首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 815 毫秒
1.
Hausdorff Measure of Linear Cantor Set   总被引:2,自引:0,他引:2  
We study the Hausdorff measure of linear Cantor set E,on the unit interval,under the strong seperated condition.We give a necessary and sufficient condition for (E) =|E|^α by using the contracting ratio and the first gap.This condition is easy to use.  相似文献   

2.
By using LKB-2277 Bioactivity Monitoring System, the heat effect changes in the process of inhibitory action of clarithromycin and erythromycin onEscherichia coli at 37°C were determined. Quantitative analysis showed that relationship between antibiotic concentrationc and rate contantk ofEscherichia coli growth, and half inhibitory ratio concentration IC50: clarithromycin:k=0. 030 03–1. 1736×10−3 c, 8. 45 mg ·L−1; erythromycin:k=0.031 08–8.4657×10−4 c, 14. 45 mg·L−1. As a result of the microcalorimetry experiments, it not only indicated that antibacterial activity of clarithromycin was stronger than that of erythromycin, but also reported the changeable features of thermodynamics of the bacterial cell in biological, biochemical and metabolic process under different drug action. Foundation item: Supported by Natinal Natural Science Fundation of China (29973030), Natural Science Fundation of Hubei Province (98J052) and Post-doctoral Science Fundation of China Biography, SHEN Xue-song (1956-), Associate professor Research direction: biothermochemistry.  相似文献   

3.
Using the fact that the factorization of x^N-1 over GF(2) is especially explicit, we completely establish the distributions and the expected values of the linear complexity and the k-error linear complexity of the N-periodic sequences respectively, where N is an odd prime and 2 is a primitive root modulo N. The results show that there are a large percentage of sequences with both the linear complexity and the k-error linear complexity not less than N, quite close to their maximum possible values.  相似文献   

4.
This paper considers a special class of operator self-similar processes Markov processes {X(t), t≥0} with independent self-similar components, that is, X ( t ) =(X^1(t),…,X^d(t)), where {X^i(t),t≥0}, i=1,2,…,d are d independent real valued self-similar Markov processes. By means of Brel-Cantelli lemma, we give two results about asymptotic property as t→∞ of sample paths for two special classes of Markov processes with independent self-similar components.  相似文献   

5.
Rotation symmetric function was presented by Pieprzyk. The algebraic configuration of rotation symmetric(RotS) function is special. For a Rots n variables function f(x1, x2, …, xn) we have f(ρn^k (x1, x2, …xn))=f(x1, x2, …, xn) for k=0, 1, …, n-1. In this paper, useing probability method we find that when the parameters of RotS function is under circular translation of indices, its walsh spectrum is invariant. And we prove the result is both sufficient and necessary.  相似文献   

6.
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.  相似文献   

7.
Novel adsorbent, Fe(III)-loaded ligand exchange cotton cellulose adsorbent [Fe(III)LECCA], was used to investigate the adsorption performances and mechanism of fluoride removal from aqueous solutions. The adsorbent was found to adsorb fluoride rapidly and effectively. The fluoride removal was influenced by pH. Adsorption model followed first-order reaction at different temperature, theapparent adsorption activated energyE, was 6.37 kJ·mol−1, and adsorption enthalpy ΔH was 5.35 kJ·mol−1. The adsorption capacity of fluoride on adsorbent was 3.2 mmol·g−1 (dry weight). The maximal integer coordination ratio of fluoride with Fe(III) LECCA was 3∶1. The ligand exchange mechanism of adsorption was elucidated through chemical methods and IR spectral analysis. Foundation item: Supported by the National Natural Science Foundation of China (29977010) and Shanghai Priority Academic Discipline Biography: ZHAO Ya-ping (1974-), female, Ph.D., research direction: water and wastewater treatment.  相似文献   

8.
0 IntroductionPayrriodminaetiics hoenteer oofc ythcleics m .os tC oambupnoduanndts a cnodn tbaeisntin kgno twhnepyridine ring are widely distributedin nature,principally asenzymes and alkaloids . Pyridine enzymes have been foundintissues of all plants and ani mals examined thus far ,andare derivedfromeither nicotinic acid or Vitamin B6[1].Pyr-idine derivatives are also the building block of many phar-maceuticals with a wide range of functionalities that includeantitubercular compounds ,antivi…  相似文献   

9.
In view of the fact that the problem of sorting unsigned permutation by reversal is NP-hard, while the problem of sorting signed permutation by reversal can be solved easily, in this paper, we first transform an unsigned permutation of length n,π (π1 ,… ,πn), into a set S(π) containing 2^n signed permutations, so that the reversal distance of π is equal to the reversal distance of the optimal signed permutation in S(π). Then analyze the structural features of S(π) by creating a directed graph and induce a new computing model of this question. Finally, an improved genetic algorithm for solving the new model is proposed. Experimental results show that the proposed model and algorithm is very efficient in practice.  相似文献   

10.
We investigated the directed graph self similar sets under some weak overlapping condition. We get the multifractal decomposition formulas for these sets, i. e.,dim Ku^a DimKu^a =f(a), where fis the multifractal spectral function of the directed graph self similar measure. Especially, the results improve that of Edgar and Mauldin to the case which allows certain overlapping.  相似文献   

11.
0 IntroductionWireless sensor networks consist of manynodes , each containing application-specificsensors ,a wirelesstransceiver ,anda si mple proces-sor[1-4]. Sensor networks have extensive applica-tions . A large number of research results can beseenin Refs .[5-7] .This paper mainly concerns with sensor net-works that are inherently unreliable. We consider anetwork with mn nodes ,arranged in a grid over asquare region of areaA. This model was presentedin[8 ,9].Each nodeis a sensor ,and can…  相似文献   

12.
The recombinant expression vector pGEMD-fhit which contains full encoding region offhit gene was constructed. The recombinant was introduced into the BL21 (DE3) strain ofE. coli and induced by 1 mmol/L IPTG to express a 29×103 polypeptide offhit fusion protein. And the 29×103 protein was sensitive and specific in reaction with anti-fhit antibody in Western blot. Foundation item: Supported by the National Natural Science Foundation of China (39770373) Biography: SUN Yan (1975−), female, Master of science, Research direction: gene engineering  相似文献   

13.
0 IntroductionThemetalionsinmetallamacrocylesformedbysupramolecularself assemblycantaketrigonal,square planar,andtetrahe dralconfiguration[1 ,2 ] .Metallacrownisaspecialclassofmetalla macrocyle,theyareanalogoustocrownethersinbothstructureandfunctionexceptthatthemetalionsarenowtakingthepositionsofcoordinationatomsincrownether[3,4] .Themetallacrownswithdifferentnumberof [M—N—O]repeatunithavedifferentcavitysizes,suchas 9 MC 3[5 7] ,12 MC 4 [4,8 1 4 ] and 15 MC 5 [1 5] .Thereportedazameta…  相似文献   

14.
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography.  相似文献   

15.
A Secure MAKAP for Wireless Communication   总被引:3,自引:0,他引:3  
A mutual authentication and key establishment protocol proposed by Aydos et al, for wireless communication based on elliptic curve cryptography can provide authentication between the user and server and they agreement a session key in the end of it. Unfortunately, Mangipudi pointed out Aydos' scheme was incurred the man-in-middle attack denial-of-service attack and impersonation based on man-in-middle attack. Then he proposed an improved scheme m overcome the above weakness. However, there is an attack which can forge the message required in the protocol and impersonation a valid user to the server.  相似文献   

16.
Neurofibrillary tangles (NFTs) are one of the neuropathological hallmarks of Alzheimer‘s disease (AD) and abnormally hyperphosphorylated tau is the major protein of NFTs. It was reported that cyclin-dependent kinase5 (Cdk-5) could phosphorylate tau at most AD-related epitopes in vivo. In this study, we investigated the effect of cdk-5 overexpression on tau hyperphosphorylation in neuroblastoma N2a cells. We demonstrated that overexpression of cdk-5 whieh rcsul-ted in a 3.5-fold Cdk-5 activation in the transfected cells induced a dramatic increase in phosphorylation of tau at several phosphorylation sites. Overexpression of cdk-5 led to a reduced staining with antibody Tau-1 and an enhanced staining with antibody PHF-1, suggesting hyperphosphorylation of tau at Ser199/202 and Ser396/404 sites. It implies that in vitro overexpression of cdk-5 leads to Cdk-5 overactivation and tau hyperphosphorylation may be the underline mechanism.  相似文献   

17.
0 IntroductionSltougdiiceasl csoynstceermnsin gharveeac btieveen o txhyeg ei nm psopretcaienst ( oRbjOecSt) iinn bbiioo--medicine and analytical chemistry in recent years[1-4]. Manyi mportant life phenomena and diseases are relatedtotheinter-mediates of ROS[5-7].ROS have beeni mplicated as ani mpor-tant causative factor in cell damage,including apoptosis andnecrosis . Their proposed actions comprise lipid peroxidation,DNAdamage,the mitochondrial respiratory chain destructionand protein mo…  相似文献   

18.
To overcome the drawbacks such as high computational cost, unreasonable security model and long signature length in existing certificateless ring signature schemes, we propose an efficient certificateless ring signature scheme in this paper. Our construction is inspired by some efficient ID-based ring signature schemes, and uses bilinear pairings as a basic tool. Using a reasonable security model, the unforgeability of the proposed scheme is proven based on the intractability of the computational Diffie-Hellman (CDH) problem. The signature length of the new scheme is only |G2|+n|G1| (|Gi| is the bit length of an element in group Gi, i =1, 2). Compared with other existing certificateless ring signature schemes, the newly proposed scheme has a shorter signature length and is more efficient and practical.  相似文献   

19.
For searching out male sterility-related proteins (polypeptides) in rice (Oryza sativa L.), we examined the difference of panicle protein (polypeptides) between hybrid rice (Wujin2A/R168, Wujin5A/R988) and their parents (male-sterile line Wujin2A, Wujin5A, and restorer line R168, R988) at the formation stage of pollen mother cell by two-dimensional electrophoresis (2-DE). The results revealed that the 2-DE polypeptide maps were similar among these experimental materials. A small group of polypeptides were disappeared in 2-DE polypeptide maps of male-sterile line (Wujin2A, Wujin5A) by comparing to restorer line (R168, R988) and the first filial (F1) generation (Wujin2A/R168, Wujin5A/R988). The isoelectric points of these polypeptides were pI 5.8–6.5 molecular, weight 42.7×103−66.2×103. Foundation item: Supported by the National Natural Science Foundation of China (30340079) and the Science and Technology Key Research Foundation of the Education Ministry of China (03109) Biography: HU Yao-jun (1960-), male Ph. D candidate, research direction: molecular cytogenetics.  相似文献   

20.
Ni(II)-dien complex was prepared and characterized by X-ray diffraction. The crystal belongs to triclinic system, space group P-1, with crystallographic parametersa=0.888 13(18) nm,b=0.890 10(18) nm,c=1. 591 8(3) nm, α=77.71(3)°, β=89.12(3)°, γ=61.24(3)°,Z=2. The two dien molecules coordinate to the central Ni atom, the six nitrogen atoms form a distorted octahedron. Preliminary pharmacological tests showed this complex had antitumor activity against HepG2 and HL-60 cell linesin vitro. Foundation item, Supported by the National Natural Science Foundation of China (29972034) Biography: Li Tao (1976-), male, Ph. D candidate, research direction: ophthalmology and chemicalbiology.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号