首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper, we give a necessary and sufficient condition of sequence of nodes, such that, the error of trigonometric interpolation for analytic function converges to 0. Foundation item: Supported by the Science Foundation of SEC of China and Foundation of Wuhan University Biography: LIU Hua (1971-), male, PH. D candidate, Research interest is in complex analysis.  相似文献   

2.
Applying the frequency domain method and the inequality method, we discussed the unconditional stability problem of the multigroup multidelays neutral type linear constant continuous control system, and obtained some sufficient conditions. Foundation item: Supported by the National Natural Science Foundation of Hubei Province Education Committee Biography: LI Ye-ping (1972-), male, Master candidate, research interest is in partial differential equation.  相似文献   

3.
A subdynamics theory framework for describing multi-coupled quantum computing systems is presented first. A general kinetic equation for the reduced system is given then, enabling a sufficient condition to be formulated for constructing a pure coherent quantum computing system. This reveals that using multi-coupled systems to perform quantum computing in Rigged Liouville Space opens the door to controlling or eliminating the intrinsic de-coherence of quantum computing systems. Foundation item: Supported by the National Natural Science Foundation of China (79970121) Biography: Liu Gui-Ping (1964-), male, Lecturer. Research direction: quantum networks.  相似文献   

4.
Hausdorff Measure of Linear Cantor Set   总被引:2,自引:0,他引:2  
We study the Hausdorff measure of linear Cantor set E,on the unit interval,under the strong seperated condition.We give a necessary and sufficient condition for (E) =|E|^α by using the contracting ratio and the first gap.This condition is easy to use.  相似文献   

5.
Mouse Karyotype Obtained by Combining DAPI Staining with Image Analysis   总被引:3,自引:0,他引:3  
In this study, mitotic metaphase chromosomes in mouse were identified by a new chromosome fluorescence banding technique combining DAPI staining with image analysis. Clear 4', 6-diamidino-2-phenylindole (DAPI) multiple bands like (J-hands could be produced in mouse. The Meta- Morph software was then used to generate linescans of pixel intensity for the banded chromosomes from short arm to long arm. These linescans were sufficient not only to identify each individual chromosome but also analyze the physical sites of bands in chromosome. Based on the results, the clear and accurate karyotype of mouse metaphase chromosomes was established. The technique is therefore considered to he a new method for cytological studies of mouse.  相似文献   

6.
We define a notion of singularity for a family of meromorphic functions. Some sufficient and necessary conditions for this singularity are estabilished. Supported by the National Natural Science Foundation of China Sun Daochun: born in July, 1943, Professor  相似文献   

7.
By using Riemann-Hilbert method and Corona theorem, Wiener-Hopf factorization for a class of matrix functions is studied. Under appropriate assumption, a sufficient and necessary condition for the existence of the matrix function admitting canonical factorization is obtained and the solution to a class of non-linear Riemann-Hilbert problem is also given. Furthermore, by means of non-standard Corona theorem partial estimation of the general factorization can be obtained. Foundation item: Supported by the National Natural Science Foundation of China(10471107) and the Specialized Research Fund for the Doctoral Program of Higher Education of China (20060486001)  相似文献   

8.
The cone condition for .r to be regular for B under the elliptic diffusion process was proved. We also gave a necessary and sufficient condition for 0 to be regular for thorn under the elliptic diffusion process.  相似文献   

9.
In this paper, the internal structures of MS-algebras are investigated by means of the new notions of Stonean kernel and M-ideal. We determine necessary and sufficient conditions for an MS-algebra with a Kleene skeleton. After introducing a special kind of principal congruence, we consider the relationship between an MS-algebra and its quotient algebra. Supported by the National Natural Science Foundation of China Luo Congwen: born in 1965, Ph.D.  相似文献   

10.
In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is pro- posed. According to this method, an analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our formal security model has been verified secure. This work demonstrates that our verification method is effective and sufficient.  相似文献   

11.
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolutionary soft a-gent model to solve it. In proposed model, agent is composed of three components: goal, environment and behavior. Experimental shows the model has the characters of parallel computing and goal driving. Foundation item: Supported by the National Natural Science Foundation of China( 60205007) , Natural Science Foundation of Guangdong Province(001264), Research Foundation of Software Technology Key Laboratory in Guangdong Province and Research Foundation of State Key Laboratory for Novel Software Technology at Nanjing University Biography: Yin Jian ( 1968-), male, Associate professor, research direction: artificial intelligence, data mining.  相似文献   

12.
The relations among various Markov chains   总被引:7,自引:0,他引:7  
Some basic equations and the relations among various Markov chains are established. These works are the bases in the investigation of the theory of Markov chain in random environment. Foundation item: Supported by the National Natural Science Foundation of China (10071058-2) and Doctoral Programme Foundation of China Biography: Hu Di-he (1935-), male, Professor, research interest: stochastic processes and random fractals.  相似文献   

13.
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography.  相似文献   

14.
A simple method for solving Cauchy’s problem of wave equations in higher space dimensions with initial condition of separated variables, has been given by using D’Alembert’s formula and some examples have been shown. Foundation item: Supported by the Natural Science Foundation of Hubei Province (992P0307) and the National Natural Science Foundation of China (39970203) Biography: YAO Duan-zheng (1946-), female, Professor, Research direction: mathematical physics and nonlinear optics.  相似文献   

15.
Rotation symmetric function was presented by Pieprzyk. The algebraic configuration of rotation symmetric(RotS) function is special. For a Rots n variables function f(x1, x2, …, xn) we have f(ρn^k (x1, x2, …xn))=f(x1, x2, …, xn) for k=0, 1, …, n-1. In this paper, useing probability method we find that when the parameters of RotS function is under circular translation of indices, its walsh spectrum is invariant. And we prove the result is both sufficient and necessary.  相似文献   

16.
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.  相似文献   

17.
In this paper, we obtain an explicit formula of general solution for a class of the non-homogeneous recurrence of variable coefficients with two indices. Foundation item: Supported by the National Natural Science Foundation of China (19771063) Biography: Yu Chang-an(1948-), male, Professor, research interest: combinatorial theory.  相似文献   

18.
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.  相似文献   

19.
Wetlands in Jianghan plain-lake district fulfill many uses and functions related to hydrology, waste assimilation, ecosystem productivity and bio-diversity. But human incorrect activities generally result in significant negative impacts on number, biodiversity, and functioning of wetlands. In order to put wetland resources to rational use and protect wetland ecological environment, some effective measures should be taken. Foundation item: Supported by the National Natural Science Foundation of China (49871071) and Hubei Waterlogging Disasters & Wetland Key Laboratory Foundation (HNKFJ2002T02) Biography: Wang Xue-lei(1965-), male, Professor, research direction: wetland ecology.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号