首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The cone condition for .r to be regular for B under the elliptic diffusion process was proved. We also gave a necessary and sufficient condition for 0 to be regular for thorn under the elliptic diffusion process.  相似文献   

2.
In this paper,we present the generalized Huff curves that contain Huff’s model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized Huff curve.Then,the fast and explicit formulae are derived for generalized Huff curves in projective coordinates.This paper also enumerates the number of isomorphism classes of generalized Huff curves over finite fields.Finally,the explicit formulae are presented for the doubling step and addition step in Miller’s algorithm to compute the Tate pairing on generalized Huff elliptic curves.  相似文献   

3.
IntroductionMany financial time series such as stock returnsand exchange rates exhibit an important feature,conditional heteroskedasticity,which means thatmarket volatilities tend to cluster.This featurewas described in many financial fields as early asClark[1] ,Merton[2 ] and others.Engle[3 ] firstintroduced the ARCH model which is now widelyused.An autoregressive model of order p with anARCH error term of order q can be written asYt=μ +1Yt-1+… +p Yt-p +εt (1 )εt|Ψt-1~ N (0 ,…  相似文献   

4.
Introduction In order to realize further progressin highfre-quency wireless communicationtechnology,systemsolution in hardware technology plays the i mpor-tant role of bringing greater higher integration,small form factors and more sophisticated func-tions.To miniaturize the RF module,three tech-nologies are needed:direct conversion one chipRFIC(System-on-Chip,SOC),bare die packagingtechnology and passive embedded substrate[1].Direct conversion one chip ICis needed to re-duce die area and…  相似文献   

5.
0 IntroductionIn the last ten years ,there were many attempts to analyzeand model the information systems to support businessprocesses . Academics and business practitioners have been de-veloping various methodologies .Froma technological point ofview, much progress has been made. Unfortunately,despiteof all thejubilant stories of suppliers ,the application of busi-ness process management(BPM) is still li mited. Most meth-odologies generally lack of actual guidance on deriving aprocess desig…  相似文献   

6.
The hedging problem for insiders is very important in the financial market.The locally risk minimizing hedging was adopted to solve this problem.Since the market was incomplete,the minimal martingale m...  相似文献   

7.
1 Results Dispersants are defined as liquids or gases that can be added to a mixture to promote dispersion or to maintain dispersed particles in suspension. A good dispersant not only helps to provide good dispersion, but also good performance, stability and rheological properties. Therefore, dispersants are widely used in many applications such as coating, ink, electronic materials, plastics, and so on[1]. There are different ways to categorize the many dispersants available on the market. From a molecular weight point of view, dispersants can be categorized as low MW dispersants and high MW dispersants. This presentation mainly introduces the high MW dispersants, including their dispersion mechanism, functional design and applications.  相似文献   

8.
In order to find the electroencephalogram (EEG) characteristic parameters typical of Alzheimer’s disease (AD) and explore an effective diagnostic method, a new mobile current multipole model was proposed to simulate the AD patient’s cortical dipole source activities. The indicators of goodness of fit (GOF) and DtononD (DD) were calculated from EEG samples to evaluate the performance of this model. Relevant results showed that this multipole model with higher GOF values and larger DD change well fitted the pathological electrical activities of cortical neurons aroused by AD’s extended sulcus and gyrus in the cerebral cortex. Meanwhile, the products of DD mean & standard variance were found in a clear linear correlation with the diagnostic data of mini-mental state examination (MMSE) used in AD clinics. Furthermore, by tracing this multipole model’s indicators in typical patients and contrasting with the functional magnetic resonance image (fMRI) as AD progressed, we suggested that the DD index may be suitable for monitoring the AD developments as a new diagnostic parameter.  相似文献   

9.
In order to find the electroencephalogram (EEG) characteristic parameters typical of Alzheimer’s disease (AD) and explore an effective diagnostic method, a new mobile current multipole model was proposed to simulate the AD patient’s cortical dipole source activities. The indicators of goodness of fit (GOF) and DtononD (DD) were calculated from EEG samples to evaluate the performance of this model. Relevant results showed that this multipole model with higher GOF values and larger DD change well fitted the pathological electrical activities of cortical neurons aroused by AD’s extended sulcus and gyrus in the cerebral cortex. Meanwhile, the products of DD mean & standard variance were found in a clear linear correlation with the diagnostic data of mini-mental state examination (MMSE) used in AD clinics. Furthermore, by tracing this multipole model’s indicators in typical patients and contrasting with the functional magnetic resonance image (fMRI) as AD progressed, we suggested that the DD index may be suitable for monitoring the AD developments as a new diagnostic parameter.  相似文献   

10.
By the subsuper solutions method, the explosive supersolutions and explosive subsol utions are obtained and the exsistence of explosive solutions is proved on a bounded domain for a class of nonlinear elliptic problems.Then, the exsitence of an entire large solution is proved by the perturbed method.  相似文献   

11.
In this paper, combining the technologies of Computer Supported Cooperative Work (CSCW), Workflow and Network, the authors aim to organize virtual distributed cooperative work environment (VDCWE) and expound the running mechanism of cooperative workflow and design its algorithm for monitoring of urban subway construction. And then a prototype system was built based on the above,capable of supporting user analyzing, dealing with and managing data of monitoring, and real-timely releasing corresponding information, providing interactive virtual and distributed coordination meet-environment, dynami-cally and transparently, in favor of clients' interoperaiility and solving practicing problems, and so on.  相似文献   

12.
Geckos(Gekko gecko)use their hairy setae to adhere on various solid surfaces and dung beetles(Copris ochus Motschulsky)use their hairy bristles to anti-adhere in sticky environments.We study why two hairy systems express a conflict in functions by using SEM,histological approaches and functional experiments.Adhesion models and various parameters were collected and analyzed.Based on the morphological data and functional experimental results carried out by natural and denatured gecko setae and beetle bristles,we first demonstrated that the stiffness along the hair is 1000 to 30000 times that perpendicular to the hair.This stiffness difference is the key factor leading to the two hairy systems' functional differences.Slope of gecko setae reduces contact stiffness,increases contact points and real contact area that results in amazing adhesive abilities.On the other hand,stiff bristles in a beetle have higher contact stiffness,which reduces the real contact area and decreases the adhesion between two contact surfaces.Deformation of gecko setae destroys the hierarchical structure,increases the contact stiffness and results in a decrease of adhesion forces.Similarly,deformation of beetle bristles destroys the erect structure of the hair,interconnects the separated bristles and thus decreases the anti-adhesive functions.These observations inspire us in designing anti-adhesive and adhesive biomimetic systems  相似文献   

13.
Least Privileges and Role’s Inheritance of RBAC   总被引:1,自引:0,他引:1  
0 IntroductionRoalse -abna asletder ancacteisvse caonndt rsoulp p(lRemBeAnCt) t oh tahse b tereandi tcioonnsaild edries-dcretionary and mandatory access controls (DAC and MAC) .In RBAC,permissions are associated withroles ,and users aremade members of appropriate roles thereby acquiring theroles’permissions[1-4]. Unfortunately,since thereis still lackof specific definition and the necessary formalization forRBAC[5],the well-known security principles and the inherit-ance of roles cannot…  相似文献   

14.
Geckos (Gekko gecko) use their hairy setae to adhere on various solid surfaces and dung beetles (Copris ochus Motschulsky) use their hairy bristles to anti-adhere in sticky environments. We study why two hairy systems express a conflict in functions by using SEM, histological approaches and functional experiments. Adhesion models and various parameters were collected and analyzed. Based on the morphological data and functional experimental results carried out by natural and denatured gecko setae and beetle bristles, we first demonstrated that the stiffness along the hair is 1000 to 30000 times that perpendicular to the hair. This stiffness difference is the key factor leading to the two hairy systems’ functional differences. Slope of gecko setae reduces contact stiffness, increases contact points and real contact area that results in amazing adhesive abilities. On the other hand, stiff bristles in a beetle have higher contact stiffness, which reduces the real contact area and decreases the adhesion between two contact surfaces. Deformation of gecko setae destroys the hierarchical structure, increases the contact stiffness and results in a decrease of adhesion forces. Similarly, deformation of beetle bristles destroys the erect structure of the hair, interconnects the separated bristles and thus decreases the anti-adhesive functions. These observations inspire us in designing anti-adhesive and adhesive biomimetic systems.  相似文献   

15.
本文研究一类竞争扩散系统,此系统有两种种群n个斑块,其中一种种群可以在n个斑块中自由扩散,而另一种种群被限定在一个斑块上不能扩散,得到系统持续生存和存在唯一全局渐近稳定周期解的条件。  相似文献   

16.
In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu liang and Hideki lmai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose confidentiality to gain non repudiation. We also propose two improvement versions that not only overcome the security leak inherenl in the schemes but also provide public verifiability or forward security. Our improvement versions require smaller computing cost than that required by signature-thenencryption methods.  相似文献   

17.
0Introduction Muchresearchworkonoceancirculationhasbeendoneandsomenumericalmodels[14]havebeendeveloped.Athreelayer3DmodelwasraisedbyLeendertseandLiu[5].Butthesolutionofthemodelinthe(x,y,z)coordinatesys temrequireshugecomputationalquantity.XuDongfenget al[6]andFangGuohongetal[7]setupa3Dmodeltocalculateoffingcirculation.A3Dmodelinσcoordinatesystemwasap pliedtoEuropeanNorthSeabyDuranceandHughes[8],butnonlineartermswereignored.Differentmodelsareadoptedin simulationfordifferentproblems.Thea…  相似文献   

18.
Having analyzed the relationships between washing shrinkage and weaving technique, parameters, material properties of woven fabrics and studied the shrinkage mechanism and its mathematical model of the plain fabric,researchers set up a shrinkage model of the twills and satins and proposed a method for calculating the washing shrinkage based on weaving technique and parameters of fabrics. Shrinkage experiments of silk habotai, silk twill and silk satin fabrics were performed. The results were compared with those of the theoretical computations, and it has been proven that the theoretical method is reliable.  相似文献   

19.
Nanometer materials include roughly nanoparticle,nanotube, nanowire, nanofiber, nanofilm andnanoblock, among which nanofiber is defined asmaterial with nanometer-sized diameter and longerthan 1 micron in length. The research development of  相似文献   

20.
The novel concept of Compound-Agent is proposed, which consists of some independent sub-agents that share common beliefs and employ community actions. The Explicit Model of Coordination, which is used in the coordination of the sub-agents of Compound-Agent, is provided. The actions of each sub-agent are rule-based determined, and the rule base can be adjusted on time. The approximate fuzzy reasoning is used to improve the speed of learn and reduce the number of rules, which makes Compound-Agent suitable for real time and dynamic applications. A real application, the design of the control system of flat-knitting machine employing the concept of Compound-Agent, is discussed briefly.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号