Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Heart Surg Forum ; 24(3): E493-E495, 2021 Jun 10.
Artigo em Inglês | MEDLINE | ID: mdl-34173765

RESUMO

BACKGROUND: Aortic dissection (AD) refers to false lumen dissected from true lumen via the internal membrane when endovascular blood flows into the aortic wall through the cleavage, which is formed after endomembrane gape of the aortic wall. Aortic dissection is a disease of extreme danger. Pregnancy is an independent risk factor for aortic dissection. Pregnancy concurrent with aortic dissection rarely is seen, not to mention pregnancy concurrent with asymptomatic aortic dissection. CASE REPORT: We present the case of a 34-year-old female patient, who was 25+ weeks pregnant, concurrent with aortic dissection. She was accepted by our hospital and successfully treated. Retrospective analysis of clinical data was carried out in this paper by combining related literature. CONCLUSION: This disease should be correctly straightened out to prevent misdiagnosis and save the patient's life. Multidisciplinary joint decisions should be made to save lives of the patient and her fetus.


Assuntos
Aorta Torácica/cirurgia , Aneurisma da Aorta Torácica/diagnóstico , Dissecção Aórtica/diagnóstico , Angiografia por Tomografia Computadorizada/métodos , Procedimentos Endovasculares/métodos , Complicações Cardiovasculares na Gravidez/diagnóstico , Ultrassonografia/métodos , Adulto , Dissecção Aórtica/cirurgia , Aorta Torácica/diagnóstico por imagem , Aneurisma da Aorta Torácica/cirurgia , Doenças Assintomáticas , Feminino , Humanos , Gravidez , Complicações Cardiovasculares na Gravidez/cirurgia
2.
Opt Express ; 27(12): 16493-16506, 2019 Jun 10.
Artigo em Inglês | MEDLINE | ID: mdl-31252874

RESUMO

In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations.

3.
Opt Express ; 27(5): 7213-7225, 2019 Mar 04.
Artigo em Inglês | MEDLINE | ID: mdl-30876289

RESUMO

A novel optical image hiding scheme based on an expansion strategy is presented under the framework of computational ghost imaging. The image to be hidden is concealed into an expanded interim with the same size as the host image. This is implemented by rearranging the measured intensities of the original object after the process of ghost imaging. An initial Hadamard matrix is used to generate additional matrices by shifting it circularly along the column direction, so that enough 2D patterns are engendered to retrieve phase-only profiles for imaging. Next, the frequency coefficients of the host image are modified with that of the expanded interim by controlling a small weighting factor. After an inverse transform, the host image carrying the hidden information can be obtained with high imperceptibility. Security is assured by considering optical parameters, such as wavelength and axial distance, as secret keys due to their high sensitivity to tiny change. Importantly, differing from other computational ghost imaging based schemes, many phase-only profiles are used to collect the measured intensities to enhance the resistance against noise and occlusion attacks. The simulated experiments illustrate the feasibility and effectiveness of the proposed scheme.

4.
Opt Express ; 24(1): 499-515, 2016 Jan 11.
Artigo em Inglês | MEDLINE | ID: mdl-26832280

RESUMO

A novel multiple-image encryption scheme using the nonlinear iterative phase retrieval algorithm in the gyrator transform domain under the illumination of an optical vortex beam is proposed. In order to increase the randomness, the chaotic structured phase mask based on the logistic map, Fresnel zone plate and radial Hilbert mask is proposed. With the help of two chaotic phase masks, each plain image is encoded into two phase-only masks that are considered as the private keys by using the iterative phase retrieval process in the gyrator domain. Then, the second keys of all plain images are modulated into the ciphertext, which has the stationary white noise distribution. Due to the use of the chaotic structured phase masks, the problem of axis alignment in the optical setup can easily be solved. Two private keys are directly relative to the plain images, which makes that the scheme has high resistance against various potential attacks. Moreover, the use of the vortex beam that can integrates more system parameters as the additional keys into one phase mask can improve the security level of the cryptosystem, which makes the key space enlarged widely. Simulation results are given to verify the feasibility and robustness of the proposed encryption scheme.

5.
Opt Lett ; 38(11): 1996-8, 2013 Jun 01.
Artigo em Inglês | MEDLINE | ID: mdl-23722815

RESUMO

A multiple-image encryption scheme is proposed based on the phase retrieval process and phase mask multiplexing in the fractional Fourier transform domain. First, each original gray-scale image is encoded into a phase only function by using the proposed phase retrieval process. Second, all the obtained phase functions are modulated into an interim, which is encrypted into the final ciphertext by using the fractional Fourier transform. From a plaintext image, a group of phase masks is generated in the encryption process. The corresponding decrypted image can be recovered from the ciphertext only with the correct phase mask group in the decryption process. Simulation results show that the proposed phase retrieval process has high convergence speed, and the encryption algorithm can avoid cross-talk; in addition, its encrypted capacity is considerably enhanced.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...