期刊文献+
共找到7,716篇文章
< 1 2 250 >
每页显示 20 50 100
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
1
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
A Recursive Method to Encryption-Decryption-Based Distributed Set-Membership Filtering for Time-Varying Saturated Systems Over Sensor Networks
2
作者 Jun Hu Jiaxing Li +2 位作者 Chaoqing Jia Xiaojian Yi Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期1047-1049,共3页
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt... Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided. 展开更多
关键词 time varying saturated systems signal transmission processspecificallya encryption decryption mechanism sensor networks recursive method distributed set membership filtering
在线阅读 下载PDF
Femtosecond laser subtractive/additive-integrated biomimetic manufacturing for visible/infrared encryption and stimuli-responsive infrared decryption
3
作者 Ruijie Liu Dongshi Zhang Zhuguo Li 《International Journal of Extreme Manufacturing》 2025年第4期387-404,共18页
Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,... Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension. 展开更多
关键词 femtosecond laser biomimetic manufacturing black particle aggregates subtractive/additive-integrated manufacturing intrinsic visible-infrared encryption stimuli responsive decrypted IR display
在线阅读 下载PDF
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
4
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
New Constructions of Identity-Based Threshold Decryption 被引量:1
5
作者 ZHANG Leyou HU Yupu +1 位作者 TIAN Xu'an YANG Yang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期222-226,共5页
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c... In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously. 展开更多
关键词 ID-Based threshold decryption verifiable pair computational bilinear Diffie-Hellman (CBDH) problem provable security
原文传递
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption 被引量:2
6
作者 李世群 吴永东 +1 位作者 周建英 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期67-70,共4页
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa... The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4. 展开更多
关键词 batch decryption secure socket layer (SSL) server public key algorithm
在线阅读 下载PDF
Identity-Based Threshold Decryption on Access Structure
7
作者 秦华旺 朱晓华 戴跃伟 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期485-489,共5页
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig... For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible. 展开更多
关键词 threshold decryption access structure IDenTITY CRYPTOGRAPHY information security
原文传递
Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption
8
作者 Chan Hyeong Cho Hyun Min Song Taek-Young Youn 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期1911-1931,共21页
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recor... With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recorded surveillance videos to enhance efficiency and security.The proposed method leverages Dlib’s CNN-based facial recognition technology to identify Regions of Interest(ROIs)within the video,linking these ROIs to generate unique IDs.These IDs are then combined with a master key to create entity-specific keys,which are used to encrypt the ROIs within the video.This system supports selective decryption,effectively protecting personal information using surveillance footage.Additionally,the system overcomes the limitations of existing ROI recognition technologies by predicting unrecognized frames through post-processing.This research validates the proposed technology through experimental evaluations of execution time and post-processing techniques,ensuring comprehensive personal information protection.Guidelines for setting the thresholds used in this process are also provided.Implementing the proposed method could serve as an effective solution to security vulnerabilities that traditional approaches fail to address. 展开更多
关键词 Privacy de-identification selective decryption surveillance video
在线阅读 下载PDF
ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
9
作者 龙宇 陈克非 刘胜利 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期127-133,共7页
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext... B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively. 展开更多
关键词 threshold decryption identity-based cryptology publicly checkable encryption
在线阅读 下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
10
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
11
作者 ZENG Jianhua ZHAN Yanlin YANG Jianrong 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image enCRYPTION decryption single channel RGB component image disrupting
在线阅读 下载PDF
基于EN 12299:2009的中国高铁乘坐舒适性评价研究 被引量:1
12
作者 马辉 牛留斌 +1 位作者 俞志豪 侯之超 《振动工程学报》 北大核心 2025年第10期2270-2275,共6页
高速列车的舒适性评价对于改进高铁结构设计、提高乘客乘坐满意度具有重要意义。本文尝试应用欧洲标准EN 12299:2009对中国高铁的长时和瞬态乘坐舒适性进行评价,并探讨该标准的适用性。基于一款高速综合检测列车,开展了振动舒适性的客... 高速列车的舒适性评价对于改进高铁结构设计、提高乘客乘坐满意度具有重要意义。本文尝试应用欧洲标准EN 12299:2009对中国高铁的长时和瞬态乘坐舒适性进行评价,并探讨该标准的适用性。基于一款高速综合检测列车,开展了振动舒适性的客观测试与主观评价。简要介绍了EN 12299:2009标准推荐的平均舒适性评价指标和离散事件舒适性评价指标,并将二者分别用于高铁长时和瞬态舒适性评价。针对主观感受不同的三种路段,基于实测振动加速度数据,分别计算了长时和瞬态舒适性评价指标,据此对高铁乘坐舒适性与轨道质量进行分析。结合主观评价结果,对对应指标的适用性进行分析,并提出改进建议。 展开更多
关键词 长时舒适性 瞬态舒适性 高速列车 en 12299:2009 中国高铁
在线阅读 下载PDF
Decryption of pure-position permutation algorithms 被引量:3
13
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 decryption Image encryption FUZZY Position permutation
在线阅读 下载PDF
基于ViT-EN复合模型的朱墨时序显微图像识别研究
14
作者 黄锐 翁宗州 谢小雪 《中国人民公安大学学报(自然科学版)》 2025年第4期9-20,共12页
朱墨时序鉴定作为文书鉴定的重要组成部分,其传统鉴定方法依赖于鉴定人的主观经验,在复杂案件中易出现结论可靠性不足和重复性差等问题。针对上述问题,提出一种基于深度学习模型的朱墨时序鉴定方法,实现了多场景下朱墨时序的快速鉴定。... 朱墨时序鉴定作为文书鉴定的重要组成部分,其传统鉴定方法依赖于鉴定人的主观经验,在复杂案件中易出现结论可靠性不足和重复性差等问题。针对上述问题,提出一种基于深度学习模型的朱墨时序鉴定方法,实现了多场景下朱墨时序的快速鉴定。该方法通过采集字迹与印文交叉、非交叉部位的立体显微特征图像,构建2种字迹与3种印章组合的6类数据集,按8∶2的比例随机划分训练集和验证集;结合Vision Transformer (ViT)的全局上下文的捕捉能力与EfficientNet (EN)的局部特征高效提取能力,自主构建出ViT-EN(Vision Transformer-Efficient Net)复合模型,以达到对朱墨时序显微图像的快速准确智能识别。结果表明,6类数据集的验证准确率分别达到99.00%、98.00%、99.00%、100.00%、99.00%、98.00%。该方法为朱墨时序鉴定提供了一种客观、高效、可量化的智能辅助手段。 展开更多
关键词 朱墨时序 ViT-en 立体显微特征 图像识别 物证技术
在线阅读 下载PDF
ECC Based Threshold Decryption Scheme and Its Application in Web Security 被引量:2
15
作者 张险峰 张峰 +1 位作者 秦志光 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第4期41-46,共6页
The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test appro... The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of these techniques in Web security is studied. Performance analysis shows that our scheme is characterized by excellent security as well as high efficiency. 展开更多
关键词 intrusion tolerance elliptic curve cryptography threshold decryption web security
在线阅读 下载PDF
腹腔镜Roux-en-Y胃旁路术操作要点 被引量:2
16
作者 王泽阳 宋智 +3 位作者 李伟正 李鹏洲 朱晒红 朱利勇 《中南大学学报(医学版)》 北大核心 2025年第2期251-258,共8页
减重代谢手术作为治疗失代偿型肥胖的主要治疗方式,近年来其手术数量在中国呈快速增长趋势,并且涌现了多种改良及新型术式。中国肥胖人群的特点是体重指数较欧美国家肥胖人群低和胰岛功能受损,因此腹腔镜Roux-en-Y胃旁路术依然是中国目... 减重代谢手术作为治疗失代偿型肥胖的主要治疗方式,近年来其手术数量在中国呈快速增长趋势,并且涌现了多种改良及新型术式。中国肥胖人群的特点是体重指数较欧美国家肥胖人群低和胰岛功能受损,因此腹腔镜Roux-en-Y胃旁路术依然是中国目前主流的术式之一。《腹腔镜Roux-en-Y胃旁路术规范化手术操作指南(2019版)》虽然对手术流程进行了规范,但在实际操作中将术式做到规范和熟练仍然有很大的挑战。腹腔镜Roux-en-Y胃旁路术相比于腹腔镜袖状胃切除术操作上更复杂,学习时间更长。为避免手术不规范导致的减重效果不佳或发生严重手术并发症,笔者结合临床实践,重点阐述了小胃囊制作、胃肠及肠肠吻合的标准化操作、裂孔关闭及全浆膜化处理等关键步骤,为提高手术安全性与疗效提供了可供参考的流程优化建议。 展开更多
关键词 腹腔镜Roux-en-Y胃旁路术 减重代谢手术 手术要点 手术适应证 手术并发症预防与管理
暂未订购
一种融合GBRT-EN和LM的AOA室内定位算法
17
作者 姜淑娜 余超 +2 位作者 穆慧珍 罗宇婧 赵昆 《导航定位学报》 北大核心 2025年第5期76-83,共8页
针对到达角(AOA)测量值易受室内非视距(NLOS)环境影响导致定位精度较低的问题,提出一种将梯度渐近回归树(GBRT)和弹性网络(EN)相结合的组合模型(GBRT-EN)对AOA测量值进行修正,并使用列文伯格-马夸特(LM)方法实现结果解算的AOA室内定位算... 针对到达角(AOA)测量值易受室内非视距(NLOS)环境影响导致定位精度较低的问题,提出一种将梯度渐近回归树(GBRT)和弹性网络(EN)相结合的组合模型(GBRT-EN)对AOA测量值进行修正,并使用列文伯格-马夸特(LM)方法实现结果解算的AOA室内定位算法:利用GBRT模型对AOA测量值进行初步修正以减小NLOS误差;然后用EN网络对修正后的AOA测量值进行误差补偿;最后使用LM算法解算目标位置。实验结果表明:无论是在静态还是动态条件下,上述算法既可以减弱室内NLOS环境对AOA测量值的干扰,又能够降低定位误差,从而获得较好的定位效果;尤其在动态情况下,相较于现有的其他3种定位算法,提出算法的定位误差可分别减少19.64%、29.69%和41.56%,能够提高定位精度。 展开更多
关键词 到达角(AOA) 室内定位 非视距(NLOS) 梯度渐近回归树(GBRT) 弹性网络(en) 列文伯格-马夸特(LM)算法
在线阅读 下载PDF
En bloc切除清创联合阔筋膜张肌穿支接力皮瓣一期修复大转子压疮
18
作者 邓如非 范宝文 +5 位作者 陈燕微 张永宏 张友来 姜臻宇 邹立津 王丽晖 《中国美容医学》 2025年第6期35-38,共4页
目的:探讨采用en bloc切除清创联合阔筋膜张肌穿支接力皮瓣一期修复大转子压疮的临床效果。方法:选取2019年12月-2023年12月笔者科室治疗的13例大转子Ⅲ、Ⅳ期压疮患者,共18处压疮,压疮面积为3.0 cm×2.0 cm~9.0 cm×6.0 cm,采... 目的:探讨采用en bloc切除清创联合阔筋膜张肌穿支接力皮瓣一期修复大转子压疮的临床效果。方法:选取2019年12月-2023年12月笔者科室治疗的13例大转子Ⅲ、Ⅳ期压疮患者,共18处压疮,压疮面积为3.0 cm×2.0 cm~9.0 cm×6.0 cm,采用en bloc切除清创将压疮病灶组织彻底清除,清创后创面面积为4.0 cm×3.0 cm~11.0 cm×9.0 cm,一期设计阔筋膜张肌穿支接力皮瓣修复大转子压疮,主瓣修复压疮,副瓣覆盖主瓣供区,副瓣供区直接拉拢缝合,其中主瓣面积5.0 cm×4.0 cm~13.0 cm×10.0 cm、副瓣面积3.0 cm×2.0 cm~7.0 cm×4.0 cm。术后观察皮瓣存活及并发症情况,随访皮瓣的外观、质地以及压疮有无复发。结果:1例患者1处皮瓣副瓣远端小面积坏死,经床旁清创缝合后创面愈合,其余皮瓣均存活良好,术后未出现出血、感染、脂肪液化及切口开裂等不良并发症;所有患者随访3~18个月,皮瓣色泽及外观较好,外形满意,均未见压疮复发。结论:采用en bloc切除清创联合阔筋膜张肌穿支接力皮瓣修复大转子压疮,可一期修复压疮,且供瓣区处无张力缝合外层皮肤,操作简单,外观良好,临床效果较佳。 展开更多
关键词 压力性溃疡 大转子 皮瓣 en bloc切除 清创 压疮
暂未订购
Simple optical decryption based on a modified joint transform correlator technique
19
作者 王怀彬 王天佐 袁晓聪 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第2期203-205,共3页
A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase... A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the encrypted hologram as well as the decryption key as phase-only elements. The optical decryption was implemented by superimposing the encrypted hologram and the decryyption key in a simple optical setup. Numerical simulation and optical experiment have confirmed the proposed technique as a simple and easy implementation for optical decryption, demonstrating potential applications in optical information security verification. 展开更多
关键词 computer generated holograms CORRELATOR enCRYPTION/decryption
在线阅读 下载PDF
基于en face OCT的视网膜前巨噬细胞样细胞在眼底病中的研究进展
20
作者 曾运考 陈婉霓(综述) 文峰(审校) 《眼科学报》 2025年第2期202-207,共6页
巨噬细胞样细胞(macrophage-like cells, MLC)指起源、功能与巨噬细胞类似的免疫细胞,包括小胶质细胞、玻璃体细胞及巨噬细胞。将en face OCT显示层面设置在视网膜表明即可观测到视网膜表明的MLC(epiretinal MLC, eMLC),随后利用Image ... 巨噬细胞样细胞(macrophage-like cells, MLC)指起源、功能与巨噬细胞类似的免疫细胞,包括小胶质细胞、玻璃体细胞及巨噬细胞。将en face OCT显示层面设置在视网膜表明即可观测到视网膜表明的MLC(epiretinal MLC, eMLC),随后利用Image J软件即可对细胞进行提取和量化。研究表明,eMLC在炎症情况下均可出现细胞募集及活化现象,但在不同眼底病中各具特点。在糖尿病视网膜病变、视网膜静脉阻塞等视网膜缺血缺氧性疾病中,eMLC密度越高,黄斑水肿可能越严重。此外,eMLC密度更高的视网膜静脉阻塞患者抗VEGF疗效更差,视力预后不佳,提示基于en face OCT的eMLC不仅可用于评估视网膜炎症情况,而且还能充当提示疾病疗效及预后的标志物。在葡萄膜炎等免疫炎症性疾病中,en face OCT亦可观测到eMLC密度、形态等改变。白塞病葡萄膜炎患者视网膜血管渗漏程度与eMLC密度相关性强,故eMLC密度可充当无创评估视网膜血管渗漏程度的新指标。然而,目前提取和量化eMLC的方法及标准不统一,降低了各研究间的可比性。因此,亟需制定统一的操作规范和评估标准。此外eMLC所代表的具体细胞类型及功能仍需进一步探究。未来,研究者可以利用en face OCT对眼底炎症地进行无创评估。基于en face OCT的eMLC还能作为基础研究与临床研究之间的桥梁,为揭示疾病的致病机制提供重要参考。 展开更多
关键词 en face OCT 巨噬细胞样细胞 眼底病 炎症
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部