作者 刘琚 王太君 何振亚 《Journal of Southeast University(English Edition)》 EI CAS 1999年第1期22-27,共6页
A new approach for blind equalization and channel identification is proposed in this paper. The equalization scheme is based on over sampling technique and an independent component analysis network. The equalized seq... A new approach for blind equalization and channel identification is proposed in this paper. The equalization scheme is based on over sampling technique and an independent component analysis network. The equalized sequence and its higher order statistics are used to identify the channel parameters. Compared to traditional equalization methods, the proposed approach is with a simple architecture, and does not need learning sequences. Computer simulations show the validity of the proposed method. 展开更多
关键词 over sampling blind equalization higher order statistics independent component analysis
下载PDF
A Block-Adaptive Blind Separation Algorithm for Post-Nonlinear Mixture of Sub- and Super-Gaussian Signals
15
作者 陈阳 杨绿溪 何振亚 《Journal of Southeast University(English Edition)》 EI CAS 2000年第2期1-9,共9页
The problem of blind separation of signals in post nonlinear mixture is addressed in this paper. The post nonlinear mixture is formed by a component wise nonlinear distortion after the linear mixture. Hence a nonlin... The problem of blind separation of signals in post nonlinear mixture is addressed in this paper. The post nonlinear mixture is formed by a component wise nonlinear distortion after the linear mixture. Hence a nonlinear adjusting part placed in front of the linear separation structure is needed to compensate for the distortion in separating such signals. The learning rules for the post nonlinear separation structure are derived by a maximum likelihood approach. An algorithm for blind separation of post nonlinearly mixed sub and super Gaussian signals is proposed based on some previous work. Multilayer perceptrons are used in this algorithm to model the nonlinear part of the separation structure. The algorithm switches between sub and super Gaussian probability models during learning according to a stability condition and operates in a block adaptive manner. The effectiveness of the algorithm is verified by experiments on simulated and real world signals. 展开更多
关键词 blind separation neural networks nonlinear mixture sub and super Gaussian
下载PDF
基于《国际功能、残疾和健康分类》评价中国智能化辅盲设备的补偿功能
16
作者 卜楠 杨祎铖 +2 位作者 宋贝贝 柏开祥 杜芸芸 《中国组织工程研究》 CAS 北大核心 2025年第17期3650-3656,共7页
背景:辅盲设备及技术的应用是当今视力障碍人群常用的干预手段,可提高日常生活活动的参与及工作学习能力,帮助其回归家庭、回归社会。数字信息和智能化时代下辅盲设备的形式、技术和功能各有不同,其分类目前暂未能得到有效统一的讨论和... 背景:辅盲设备及技术的应用是当今视力障碍人群常用的干预手段,可提高日常生活活动的参与及工作学习能力,帮助其回归家庭、回归社会。数字信息和智能化时代下辅盲设备的形式、技术和功能各有不同,其分类目前暂未能得到有效统一的讨论和评价。目的:基于《国际功能、残疾和健康分类》评价国内视力障碍人群智能化辅盲设备的补偿功能。方法:通过计算机检索中国知网、维普和万方数据库2013-01-01/2023-12-31收录的相关文献。基于《国际功能、残疾和健康分类》理论模式和框架结构,应用术语结构和编码程序归纳相关视力障碍评估类目,整理与分析国内视力障碍的智能化辅盲设备补偿功能研究与分类。结果与结论:①共纳入197篇文献:其中身体功能1篇,包含b2(b210);身体结构1篇,包含s2(s220);活动与参与共119篇,包含d1(10篇,d110、d115、d120、d140、d166),d3(4篇,d315、d325、d345、d360),d4(102篇,d465、d470),d8(3篇,d820、d825);环境因素共76篇,包含e1(72篇,e115、e120、e125、e130、e140、e150、e155、e160),e2(4篇,e210、e240);②基于《国际功能、残疾和健康分类》的视力障碍智能化辅盲设备补偿功能研究分类包含4个部分、8个分类、25个类目,领域涉及身体补偿类、生活用品类、教育学习类、出行导盲类、布局规划类。 展开更多
关键词 国际功能、残疾和健康分类 视力障碍 辅盲设备 智能化 人工智能 功能 分类 评价
下载PDF
New subspace algorithm for blind channel estimation in OFDM systems
17
作者 黄学军 余松煜 毕厚杰 《Journal of Southeast University(English Edition)》 EI CAS 2005年第2期132-135,共4页
In order to increase the transmission efficiency,a subspace-based algorithm for blind channel estimation using second-order statistics is proposed in orthogonal frequency division multiplexing (OFDM) systems.Because t... In order to increase the transmission efficiency,a subspace-based algorithm for blind channel estimation using second-order statistics is proposed in orthogonal frequency division multiplexing (OFDM) systems.Because the transmission equation of OFDM systems does not exactly have the desired structure to directly derive a subspace algorithm,the algorithm first divides the OFDM signals into three parts,then,by exploiting the redundancy introduced by the cyclic prefix (CP) in OFDM signals,a new equation with Toeplitz channel matrix is derived.Based on the equation,a new blind subspace algorithm is developed.Toeplitz structure eases the derivation of the subspace algorithm and practical computation.Moreover the algorithm does not change the existing OFDM system,is robust to channel order overdetermination,and the channel zero locations.The performances are demonstrated by simulation results. 展开更多
关键词 orthogonal frequency division multiplexing (OFDM) blind channel estimation subspace algorithm
下载PDF
The gut-eye axis:from brain neurodegenerative diseases to age-related macular degeneration
18
作者 Qianzi Jin Suyu Wang +2 位作者 Yujia Yao Qin Jiang Keran Li 《Neural Regeneration Research》 SCIE CAS 2025年第10期2741-2757,共17页
Age-related macular degeneration is a serious neurodegenerative disease of the retina that significantly impacts vision.Unfortunately,the specific pathogenesis remains unclear,and effective early treatment options are... Age-related macular degeneration is a serious neurodegenerative disease of the retina that significantly impacts vision.Unfortunately,the specific pathogenesis remains unclear,and effective early treatment options are consequently lacking.The microbiome is defined as a large ecosystem of microorganisms living within and coexisting with a host.The intestinal microbiome undergoes dynamic changes owing to age,diet,genetics,and other factors.Such dysregulation of the intestinal flora can disrupt the microecological balance,resulting in immunological and metabolic dysfunction in the host,and affecting the development of many diseases.In recent decades,significant evidence has indicated that the intestinal flora also influences systems outside of the digestive tract,including the brain.Indeed,several studies have demonstrated the critical role of the gut-brain axis in the development of brain neurodegenerative diseases,including Alzheimer’s disease and Parkinson’s disease.Similarly,the role of the“gut-eye axis”has been confirmed to play a role in the pathogenesis of many ocular disorders.Moreover,age-related macular degeneration and many brain neurodegenerative diseases have been shown to share several risk factors and to exhibit comparable etiologies.As such,the intestinal flora may play an important role in age-related macular degeneration.Given the above context,the present review aims to clarify the gut-brain and gut-eye connections,assess the effect of intestinal flora and metabolites on age-related macular degeneration,and identify potential diagnostic markers and therapeutic strategies.Currently,direct research on the role of intestinal flora in age-related macular degeneration is still relatively limited,while studies focusing solely on intestinal flora are insufficient to fully elucidate its functional role in age-related macular degeneration.Organ-on-a-chip technology has shown promise in clarifying the gut-eye interactions,while integrating analysis of the intestinal flora with research on metabolites through metabolomics and other techniques is crucial for understanding their potential mechanisms. 展开更多
关键词 age-related macular degeneration biological agents blinding eye disease dietary nutrition fecal microbial transplantation gut-eye axis intestinal flora METABOLITE MICROECOLOGY neurodegenerative disease
下载PDF
基于测量的盲量子计算研究进展
19
作者 李建设 柳闻鹃 《湖南工业大学学报》 2025年第2期87-96,共10页
量子计算机具有广阔的前景和发展潜力,但其物理实现目前面临巨大挑战。基于测量的盲量子计算,由于其允许量子能力有限甚至没有量子能力的普通用户,可通过借助远程量子服务器,使用基于测量的量子计算模型完成计算任务,并保证其数据、算... 量子计算机具有广阔的前景和发展潜力,但其物理实现目前面临巨大挑战。基于测量的盲量子计算,由于其允许量子能力有限甚至没有量子能力的普通用户,可通过借助远程量子服务器,使用基于测量的量子计算模型完成计算任务,并保证其数据、算法和结果的私密性。因此,这种委托量子计算的方式将成为未来普通用户共享量子计算资源的一种重要应用模式。基于此,阐述了基于测量的量子计算模型包括的两种常用资源态—簇态和图态,以及测量模式的定义和形式化描述;分析了基于测量的盲量子计算的基本原理,包括通用资源态—Brickwork态的构造、盲量子计算测量模式和通用盲量子计算协议;梳理了解决基于测量的盲量子计算根本问题的不同技术路线和实验成果;探讨了其未来的发展方向。 展开更多
关键词 盲量子计算 测量模式 经典客户端 量子成本
下载PDF
陆地棉两个同源基因GhBlind的克隆与表达分析 被引量:3
20
作者 熊冠军 徐芹 华金平 《作物学报》 CAS CSCD 北大核心 2011年第2期362-368,共7页
Blind同源基因对植物株型调控起着重要作用。本研究用同源克隆策略,在陆地棉(GossypiumhirsutumL.)腋芽部位cDNA中克隆出2个Blind同源基因GhBlind1(GenBank登录号为HQ115643)和GhBlind2(登录号为HQ115644)。GhBlind1和GhBlind2均由3个... Blind同源基因对植物株型调控起着重要作用。本研究用同源克隆策略,在陆地棉(GossypiumhirsutumL.)腋芽部位cDNA中克隆出2个Blind同源基因GhBlind1(GenBank登录号为HQ115643)和GhBlind2(登录号为HQ115644)。GhBlind1和GhBlind2均由3个外显子和2个内含子组成,分别编码359个和262个氨基酸残基。组织特异性表达分析表明,GhBlind1在腋芽部位和茎尖分生组织部位优势表达,在根、叶、茎尖、幼嫩纤维表达,而在茎部不表达;GhBlind2在腋芽部位以及根、茎、叶片、茎尖表达,而在幼嫩纤维不表达。通过重组PCR技术,构建表达载体pSuper-gus-b1和pSuper-gus-b2;应用根癌农杆菌EHA105介导转化棉花胚性愈伤组织进行瞬时表达分析。将棉花胚性愈伤组织共培养4d后,2个表达载体转化的胚性愈伤组织中均能检测到GUS活性,但pSuper-gus-b2表达活性强于pSuper-gus-b1。对Blind同源蛋白的保守结构域比对发现,GhBlind1和GhBlind2与Blind同源蛋白的一致性分别达94%和91%。以Blind同源蛋白作为外参,结合NCBI已公开的23个棉花MYB蛋白构建系统发生树,发现GhBlind1和GhBlind2与棉花大多数MYB蛋白遗传距离较远,和Blind同源蛋白组成一个较小的分支。 展开更多
关键词 棉花 blind 同源克隆 表达分析
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部