期刊文献+
共找到7,759篇文章
< 1 2 250 >
每页显示 20 50 100
High-speed all-optical speckle decryption empowered by a physics-informed diffractive neural network
1
作者 Jiaan Gan Yong Yang +2 位作者 Siwei Zhu Shengjiang Chang Xiaocong Yuan 《Advanced Photonics Nexus》 2026年第1期150-157,共8页
Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed adv... Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed advantage of optical encryption.Moreover,conventional neural networks are typically effective only on images from the same distribution as the training datasets,limiting their general applicability.In this paper,we propose an all-optical high-speed decryption scheme for real-time recovery of speckle-encoded ciphertexts.By constructing a physics-informed diffractive neural network that approximates the inverse transmission matrix of the scattering medium,secret images can be directly reconstructed from speckle fields without optoelectronic conversion or post-processing.The network is trained with only 2048 samples from the MNIST dataset.Its transfer learning capability is validated across three out-of-distribution datasets,with decrypted images achieving a Pearson correlation coefficient of 0.82 and a structural similarity index measure of 0.75,demonstrating excellent transfer learning capability.For the first time,to our knowledge,this scheme simultaneously overcomes the bottlenecks of decryption delay and limited network generalizability in conventional speckle-based cryptosystems,achieving real-time image decryption with strong transferability.It provides a new pathway for developing low-power,real-time,and broadly applicable optical encryption systems,demonstrating significant potential for applications in high-speed security optical communications. 展开更多
关键词 SPECKLE all-optical decryption diffractive neural network transmission matrix transfer learning real time
在线阅读 下载PDF
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
2
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
A Recursive Method to Encryption-Decryption-Based Distributed Set-Membership Filtering for Time-Varying Saturated Systems Over Sensor Networks
3
作者 Jun Hu Jiaxing Li +2 位作者 Chaoqing Jia Xiaojian Yi Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期1047-1049,共3页
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt... Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided. 展开更多
关键词 time varying saturated systems signal transmission processspecificallya encryption decryption mechanism sensor networks recursive method distributed set membership filtering
在线阅读 下载PDF
Femtosecond laser subtractive/additive-integrated biomimetic manufacturing for visible/infrared encryption and stimuli-responsive infrared decryption
4
作者 Ruijie Liu Dongshi Zhang Zhuguo Li 《International Journal of Extreme Manufacturing》 2025年第4期387-404,共18页
Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,... Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension. 展开更多
关键词 femtosecond laser biomimetic manufacturing black particle aggregates subtractive/additive-integrated manufacturing intrinsic visible-infrared encryption stimuli responsive decrypted IR display
在线阅读 下载PDF
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
5
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
New Constructions of Identity-Based Threshold Decryption 被引量:1
6
作者 ZHANG Leyou HU Yupu +1 位作者 TIAN Xu'an YANG Yang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期222-226,共5页
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c... In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously. 展开更多
关键词 ID-Based threshold decryption verifiable pair computational bilinear Diffie-Hellman (CBDH) problem provable security
原文传递
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption 被引量:2
7
作者 李世群 吴永东 +1 位作者 周建英 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期67-70,共4页
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa... The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4. 展开更多
关键词 batch decryption secure socket layer (SSL) server public key algorithm
在线阅读 下载PDF
基于蛋白质组学解析桑椹低聚半乳糖通过碳水化合物代谢调控鼠李糖乳酪杆菌EN-08增殖的机制
8
作者 陈心如 李倩 +3 位作者 庞道睿 邢东旭 邹宇晓 黎尔纳 《食品与发酵工业》 北大核心 2026年第3期121-128,共8页
为了研究桑椹低聚半乳糖(mulberry galacto-oligosaccharide,MGO)对鼠李糖乳酪杆菌EN-08胞内蛋白质表达的影响,采用串联质量标签(tandem mass tags,TMT)定量蛋白质组学技术进行分析。将鼠李糖乳酪杆菌EN-08分别接种到含MGO、桑椹多糖(mu... 为了研究桑椹低聚半乳糖(mulberry galacto-oligosaccharide,MGO)对鼠李糖乳酪杆菌EN-08胞内蛋白质表达的影响,采用串联质量标签(tandem mass tags,TMT)定量蛋白质组学技术进行分析。将鼠李糖乳酪杆菌EN-08分别接种到含MGO、桑椹多糖(mulberry polysaccharide,MPS)和低聚半乳糖(galactooligosaccharides,GOS)的MRS培养基中发酵培养。培养18 h后提取所有样品的蛋白质进行TMT技术鉴定,采用相关性热图和主成分分析观察各组相关性,发现添加MGO和MPS后,鼠李糖乳酪杆菌EN-08全蛋白组成发生变化。在MGO组中鉴定出192个差异蛋白,其中上调蛋白有110个,下调蛋白有82个。KEGG功能注释显示,上调差异蛋白的功能主要集中在碳水化合物代谢和膜运输方面,分别有17个和16个上调蛋白参与。KEGG富集分析显示,上调差异蛋白质显著富集于果糖和甘露糖代谢以及磷酸转移酶系统通路,富集因子分别为0.2195和0.2286。分析结果表明,MGO主要从碳水化合物代谢以及环境信息处理这两方面影响菌株的生命活动。说明MGO可作为有潜力的碳源,促进菌体代谢调控,为鼠李糖乳酪杆菌EN-08的高密度工业化生产提供参考。 展开更多
关键词 鼠李糖乳酪杆菌en-08 桑椹低聚半乳糖 蛋白质组学 串联质量标签分析 碳水化合物代谢
在线阅读 下载PDF
Identity-Based Threshold Decryption on Access Structure
9
作者 秦华旺 朱晓华 戴跃伟 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期485-489,共5页
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig... For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible. 展开更多
关键词 threshold decryption access structure IDenTITY CRYPTOGRAPHY information security
原文传递
Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption
10
作者 Chan Hyeong Cho Hyun Min Song Taek-Young Youn 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期1911-1931,共21页
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recor... With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recorded surveillance videos to enhance efficiency and security.The proposed method leverages Dlib’s CNN-based facial recognition technology to identify Regions of Interest(ROIs)within the video,linking these ROIs to generate unique IDs.These IDs are then combined with a master key to create entity-specific keys,which are used to encrypt the ROIs within the video.This system supports selective decryption,effectively protecting personal information using surveillance footage.Additionally,the system overcomes the limitations of existing ROI recognition technologies by predicting unrecognized frames through post-processing.This research validates the proposed technology through experimental evaluations of execution time and post-processing techniques,ensuring comprehensive personal information protection.Guidelines for setting the thresholds used in this process are also provided.Implementing the proposed method could serve as an effective solution to security vulnerabilities that traditional approaches fail to address. 展开更多
关键词 Privacy de-identification selective decryption surveillance video
在线阅读 下载PDF
ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
11
作者 龙宇 陈克非 刘胜利 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期127-133,共7页
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext... B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively. 展开更多
关键词 threshold decryption identity-based cryptology publicly checkable encryption
在线阅读 下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
12
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
13
作者 ZENG Jianhua ZHAN Yanlin YANG Jianrong 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image enCRYPTION decryption single channel RGB component image disrupting
在线阅读 下载PDF
老旧电梯改造中EN 81-80风险评估与TSG T7006技术融合路径
14
作者 董志国 《模具制造》 2026年第1期246-248,共3页
探讨了欧洲标准EN 81-80的系统化风险评估方法与中国特种设备安全技术规范TSG T7006具体要求的融合应用途径,对两者的理论基础、核心要素以及互补空间展开了系统分析,构建出“风险识别—等级评定—对策制订—合规验证”这样一个闭环流... 探讨了欧洲标准EN 81-80的系统化风险评估方法与中国特种设备安全技术规范TSG T7006具体要求的融合应用途径,对两者的理论基础、核心要素以及互补空间展开了系统分析,构建出“风险识别—等级评定—对策制订—合规验证”这样一个闭环流程框架,并且结合实际改造案例来验证该框架的有效性。研究显示,借助EN 81-80的风险导向思维与TSG T7006的底线要求以及技术细则进行有机融合,可提升老旧电梯改造项目的科学性、针对性与合规性,为保障电梯安全长效运行提供系统性的解决办法,对规范行业实践、优化资源配置有着关键的指导价值。 展开更多
关键词 老旧电梯改造 en 81-80 TSG T7006 技术融合
在线阅读 下载PDF
GB/T 31248—2014与EN 50399:2022标准差异性解读
15
作者 包光宏 鞠麟麟 +2 位作者 李准 陈玥希 胡林明 《建筑电气》 2026年第1期13-17,共5页
对比分析现行国家标准GB/T 31248—2014《电缆或光缆在受火条件下火焰蔓延热释放和产烟特性的试验方法》与欧盟标准EN 50399:2022 Common test methods for cables under fire conditions—Heat release and smoke production measureme... 对比分析现行国家标准GB/T 31248—2014《电缆或光缆在受火条件下火焰蔓延热释放和产烟特性的试验方法》与欧盟标准EN 50399:2022 Common test methods for cables under fire conditions—Heat release and smoke production measurement on cables during flame spread test—Test apparatus,procedures,results主要技术差异,相比于国标,欧标关于试验装置的规定更加详细,同时增加了标准电缆试样校准、火焰形状校准、非圆形电缆数量及安装规定等技术内容。针对外径小于或等于5 mm的电缆,分析国标和欧标试样安装方式异同,并给出GB/T 31248—2014修订建议。 展开更多
关键词 GB/T 31248—2014 en 50399:2022 标准差异性 电缆 燃烧
在线阅读 下载PDF
GB/T 4732与欧盟EN 13445标准在焊接接头疲劳评定中的对比研究
16
作者 周威 徐才福 杨小林 《石油化工设备技术》 2026年第2期31-36,I0002,共7页
压力容器焊接接头的疲劳评定是确保设备长期安全运行的关键环节。随着GB/T 4732.1~4732.6—2024(以下简称GB/T 4732)标准的发布实施,我国压力容器疲劳设计方法在借鉴ASME标准体系的基础上取得了重要进展,但与欧盟EN 13445—2021(以下简... 压力容器焊接接头的疲劳评定是确保设备长期安全运行的关键环节。随着GB/T 4732.1~4732.6—2024(以下简称GB/T 4732)标准的发布实施,我国压力容器疲劳设计方法在借鉴ASME标准体系的基础上取得了重要进展,但与欧盟EN 13445—2021(以下简称EN 13445)标准在焊接接头评定方面仍存在显著差异。文章基于现有理论研究的成果,系统对比了GB/T 4732与EN 13445在焊接接头疲劳评定中的技术差异,重点分析了设计方法、应力计算及评定结果的工程适用性。该研究以储罐角焊缝为例进行分析,结果表明:相同焊接接头按EN 13445评定得到的允许循环次数显著高于按GB/T 4732评定的结果。文章通过进一步分析这一差异的产生机理,揭示了不同标准体系的技术特点,也为工程实践中的标准选择和优化设计提供了参考。 展开更多
关键词 焊接接头 疲劳评定 GB/T 4732 en 13445 结构应力 热点应力法
在线阅读 下载PDF
Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT
17
作者 He Duan Shi Zhang Dayu Li 《Computers, Materials & Continua》 2026年第2期872-896,共25页
Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudass... Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost. 展开更多
关键词 Cloud computing Internet of Things ABSE multi-keyword fuzzy matching outsourcing decryption
在线阅读 下载PDF
Microstructural tailoring and property enhancement via friction stir processing of additively manufactured steel and Ti6Al4V alloy
18
作者 Md Parwez Alam Md Anwar Ali Anshari +1 位作者 Mohamed M.El-Sayed Seleman Murshid Imam 《China Welding》 2026年第1期17-33,共17页
Friction stir processing(FSP) has emerged as a transformative solid-state technique for enhancing the mechanical performance and microstructural integrity of metallic materials,particularly in the context of additive ... Friction stir processing(FSP) has emerged as a transformative solid-state technique for enhancing the mechanical performance and microstructural integrity of metallic materials,particularly in the context of additive manufacturing(AM).This study demonstrates the effectiveness of FSP as a post-processing strategy for two distinct AM systems:wire arc additive manufacturing(WAAM) of low-carbon steel and selective laser melting(SLM) of Ti6Al4V alloy.In the case of WAAM fabricated steel,FSP significantly refined the coarse dendritic microstructure into ultrafine equiaxed grains,resulting in a 21 %-24 % increase in hardness and enhanced tensile properties at the overlapping regions.Similarly,for SLM fabricated Ti6Al4V,FSP eliminated the columnar prior-β grains and residual porosity,yielding a homogenous α+β structure with improved strengthductility balance and reduced anisotropy.These improvements were attributed to the dynamic recrystallization,conversion of low-angle to high-angle grain boundaries,and homogenization of phase constituents induced by FSP.Despite challenges such as tool wear and fixturing complexity,the study confirms that FSP can reliably bridge the performance gap in AM components by healing solidification defects,mitigating anisotropy,and tailoring the local microstructure.The findings position FSP as a versatile and scalable post-processing technique,crucial for advancing high-performance,application-ready components in aerospace,biomedical,and structural applications. 展开更多
关键词 Friction stir processing Wire arc additive manufacturing Selective laser melting en8 Steel Ti6Al4V alloy Microstructural modification
在线阅读 下载PDF
Roux-en-Y胃旁路术及腹腔镜袖状胃切除术对减重手术患者的应用研究
19
作者 朱颜艳 《黑龙江医学》 2026年第1期56-59,共4页
目的:观察Roux-en-Y胃旁路术(LRYGB)及腹腔镜胃袖状切除术(LSG)对减重手术患者的应用效果。方法:本研究为前瞻性研究,选取2021年10月—2023年10月于南阳市第一人民医院接受LSG治疗的110例患者作为研究对象,应用电脑随机分组法将患者分为... 目的:观察Roux-en-Y胃旁路术(LRYGB)及腹腔镜胃袖状切除术(LSG)对减重手术患者的应用效果。方法:本研究为前瞻性研究,选取2021年10月—2023年10月于南阳市第一人民医院接受LSG治疗的110例患者作为研究对象,应用电脑随机分组法将患者分为LRYGB组和LSG组,每组各55例。术后随访半年,比较两组患者的手术情况、并发症发生情况、消化功能及减重效果。结果:在不同手术方案下,LSG组的手术时间、术中出血量、术后恢复排气时间、恢复进食时间、下床活动时间、住院时间均低于LRYGB组,差异均有统计学意义(P<0.05);LSG组的并发症发生率低于LRYGB组,差异有统计学意义(P<0.05);LSG组随访第3个月、6个月时的胃泌素-17(GAS-17)均高于LRYGB组,胃蛋白酶原Ⅰ及胃蛋白酶原Ⅱ比值(PGR)均高于LRYGB组,差异均有统计学意义(P<0.05);截至随访结束时,LSG组的体质量指数(BMI)、腰围、臀围、多余体重减少百分比(EWL)与LRYGB组比较,差异均无统计学意义(P>0.05)。结论:LSG与LRYGB的减重效果相当,但相比之下LSG能加快减重术患者术后康复进程,对降低手术并发症发生风险、减轻消化功能损伤均有积极意义。 展开更多
关键词 减重手术 ROUX-en-Y胃旁路术 腹腔镜胃袖状切除术
暂未订购
基于EN 12299:2009的中国高铁乘坐舒适性评价研究 被引量:2
20
作者 马辉 牛留斌 +1 位作者 俞志豪 侯之超 《振动工程学报》 北大核心 2025年第10期2270-2275,共6页
高速列车的舒适性评价对于改进高铁结构设计、提高乘客乘坐满意度具有重要意义。本文尝试应用欧洲标准EN 12299:2009对中国高铁的长时和瞬态乘坐舒适性进行评价,并探讨该标准的适用性。基于一款高速综合检测列车,开展了振动舒适性的客... 高速列车的舒适性评价对于改进高铁结构设计、提高乘客乘坐满意度具有重要意义。本文尝试应用欧洲标准EN 12299:2009对中国高铁的长时和瞬态乘坐舒适性进行评价,并探讨该标准的适用性。基于一款高速综合检测列车,开展了振动舒适性的客观测试与主观评价。简要介绍了EN 12299:2009标准推荐的平均舒适性评价指标和离散事件舒适性评价指标,并将二者分别用于高铁长时和瞬态舒适性评价。针对主观感受不同的三种路段,基于实测振动加速度数据,分别计算了长时和瞬态舒适性评价指标,据此对高铁乘坐舒适性与轨道质量进行分析。结合主观评价结果,对对应指标的适用性进行分析,并提出改进建议。 展开更多
关键词 长时舒适性 瞬态舒适性 高速列车 en 12299:2009 中国高铁
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部