期刊文献+
共找到6,284篇文章
< 1 2 250 >
每页显示 20 50 100
A new quantum key distribution resource allocation and routing optimization scheme
1
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
2
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Elucidation of potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa
3
作者 Mingming Li Qiujin Zhu +4 位作者 Chao Qu Xiaohui Gong Yunhan Zhang Xin Zhang Shouwei Wang 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第4期2152-2160,共9页
Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.T... Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal. 展开更多
关键词 Dry-cured pork coppa Endogenous proteases PROTEOLYSIS Key taste-active amino acids Volatile compounds
下载PDF
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
4
《China Rare Earth Information》 2024年第2期F0002-F0002,共1页
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la... State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researchesand Comprehensive Utilization. 展开更多
关键词 KEY EARTH Researches
下载PDF
National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
5
《China Rare Earth Information》 2024年第1期F0002-F0002,共1页
National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The... National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.The key laboratory takes Baotou Research Institute of Rare Earths as the main research body,cooperating with scientific and technological strength from Lanzhou University and Changsha Research Institute of Mining and Metallurgy. 展开更多
关键词 KEY Earth LABORATORY
下载PDF
Analysis of the Significance of Key Points of Patient Interventional Psychological Care and Pain Care
6
作者 Xiaoping Dai Chu Luo Jiawei Dai 《Journal of Clinical and Nursing Research》 2024年第3期66-71,共6页
Interventional therapy has become increasingly popular in clinical practice due to advancements in medical technology.However,patients often experience psychological and physiological pressure due to its invasive natu... Interventional therapy has become increasingly popular in clinical practice due to advancements in medical technology.However,patients often experience psychological and physiological pressure due to its invasive nature.The management of patient discomfort and tension is crucial to ensure effective treatment.Psychological and pain management are essential components of interventional therapy,as they significantly impact patient recovery and prognosis.This article discussed the importance of interventional psychological and pain care for patients,starting with the development and spread of interventional therapy.The significance of providing high-quality nursing services to patients and improving their quality of life was also discussed. 展开更多
关键词 Interventional treatment Psychological nursing Pain care Key points Significance analysis
下载PDF
Technical development of operational in-situ marine monitoring and research on its key generic technologies in China 被引量:1
7
作者 Yunzhou Li Juncheng Wang 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2023年第10期117-126,共10页
In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications su... In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications such as forecast of marine environment,prevention and mitigation of disaster,exploitation of marine resources,marine environmental protection,and management of transportation safety.In this paper,we summarise the composition,development courses,and present operational status of three systems of operational in-situ marine monitoring,namely coastal marine automated network station,ocean data buoy and voluntary observing ship measuring and reporting system.Additionally,we discuss the technical development in these in-situ systems and achievements in the key generic technologies along with future development trends. 展开更多
关键词 marine observation technology operational in-situ marine monitoring C-MAN station ocean data buoy VOS measuring and reporting system achievements in the key technologies development trend
下载PDF
Preface to Special Issue on Advanced Optoelectronic and Electronic Devices toward Future Displays--Celebration of the 10th anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies at HKUST
8
作者 Hoi-Sing Kwok Zhiyong Fan 《Journal of Semiconductors》 EI CAS CSCD 2023年第9期1-2,共2页
This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT w... This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT was the Center for Display Research(CDR)which was started in 1995.Thus display research has a long history at HKUST. 展开更多
关键词 ADO KEY UST
下载PDF
An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT
9
作者 Lupeng Zhang Pingchuan Wang +4 位作者 Yuming Zhang Zongzheng Chi Ning Tong Lei Wang Fengqi Li 《Digital Communications and Networks》 SCIE CSCD 2023年第4期809-816,共8页
The Sixth-Generation(6G)enhances the Industrial Internet of Things(IIoT)communication efficiency and further raises security requirements.It is crucial to construct a post-quantum security communication channel betwee... The Sixth-Generation(6G)enhances the Industrial Internet of Things(IIoT)communication efficiency and further raises security requirements.It is crucial to construct a post-quantum security communication channel between any pair of industrial equipment.Recent work shows that two legitimate devices can directly extract symmetrical secret keys in information-theoretic secure by measuring their common wireless channels.However,existing schemes may cause a high bit mismatch rate in IIoT with high noise.In addition,the physical layer key extraction scheme widely uses passive attack assumptions,which also contradicts the high-security requirements of IIoT.By analyzing and modeling IIoT systems and channels,we propose an Adaptive and Robust Secret Key Extraction scheme(ARSKE)from high noise wireless channels in 6G-enabled IIoT.To eliminate the non-reciprocity of the wireless channel,we design a smoothing method as the preprocessing module.Then,we propose a Robust Secure Reconciliation technique that can effectively resist active attacks by jointly designing the information reconciliation and privacy amplification phases.Extensive real-world experiments are conducted to test the effectiveness and robustness of our scheme. 展开更多
关键词 SECURITY Key extraction Resource-constrained devices PRIVACY
下载PDF
Efficient and robust missing key tag identification for large-scale RFID systems
10
作者 Chu Chu Guangjun Wen Jianyu Niu 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1421-1433,共13页
Radio Frequency Identification(RFID)technology has been widely used to identify missing items.In many applications,rapidly pinpointing key tags that are attached to favorable or valuable items is critical.To realize t... Radio Frequency Identification(RFID)technology has been widely used to identify missing items.In many applications,rapidly pinpointing key tags that are attached to favorable or valuable items is critical.To realize this goal,interference from ordinary tags should be avoided,while key tags should be efficiently verified.Despite many previous studies,how to rapidly and dynamically filter out ordinary tags when the ratio of ordinary tags changes has not been addressed.Moreover,how to efficiently verify missing key tags in groups rather than one by one has not been explored,especially with varying missing rates.In this paper,we propose an Efficient and Robust missing Key tag Identification(ERKI)protocol that consists of a filtering mechanism and a verification mechanism.Specifically,the filtering mechanism adopts the Bloom filter to quickly filter out ordinary tags and uses the labeling vector to optimize the Bloom filter's performance when the key tag ratio is high.Furthermore,the verification mechanism can dynamically verify key tags according to the missing rates,in which an appropriate number of key tags is mapped to a slot and verified at once.Moreover,we theoretically analyze the parameters of the ERKI protocol to minimize its execution time.Extensive numerical results show that ERKI can accelerate the execution time by more than 2.14compared with state-of-the-art solutions. 展开更多
关键词 RFID Missing key tag identification Time efficiency ROBUST
下载PDF
Effect of weak randomness flaws on security evaluation of practical quantum key distribution with distinguishable decoy states
11
作者 周雨 李宏伟 +5 位作者 周淳 汪洋 陆宜飞 江木生 张晓旭 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期254-260,共7页
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections... Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation. 展开更多
关键词 weak randomness quantum key distribution distinguishable decoy state
下载PDF
An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity
12
作者 Akshaykumar Meshram Monia Hadj Alouane-Turki +1 位作者 N.M.Wazalwar Chandrashekhar Meshram 《Computers, Materials & Continua》 SCIE EI 2023年第6期5337-5353,共17页
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly... Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly hundreds of billions of devices will be linked together.These smart devices will be able to gather data,process it,and even come to decisions on their own.Security is the most essential thing in these situations.In IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange techniques.The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation processes.The focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above.The proposed three-party AKEP is protected from several attacks.The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing costs.To protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client anonymity.Finally,the presented procedure offers better security features than the procedures currently available in the literature. 展开更多
关键词 Client anonymity Chebyshev chaotic maps authenticated key exchange statistical experiment Galois fields
下载PDF
Research on the Chinese Path to Modernization in History,Key Topics,and Outlook:A Cite Space-based Bibliometric Analysis
13
作者 Wang Linmei Yang Huiru 《Contemporary Social Sciences》 2023年第6期75-96,共22页
In the speech delivered at the centenary celebration of the Communist Party of China(CPC),Xi Jinping,general secretary of the Communist Party of China(CPC)Central Committee,made important remarks on the“Chinese path ... In the speech delivered at the centenary celebration of the Communist Party of China(CPC),Xi Jinping,general secretary of the Communist Party of China(CPC)Central Committee,made important remarks on the“Chinese path to modernization.”This term represents the latest achievement China has scored in adapting Marxism to the Chinese context and the needs of the times.It has set the course as China embarks on a new journey of building a strong socialist country with Chinese characteristics and achieving national rejuvenation.Drawing on CiteSpace,we conducted a visualized bibliometric analysis of literature on the Chinese path to modernization by searching the CNKI database using subject terms such as“Chinese modernization,Chinese path to modernization,and Chinese-style modernization.”The findings reveal that:(a)Research on the Chinese path to modernization has gone through three stages:initial establishment,pioneering exploration,and comprehensive in-depth development.(b)Existing literature has covered the four key topics associated with the Chinese path to modernization,namely its essence,goal,methodology,and pioneering achievements.(c)Future research may focus on building up China’s strength in agriculture,developing the digital economy,modernizing China’s system and capacity for governance,and establishing a unique socialist discourse system for Chinese modernization. 展开更多
关键词 the Chinese path to modernization HISTORY key topics OUTLOOK
下载PDF
Leadership,communication,and science:three pillars essential to public health emergency response and closing the gap in the HIV response among key populations
14
作者 Tafadzwa Dzinamarira Enos Moyo +2 位作者 Perseverance Moyo Munashe Chimene Grant Murewanhema 《Global Health Journal》 2023年第4期182-185,共4页
Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has... Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has significantly increased morbidity and mortality worldwide is the human immunodeficiency virus(HIV)and acquired immune deficiency syndrome(AIDS)pandemic.HIV has a disproportionately negative impact on key populations.Strong leadership,effective communication,and sound science are necessary for public health emergency(PHE)responses to be successful.These three PHE response pllars are also essential for bridging the HIV response gap among key populations in the setting of restrictive laws.In this review,we explored the importance of these three pillars of successful PHEs responses,and how they are essential to closing the gap in the HIV response among key populations.Leaders must make decisions and instil a sense of authority in the populace during PHEs to foster trust and confidence.Leaders should base their choices on scientific evidence.Effective communication during PHEs should be proactive,polite,imaginative,innovative,and constructive.To address gaps in the HIV response among key populations,leaders must create a supportive environment for effective communication and scientific research,communication should be used to raise awareness of HIV and to dispel stigma and discrimination,while science should provide evidence of efficacy and effectiveness of interventions amongkey populations. 展开更多
关键词 Public health emergencies LEADERSHIP COMMUNICATION SCIENCE Key populations HIV response
下载PDF
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
15
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
下载PDF
Exploration on Key Technologies and Practical Paths for Carbon Emission Reduction in Food System
16
作者 Zhenzhong BAI Yunhao LU Hongling WANG 《Agricultural Biotechnology》 CAS 2023年第2期96-104,共9页
On the basis of existing research,carbon emission reduction technologies in production,processing,packaging,transportation and storage of the food system were summarized,and their application effects were analyzed.In ... On the basis of existing research,carbon emission reduction technologies in production,processing,packaging,transportation and storage of the food system were summarized,and their application effects were analyzed.In view of the inherent inadequacy of carbon emission reduction technologies in Chinese food system,starting from carbon labeling technologies and ESG system of the food industry,the unsoundness of the carbon emission reduction evaluation system and the high cost of related technology promotion,countermeasures such as strengthening top-level design,encouraging and supporting the development of new carbon emission reduction technologies,and improving carbon emission reduction technology subsidies were proposed by drawing on domestic and international experiences. 展开更多
关键词 Food system Carbon emission reduction Key technology Practice path
下载PDF
Effect of vitamin supplementation on polycystic ovary syndrome and key pathways implicated in its development:A Mendelian randomization study
17
作者 Jia-Yan Shen Li Xu +1 位作者 Yang Ding Xiao-Yun Wu 《World Journal of Clinical Cases》 SCIE 2023年第23期5468-5478,共11页
BACKGROUND Many epidemiologic investigations have explored the relationship between viatmins and polycystic ovary syndrome(PCOS).However,the effectiveness of vitamin,vitamin-like nutrient,or mineral supplementation in... BACKGROUND Many epidemiologic investigations have explored the relationship between viatmins and polycystic ovary syndrome(PCOS).However,the effectiveness of vitamin,vitamin-like nutrient,or mineral supplementation in reducing the risk of PCOS remains a subject of debate.AIM To investigate the impact of plasma levels of vitamins A,B12,D,E,and K on PCOS and key pathways implicated in its development,namely,insulin resistance,hyperlipidemia,and obesity,through Mendelian randomization(MR)analysis.METHODS Single nucleotide polymorphisms associated with vitamin levels were selected from genome-wide association studies.The primary analysis was performed using the random-effects inverse-variance-weighted approach.Complementary analyses were conducted using the weighted median,MR-Egger,MR-robust adjusted profile score,and MR-PRESSO approaches.RESULTS The results provided suggestive evidence of a decreased risk of PCOS with genetically predicted higher levels of vitamin E(odds ratio[OR]=0.118;95%confidence interval[CI]:0.071–0.226;P<0.001)and vitamin B12(OR=0.753,95%CI:0.568–0.998,P=0.048).An association was observed between vitamin E levels and insulin resistance(OR=0.977,95%CI:0.976–0.978,P<0.001).Additionally,genetically predicted higher concentrations of vitamins E,D,and A were suggested to be associated with a decreased risk of hyperlipidemia.Increased vitamins K and B12 levels were linked to a lower obesity risk(OR=0.917,95%CI:0.848–0.992,P=0.031).CONCLUSION The findings of this MR study suggest a causal relationship between increased vitamins A,D,E,K,and B12 levels and a reduced risk of PCOS or primary pathways implicated in its development. 展开更多
关键词 Vitamin levels Polycystic ovary syndrome Key pathways Mendelian randomization Casual effect
下载PDF
Eye-shaped keyboard for dual-hand text entry in virtual reality
18
作者 Kangyu WANG Yangqiu YAN +2 位作者 Hao ZHANG Xiaolong LIU Lili WANG 《Virtual Reality & Intelligent Hardware》 EI 2023年第5期451-469,共19页
We propose an eye-shaped keyboard for high-speed text entry in virtual reality (VR), having the shape of dual eyes with characters arranged along the curved eyelids, which ensures low density and short spacing of the ... We propose an eye-shaped keyboard for high-speed text entry in virtual reality (VR), having the shape of dual eyes with characters arranged along the curved eyelids, which ensures low density and short spacing of the keys. The eye-shaped keyboard references the QWERTY key sequence, allowing the users to benefit from their experience using the QWERTY keyboard. The user interacts with an eye-shaped keyboard using rays controlled with both the hands. A character can be entered in one step by moving the rays from the inner eye regions to regions of the characters. A high-speed auto-complete system was designed for the eye-shaped keyboard. We conducted a pilot study to determine the optimal parameters, and a user study to compare our eye-shaped keyboard with the QWERTY and circular keyboards. For beginners, the eye-shaped keyboard performed significantly more efficiently and accurately with less task load and hand movement than the circular keyboard. Compared with the QWERTY keyboard, the eye-shaped keyboard is more accurate and significantly reduces hand translation while maintaining similar efficiency. Finally, to evaluate the potential of eye-shaped keyboards, we conducted another user study. In this study, the participants were asked to type continuously for three days using the proposed eye-shaped keyboard, with two sessions per day. In each session, participants were asked to type for 20min, and then their typing performance was tested. The eye-shaped keyboard was proven to be efficient and promising, with an average speed of 19.89 words per minute (WPM) and mean uncorrected error rate of 1.939%. The maximum speed reached 24.97 WPM after six sessions and continued to increase. 展开更多
关键词 Virtual reality Human computer interaction Text entry Shaped keyboard QWERTY-like key sequence Dual-hand cooperation
下载PDF
Difficulty Analysis of HVAC Construction and Key Analysis of Improved Technology
19
作者 Xiaolong Ruan Yisong Yin 《Journal of Architectural Research and Development》 2020年第3期43-46,共4页
This paper expounds the concept of HVAC construction,specifically analyzes the current situation of HVAC construction in construction engineering,and focuses on the key and difficult points in HVAC construction.In ord... This paper expounds the concept of HVAC construction,specifically analyzes the current situation of HVAC construction in construction engineering,and focuses on the key and difficult points in HVAC construction.In order to provide an effective reference for improving the quality of HVAC construction in the current construction engineering,some suggestions are put forward for improvement of relevant technologies involved in key and difficult points. 展开更多
关键词 HVAC construction Key and difficult points Current situation analysis Technical improvement Air duct installation
下载PDF
The outcomes and safety of patients undergoing endoscopic retrograde cholangiopancreatography combining a single-use cholangioscope and a single-use duodenoscope:A multicenter retrospective international study
20
作者 Alessandro Fugazza Matteo Colombo +20 位作者 Michel Kahaleh V.Raman Muthusamy Bick Benjamin Wim Laleman Carmelo Barbera Carlo Fabbri Jose Nieto Abed Al-Lehibi Mohan Ramchandani Amy Tyberg Haroon Shahid Avik Sarkar Dean Ehrlich Stuart Shermand Cecilia Binda Marco Spadaccini Andrea Iannone Kareem Khalaf Nageshwar Reddy Andrea Anderloni Alessandro Repici 《Hepatobiliary & Pancreatic Diseases International》 SCIE CAS CSCD 2024年第1期71-76,共6页
Background: Duodenoscope-related multidrug-resistant organism(MDRO) infections raise concerns. Disposable duodenoscopes have been recently introduced in the market and approved by regulatory agencies with the aim to r... Background: Duodenoscope-related multidrug-resistant organism(MDRO) infections raise concerns. Disposable duodenoscopes have been recently introduced in the market and approved by regulatory agencies with the aim to reduce the risk of endoscopic retrograde cholangiopancreatography(ERCP) associated infections. The aim of this study was to evaluate the outcome of procedures performed with single-use duodenoscopes in patients with clinical indications to single-operator cholangiopancreatoscopy. Methods: This is a multicenter international, retrospective study combining all patients who underwent complex biliopancreatic interventions using the combination of a single-use duodenoscope and a single-use cholangioscope. The primary outcome was technical success defined as ERCP completion for the intended clinical indication. Secondary outcomes were procedural duration, rate of cross-over to reusable duodenoscope, operator-reported satisfaction score(1 to 10) on performance rating of the single-use duodenoscope, and adverse event(AE) rate. Results: A total of 66 patients(26, 39.4% female) were included in the study. ERCP was categorized according to ASGE ERCP grading system as 47(71.2%) grade 3 and 19(28.8%) grade 4. The technical success rate was 98.5%(65/66). Procedural duration was 64(interquartile range 15-189) min, cross-over rate to reusable duodenoscope was 1/66(1.5%). The satisfaction score of the single-use duodenoscope classified by the operators was 8.6 ± 1.3 points. Four patients(6.1%) experienced AEs not directly related to the single-use duodenoscope, namely 2 post-ERCP pancreatitis(PEP), 1 cholangitis and 1 bleeding.Conclusions: Single-use duodenoscope is effective, reliable and safe even in technically challenging procedures with a non-inferiority to reusable duodenoscope, making these devices a viable alternative to standard reusable equipment. 展开更多
关键词 Single-operator cholangioscopy Single-use duodenoscope Endoscopic retrograde CHOLANGIOPANCREATOGRAPHY Indeterminate biliary stricture Difficult biliary stones
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部