期刊文献+
共找到139,665篇文章
< 1 2 250 >
每页显示 20 50 100
A new quantum key distribution resource allocation and routing optimization scheme
1
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
Clinical diagnostic advances in intestinal anastomotic techniques:Hand suturing,stapling,and compression devices
2
作者 Ah Young Lee Joo Young Cho 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第5期1231-1234,共4页
The development of intestinal anastomosis techniques,including hand suturing,stapling,and compression anastomoses,has been a significant advancement in surgical practice.These methods aim to prevent leakage and minimi... The development of intestinal anastomosis techniques,including hand suturing,stapling,and compression anastomoses,has been a significant advancement in surgical practice.These methods aim to prevent leakage and minimize tissue fibrosis,which can lead to stricture formation.The healing process involves various phases:hemostasis and inflammation,proliferation,and remodeling.Mechanical staplers and sutures can cause inflammation and fibrosis due to the release of profibrotic chemokines.Compression anastomosis devices,including those made of nickel-titanium alloy,offer a minimally invasive option for various surgical challenges and have shown safety and efficacy.However,despite advancements,anastomotic techniques are evaluated based on leakage risk,with complications being a primary concern.Newer devices like Magnamosis use magnetic rings for compression anastomosis,demonstrating greater strength and patency compared to stapling.Magnetic technology is also being explored for other medical treatments.While there are promising results,particularly in animal models,the realworld application in humans is limited,and further research is needed to assess their safety and practicality. 展开更多
关键词 ANASTOMOSES Diagnostic advances Anastomotic techniques Technique Intestine
下载PDF
Blockchain-Based Key Management Scheme Using Rational Secret Sharing
3
作者 Xingfan Zhao Changgen Peng +1 位作者 Weijie Tan Kun Niu 《Computers, Materials & Continua》 SCIE EI 2024年第4期307-328,共22页
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes... Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities. 展开更多
关键词 Blockchain smart contract rational secret sharing key management
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
4
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 key nodes dynamic model industrial control network SIMULATION
下载PDF
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
5
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
6
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Epileptic brain network mechanisms and neuroimaging techniques for the brain network
7
作者 Yi Guo Zhonghua Lin +1 位作者 Zhen Fan Xin Tian 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第12期2637-2648,共12页
Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal d... Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions. 展开更多
关键词 electrophysiological techniques EPILEPSY functional brain network functional magnetic resonance imaging functional near-infrared spectroscopy machine leaning molecular imaging neuroimaging techniques structural brain network virtual epileptic models
下载PDF
Surgical techniques to prevent delayed gastric emptying after pancreaticoduodenectomy
8
作者 Peng Duan Lu Sun +2 位作者 Kai Kou Xin-Rui Li Ping Zhang 《Hepatobiliary & Pancreatic Diseases International》 SCIE CAS CSCD 2024年第5期449-457,共9页
Background: Delayed gastric emptying(DGE) is one of the most common complications after pancreaticoduodenectomy(PD). DGE represents impaired gastric motility without significant mechanical obstruction and is associate... Background: Delayed gastric emptying(DGE) is one of the most common complications after pancreaticoduodenectomy(PD). DGE represents impaired gastric motility without significant mechanical obstruction and is associated with an increased length of hospital stay, increased healthcare costs, and a high readmission rate. We reviewed published studies on various technical modifications to reduce the incidence of DGE. Data sources: Studies were identified by searching Pub Med for relevant articles published up to December 2022. The following search terms were used: “pancreaticoduodenectomy”, “pancreaticojejunostomy”, “pancreaticogastrostomy”, “gastric emptying”, “gastroparesis” and “postoperative complications”. The search was limited to English publications. Additional articles were identified by a manual search of references from key articles. Results: In recent years, various surgical procedures and techniques have been explored to reduce the incidence of DGE. Pyloric resection, Billroth II reconstruction, Braun's enteroenterostomy, and antecolic reconstruction may be associated with a decreased incidence of DGE, but more high-powered studies are needed in the future. Neither laparoscopic nor robotic surgery has demonstrated superiority in preventing DGE, and the use of staplers is controversial regarding whether they can reduce the incidence of DGE. Conclusions: Despite many innovations in surgical techniques, there is no surgical procedure that is superior to others to reduce DGE. Further larger prospective randomized studies are needed. 展开更多
关键词 PANCREATICODUODENECTOMY Delayed gastric emptying Postoperative complications Surgical techniques
下载PDF
Physical-Layer Secret Key Generation for Dual-Task Scenarios
9
作者 Yang Lilin Li Guyue +2 位作者 Guo Tao Xu Hao Hu Aiqun 《China Communications》 SCIE CSCD 2024年第7期252-266,共15页
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou... Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation. 展开更多
关键词 dual-task scenario information-theoretic security physical layer security secret group key generation
下载PDF
Exploring battery material failure mechanisms through synchrotron X-ray characterization techniques
10
作者 Lingzhe Fang Xiaozhao Liu Tao Li 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第7期128-135,共8页
Rechargeable battery cycling performance and related safety have been persistent concerns.It is crucial to decipher the capacity fading induced by electrode material failure via a range of techniques.Among these,synch... Rechargeable battery cycling performance and related safety have been persistent concerns.It is crucial to decipher the capacity fading induced by electrode material failure via a range of techniques.Among these,synchrotron-based X-ray techniques with high flux and brightness play a key role in understanding degradation mechanisms.In this comprehensive review,we summarize recent advancements in degra-dation modes and mechanisms that were revealed by synchrotron X-ray methodologies.Subsequently,an overview of X-ray absorption spectroscopy and X-ray scattering techniques is introduced for charac-terizing failure phenomena at local coordination atomic environment and long-range order crystal struc-ture scale,respectively.At last,we envision the future of exploring material failure mechanism. 展开更多
关键词 Battery failure Synchrotron-based techniques X-ray scattering X-ray absorption spectroscopy
下载PDF
Recent Advance in Synaptic Plasticity Modulation Techniques for Neuromorphic Applications
11
作者 Yilin Sun Huaipeng Wang Dan Xie 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第10期403-434,共32页
Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to explo... Manipulating the expression of synaptic plasticity of neuromorphic devices provides fascinating opportunities to develop hardware platforms for artifi-cial intelligence.However,great efforts have been devoted to exploring biomimetic mechanisms of plasticity simulation in the last few years.Recent progress in various plasticity modulation techniques has pushed the research of synaptic electronics from static plasticity simulation to dynamic plasticity modulation,improving the accuracy of neuromorphic computing and providing strategies for implementing neuromorphic sensing functions.Herein,several fascinating strategies for synap-tic plasticity modulation through chemical techniques,device structure design,and physical signal sensing are reviewed.For chemical techniques,the underly-ing mechanisms for the modification of functional materials were clarified and its effect on the expression of synaptic plasticity was also highlighted.Based on device structure design,the reconfigurable operation of neuromorphic devices was well demonstrated to achieve programmable neuromorphic functions.Besides,integrating the sensory units with neuromorphic processing circuits paved a new way to achieve human-like intelligent perception under the modulation of physical signals such as light,strain,and temperature.Finally,considering that the relevant technology is still in the basic exploration stage,some prospects or development suggestions are put forward to promote the development of neuromorphic devices. 展开更多
关键词 Plasticity modulation Dynamic plasticity Chemical techniques Programmable operation Neuromorphic sensing
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
12
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
Elucidation of potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa
13
作者 Mingming Li Qiujin Zhu +4 位作者 Chao Qu Xiaohui Gong Yunhan Zhang Xin Zhang Shouwei Wang 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第4期2152-2160,共9页
Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.T... Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal. 展开更多
关键词 Dry-cured pork coppa Endogenous proteases PROTEOLYSIS key taste-active amino acids Volatile compounds
下载PDF
Pretreatment and analysis techniques development of TKIs in biological samples for pharmacokinetic studies and therapeutic drug monitoring
14
作者 Lan Chen Yuan Zhang +5 位作者 Yi-Xin Zhang Wei-Lai Wang De-Mei Sun Peng-Yun Li Xue-Song Feng Yue Tan 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2024年第4期439-459,共21页
Tyrosine kinase inhibitors(TKIs)have emerged as the first-line small molecule drugs in many cancer therapies,exerting their effects by impeding aberrant cell growth and proliferation through the modulation of tyrosine... Tyrosine kinase inhibitors(TKIs)have emerged as the first-line small molecule drugs in many cancer therapies,exerting their effects by impeding aberrant cell growth and proliferation through the modulation of tyrosine kinase-mediated signaling pathways.However,there exists a substantial inter-individual variability in the concentrations of certain TKIs and their metabolites,which may render patients with compromised immune function susceptible to diverse infections despite receiving theoretically efficacious anticancer treatments,alongside other potential side effects or adverse reactions.Therefore,an urgent need exists for an up-to-date review concerning the biological matrices relevant to bioanalysis and the sampling methods,clinical pharmacokinetics,and therapeutic drug monitoring of different TKIs.This paper provides a comprehensive overview of the advancements in pretreatment methods,such as protein precipitation(PPT),liquid-liquid extraction(LLE),solid-phase extraction(SPE),micro-SPE(μ-SPE),magnetic SPE(MSPE),and vortex-assisted dispersive SPE(VA-DSPE)achieved since 2017.It also highlights the latest analysis techniques such as newly developed high performance liquid chromatography(HPLC)and high-resolution mass spectrometry(HRMS)methods,capillary electrophoresis(CE),gas chromatography(GC),supercritical fluid chromatography(SFC)procedures,surface plasmon resonance(SPR)assays as well as novel nanoprobes-based biosensing techniques.In addition,a comparison is made between the advantages and disadvantages of different approaches while presenting critical challenges and prospects in pharmacokinetic studies and therapeutic drug monitoring. 展开更多
关键词 TKIs Microextraction technique HRMS methods Pharmacokinetic studies Therapeutic drug monitoring
下载PDF
An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces
15
作者 Sheetal Sharma Kamali Gupta +2 位作者 DeepaliGupta Shalli Rani Gaurav Dhiman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2029-2059,共31页
The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness... The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things. 展开更多
关键词 ERROR fault detection techniques sensor faults OUTLIERS Internet of Things
下载PDF
Countermeasure against blinding attack for single-photon detectors in quantum key distribution
16
作者 Lianjun Jiang Dongdong Li +12 位作者 Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang 《Journal of Semiconductors》 EI CAS CSCD 2024年第4期76-81,共6页
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin... Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security. 展开更多
关键词 quantum key distribution single photon detector blinding attack pulsed blinding attack COUNTERMEASURE quan-tum communication
下载PDF
Randomization Strategies in Image Steganography Techniques:A Review
17
作者 AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan 《Computers, Materials & Continua》 SCIE EI 2024年第8期3139-3171,共33页
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ... Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography. 展开更多
关键词 Information hiding image steganography randomized embedding techniques payload capacity IMPERCEPTIBILITY
下载PDF
Advances in the application of auxiliary imaging techniques in parathyroid diseases
18
作者 Lei Lu Hong-Qing Shang 《World Journal of Clinical Cases》 SCIE 2024年第17期2946-2950,共5页
Hypoparathyroidism is one of the main complications after total thyroidectomy,severely affecting patients’quality of life.How to effectively protect parathyroid function after surgery and reduce the incidence of hypo... Hypoparathyroidism is one of the main complications after total thyroidectomy,severely affecting patients’quality of life.How to effectively protect parathyroid function after surgery and reduce the incidence of hypoparathyroidism has always been a key research area in thyroid surgery.Therefore,precise localization of parathyroid glands during surgery,effective imaging,and accurate surgical resection have become hot topics of concern for thyroid surgeons.In response to this clinical phenomenon,this study compared several different imaging methods for parathyroid surgery,including nanocarbon,indocyanine green,near-infrared imaging techniques,and technetium-99m methoxyisobutylisonitrile combined with gamma probe imaging technology.The advantages and disadvantages of each method were analyzed,providing scientific recommendations for future parathyroid imaging.In recent years,some related basic and clinical research has also been conducted in thyroid surgery.This article reviewed relevant literature and provided an overview of the practical application progress of various imaging techniques in parathyroid surgery. 展开更多
关键词 Imaging technique Parathyroid gland Thyroid surgery HYPOPARATHYROIDISM COMPLICATION
下载PDF
Software Defect Prediction Using Hybrid Machine Learning Techniques: A Comparative Study
19
作者 Hemant Kumar Vipin Saxena 《Journal of Software Engineering and Applications》 2024年第4期155-171,共17页
When a customer uses the software, then it is possible to occur defects that can be removed in the updated versions of the software. Hence, in the present work, a robust examination of cross-project software defect pr... When a customer uses the software, then it is possible to occur defects that can be removed in the updated versions of the software. Hence, in the present work, a robust examination of cross-project software defect prediction is elaborated through an innovative hybrid machine learning framework. The proposed technique combines an advanced deep neural network architecture with ensemble models such as Support Vector Machine (SVM), Random Forest (RF), and XGBoost. The study evaluates the performance by considering multiple software projects like CM1, JM1, KC1, and PC1 using datasets from the PROMISE Software Engineering Repository. The three hybrid models that are compared are Hybrid Model-1 (SVM, RandomForest, XGBoost, Neural Network), Hybrid Model-2 (GradientBoosting, DecisionTree, LogisticRegression, Neural Network), and Hybrid Model-3 (KNeighbors, GaussianNB, Support Vector Classification (SVC), Neural Network), and the Hybrid Model 3 surpasses the others in terms of recall, F1-score, accuracy, ROC AUC, and precision. The presented work offers valuable insights into the effectiveness of hybrid techniques for cross-project defect prediction, providing a comparative perspective on early defect identification and mitigation strategies. . 展开更多
关键词 Defect Prediction Hybrid techniques Ensemble Models Machine Learning Neural Network
下载PDF
Research Progress on Detection Techniques of Fungicide Residues in Chinese Chives
20
作者 Xiuying CHEN Zhe MENG +5 位作者 Chen DING Huihui LIU Yancheng ZHOU Jinlu LI Yanhua YAN Lei WANG 《Agricultural Biotechnology》 2024年第1期43-48,共6页
Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized... Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized relevant literatures published in recent years,and sorted out and analyzed the types of pesticides used and detection techniques of common diseases in Chinese chives. 展开更多
关键词 Chinese chive Pesticide residues FUNGICIDE Detection technique
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部