Recent advances in deep learning have significantly improved image deblurring;however,existing approaches still suffer from limited global context modeling,inadequate detail restoration,and poor texture or edge percep...Recent advances in deep learning have significantly improved image deblurring;however,existing approaches still suffer from limited global context modeling,inadequate detail restoration,and poor texture or edge perception,especially under complex dynamic blur.To address these challenges,we propose the Multi-Resolution Fusion Network(MRFNet),a blind multi-scale deblurring framework that integrates progressive residual connectivity for hierarchical feature fusion.The network employs a three-stage design:(1)TransformerBlocks capture long-range dependencies and reconstruct coarse global structures;(2)Nonlinear Activation Free Blocks(NAFBlocks)enhance local detail representation and mid-level feature fusion;and(3)an optimized residual subnetwork based on gated feature modulation refines texture and edge details for high-fidelity restoration.Extensive experiments demonstrate that MRFNet achieves superior performance compared to state-of-the-art methods.On GoPro,it attains 32.52 dB Peak Signal-to-Noise Ratio(PSNR)and 0.071 Learned Perceptual Image Patch Similarity(LPIPS),outperforming MIMOWNet(32.50 dB,0.075).On HIDE,it achieves 30.25 dB PSNR and 0.945 Structural Similarity Index Measure(SSIM),representing gains of+0.26 dB and+0.015 SSIM over MIMO-UNet(29.99 dB,0.930).On RealBlur-J,it reaches 28.82 dB PSNR and 0.872 SSIM,surpassing MIMO-UNet by+1.19 dB and+0.035 SSIM(27.63 dB,0.837).These results validate the effectiveness of the proposed progressive residual fusion and hybrid attention mechanisms in balancing global context understanding and local detail recovery for blind image deblurring.展开更多
This report presents a forensic evaluation of a case involving blindness(visual acuity grade 5)following a bee/wasp sting to the left eye.Through systematic analysis of the patient’s multiple hospital admissions,post...This report presents a forensic evaluation of a case involving blindness(visual acuity grade 5)following a bee/wasp sting to the left eye.Through systematic analysis of the patient’s multiple hospital admissions,postoperative follow-up data,and a review of the pathological mechanisms of ocular injury caused by bee venom,this study comprehensively assesses the injury characteristics,treatment course,and visual outcomes.Bee venom induces severe complications such as corneal damage,uveitis,cataract,and secondary glaucoma through multiple mechanisms including direct cytotoxicity,immune-inflammatory responses,and enzymatic hydrolysis.Despite interventions including anterior chamber irrigation,phacoemulsification with intraocular lens implantation,and antiglaucoma surgery,the affected eye ultimately lost light perception.Forensic examination confirmed the absence of light perception in the left eye and abnormal visual pathway function,consistent with clinical observations.According to the relevant Chinese disability assessment standard(JR/T 0083-2013,Article 4.2.2),the injury was classified as grade 7 disability.This study provides an in-depth discussion of the mechanisms and key forensic identification points in bee-sting-induced blindness,offering a scientific reference for similar forensic clinical cases.展开更多
Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively ...Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively high row weights,the existing blind recognition algorithms based on a candidate set generally perform worse.In this paper,we propose a blind recognition method for LDPC codes,called as tangent function assisted least square(TLS)method,which improves recognition performances by constructing a new cost function.To characterize the constraint degree among received vectors and paritycheck vectors,a feature function based on tangent function is constructed in the proposed algorithm.A cost function based on least square method is also established according to the feature function values satisfying the parity-check relationship.Moreover,the minimum average value in TLS is obtained on the candidate set.Numerical analysis and simulation results show that recognition performances of TLS algorithm are consistent with theoretical results.Compared with existing algorithms,the proposed method possesses better recognition performances.展开更多
Organophosphate pesticide poisoning is an acute form of poisoning primarily found in underdeveloped regions.Its main clinical manifestations include muscarinic symptoms,nicotinic symptoms,and central nervous system di...Organophosphate pesticide poisoning is an acute form of poisoning primarily found in underdeveloped regions.Its main clinical manifestations include muscarinic symptoms,nicotinic symptoms,and central nervous system disturbances.This report presents a case of a middleaged female who developed extremely rare symptoms of optic nerve damage after ingesting a large amount of an organophosphate pesticide.展开更多
When Dachung Wochen,a 35-year-old blind Tibetan,walks in the bustling streets of Lhasa,capital of the Xizang Autonomous Region,with his guide dog Fuju,people are amazed by their tacit cooperation.Fuju helps his master...When Dachung Wochen,a 35-year-old blind Tibetan,walks in the bustling streets of Lhasa,capital of the Xizang Autonomous Region,with his guide dog Fuju,people are amazed by their tacit cooperation.Fuju helps his master navigate every obstacle on the road.After spending only a year with him,he understands most of his commands in Tibetan.Dachung Wochen's journey with the four-year-old canine began in April 2024.After 28 days of professional training at the China Guide Dog Training Center in Dalian,Liaoning Province,Dachung,as he is called by friends and family,took Fuju to Xizang by air and rail.展开更多
In airborne tracking,the blind Doppler makes the target undetectable,resulting in tracking difficulties. In this paper,we studied most possible blind-Doppler cases and summed them up into two types:targets' intent...In airborne tracking,the blind Doppler makes the target undetectable,resulting in tracking difficulties. In this paper,we studied most possible blind-Doppler cases and summed them up into two types:targets' intentional tangential flying to radar and unintentional flying with large tangential speed. We proposed an interacting multiple model(IMM) particle filter which combines a constant velocity model and an acceleration model to handle maneuvering motions. We compared the IMM particle filter with a previous particle filter solution. Simulation results showed that the IMM particle filter outperforms the method in previous works in terms of tracking accuracy and continuity.展开更多
AIM:To evaluate the prevalence and the causes of blindness,severe visual impairment(SVI),and visual impairment(VI)and to investigate the frequency of cataract surgery in people aged≥50y in Yueqing,Zhejiang Province,C...AIM:To evaluate the prevalence and the causes of blindness,severe visual impairment(SVI),and visual impairment(VI)and to investigate the frequency of cataract surgery in people aged≥50y in Yueqing,Zhejiang Province,China.METHODS:A population-based,cross-sectional study was performed using the Rapid Assessment of Avoidable Blindness technique.Eight-seven clusters,each consisting of 50 people aged≥50y,were selected by probabilityproportionate-to-size sampling.Three outreach teams conducted door-to-door visits.Visual acuity(VA)was measured using a tumbling E chart.Lens status and causes of VI were assessed by ophthalmologists for individuals with a VA of<6/12 in either eye.A standardized questionnaire was used to collect information about cataract surgeries.RESULTS:Of 4350 eligible individuals,4120 were examined with a 94.7%response rate.Age-and genderadjusted prevalence of blindness,SVI,and VI were 0.5%(95%CI,0.3%–0.7%),0.7%(95%CI,0.4%–1.0%),and 4.8%(95%CI,4.2%–5.5%),respectively.Age was associated with an increased prevalence of VI,and the most common cause of VI was untreated cataracts,with the main barriers to cataract surgery being a lack of knowledge or awareness about cataracts.Of the 415 eyes operated on for cataracts,68(16.4%)eyes had a poor outcomes(VA<6/60)and 303(73.0%)had a good outcomes(VA>6/18).CONCLUSION:Prevalence rates of blindness,SVI,and VI in Yueqing are lower than other reported Chinese population-based studies.Cataracts remain the most common cause of blindness and VI.展开更多
Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concern...Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes.展开更多
Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at th...Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at the north of the Cangxian uplift in the North China Basin,the concentrated geothermal resource development zone in North China.This study systematically collects temperature logging data and long-term dynamic monitoring of water level and water quality as well as group well tracer test data carried out in this area in recent years,on the basis of which the hydrothermal controlling role of the deep hidden faults is systematically analyzed.The results show that the Cangdong fault communicates with different geothermal reservoirs in the shallow part and plays a specific role in the water-heat channel of the local area.As a result,the high-value area of the geothermal temperature gradient in the sedimentary layer of the Donglihu area is distributed around the Cangdong fault.The geothermal reservoir temperature of the Minghuazhen Formation within the influence of the fault is also significantly higher than the regional average,the hydraulic head of different geothermal reservoirs showing a consistent and synergistic trend.However,the water quality has been stable for many years without any apparent changes.This understanding has a particular significance for further deepening understanding of the geothermal genesis mechanism in sedimentary basins and guiding future geothermal exploration and development in the Donglihu area.展开更多
Most blind image quality assessment(BIQA)methods require a large amount of time to collect human opinion scores as training labels,which limits their usability in practice.Thus,we present an opinion-unaware BIQA metho...Most blind image quality assessment(BIQA)methods require a large amount of time to collect human opinion scores as training labels,which limits their usability in practice.Thus,we present an opinion-unaware BIQA method based on deep reinforcement learning which is trained without subjective scores,named DRL-IQA.Inspired by the human visual perception process,our model is formulated as a quality reinforced agent,which consists of the dynamic distortion generation part and the quality perception part.By considering the image distortion degradation process as a sequential decision-making process,the dynamic distortion generation part can develop a strategy to add as many different distortions as possible to an image,which enriches the distortion space to alleviate overfitting.A reward function calculated from quality degradation after adding distortion is utilized to continuously optimize the strategy.Furthermore,the quality perception part can extract rich quality features from the quality degradation process without using subjective scores,and accurately predict the state values that represent the image quality.Experimental results reveal that our method achieves competitive quality prediction performance compared to other state-of-the-art BIQA methods.展开更多
Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapmen...Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapment in low-value-added production,and driving industrial upgrading.Given the distinct market environment in which China’s hidden champions have emerged,it is both timely and practically significant to examine their growth trajectories and underlying mechanisms.This study adopts a resource allocation perspective to investigate the development path of Chinese manufacturing enterprises into hidden champions,using a vertical case study of Hailiya Group.The findings reveal that such enterprises achieve hidden champion status by vertically concentrating on niche markets while harnessing technological potential and horizontally diversifying their technology application scenarios.Their growth follows a“T-shaped”strategy,combining vertical specialization in a focused market with horizontal expansion into new applications.Four critical mechanisms underpin the rise of manufacturing hidden champions:market niche positioning,innovation-driven focus,application scenario expansion,and ecosystem development.Specifically,these enterprises strategically target niche markets,establish a technology-oriented competitive edge,broaden technology applications to unlock new profit opportunities,and develop collaborative ecosystems to share resources and drive industrial advancement.This paper not only extends the interpretive boundaries of resource allocation theory but also offers fresh insights into the emergence of Chinese manufacturing enterprises as hidden champions,enriching our understanding of their unique growth dynamics.展开更多
The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastr...The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected.展开更多
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the...With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues.Due to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in IoV.However,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key misuse.This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure.In addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse.Since the main computation task is outsourced to the cloud,the burden of the user side is relatively low.Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.展开更多
This study begins with the fabrication and simulation of high-performance back-illuminated AlGaN-based solar-blind ultraviolet(UV)photodetectors.Based on the photodetectors,a low-noise,high-gain UV detection system ci...This study begins with the fabrication and simulation of high-performance back-illuminated AlGaN-based solar-blind ultraviolet(UV)photodetectors.Based on the photodetectors,a low-noise,high-gain UV detection system circuit is designed and fabricated,enabling the detection,acquisition,and calibration of weak solar-blind UV signals.Experimental results demonstrate that under zero bias conditions,with a UV light power density of 3.45μW/cm^(2) at 260 nm,the sample achieves a peak responsivity(R)of 0.085 A·W^(−1),an external quantum efficiency(EQE)of 40.7%,and a detectivity(D^(*))of 7.46×10^(12) cm·Hz^(1/2)·W^(−1).The system exhibits a bandpass characteristic within the 240–280 nm wavelength range,coupled with a high signal-to-noise ratio(SNR)of 39.74 dB.展开更多
Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory.In order to achieve better jamming suppression performance,many studies have applied blind sourc...Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory.In order to achieve better jamming suppression performance,many studies have applied blind source separation(BSS)to jamming suppression.BSS can achieve the separation and extraction of the individual source signals from the mixed signal received by the array.This paper proposes a perspective to recognize BSS as spatial band-pass filters(SBPFs)for jamming suppression applications.The theoretical derivation indicates that the processing of mixed signals by BSS can be perceived as the application of a set of SBPFs that gate the source signals at various angles.Simulations are performed using radar jamming suppression as an example.The simulation results suggest that BSS and SBPFs produce approximately the same effects.Simulation results are consistent with theoretical derivation results.展开更多
Background:Blindness and vision impairment(BVI)continue to pose significant global public health challenges,disproportionately impacting vulnerable populations and further widening socioeconomic disparities.This study...Background:Blindness and vision impairment(BVI)continue to pose significant global public health challenges,disproportionately impacting vulnerable populations and further widening socioeconomic disparities.This study conducts a comprehensive evaluation of the global burden of BVI and the socioeconomic inequalities in its distribution from 1990 to 2021,aiming to provide insights for targeted intervention strategies.Methods:Using data from Global Burden of Disease 2021,this study performed a multiscale analysis of BVI burden,examining patterns at the global,regional and national levels.We quantified the disease burden using disability-adjusted life years DALY and prevalence rates.Temporal trends were analyzed by calculating estimated annual percentage changes(EAPC).Stratified assessments were carried out by sex and age group across 21 regions and 204 countries.The study also included comparative analyses of six major eye conditions and evaluated their associations with socio-demographic index(SDI).Results:Globally,the age-standardized prevalence of BVI increased from 12,453.52 per million(95%UI:10,287.58-15,226.09)in 1990 to 15,784.33 per million(12,761.44-19,502.32)in 2021,with an EAPC of 1.09%(95%UI:0.97-1.20).During this period,global DALYs attributable to BVI increased by 37.7%.Disease trends exhibited significant divergence,with near vision loss showing the steepest increase(EAPC:1.47%),while the prevalence of glaucoma declined(EAPC:-0.73%).Geographic disparities were pronounced,with substantial improvements observed in Equatorial Guinea(EAPC:-1.75)and worsening burdens in Benin(+0.54).Disease distribution demonstrated strong regional clustering,with near vision loss being predominant in Sub-Saharan Africa(64.47%)and East Asia(50.97%),while cataract was the most common condition in Oceania(33.86%).Females consistently bore a higher burden,particularly in South Asia(646.3 vs 563.2 DALYs).Moreover,we identified a strong inverse correlation between SDI and BVI burden(Ρ=-0.772 for DALYs).Conclusions:This study highlights the severe global burden of BVI and the significant cross-country inequality,particularly in low-and middle-income countries.It emphasizes the urgent need for targeted interventions and the integration of eye care into universal health policies to promote global health equity in the post-pandemic era.展开更多
Recent deep neural network(DNN)based blind image quality assessment(BIQA)approaches take mean opinion score(MOS)as ground-truth labels,which would lead to cross-datasets biases and limited generalization ability of th...Recent deep neural network(DNN)based blind image quality assessment(BIQA)approaches take mean opinion score(MOS)as ground-truth labels,which would lead to cross-datasets biases and limited generalization ability of the DNN-based BIQA model.This work validates the natural instability of MOS through investigating the neuropsychological characteristics inside the human visual system during quality perception.By combining persistent homology analysis with electroencephalogram(EEG),the physiologically meaningful features of the brain responses to different distortion levels are extracted.The physiological features indicate that although volunteers view exactly the same image content,their EEG features are quite varied.Based on the physiological results,we advocate treating MOS as noisy labels and optimizing the DNN based BIQA model with earlystop strategies.Experimental results on both innerdataset and cross-dataset demonstrate the superiority of our optimization approach in terms of generalization ability.展开更多
Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded the...Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded theory study involved twenty-six students and five faculty members from a century-old nursing school in Macao.Semi-structured interviews examined the factors influencing nursing students’choice of a specific nursing school and their general learning experiences in nursing studies.Open and focused coding was employed to develop categories and concepts that capture the nuances of how the hidden curriculum influences students’personal experiences,perceptions,and values related to developing their professional identities.The data analysis was guided by the“Community of Practice”model.Results The educational mission fostered a hidden curriculum that emphasized nurturing qualities and social responsibilities,creating a family-like learning environment that positively influenced the professional socialization of nursing students.Under the core theme of“becoming a family,”two sub-themes emerged:“student-peer interactions-fostering sisterly/brotherly learning partnerships”and“student-faculty interactions–faculty’s acting as parenting instructors.”While the hidden curriculum promoted a democratic and egalitarian learning atmosphere among student-peers,it simultaneously reinforced hierarchical power dynamics among senior-junior students and student-faculty relationships,mirroring the power-based interpersonal dynamics often found in traditional Chinese families.Conclusions Explicating the educational mission can help shape a hidden curriculum that benefits nursing students’professional socialization.Faculty members should reflect on the power inequalities reproduced by the hidden curriculum and establish appropriate boundaries in student-faculty relationships.展开更多
In 5G new radio(NR), polar codes are adopted for e MBB downlink control channels where the blind detection is employed in user equipment(UE) to identify the correct downlink control information(DCI). However, differen...In 5G new radio(NR), polar codes are adopted for e MBB downlink control channels where the blind detection is employed in user equipment(UE) to identify the correct downlink control information(DCI). However, different from that in the 4G LTE system, the cyclic redundancy check(CRC) in polar decoding plays both error correction and error detection roles. Consequently, the false alarm rates(FAR) may not meet the system requirements(FAR<1.52 × 10^(−5)). In this paper, to mitigate the FAR in polar code blind detection, we attach a binary classifier after the polar decoder to further remove the false alarm results and meanwhile retain the correct DCI. This classifier works by tracking the squared Euclidean distance ratio(SEDR) between the received signal and hypothesis. We derive an analytical method to fast compute proper classification threshold that is implementation-friendly in practical use. Combining the well-designed classifier, we show that some very short CRC sequences can even be used to meet the FAR requirements. This consequently reduces the CRC overhead and contributes to the system error performance improvements.展开更多
AIM:To identify risk factors for postoperative blindness in patients with primary rhegmatogenous retinal detachment(RRD)at their first presentation to a tertiary center,using a large clinical database to improve under...AIM:To identify risk factors for postoperative blindness in patients with primary rhegmatogenous retinal detachment(RRD)at their first presentation to a tertiary center,using a large clinical database to improve understanding of this adverse outcome.METHODS:Electronic health records of patients with primary RRD from the Eye Hospital of Wenzhou Medical University were retrospectively analyzed.Postoperative blindness was defined according to the World Health Organization(WHO)criteria for legal blindness.Potential risk factors included demographic characteristics,preoperative clinical features,and surgical variables.Univariable and multivariable logistic regression analyses were performed to calculate odds ratios(ORs)and 95%confidence intervals(CIs)for each risk factor.RESULTS:A total of 532 patients were included in the cohort,of whom 62(12.0%;28 males,34 females)developed postoperative blindness at the final follow-up.Among these 62 patients,30 had high myopia and 32 did not.The mean age of participants was 49.0±16.4y,with 275 subjects(52%)being male and 133 patients(25%)having the condition in the right eye.In the multivariable model for all patients,the following factors were associated with an increased risk of postoperative blindness:higher preoperative logarithm of the minimum angle of resolution visual acuity(logMAR VA;OR=1.09 per 0.1 logMAR unit increase,95%CI 1.03-1.15);inferior or superior retinal breaks(OR=2.42,95%CI 1.12-5.24);and macular holes or superior retinal breaks(OR=8.46,95%CI 3.45-20.75).In the subgroup of patients with high myopia,risk factors for postoperative blindness included:pseudophakia/aphakia versus phakia(OR=6.33,95%CI 1.41-28.31);macular holes or superior retinal breaks(OR=15.15,95%CI 3.07-74.85);and proliferative vitreoretinopathy(PVR;OR=21.41,95%CI 2.14-214.57).In the subgroup of patients without high myopia,increased risk of postoperative blindness was associated with:higher preoperative logMAR VA(OR=1.11 per 0.1 logMAR unit increase,95%CI 1.04-1.18);and inferior or superior retinal breaks(OR=2.90,95%CI 1.19-7.06).CONCLUSION:Using a large real-world clinical database,we identified distinct risk factors for postoperative blindness in patients with primary RRD-including differences between those with and without high myopia.These findings emphasize the need to target specific risk factors in clinical practice to mitigate and reduce the incidence of postoperative blindness in this patient population.展开更多
基金funded by Qinghai University Postgraduate Research and Practice Innovation Program of Funder,grant number 2025-GMKY-42.
文摘Recent advances in deep learning have significantly improved image deblurring;however,existing approaches still suffer from limited global context modeling,inadequate detail restoration,and poor texture or edge perception,especially under complex dynamic blur.To address these challenges,we propose the Multi-Resolution Fusion Network(MRFNet),a blind multi-scale deblurring framework that integrates progressive residual connectivity for hierarchical feature fusion.The network employs a three-stage design:(1)TransformerBlocks capture long-range dependencies and reconstruct coarse global structures;(2)Nonlinear Activation Free Blocks(NAFBlocks)enhance local detail representation and mid-level feature fusion;and(3)an optimized residual subnetwork based on gated feature modulation refines texture and edge details for high-fidelity restoration.Extensive experiments demonstrate that MRFNet achieves superior performance compared to state-of-the-art methods.On GoPro,it attains 32.52 dB Peak Signal-to-Noise Ratio(PSNR)and 0.071 Learned Perceptual Image Patch Similarity(LPIPS),outperforming MIMOWNet(32.50 dB,0.075).On HIDE,it achieves 30.25 dB PSNR and 0.945 Structural Similarity Index Measure(SSIM),representing gains of+0.26 dB and+0.015 SSIM over MIMO-UNet(29.99 dB,0.930).On RealBlur-J,it reaches 28.82 dB PSNR and 0.872 SSIM,surpassing MIMO-UNet by+1.19 dB and+0.035 SSIM(27.63 dB,0.837).These results validate the effectiveness of the proposed progressive residual fusion and hybrid attention mechanisms in balancing global context understanding and local detail recovery for blind image deblurring.
文摘This report presents a forensic evaluation of a case involving blindness(visual acuity grade 5)following a bee/wasp sting to the left eye.Through systematic analysis of the patient’s multiple hospital admissions,postoperative follow-up data,and a review of the pathological mechanisms of ocular injury caused by bee venom,this study comprehensively assesses the injury characteristics,treatment course,and visual outcomes.Bee venom induces severe complications such as corneal damage,uveitis,cataract,and secondary glaucoma through multiple mechanisms including direct cytotoxicity,immune-inflammatory responses,and enzymatic hydrolysis.Despite interventions including anterior chamber irrigation,phacoemulsification with intraocular lens implantation,and antiglaucoma surgery,the affected eye ultimately lost light perception.Forensic examination confirmed the absence of light perception in the left eye and abnormal visual pathway function,consistent with clinical observations.According to the relevant Chinese disability assessment standard(JR/T 0083-2013,Article 4.2.2),the injury was classified as grade 7 disability.This study provides an in-depth discussion of the mechanisms and key forensic identification points in bee-sting-induced blindness,offering a scientific reference for similar forensic clinical cases.
基金Fundamental Research Funds for the Central Universities under Grant 3072025YC0802the National Natural Science Foundation of China under Grant 62001138Heilongjiang Provincial Natural Science Foundation of China under Grant LH2021F009。
文摘Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively high row weights,the existing blind recognition algorithms based on a candidate set generally perform worse.In this paper,we propose a blind recognition method for LDPC codes,called as tangent function assisted least square(TLS)method,which improves recognition performances by constructing a new cost function.To characterize the constraint degree among received vectors and paritycheck vectors,a feature function based on tangent function is constructed in the proposed algorithm.A cost function based on least square method is also established according to the feature function values satisfying the parity-check relationship.Moreover,the minimum average value in TLS is obtained on the candidate set.Numerical analysis and simulation results show that recognition performances of TLS algorithm are consistent with theoretical results.Compared with existing algorithms,the proposed method possesses better recognition performances.
文摘Organophosphate pesticide poisoning is an acute form of poisoning primarily found in underdeveloped regions.Its main clinical manifestations include muscarinic symptoms,nicotinic symptoms,and central nervous system disturbances.This report presents a case of a middleaged female who developed extremely rare symptoms of optic nerve damage after ingesting a large amount of an organophosphate pesticide.
文摘When Dachung Wochen,a 35-year-old blind Tibetan,walks in the bustling streets of Lhasa,capital of the Xizang Autonomous Region,with his guide dog Fuju,people are amazed by their tacit cooperation.Fuju helps his master navigate every obstacle on the road.After spending only a year with him,he understands most of his commands in Tibetan.Dachung Wochen's journey with the four-year-old canine began in April 2024.After 28 days of professional training at the China Guide Dog Training Center in Dalian,Liaoning Province,Dachung,as he is called by friends and family,took Fuju to Xizang by air and rail.
基金Project supported by China Postdoctoral Science Foundation (No.20060400313)partly by Zhejiang Postdoctoral Science Founda-tion of China (No. 2006-bsh-25)
文摘In airborne tracking,the blind Doppler makes the target undetectable,resulting in tracking difficulties. In this paper,we studied most possible blind-Doppler cases and summed them up into two types:targets' intentional tangential flying to radar and unintentional flying with large tangential speed. We proposed an interacting multiple model(IMM) particle filter which combines a constant velocity model and an acceleration model to handle maneuvering motions. We compared the IMM particle filter with a previous particle filter solution. Simulation results showed that the IMM particle filter outperforms the method in previous works in terms of tracking accuracy and continuity.
基金Supported by Zhejiang Province Science and Technology Benefiting Project(No.2014H01007)Wenzhou Municipal Basic Research Project(No.Y20210208).
文摘AIM:To evaluate the prevalence and the causes of blindness,severe visual impairment(SVI),and visual impairment(VI)and to investigate the frequency of cataract surgery in people aged≥50y in Yueqing,Zhejiang Province,China.METHODS:A population-based,cross-sectional study was performed using the Rapid Assessment of Avoidable Blindness technique.Eight-seven clusters,each consisting of 50 people aged≥50y,were selected by probabilityproportionate-to-size sampling.Three outreach teams conducted door-to-door visits.Visual acuity(VA)was measured using a tumbling E chart.Lens status and causes of VI were assessed by ophthalmologists for individuals with a VA of<6/12 in either eye.A standardized questionnaire was used to collect information about cataract surgeries.RESULTS:Of 4350 eligible individuals,4120 were examined with a 94.7%response rate.Age-and genderadjusted prevalence of blindness,SVI,and VI were 0.5%(95%CI,0.3%–0.7%),0.7%(95%CI,0.4%–1.0%),and 4.8%(95%CI,4.2%–5.5%),respectively.Age was associated with an increased prevalence of VI,and the most common cause of VI was untreated cataracts,with the main barriers to cataract surgery being a lack of knowledge or awareness about cataracts.Of the 415 eyes operated on for cataracts,68(16.4%)eyes had a poor outcomes(VA<6/60)and 303(73.0%)had a good outcomes(VA>6/18).CONCLUSION:Prevalence rates of blindness,SVI,and VI in Yueqing are lower than other reported Chinese population-based studies.Cataracts remain the most common cause of blindness and VI.
基金funded by the Yunnan Key Laboratory of Blockchain Application Technology(202105AG070005,202305AG340008)&YNB202301,NSFC(Grant Nos.72293583,72293580,62476007,62176273,62271234)the Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2024-1-06)+2 种基金the Project of Science and Technology Major Project of Yunnan Province(202302AF080006)Open Foundation of State Key Laboratory of Public Big Data(Guizhou University)under Grant No.PBD2022-16Double First-Class Project for Collaborative Innovation Achievements inDisciplines Construction in Heilongjiang Province under Grant No.GXCG2022-054.
文摘Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes.
基金funded by Public Interest Monitoring Project(No.XCSD-2024-317)of the Tianjin Municipal Bureau of Planning and Natural Resources。
文摘Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at the north of the Cangxian uplift in the North China Basin,the concentrated geothermal resource development zone in North China.This study systematically collects temperature logging data and long-term dynamic monitoring of water level and water quality as well as group well tracer test data carried out in this area in recent years,on the basis of which the hydrothermal controlling role of the deep hidden faults is systematically analyzed.The results show that the Cangdong fault communicates with different geothermal reservoirs in the shallow part and plays a specific role in the water-heat channel of the local area.As a result,the high-value area of the geothermal temperature gradient in the sedimentary layer of the Donglihu area is distributed around the Cangdong fault.The geothermal reservoir temperature of the Minghuazhen Formation within the influence of the fault is also significantly higher than the regional average,the hydraulic head of different geothermal reservoirs showing a consistent and synergistic trend.However,the water quality has been stable for many years without any apparent changes.This understanding has a particular significance for further deepening understanding of the geothermal genesis mechanism in sedimentary basins and guiding future geothermal exploration and development in the Donglihu area.
基金supported by the Fundamental Research Funds for the Central Universities.
文摘Most blind image quality assessment(BIQA)methods require a large amount of time to collect human opinion scores as training labels,which limits their usability in practice.Thus,we present an opinion-unaware BIQA method based on deep reinforcement learning which is trained without subjective scores,named DRL-IQA.Inspired by the human visual perception process,our model is formulated as a quality reinforced agent,which consists of the dynamic distortion generation part and the quality perception part.By considering the image distortion degradation process as a sequential decision-making process,the dynamic distortion generation part can develop a strategy to add as many different distortions as possible to an image,which enriches the distortion space to alleviate overfitting.A reward function calculated from quality degradation after adding distortion is utilized to continuously optimize the strategy.Furthermore,the quality perception part can extract rich quality features from the quality degradation process without using subjective scores,and accurately predict the state values that represent the image quality.Experimental results reveal that our method achieves competitive quality prediction performance compared to other state-of-the-art BIQA methods.
基金supported by the following projects:The Youth Project of the National Natural Science Foundation of China(NSFC)“Research on Chinese Multinational Companies’Componovation under Resource Constraint:From a Dynamic Circulation Logic of Home and Host Countries”(Grant No.72102030)The Research Project of Humanities and Social Sciences of the Ministry of Education“Research on Chinese Multinational Companies’Learning by Doing Mechanism under Resource Constraint”(Grant No.21C10173022)The General Project of the China Postdoctoral Science Foundation“Research on the Realization Path and Motivations for the Domestic Replacement of Core Technologies for Chinese Manufacturing Enterprises”(Grant No.2022M720975).
文摘Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapment in low-value-added production,and driving industrial upgrading.Given the distinct market environment in which China’s hidden champions have emerged,it is both timely and practically significant to examine their growth trajectories and underlying mechanisms.This study adopts a resource allocation perspective to investigate the development path of Chinese manufacturing enterprises into hidden champions,using a vertical case study of Hailiya Group.The findings reveal that such enterprises achieve hidden champion status by vertically concentrating on niche markets while harnessing technological potential and horizontally diversifying their technology application scenarios.Their growth follows a“T-shaped”strategy,combining vertical specialization in a focused market with horizontal expansion into new applications.Four critical mechanisms underpin the rise of manufacturing hidden champions:market niche positioning,innovation-driven focus,application scenario expansion,and ecosystem development.Specifically,these enterprises strategically target niche markets,establish a technology-oriented competitive edge,broaden technology applications to unlock new profit opportunities,and develop collaborative ecosystems to share resources and drive industrial advancement.This paper not only extends the interpretive boundaries of resource allocation theory but also offers fresh insights into the emergence of Chinese manufacturing enterprises as hidden champions,enriching our understanding of their unique growth dynamics.
基金supported by the project Major Scientific and Technological Special Project of Guizhou Province([2024]014).
文摘The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected.
基金supported by the National Natural Science Foundation of China(No.62272076)。
文摘With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues.Due to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in IoV.However,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key misuse.This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure.In addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse.Since the main computation task is outsourced to the cloud,the burden of the user side is relatively low.Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
基金supported by the Director’s Fund for the‘Climbing Plan’of the National Space Science Centre of the Chinese Academy of Sciences(No.E2PD10011S)the National Engineering Research Centre for Mobile Private Networks Project(No.BJTU20221102).
文摘This study begins with the fabrication and simulation of high-performance back-illuminated AlGaN-based solar-blind ultraviolet(UV)photodetectors.Based on the photodetectors,a low-noise,high-gain UV detection system circuit is designed and fabricated,enabling the detection,acquisition,and calibration of weak solar-blind UV signals.Experimental results demonstrate that under zero bias conditions,with a UV light power density of 3.45μW/cm^(2) at 260 nm,the sample achieves a peak responsivity(R)of 0.085 A·W^(−1),an external quantum efficiency(EQE)of 40.7%,and a detectivity(D^(*))of 7.46×10^(12) cm·Hz^(1/2)·W^(−1).The system exhibits a bandpass characteristic within the 240–280 nm wavelength range,coupled with a high signal-to-noise ratio(SNR)of 39.74 dB.
基金supported by the National Natural Science Foundation of China(6237104662201048)the Natural Science Foundation of Chongqing,China(cstc2020jcyj-msxmX0260).
文摘Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory.In order to achieve better jamming suppression performance,many studies have applied blind source separation(BSS)to jamming suppression.BSS can achieve the separation and extraction of the individual source signals from the mixed signal received by the array.This paper proposes a perspective to recognize BSS as spatial band-pass filters(SBPFs)for jamming suppression applications.The theoretical derivation indicates that the processing of mixed signals by BSS can be perceived as the application of a set of SBPFs that gate the source signals at various angles.Simulations are performed using radar jamming suppression as an example.The simulation results suggest that BSS and SBPFs produce approximately the same effects.Simulation results are consistent with theoretical derivation results.
基金supported by grants from the National Natural Science Foundation of China(82000901,82171084).
文摘Background:Blindness and vision impairment(BVI)continue to pose significant global public health challenges,disproportionately impacting vulnerable populations and further widening socioeconomic disparities.This study conducts a comprehensive evaluation of the global burden of BVI and the socioeconomic inequalities in its distribution from 1990 to 2021,aiming to provide insights for targeted intervention strategies.Methods:Using data from Global Burden of Disease 2021,this study performed a multiscale analysis of BVI burden,examining patterns at the global,regional and national levels.We quantified the disease burden using disability-adjusted life years DALY and prevalence rates.Temporal trends were analyzed by calculating estimated annual percentage changes(EAPC).Stratified assessments were carried out by sex and age group across 21 regions and 204 countries.The study also included comparative analyses of six major eye conditions and evaluated their associations with socio-demographic index(SDI).Results:Globally,the age-standardized prevalence of BVI increased from 12,453.52 per million(95%UI:10,287.58-15,226.09)in 1990 to 15,784.33 per million(12,761.44-19,502.32)in 2021,with an EAPC of 1.09%(95%UI:0.97-1.20).During this period,global DALYs attributable to BVI increased by 37.7%.Disease trends exhibited significant divergence,with near vision loss showing the steepest increase(EAPC:1.47%),while the prevalence of glaucoma declined(EAPC:-0.73%).Geographic disparities were pronounced,with substantial improvements observed in Equatorial Guinea(EAPC:-1.75)and worsening burdens in Benin(+0.54).Disease distribution demonstrated strong regional clustering,with near vision loss being predominant in Sub-Saharan Africa(64.47%)and East Asia(50.97%),while cataract was the most common condition in Oceania(33.86%).Females consistently bore a higher burden,particularly in South Asia(646.3 vs 563.2 DALYs).Moreover,we identified a strong inverse correlation between SDI and BVI burden(Ρ=-0.772 for DALYs).Conclusions:This study highlights the severe global burden of BVI and the significant cross-country inequality,particularly in low-and middle-income countries.It emphasizes the urgent need for targeted interventions and the integration of eye care into universal health policies to promote global health equity in the post-pandemic era.
基金supported by the Medium and Long-term Science and Technology Plan for Radio,Television,and Online Audiovisuals(2023AC0200)the Public Welfare Technology Application Research Project of Zhejiang Province,China(No.LGF21F010001).
文摘Recent deep neural network(DNN)based blind image quality assessment(BIQA)approaches take mean opinion score(MOS)as ground-truth labels,which would lead to cross-datasets biases and limited generalization ability of the DNN-based BIQA model.This work validates the natural instability of MOS through investigating the neuropsychological characteristics inside the human visual system during quality perception.By combining persistent homology analysis with electroencephalogram(EEG),the physiologically meaningful features of the brain responses to different distortion levels are extracted.The physiological features indicate that although volunteers view exactly the same image content,their EEG features are quite varied.Based on the physiological results,we advocate treating MOS as noisy labels and optimizing the DNN based BIQA model with earlystop strategies.Experimental results on both innerdataset and cross-dataset demonstrate the superiority of our optimization approach in terms of generalization ability.
基金supported by Foundation of Macao(No.G-BXX-00047-2112367-03)。
文摘Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded theory study involved twenty-six students and five faculty members from a century-old nursing school in Macao.Semi-structured interviews examined the factors influencing nursing students’choice of a specific nursing school and their general learning experiences in nursing studies.Open and focused coding was employed to develop categories and concepts that capture the nuances of how the hidden curriculum influences students’personal experiences,perceptions,and values related to developing their professional identities.The data analysis was guided by the“Community of Practice”model.Results The educational mission fostered a hidden curriculum that emphasized nurturing qualities and social responsibilities,creating a family-like learning environment that positively influenced the professional socialization of nursing students.Under the core theme of“becoming a family,”two sub-themes emerged:“student-peer interactions-fostering sisterly/brotherly learning partnerships”and“student-faculty interactions–faculty’s acting as parenting instructors.”While the hidden curriculum promoted a democratic and egalitarian learning atmosphere among student-peers,it simultaneously reinforced hierarchical power dynamics among senior-junior students and student-faculty relationships,mirroring the power-based interpersonal dynamics often found in traditional Chinese families.Conclusions Explicating the educational mission can help shape a hidden curriculum that benefits nursing students’professional socialization.Faculty members should reflect on the power inequalities reproduced by the hidden curriculum and establish appropriate boundaries in student-faculty relationships.
基金supported in part by National Natural Science Foundation of China(No.62471054)in part by National Natural Science Foundation of China(No.92467301)+3 种基金in part by the National Natural Science Foundation of China(No.62201562)in part by the National Natural Science Foundation of China(No.62371063)in part by the National Natural Science Foundation of China(No.62321001)in part by Liaoning Provincial Natural Science Foundation of China(No.2024–BSBA–51).
文摘In 5G new radio(NR), polar codes are adopted for e MBB downlink control channels where the blind detection is employed in user equipment(UE) to identify the correct downlink control information(DCI). However, different from that in the 4G LTE system, the cyclic redundancy check(CRC) in polar decoding plays both error correction and error detection roles. Consequently, the false alarm rates(FAR) may not meet the system requirements(FAR<1.52 × 10^(−5)). In this paper, to mitigate the FAR in polar code blind detection, we attach a binary classifier after the polar decoder to further remove the false alarm results and meanwhile retain the correct DCI. This classifier works by tracking the squared Euclidean distance ratio(SEDR) between the received signal and hypothesis. We derive an analytical method to fast compute proper classification threshold that is implementation-friendly in practical use. Combining the well-designed classifier, we show that some very short CRC sequences can even be used to meet the FAR requirements. This consequently reduces the CRC overhead and contributes to the system error performance improvements.
文摘AIM:To identify risk factors for postoperative blindness in patients with primary rhegmatogenous retinal detachment(RRD)at their first presentation to a tertiary center,using a large clinical database to improve understanding of this adverse outcome.METHODS:Electronic health records of patients with primary RRD from the Eye Hospital of Wenzhou Medical University were retrospectively analyzed.Postoperative blindness was defined according to the World Health Organization(WHO)criteria for legal blindness.Potential risk factors included demographic characteristics,preoperative clinical features,and surgical variables.Univariable and multivariable logistic regression analyses were performed to calculate odds ratios(ORs)and 95%confidence intervals(CIs)for each risk factor.RESULTS:A total of 532 patients were included in the cohort,of whom 62(12.0%;28 males,34 females)developed postoperative blindness at the final follow-up.Among these 62 patients,30 had high myopia and 32 did not.The mean age of participants was 49.0±16.4y,with 275 subjects(52%)being male and 133 patients(25%)having the condition in the right eye.In the multivariable model for all patients,the following factors were associated with an increased risk of postoperative blindness:higher preoperative logarithm of the minimum angle of resolution visual acuity(logMAR VA;OR=1.09 per 0.1 logMAR unit increase,95%CI 1.03-1.15);inferior or superior retinal breaks(OR=2.42,95%CI 1.12-5.24);and macular holes or superior retinal breaks(OR=8.46,95%CI 3.45-20.75).In the subgroup of patients with high myopia,risk factors for postoperative blindness included:pseudophakia/aphakia versus phakia(OR=6.33,95%CI 1.41-28.31);macular holes or superior retinal breaks(OR=15.15,95%CI 3.07-74.85);and proliferative vitreoretinopathy(PVR;OR=21.41,95%CI 2.14-214.57).In the subgroup of patients without high myopia,increased risk of postoperative blindness was associated with:higher preoperative logMAR VA(OR=1.11 per 0.1 logMAR unit increase,95%CI 1.04-1.18);and inferior or superior retinal breaks(OR=2.90,95%CI 1.19-7.06).CONCLUSION:Using a large real-world clinical database,we identified distinct risk factors for postoperative blindness in patients with primary RRD-including differences between those with and without high myopia.These findings emphasize the need to target specific risk factors in clinical practice to mitigate and reduce the incidence of postoperative blindness in this patient population.