期刊文献+
共找到508篇文章
< 1 2 26 >
每页显示 20 50 100
Countermeasure against blinding attack for single-photon detectors in quantum key distribution
1
作者 Lianjun Jiang Dongdong Li +12 位作者 Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang 《Journal of Semiconductors》 EI CAS CSCD 2024年第4期76-81,共6页
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin... Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security. 展开更多
关键词 quantum key distribution single photon detector blinding attack pulsed blinding attack COUNTERMEASURE quan-tum communication
下载PDF
Countermeasure against probabilistic blinding attack in practical quantum key distribution systems 被引量:1
2
作者 钱泳君 李宏伟 +5 位作者 何德勇 银振强 张春梅 陈巍 王双 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第9期111-115,共5页
In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by... In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. 展开更多
关键词 countermeasure bound single-photon detector probabilistic blinding attack quantum key distribution
下载PDF
Mechanism of Aperture Blinding in Screening Wet and Fine Coal
3
作者 陶秀祥 赵跃民 +1 位作者 杨国华 刘初升 《International Journal of Mining Science and Technology》 SCIE EI 2000年第1期26-29,共4页
The agglomeration of moist fine coal and the mechanism of aperture blinding in screening were analyzed. The theoretical analysis and a pilot test on that the elastic screen mesh can overcome the aperture blinding prob... The agglomeration of moist fine coal and the mechanism of aperture blinding in screening were analyzed. The theoretical analysis and a pilot test on that the elastic screen mesh can overcome the aperture blinding problem were presented. 展开更多
关键词 SCREENING moisture AGGLOMERATION APERTURE blinding MECHANISM elastic screen mesh
下载PDF
Blinding trachoma among refugees:complicating social disaster
4
作者 Yeshigeta Gelaw Aemero Abateneh 《Asian Pacific Journal of Tropical Biomedicine》 SCIE CAS 2015年第2期124-127,共4页
Objective:To determine the prevalence of blinding trachoma among refugees in South Western Ethiopia.Methods:A cross-sectional outreach clinic based descriptive study was conducted on 1054 refugees in Southwest Ethiopi... Objective:To determine the prevalence of blinding trachoma among refugees in South Western Ethiopia.Methods:A cross-sectional outreach clinic based descriptive study was conducted on 1054 refugees in Southwest Ethiopia.A basic eyelid and cornea examination for signs of trachoma was done by using 2.5× binocular magnifying loupe.The findings were classified by using the World Health Digitization simplified trachoma grading system and data were analyzed by using SPSS version 16.0.Results:A total of 1054 refugee patients were examined for trachoma.179(16.98%) of them had clinical signs of trachoma.About 6(3.35%) patients had active trachoma with trachomatous trichiasis(TT),47(26.26%) patients had TT only and the rest 126(70.39%)patients had TT with trachomatous corneal opacity.All of the trachoma patients had blinding trachoma(TT with or without trachomatous corneal opacity),and about 60.89% of them had visual impairment.Blinding trachoma was significantly more common among females.patients in age group of 16-59 years,married patients,illiterates and Fugnido camp settlers(P<0.05).Conclusions:There is a very high burden of blinding trachoma among refugees.Urgent surgical intervention is needed to prevent blindness and low vision in the study subjects,and targeted regular outreach-based eye care service should be commenced. 展开更多
关键词 TRACHOMA Trichiasis BLINDNESS Low VISION Refugees Ethiopia
下载PDF
Blinding assessment in clinical trials of traditional Chinese medicine:Exploratory principles and protocol
5
作者 Xiao-cong Wang Xiao-yu Liu +7 位作者 Kang-le Shi Qing-gang Meng Yue-fan Yu Shi-yao Wang Juan Wang Chang Qu Cong Lei Xin-ping Yu 《Journal of Integrative Medicine》 SCIE CAS CSCD 2023年第6期528-536,共9页
As one of the key components of clinical trials, blinding, if successfully implemented, can help to mitigate the risks of implementation bias and measurement bias, consequently improving the validity and reliability o... As one of the key components of clinical trials, blinding, if successfully implemented, can help to mitigate the risks of implementation bias and measurement bias, consequently improving the validity and reliability of the trial results. However, successful blinding in clinical trials of traditional Chinese medicine(TCM) is hard to achieve, and the evaluation of blinding success through blinding assessment lacks established guidelines. Taking into account the challenges associated with blinding in the TCM field, here we present a framework for assessing blinding. Further, this study proposes a blinding assessment protocol for TCM clinical trials, building upon the framework and the existing methods. An assessment report checklist and an approach for evaluating the assessment results are presented based on the proposed protocol. It is anticipated that these improvements to blinding assessment will generate greater awareness among researchers, facilitate the standardization of blinding, and augment the blinding effectiveness. The use of this blinding assessment may further advance the quality and precision of TCM clinical trials and improve the accuracy of the trial results. The blinding assessment protocol will undergo continued optimization and refinement, drawing upon expert consensus and experience derived from clinical trials. 展开更多
关键词 Traditional Chinese medicine blinding assessment Evaluation protocol Assessment report
原文传递
Assessing Blinding in Randomised Controlled Trials of Acupuncture:Challenges and Recommendations 被引量:6
6
作者 Ann K Hopton Hugh MacPherson 《Chinese Journal of Integrative Medicine》 SCIE CAS 2011年第2期173-176,共4页
The revision of CONSORT guidelines for reporting blinding in randomised controlled trials is the subject of controversy and criticism. To determine whether the criticism is justified, in this short communication paper... The revision of CONSORT guidelines for reporting blinding in randomised controlled trials is the subject of controversy and criticism. To determine whether the criticism is justified, in this short communication paper we discuss the problems encountered in the methodology of the assessment of blinding, and the reporting of blinding in randomised controlled trials and the standards of reporting on blinding with reference to their usage in clinical trials of acupuncture for chronic pain. To conclude we recommend two simple guidelines: the development of sound clinical protocols that anticipate potential difficulties and reinforce overall internal validity, and secondly. the accurate reporting of the methodologies used to ensure a clear view of blinding procedures. 展开更多
关键词 blinding assesment METHODOLOGY REPORTING ACUPUNCTURE
原文传递
Enlightenment of blinding trachoma elimination in China 被引量:2
7
作者 Ailian Hu Ningli Wang 《Science China(Life Sciences)》 SCIE CAS CSCD 2017年第12期1453-1456,共4页
Trachoma is a blinding eye disease caused by Chlamydia trachomatis infection.Trachoma was pandemic in the 19th century and rampant around the world,and was a widely prevalent infectious eye disease.Still prevalent in ... Trachoma is a blinding eye disease caused by Chlamydia trachomatis infection.Trachoma was pandemic in the 19th century and rampant around the world,and was a widely prevalent infectious eye disease.Still prevalent in some countries and regions,it is an eye disease with the longest epidemic time.Trachoma is a blinding eye disease pandemic globally,having caused many people to lose their visions 展开更多
关键词 Enlightenment of blinding trachoma elimination in China
原文传递
Treatment of uveitis and scleritis patients in Malaysia
8
作者 Sieng Teng Seow Iqbal Tajunisah +2 位作者 Fei Yee Lee Pooi Wah Lott Sagili Chandrasekhara Reddy 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第3期518-527,共10页
●AIM:To determine the common causes and visual outcome after treatment among uveitis and scleritis patients.●METHODS:This is a retrospective cohort observational study.All consecutive clinical records of patients wi... ●AIM:To determine the common causes and visual outcome after treatment among uveitis and scleritis patients.●METHODS:This is a retrospective cohort observational study.All consecutive clinical records of patients with newly diagnosed uveitis and scleritis over a 4-year period,from Jan.1,2017 to Dec.31,2020,were analysed.Data was collected at the presentation and included a follow-up period of one year.●RESULTS:A total of 288 patients were recruited during the study period.Anterior uveitis was the most common anatomical diagnosis(50.0%)followed by panuveitis(25.0%),scleritis(13.5%),posterior uveitis(6.9%),and intermediate uveitis(4.5%).Viral Herpes was the most common cause of infectious cases,while Vogt-Koyanagi-Harada(VKH)disease and human leucocyte antigen(HLA)B27 spondyloarthropathy were the leading causes of identifiable non-infectious cases.Majority of patients presented with unilateral,non-granulomatous uveitis with an absence of hypopyon.Anatomical locations like posterior uveitis and panuveitis,and visual acuity worse than 3/60 at presentation were the factors associated with poor visual outcomes(P<0.05).About 60%of patients had an identifiable cause for the uveitis and scleritis,with nearly equal distribution of infectious(n=85,29.5%)and noninfectious causes(n=84,29.2%).About 14.5%of patients were clinically blind at 1y of follow-up.The most common complication in our uveitis patients was glaucoma(47.5%),followed by cystoid macula oedema(18.9%)and cataract(13.9%).●CONCLUSION:Uveitis and scleritis are important causes of ocular morbidity.They are potentially blinding diseases which can have a good outcome if diagnosed and treated early. 展开更多
关键词 UVEITIS SCLERITIS ocular morbidity BLINDNESS AETIOLOGY
下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
9
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
10
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data
11
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation Technology
12
作者 Chengjie Li Lidong Zhu Zhen Zhang 《China Communications》 SCIE CSCD 2024年第2期85-95,共11页
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system. 展开更多
关键词 blind source separation greedy optimization algorithm interference sensing LEO satellite communication networks signal reconstruction
下载PDF
Cost of Medical Treatment for Primary Open-Angle Glaucoma in Relation to Patients’ Income and Its Impact on the Prognosis of the Disease, in Bouaké University Hospital
13
作者 Yves Ouattara Liliane Ella Godé +5 位作者 Zana Diabaté Franck Hermann Koffi Mamadou Korka Diallo Philippe Emile France Koffi Bilé Diomandé François Gossé Ibrahim Abib Diomandé 《Open Journal of Ophthalmology》 2024年第1期8-17,共10页
Introduction: Medical treatment for POAG is continuous and lifelong treatment. The aim of this study was to evaluate the relationship between the cost of this treatment and patients’ income and the impact of this rel... Introduction: Medical treatment for POAG is continuous and lifelong treatment. The aim of this study was to evaluate the relationship between the cost of this treatment and patients’ income and the impact of this relationship on treatment compliance. Materials and Methods: Prospective cross-sectional study with a descriptive aim covering sociodemographic data, average incomes, and direct and indirect costs of treatment of 57 patients followed for POAG during the period from January 1, 2012, to December 31, 2016 (5 years). Results: The patients were aged 25 to 77 years (mean = 54.4 years) with a male predominance (sex ratio = 1.5). Retirees were the most represented (26.32%), followed by workers in the informal sector (14.04%) and housewives (12.28%). Patients who had an annual income less than or equal to 900,000 CFA francs (€1370.83) per year represented 56.14% and those who did not have health coverage represented 57.89%. The treatment was monotherapy (64.91%), dual therapy (31.58%) or triple therapy (3.05%) and the average ratio of “annual cost of treatment to annual income” was 0.56 with for maximum 2.23 and 0.02 as minimum. Patients who considered the cost of treatment unbearable for their income represented 78.95%. Conclusion: Prevention of blindness due to glaucoma requires early detection but also the establishment of health coverage mechanisms to improve compliance with medical treatment. In addition, consideration should be given to the development of glaucoma surgery in our country, the indication of which could be the first intention in certain patients, considering for those patients, the geographical and financial accessibility of medical treatment. . 展开更多
关键词 Primary Open-Angle Glaucoma Treatment Cost Medical Treatment INCOME BLINDNESS
下载PDF
Discussion on the application prospect of the transient electromagnetic method based on the dual launcher and mine advanced detection
14
作者 Zhen Yang Huizhou Liu +5 位作者 Shengqing Wang Yu Cao Ya Dong Chenghu Niu Weiwen Song Guoxin Xie 《World Journal of Condensed Matter Physics》 CAS 2024年第1期21-33,共13页
The dual transmitter implements the equivalent anti-magnetic flux transient electromagnetic method, which can effectively reduce the scope of the transient electromagnetic detection blind area. However, this method is... The dual transmitter implements the equivalent anti-magnetic flux transient electromagnetic method, which can effectively reduce the scope of the transient electromagnetic detection blind area. However, this method is rarely reported in the detection of pipelines in urban geophysical exploration and the application of coal mines. Based on this, this paper realizes the equivalent anti-magnetic flux transient electromagnetic method based on the dual launcher. The suppression effect of this method on the blind area is analyzed by physical simulation. And the detection experiment of underground pipelines is carried out outdoors. The results show that the dual launcher can significantly reduce the turn-off time, thereby effectively reducing the impact of the blind area on the detection results, and the pipeline detection results verify the device’s effectiveness. Finally, based on the ground experimental results, the application prospect of mine advanced detection is discussed. Compared with other detection fields, the formation of blind areas is mainly caused by the equipment. If the dual launcher can be used to reduce the blind area, the accuracy of advanced detection can be improved more effectively. The above research results are of great significance for improving the detection accuracy of the underground transient electromagnetic method. 展开更多
关键词 A Dual Launcher Physical Simulation Transient Electromagnetic Method Mine Geophysical Prospecting Detection Blind Area Application Prospect
下载PDF
Image Processing for Denoising Using Composite Adaptive Filtering Methods Based on RMSE
15
作者 Yanlu Chen Ruijie Wang +1 位作者 Puming Zong Da Chen 《Open Journal of Applied Sciences》 2024年第3期660-675,共16页
As one of the carriers for human communication and interaction, images are prone to contamination by noise during transmission and reception, which is often uncontrollable and unknown. Therefore, how to denoise images... As one of the carriers for human communication and interaction, images are prone to contamination by noise during transmission and reception, which is often uncontrollable and unknown. Therefore, how to denoise images contaminated by unknown noise has gradually become one of the research focuses. In order to achieve blind denoising and separation to restore images, this paper proposes a method for image processing based on Root Mean Square Error (RMSE) by integrating multiple filtering methods for denoising. This method includes Wavelet Filtering, Gaussian Filtering, Median Filtering, Mean Filtering, Bilateral Filtering, Adaptive Bandpass Filtering, Non-local Means Filtering and Regularization Denoising suitable for different types of noise. We can apply this method to denoise images contaminated by blind noise sources and evaluate the denoising effects using RMSE. The smaller the RMSE, the better the denoising effect. The optimal denoising result is selected through comprehensively comparing the RMSE values of all methods. Experimental results demonstrate that the proposed method effectively denoises and restores images contaminated by blind noise sources. 展开更多
关键词 Blind Denoising Adaptive RMSE Image Restoratio
下载PDF
A robust deformed convolutional neural network(CNN)for image denoising 被引量:5
16
作者 Qi Zhang Jingyu Xiao +2 位作者 Chunwei Tian Jerry Chun‐Wei Lin Shichao Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第2期331-342,共12页
Due to strong learning ability,convolutional neural networks(CNNs)have been developed in image denoising.However,convolutional operations may change original distributions of noise in corrupted images,which may increa... Due to strong learning ability,convolutional neural networks(CNNs)have been developed in image denoising.However,convolutional operations may change original distributions of noise in corrupted images,which may increase training difficulty in image denoising.Using relations of surrounding pixels can effectively resolve this problem.Inspired by that,we propose a robust deformed denoising CNN(RDDCNN)in this paper.The proposed RDDCNN contains three blocks:a deformable block(DB),an enhanced block(EB)and a residual block(RB).The DB can extract more representative noise features via a deformable learnable kernel and stacked convolutional architecture,according to relations of surrounding pixels.The EB can facilitate contextual interaction through a dilated convolution and a novel combination of convolutional layers,batch normalisation(BN)and ReLU,which can enhance the learning ability of the proposed RDDCNN.To address long-term dependency problem,the RB is used to enhance the memory ability of shallow layer on deep layers and construct a clean image.Besides,we implement a blind denoising model.Experimental results demonstrate that our denoising model outperforms popular denoising methods in terms of qualitative and quantitative analysis.Codes can be obtained at https://github.com/hellloxiaotian/RDDCNN. 展开更多
关键词 blind denoising CNN deformed block enhanced block
下载PDF
三种方法检测173例先天性红绿色觉异常患者的诊断效能比较
17
作者 王培红 俞俊 +1 位作者 李朝辉 贾亮 《解放军医学院学报》 CAS 北大核心 2023年第7期774-779,786,共7页
背景先天性红绿色觉异常(color vision deficiency,CVD)的诊断存在分型不准,分度不明等问题。目的以Fornsworth Munsell-100 hue test(FM-100)色觉检测法为标准,评估《俞自萍色盲本》(俞本)、色盲检测(Color Blind Check,CBC)评分法对红... 背景先天性红绿色觉异常(color vision deficiency,CVD)的诊断存在分型不准,分度不明等问题。目的以Fornsworth Munsell-100 hue test(FM-100)色觉检测法为标准,评估《俞自萍色盲本》(俞本)、色盲检测(Color Blind Check,CBC)评分法对红绿CVD患者分型和严重度分度的判定能力。方法采用俞本、CBC评分和FM-100三种方法对2022年2-7月在解放军总医院眼科就诊的CVD患者进行检测,并以FM-100为标准,评价俞本和CBC评分的诊断效能和符合度。结果在纳入的173例患者中,检出红、绿色觉异常者比例,俞本为1.2%和12.7%,CBC评分为36.4%和62.4%,FM-100为19.1%和65.9%。严重度方面三种方法结果相似。以FM-100为金标准,俞本和CBC评分对先天性色觉异常分度诊断的敏感度和特异度分别为91.3%和38.5%、92.5%和46.2%,ROC曲线下面积分别为0.712和0.604。以FM-100为金标准,俞本和CBC评分对先天性色觉异常分型诊断:诊断红色觉异常的敏感度和特异度分别为0和15.8%、75.8%和78.9%,Kappa值分别为-0.125和0.490;诊断绿色觉异常的敏感度和特异度分别为15.8%和0、78.9%和75.8%,Kappa值分别为-0.125和0.490。平均检测时间:俞本<CBC评分<FM-100。结论俞本能够快速筛查CVD并初步判定严重度;CBC评分具有一定的分型和分度能力,结果稳定,耗时短,且无法作弊,具有一定的临床应用前景。 展开更多
关键词 先天性色觉异常 俞自萍色盲本 Color Blind Check评分 FM-100色觉检测
下载PDF
Contrastive Learning for Blind Super-Resolution via A Distortion-Specific Network 被引量:1
18
作者 Xinya Wang Jiayi Ma Junjun Jiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期78-89,共12页
Previous deep learning-based super-resolution(SR)methods rely on the assumption that the degradation process is predefined(e.g.,bicubic downsampling).Thus,their performance would suffer from deterioration if the real ... Previous deep learning-based super-resolution(SR)methods rely on the assumption that the degradation process is predefined(e.g.,bicubic downsampling).Thus,their performance would suffer from deterioration if the real degradation is not consistent with the assumption.To deal with real-world scenarios,existing blind SR methods are committed to estimating both the degradation and the super-resolved image with an extra loss or iterative scheme.However,degradation estimation that requires more computation would result in limited SR performance due to the accumulated estimation errors.In this paper,we propose a contrastive regularization built upon contrastive learning to exploit both the information of blurry images and clear images as negative and positive samples,respectively.Contrastive regularization ensures that the restored image is pulled closer to the clear image and pushed far away from the blurry image in the representation space.Furthermore,instead of estimating the degradation,we extract global statistical prior information to capture the character of the distortion.Considering the coupling between the degradation and the low-resolution image,we embed the global prior into the distortion-specific SR network to make our method adaptive to the changes of distortions.We term our distortion-specific network with contrastive regularization as CRDNet.The extensive experiments on synthetic and realworld scenes demonstrate that our lightweight CRDNet surpasses state-of-the-art blind super-resolution approaches. 展开更多
关键词 Blind super-resolution contrastive learning deep learning image super-resolution(SR)
下载PDF
基于拟态防御的VPN流量劫持防御技术
19
作者 高振 陈福才 +1 位作者 王亚文 何威振 《计算机科学》 CSCD 北大核心 2023年第11期340-347,共8页
VPN技术能够有效保障通信流量的保密性和完整性,但是近年来出现的名为blind in/on-path的流量劫持攻击利用VPN协议规则,通过将伪造报文注入加密隧道的方式来实施攻击,严重威胁了VPN技术的安全性。针对此类威胁,提出了基于拟态防御的VPN... VPN技术能够有效保障通信流量的保密性和完整性,但是近年来出现的名为blind in/on-path的流量劫持攻击利用VPN协议规则,通过将伪造报文注入加密隧道的方式来实施攻击,严重威胁了VPN技术的安全性。针对此类威胁,提出了基于拟态防御的VPN流量劫持防御技术,并设计了拟态VPN架构(Mimic VPN,M-VPN)。该架构由选调器和包含多个异构的VPN加解密节点的节点池组成。首先选调器根据节点的可信度动态地选取若干加解密节点,来并行处理加密流量;然后对各加解密节点的处理结果进行综合裁决;最后将裁决结果作为响应报文以及更新可信度的依据。通过对来自不同节点的同一响应进行裁决,有效阻止了攻击者注入伪造报文。实验仿真结果表明,相比传统的VPN架构,M-VPN可以降低blind in/on-path攻击成功率约12个数量级。 展开更多
关键词 VPN 流量劫持攻击 blind in/on-path攻击 拟态防御 M-VPN
下载PDF
Smart Shoes Safety System for the Blind People Based on (IoT) Technology
20
作者 Ammar Almomani Mohammad Alauthman +4 位作者 Amal Malkawi Hadeel Shwaihet Batool Aldigide Donia Aldabeek Karmen Abu Hamoodeh 《Computers, Materials & Continua》 SCIE EI 2023年第7期415-436,共22页
People’s lives have become easier and simpler as technology has proliferated.This is especially true with the Internet of Things(IoT).The biggest problem for blind people is figuring out how to get where they want to... People’s lives have become easier and simpler as technology has proliferated.This is especially true with the Internet of Things(IoT).The biggest problem for blind people is figuring out how to get where they want to go.People with good eyesight need to help these people.Smart shoes are a technique that helps blind people find their way when they walk.So,a special shoe has been made to help blind people walk safely without worrying about running into other people or solid objects.In this research,we are making a new safety system and a smart shoe for blind people.The system is based on Internet of Things(IoT)technology and uses three ultrasonic sensors to allow users to hear and react to barriers.It has ultrasonic sensors and a microprocessor that can tell how far away something is and if there are any obstacles.Water and flame sensors were used,and a sound was used to let the person know if an obstacle was near him.The sensors use Global Positioning System(GPS)technology to detect motion from almost every side to keep an eye on them and ensure they are safe.To test our proposal,we gave a questionnaire to 100 people.The questionnaire has eleven questions,and 99.1%of the people who filled it out said that the product meets their needs. 展开更多
关键词 IOT smart shoe SENSORS GSM GPS ARDUINO blind people safety system
下载PDF
上一页 1 2 26 下一页 到第
使用帮助 返回顶部