5,529 research outputs found

    Early diagnosis and research of high myopia with primary open angle glaucoma

    Get PDF
    People with high myopia are high risk populations to have primary open angle glaucoma. Clinically, we found that patients with primary open angle glaucoma and high myopia is closely related. So to understand the clinical features of high myopia with primary open angle glaucoma and the importance of early diagnosis, to avoiding missed diagnosis or lower misdiagnosed rate, can help to improve the vigilance and level of early diagnosis of the clinicians. In this paper, high myopia with clinical features of primary open angle glaucoma, and the research progress on the main points of early diagnosis were reviewed

    A New Method for Fast Computation of Moments Based on 8-neighbor Chain CodeApplied to 2-D Objects Recognition

    Get PDF
    2D moment invariants have been successfully applied in pattern recognition tasks. The main difficulty of using moment invariants is the computational burden. To improve the algorithm of moments computation through an iterative method, an approach for fast computation of moments based on the 8-neighbor chain code is proposed in this paper. Then artificial neural networks are applied for 2D shape recognition with moment invariants. Compared with the method of polygonal approximation, this approach shows higher accuracy in shape representation and faster recognition speed in experiment

    Multiparty quantum secret splitting and quantum state sharing

    Full text link
    A protocol for multiparty quantum secret splitting is proposed with an ordered NN EPR pairs and Bell state measurements. It is secure and has the high intrinsic efficiency and source capacity as almost all the instances are useful and each EPR pair carries two bits of message securely. Moreover, we modify it for multiparty quantum state sharing of an arbitrary mm-particle entangled state based on quantum teleportation with only Bell state measurements and local unitary operations which make this protocol more convenient in a practical application than others.Comment: 7 pages, 1 figure. The revision of the manuscript appeared in PLA. Some procedures for detecting cheat have been added. Then the security loophole in the original manuscript has been eliminate
    • …
    corecore