Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections...Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.展开更多
In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the...In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the design and the attacks on these hash functions. However, it is very significant to study some properties of their primitives and underlying permutations. Because some properties reflect the pseudo-randomness of the structures. Moreover, they help us to find new cryptanalysis for some block cipher structures. In this paper, we analyze the resistance of JH and Grcstl-512 against structural properties built on integral distinguishers. And then 31.5 (out of 42) rounds integral distinguishers for JH compression function and 11.5 (out of 14) rounds for Grcstl-512 compression function are presented.展开更多
To solve the arrearage problem that puzzled most of the mobile corporations, we propose an approach to forecast and evaluate the credits for mobile clients, devising a method that is of the coalescence of genetic algo...To solve the arrearage problem that puzzled most of the mobile corporations, we propose an approach to forecast and evaluate the credits for mobile clients, devising a method that is of the coalescence of genetic algorithm and multidimensional distinguishing model. In the end of this paper, a result of a testing application in Zhuhai Branch, GMCC was provided. The precision of the forecasting and evaluation of the client’s credit is near 90%. This study is very significant to the mobile communication corporation at all levels. The popularization of the techniques and the result would produce great benefits of both society and economy.展开更多
This paper proves that a set of orthogonal pure states are indistinguishable by restricted local projective measurement and classical communication if the sum of their Schmidt ranks is larger than the dimension of the...This paper proves that a set of orthogonal pure states are indistinguishable by restricted local projective measurement and classical communication if the sum of their Schmidt ranks is larger than the dimension of their joint Hilbert space. This result is useful in determining the local distinguishability of quantum states and is stronger in some respects than that of Hayashi et al [Phys. Rev. Lett. 96, 040501]. In addition, it presents a new method to determine the local distinguishability of orthogonal states by projecting measurement operators into their subspaces.展开更多
It has been known that determining the exact value of vertex distinguishing edge index X '8(G) of a graph G is difficult, even for simple classes of graphs such as paths, cycles, bipartite complete graphs, complete...It has been known that determining the exact value of vertex distinguishing edge index X '8(G) of a graph G is difficult, even for simple classes of graphs such as paths, cycles, bipartite complete graphs, complete, graphs, and graphs with maximum degree 2. Let rid(G) denote the number of vertices of degree d in G, and let X'es(G) be the equitable vertex distinguishing edge index of G. We show that a tree T holds nl (T) ≤ X 's (T) ≤ n1 (T) + 1 and X's(T) = X'es(T) if T satisfies one of the following conditions (i) n2(T) ≤△(T) or (ii) there exists a constant c with respect to 0 〈 c 〈 1 such that n2(T) △ cn1(T) and ∑3 ≤d≤△(T)nd(T) ≤ (1 - c)n1(T) + 1.展开更多
A fuzzy mathematical method is used to discriminate the similarities of pelagic fishes land- ed in the 9180 hauls by 10 light-seine information vessels in the southern Fujian waters from 1989 to 1998. The results indi...A fuzzy mathematical method is used to discriminate the similarities of pelagic fishes land- ed in the 9180 hauls by 10 light-seine information vessels in the southern Fujian waters from 1989 to 1998. The results indicate that the dominant species of the communities had an obvious alternation and the fuzzy adjacency of annual species composition varied between 0. 659 and 0. 923 with an average value of 0. 791. The fuzzy clustering analysis indicates that the annual fuzzy adjacency in general remains good although the species composition of the pelagic fishes has changed to a certain degree since 1992. This paper concludes that the community structure of pelagic fishes in the southern Taiwan Strait remains rel- atively stable and the state of fish stocks shows a good potentiality for a larger utilization.展开更多
Longman Dictionary of Contemporary English is one of the commonly-used dictionaries for English learners,in order to help English learners learn more about the Longman Dictionary and make use of it better,the main com...Longman Dictionary of Contemporary English is one of the commonly-used dictionaries for English learners,in order to help English learners learn more about the Longman Dictionary and make use of it better,the main common features of the Longman Dictionary of Contemporary English group are summarized in this essay and based on that,the distinguished features and the deficiencies of the Longman Dictionary of Contemporary English(edition 3) are analyzed.展开更多
A vertex distinguishing edge coloring of a graph G is a proper edge coloring of G such that any pair of vertices has the distinct sets of colors. The minimum number of colors required for a vertex distinguishing edge ...A vertex distinguishing edge coloring of a graph G is a proper edge coloring of G such that any pair of vertices has the distinct sets of colors. The minimum number of colors required for a vertex distinguishing edge coloring of a graph C is denoted by Xs'8(G). In this paper, we obtained upper bounds on the vertex distinguishing chromatic index of 3-regular Halin graphs and Halin graphs with △(G) ≥ 4, respectively.展开更多
Let G be a simple graph with no isolated edge. An Ⅰ-total coloring of a graph G is a mapping φ : V(G) ∪ E(G) → {1, 2, · · ·, k} such that no adjacent vertices receive the same color and no adjacent ...Let G be a simple graph with no isolated edge. An Ⅰ-total coloring of a graph G is a mapping φ : V(G) ∪ E(G) → {1, 2, · · ·, k} such that no adjacent vertices receive the same color and no adjacent edges receive the same color. An Ⅰ-total coloring of a graph G is said to be adjacent vertex distinguishing if for any pair of adjacent vertices u and v of G, we have C_φ(u) = C_φ(v), where C_φ(u) denotes the set of colors of u and its incident edges. The minimum number of colors required for an adjacent vertex distinguishing Ⅰ-total coloring of G is called the adjacent vertex distinguishing Ⅰ-total chromatic number, denoted by χ_at^i(G).In this paper, we characterize the adjacent vertex distinguishing Ⅰ-total chromatic number of outerplanar graphs.展开更多
A k-proper total coloring of G is called adjacent distinguishing if for any two adjacent vertices have different color sets. According to the property of trees, the adjacent vertex distinguishing total chromatic numbe...A k-proper total coloring of G is called adjacent distinguishing if for any two adjacent vertices have different color sets. According to the property of trees, the adjacent vertex distinguishing total chromatic number will be determined for the Mycielski graphs of trees using the method of induction.展开更多
A proper <em>k</em>-edge coloring of a graph <em>G</em> = (<em>V</em>(<em>G</em>), <em>E</em>(<em>G</em>)) is an assignment <em>c</em>...A proper <em>k</em>-edge coloring of a graph <em>G</em> = (<em>V</em>(<em>G</em>), <em>E</em>(<em>G</em>)) is an assignment <em>c</em>: <em>E</em>(<em>G</em>) → {1, 2, …, <em>k</em>} such that no two adjacent edges receive the same color. A neighbor sum distinguishing <em>k</em>-edge coloring of <em>G</em> is a proper <em>k</em>-edge coloring of <em>G</em> such that <img src="Edit_28f0a24c-7d3f-4bdc-b58c-46dfa2add4b4.bmp" alt="" /> for each edge <em>uv</em> ∈ <em>E</em>(<em>G</em>). The neighbor sum distinguishing index of a graph <em>G</em> is the least integer <em>k</em> such that <em>G </em>has such a coloring, denoted by <em>χ’</em><sub>Σ</sub>(<em>G</em>). Let <img src="Edit_7525056f-b99d-4e38-b940-618d16c061e2.bmp" alt="" /> be the maximum average degree of <em>G</em>. In this paper, we prove <em>χ</em>’<sub>Σ</sub>(<em>G</em>) ≤ max{9, Δ(<em>G</em>) +1} for any normal graph <em>G</em> with <img src="Edit_e28e38d5-9b6d-46da-bfce-2aae47cc36f3.bmp" alt="" />. Our approach is based on the discharging method and Combinatorial Nullstellensatz.展开更多
There are still debates on whether the observed zero energy peak in the experiment by Stevan et al. [Science 346 (2014) 602] reveals the existence of the long pursued Ala.jorana bound states (MBSs). We propose tha...There are still debates on whether the observed zero energy peak in the experiment by Stevan et al. [Science 346 (2014) 602] reveals the existence of the long pursued Ala.jorana bound states (MBSs). We propose that, by mounting two scanning tunneling microscopic tips on top of the topological superconducting chain and measuring the transmission spectrum between these two metallic tips, there are two kinds of characteristics on the spectrum that are caused by A.IBSs uniquely: One is symmetric peaks with respect to zero energy and the other is 4~r period caused by a nearby dosephson junction. The former refers to the fact that MBSs are eomposited by Alajorana fermions which distributed in the particle and hole subspaees equally. The latter is based on the well known 4w period of Josephson effect in topological superconductor. We think that such two characteristics can be used as criteria to distinguish MBSs from other candidates, such as impurities, Kondo effect and traditional Andreev bound states.展开更多
Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe,...Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe, is masked by a preceding tone, the masker. Forward masking is展开更多
Multiple BAC-FISH is a powerful tool for modern cytogenetic researching in both animals and plants.But in cotton,this technique is unavailable due to the high percentage of repetitive sequences.
CHEN Yushun,an expert on aquaculture and aquatic ecosystems from the Institute of Hydrobiology,Chinese Academy of Sciences,received the Distinguished Service Award on August 23,2017 at the American Fisheries Society(A...CHEN Yushun,an expert on aquaculture and aquatic ecosystems from the Institute of Hydrobiology,Chinese Academy of Sciences,received the Distinguished Service Award on August 23,2017 at the American Fisheries Society(AFS)Annual Meeting in Tampa,Florida.The Distinguished Service Award recognizes outstanding contributions of time and energy for展开更多
For data of atmospheric composition missing, fog and haze days were distinguished based on the standard of meteorological industry Observation and Forecasting Levels of Haze (QX/T113-2010) and four user-defined stan...For data of atmospheric composition missing, fog and haze days were distinguished based on the standard of meteorological industry Observation and Forecasting Levels of Haze (QX/T113-2010) and four user-defined standards, and using data of surface meteorological factors in Fuzhou City, China from 2005 to 2011, temporal distributions of fog and haze days were analyzed respectively to provide methods for fog and haze forecast. The results showed that there were 28.9 fog days and 89.7 haze days per year in Fuzhou. Both fog and haze days were variable, and there might be a day difference of twice to thrice among the years. They were the most in 2007, and then decreased in recent years. Both fog and haze days were more in winter and spring, accounted for 94.1% and 70.1% respectively, while in summer and autumn, they only accounted for 5.9% and 29.9% respectively. In a day, fog mainly occurred from night to early morning, while haze occurred mainly at about noon, which demonstrated that fog and haze are different synoptic phenomena. The mass concentration of PM2.5 in fog days was 34 μg/m^3, while it was 61 μg/m^3 in haze days, and in 22% of haze days it was larger than 75 μg/m3, which was above the national second-grade ambient air quality standard.展开更多
Due to the emergence of a large number of counterfeit notes and incomplete coins in the slot machine of self-service bus, to improve the automization of intelligent slot machine, based on multi-sensor testing technolo...Due to the emergence of a large number of counterfeit notes and incomplete coins in the slot machine of self-service bus, to improve the automization of intelligent slot machine, based on multi-sensor testing technology, using programming log- ic controller (PLC) as the core of the whole system, the PLC hardware design and software design are accomplished for the first time to detect the counterfeit notes and coins. The system was tested by many groups of experiments. The results show that the system has reliable recognition rate, good flexibility and stability, reaching the accuracy of 97%.展开更多
To find out the origin of dolomite, the precipitation of primary dolomite, and the formation of pores in dolomite, petrologic and geochemical characteristics of typical samples from Sichuan and Tarim Basin were analyz...To find out the origin of dolomite, the precipitation of primary dolomite, and the formation of pores in dolomite, petrologic and geochemical characteristics of typical samples from Sichuan and Tarim Basin were analyzed based on the previous understandings, and three aspects of results were achieved.(1) A classification of dolomite origins based on petrologic features, forming environment, and time sequence was proposed, which shows clear boundaries of diagenetic and characteristic realms and evolved clues between different types of dolomite.(2) Petrographic and geochemical identification marks for different types of dolomite were presented, revealing that the orderly geochemical variation of different types of dolomite is the response to the change of forming environment of dolomite during continuous time sequence.(3) The contribution of dolomitization to the formation of porosity was re-evaluated, revealing that the porosity in dolomite was mostly attributed to the primary pores and supergene dissolution and burial dissolution, and early dolomitization was conducive to the preservation of primary pores. These understandings are of great theoretical significance for identifying the origins and types of dolomite, and can guide the prediction of dolomite reservoirs.展开更多
基金the National Key Research and Development Program of China(Grant No.2020YFA0309702)NSAF(Grant No.U2130205)+3 种基金the National Natural Science Foundation of China(Grant Nos.62101597,61605248,and 61505261)the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.
基金Supported by the National Natural Science Foundation of China (No. 60873259 and No. 60903212)Knowledge Innovation Project of the Chinese Academy of Sciences
文摘In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the design and the attacks on these hash functions. However, it is very significant to study some properties of their primitives and underlying permutations. Because some properties reflect the pseudo-randomness of the structures. Moreover, they help us to find new cryptanalysis for some block cipher structures. In this paper, we analyze the resistance of JH and Grcstl-512 against structural properties built on integral distinguishers. And then 31.5 (out of 42) rounds integral distinguishers for JH compression function and 11.5 (out of 14) rounds for Grcstl-512 compression function are presented.
基金Guangdong Mobile Communication Company Limited Key Item(2001 and 2002)
文摘To solve the arrearage problem that puzzled most of the mobile corporations, we propose an approach to forecast and evaluate the credits for mobile clients, devising a method that is of the coalescence of genetic algorithm and multidimensional distinguishing model. In the end of this paper, a result of a testing application in Zhuhai Branch, GMCC was provided. The precision of the forecasting and evaluation of the client’s credit is near 90%. This study is very significant to the mobile communication corporation at all levels. The popularization of the techniques and the result would produce great benefits of both society and economy.
基金supported by National Fundamental Research Program of China (Grant No 2006CB921900)the Innovation Funds from the Chinese Academy of SciencesNational Natural Science Foundation of China (Grant Nos 60621064,10574126,10875110 and 60836001)
文摘This paper proves that a set of orthogonal pure states are indistinguishable by restricted local projective measurement and classical communication if the sum of their Schmidt ranks is larger than the dimension of their joint Hilbert space. This result is useful in determining the local distinguishability of quantum states and is stronger in some respects than that of Hayashi et al [Phys. Rev. Lett. 96, 040501]. In addition, it presents a new method to determine the local distinguishability of orthogonal states by projecting measurement operators into their subspaces.
基金supported by the National Natural Science Foundation of China (61163054),supported by the National Natural Science Foundation of China (61163037)
文摘It has been known that determining the exact value of vertex distinguishing edge index X '8(G) of a graph G is difficult, even for simple classes of graphs such as paths, cycles, bipartite complete graphs, complete, graphs, and graphs with maximum degree 2. Let rid(G) denote the number of vertices of degree d in G, and let X'es(G) be the equitable vertex distinguishing edge index of G. We show that a tree T holds nl (T) ≤ X 's (T) ≤ n1 (T) + 1 and X's(T) = X'es(T) if T satisfies one of the following conditions (i) n2(T) ≤△(T) or (ii) there exists a constant c with respect to 0 〈 c 〈 1 such that n2(T) △ cn1(T) and ∑3 ≤d≤△(T)nd(T) ≤ (1 - c)n1(T) + 1.
基金This project is funded by the Fujian Department of Fisheries (Min Shui Ke 1998-08).
文摘A fuzzy mathematical method is used to discriminate the similarities of pelagic fishes land- ed in the 9180 hauls by 10 light-seine information vessels in the southern Fujian waters from 1989 to 1998. The results indicate that the dominant species of the communities had an obvious alternation and the fuzzy adjacency of annual species composition varied between 0. 659 and 0. 923 with an average value of 0. 791. The fuzzy clustering analysis indicates that the annual fuzzy adjacency in general remains good although the species composition of the pelagic fishes has changed to a certain degree since 1992. This paper concludes that the community structure of pelagic fishes in the southern Taiwan Strait remains rel- atively stable and the state of fish stocks shows a good potentiality for a larger utilization.
文摘Longman Dictionary of Contemporary English is one of the commonly-used dictionaries for English learners,in order to help English learners learn more about the Longman Dictionary and make use of it better,the main common features of the Longman Dictionary of Contemporary English group are summarized in this essay and based on that,the distinguished features and the deficiencies of the Longman Dictionary of Contemporary English(edition 3) are analyzed.
基金Supported by the National Natural Science Foundation of China(10971198)the Zhejiang Natural Science Foundation of China(Z6110786)
文摘A vertex distinguishing edge coloring of a graph G is a proper edge coloring of G such that any pair of vertices has the distinct sets of colors. The minimum number of colors required for a vertex distinguishing edge coloring of a graph C is denoted by Xs'8(G). In this paper, we obtained upper bounds on the vertex distinguishing chromatic index of 3-regular Halin graphs and Halin graphs with △(G) ≥ 4, respectively.
基金Supported by the National Natural Science Foundation of China(61163037,61163054,61363060)
文摘Let G be a simple graph with no isolated edge. An Ⅰ-total coloring of a graph G is a mapping φ : V(G) ∪ E(G) → {1, 2, · · ·, k} such that no adjacent vertices receive the same color and no adjacent edges receive the same color. An Ⅰ-total coloring of a graph G is said to be adjacent vertex distinguishing if for any pair of adjacent vertices u and v of G, we have C_φ(u) = C_φ(v), where C_φ(u) denotes the set of colors of u and its incident edges. The minimum number of colors required for an adjacent vertex distinguishing Ⅰ-total coloring of G is called the adjacent vertex distinguishing Ⅰ-total chromatic number, denoted by χ_at^i(G).In this paper, we characterize the adjacent vertex distinguishing Ⅰ-total chromatic number of outerplanar graphs.
基金Foundation item: Supported by Natural Science Foundation of China(60503002)
文摘A k-proper total coloring of G is called adjacent distinguishing if for any two adjacent vertices have different color sets. According to the property of trees, the adjacent vertex distinguishing total chromatic number will be determined for the Mycielski graphs of trees using the method of induction.
文摘A proper <em>k</em>-edge coloring of a graph <em>G</em> = (<em>V</em>(<em>G</em>), <em>E</em>(<em>G</em>)) is an assignment <em>c</em>: <em>E</em>(<em>G</em>) → {1, 2, …, <em>k</em>} such that no two adjacent edges receive the same color. A neighbor sum distinguishing <em>k</em>-edge coloring of <em>G</em> is a proper <em>k</em>-edge coloring of <em>G</em> such that <img src="Edit_28f0a24c-7d3f-4bdc-b58c-46dfa2add4b4.bmp" alt="" /> for each edge <em>uv</em> ∈ <em>E</em>(<em>G</em>). The neighbor sum distinguishing index of a graph <em>G</em> is the least integer <em>k</em> such that <em>G </em>has such a coloring, denoted by <em>χ’</em><sub>Σ</sub>(<em>G</em>). Let <img src="Edit_7525056f-b99d-4e38-b940-618d16c061e2.bmp" alt="" /> be the maximum average degree of <em>G</em>. In this paper, we prove <em>χ</em>’<sub>Σ</sub>(<em>G</em>) ≤ max{9, Δ(<em>G</em>) +1} for any normal graph <em>G</em> with <img src="Edit_e28e38d5-9b6d-46da-bfce-2aae47cc36f3.bmp" alt="" />. Our approach is based on the discharging method and Combinatorial Nullstellensatz.
文摘There are still debates on whether the observed zero energy peak in the experiment by Stevan et al. [Science 346 (2014) 602] reveals the existence of the long pursued Ala.jorana bound states (MBSs). We propose that, by mounting two scanning tunneling microscopic tips on top of the topological superconducting chain and measuring the transmission spectrum between these two metallic tips, there are two kinds of characteristics on the spectrum that are caused by A.IBSs uniquely: One is symmetric peaks with respect to zero energy and the other is 4~r period caused by a nearby dosephson junction. The former refers to the fact that MBSs are eomposited by Alajorana fermions which distributed in the particle and hole subspaees equally. The latter is based on the well known 4w period of Josephson effect in topological superconductor. We think that such two characteristics can be used as criteria to distinguish MBSs from other candidates, such as impurities, Kondo effect and traditional Andreev bound states.
文摘Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe, is masked by a preceding tone, the masker. Forward masking is
文摘Multiple BAC-FISH is a powerful tool for modern cytogenetic researching in both animals and plants.But in cotton,this technique is unavailable due to the high percentage of repetitive sequences.
文摘CHEN Yushun,an expert on aquaculture and aquatic ecosystems from the Institute of Hydrobiology,Chinese Academy of Sciences,received the Distinguished Service Award on August 23,2017 at the American Fisheries Society(AFS)Annual Meeting in Tampa,Florida.The Distinguished Service Award recognizes outstanding contributions of time and energy for
基金Supported by the Key Project of Science and Technology Department of Fujian Province,China in 2012(2012Y0009)
文摘For data of atmospheric composition missing, fog and haze days were distinguished based on the standard of meteorological industry Observation and Forecasting Levels of Haze (QX/T113-2010) and four user-defined standards, and using data of surface meteorological factors in Fuzhou City, China from 2005 to 2011, temporal distributions of fog and haze days were analyzed respectively to provide methods for fog and haze forecast. The results showed that there were 28.9 fog days and 89.7 haze days per year in Fuzhou. Both fog and haze days were variable, and there might be a day difference of twice to thrice among the years. They were the most in 2007, and then decreased in recent years. Both fog and haze days were more in winter and spring, accounted for 94.1% and 70.1% respectively, while in summer and autumn, they only accounted for 5.9% and 29.9% respectively. In a day, fog mainly occurred from night to early morning, while haze occurred mainly at about noon, which demonstrated that fog and haze are different synoptic phenomena. The mass concentration of PM2.5 in fog days was 34 μg/m^3, while it was 61 μg/m^3 in haze days, and in 22% of haze days it was larger than 75 μg/m3, which was above the national second-grade ambient air quality standard.
文摘Due to the emergence of a large number of counterfeit notes and incomplete coins in the slot machine of self-service bus, to improve the automization of intelligent slot machine, based on multi-sensor testing technology, using programming log- ic controller (PLC) as the core of the whole system, the PLC hardware design and software design are accomplished for the first time to detect the counterfeit notes and coins. The system was tested by many groups of experiments. The results show that the system has reliable recognition rate, good flexibility and stability, reaching the accuracy of 97%.
基金Supported by the China National Science and Technology Major Project(2016ZX05004-002)
文摘To find out the origin of dolomite, the precipitation of primary dolomite, and the formation of pores in dolomite, petrologic and geochemical characteristics of typical samples from Sichuan and Tarim Basin were analyzed based on the previous understandings, and three aspects of results were achieved.(1) A classification of dolomite origins based on petrologic features, forming environment, and time sequence was proposed, which shows clear boundaries of diagenetic and characteristic realms and evolved clues between different types of dolomite.(2) Petrographic and geochemical identification marks for different types of dolomite were presented, revealing that the orderly geochemical variation of different types of dolomite is the response to the change of forming environment of dolomite during continuous time sequence.(3) The contribution of dolomitization to the formation of porosity was re-evaluated, revealing that the porosity in dolomite was mostly attributed to the primary pores and supergene dissolution and burial dissolution, and early dolomitization was conducive to the preservation of primary pores. These understandings are of great theoretical significance for identifying the origins and types of dolomite, and can guide the prediction of dolomite reservoirs.