The Riemann–Hilbert approach is demonstrated to investigate the defocusing Lakshmanan–Porsezian–Daniel equation under fully asymmetric nonzero boundary conditions.In contrast to the symmetry case,this paper focuses...The Riemann–Hilbert approach is demonstrated to investigate the defocusing Lakshmanan–Porsezian–Daniel equation under fully asymmetric nonzero boundary conditions.In contrast to the symmetry case,this paper focuses on the branch points related to the scattering problem rather than using the Riemann surfaces.For the direct problem,we analyze the Jost solution of lax pairs and some properties of scattering matrix,including two kinds of symmetries.The inverse problem at branch points can be presented,corresponding to the associated Riemann–Hilbert.Moreover,we investigate the time evolution problem and estimate the value of solving the solutions by Jost function.For the inverse problem,we construct it as a Riemann–Hilbert problem and formulate the reconstruction formula for the defocusing Lakshmanan–Porsezian–Daniel equation.The solutions of the Riemann–Hilbert problem can be constructed by estimating the solutions.Finally,we work out the solutions under fully asymmetric nonzero boundary conditions precisely via utilizing the Sokhotski–Plemelj formula and the square of the negative column transformation with the assistance of Riemann surfaces.These results are valuable for understanding physical phenomena and developing further applications of optical problems.展开更多
This report describes an equivalent doping profile transformation method with which the avalanche breakdown voltage of the asymmetric linearly graded junction was analytically predicted.The maximum breakdown voltage a...This report describes an equivalent doping profile transformation method with which the avalanche breakdown voltage of the asymmetric linearly graded junction was analytically predicted.The maximum breakdown voltage and the different depletion layer extension on the diffused side and substrate side are demonstrated in the report.The report shows the equivalent doping profile method is valid to predict the breakdown voltage of the complex P N junction.The analytical results agree with the experimental breakdown voltage in comparison with the abrupt junction and symmetric linearly graded junction approximations.展开更多
This article is concerned with the extended homogeneous balance method for studying the abundant localized solution structure of the (2+1) dimensional asymmetric Nizhnik Novikov Veselov equation. A B a¨...This article is concerned with the extended homogeneous balance method for studying the abundant localized solution structure of the (2+1) dimensional asymmetric Nizhnik Novikov Veselov equation. A B a¨ cklund transformation was first obtained, and then the richness of the localized coherent structures was found, which was caused by the entrance of two variable separated arbitrary functions, in the model. For some special choices of the arbitrary functions, it is shown that the localized structures of the model may be dromions, lumps, and ring solitons.展开更多
The method of preparing D-phenylalanine by asymmetric transformation is reported. D-phenylalanine was prepared from DL-phenylalanine by two-step reaction. D-phenylalanine (2S, 3S)-tartrate was prepared by heating DL-p...The method of preparing D-phenylalanine by asymmetric transformation is reported. D-phenylalanine was prepared from DL-phenylalanine by two-step reaction. D-phenylalanine (2S, 3S)-tartrate was prepared by heating DL-phenylalanine, salicylaldehyde, and (2S, 3S)-tartaric acid in propionic acid; the obtained D-phenylalanine (2S, 3S)-tartrate was treated with triethylamine in ethanol giving D-phenylalanine with 98% optical purity in 69% yield.展开更多
A new asymmetric watermarking scheme is proposed in this letter. In the proposed scheme, a secret real fractional DCT-I transform and a primitive watermark are employed to generate an asymmetric watermark. The secret ...A new asymmetric watermarking scheme is proposed in this letter. In the proposed scheme, a secret real fractional DCT-I transform and a primitive watermark are employed to generate an asymmetric watermark. The secret watermark for em-bedding is derived from the primitive watermark, and is embedded in the large fractional DCT-I transformation coefficients of a cover signal. The asymmetric detection procedure is performed using a correlation test. Simulation results showed that the asymmetric detection is reliable, and that the scheme can provide minimum security.展开更多
Electrosynthesis has gained widespread recognition for its extraordinary ability to precisely control the redox process.This outstanding capability enables the direct conversion of non-functionalized substrates into r...Electrosynthesis has gained widespread recognition for its extraordinary ability to precisely control the redox process.This outstanding capability enables the direct conversion of non-functionalized substrates into reactive intermediates by utilizing easily accessible starting materials, eliminating the need for preliminary functionalization procedures and allowing for unconventional bond activations.展开更多
Although the application of Symmetrical Components to time-dependent variables was introduced by Lyon in 1954, for many years its application was essentially restricted to electric machines. Recently, thanks to its ad...Although the application of Symmetrical Components to time-dependent variables was introduced by Lyon in 1954, for many years its application was essentially restricted to electric machines. Recently, thanks to its advantages, the Lyon transformation is also applied to power network calculation. In this paper, time-dependent symmetrical components are used to study the dynamic analysis of asymmetrical faults in a power system. The Lyon approach allows the calculation of the maximum values of overvoltages and overcurrents under transient conditions and to study network under non-sinusoidal conditions. Finally, some examples with longitudinal asymmetrical faults are illustrated.展开更多
We introduce the three-mode entangled state and set up an experiment to generate it. Then we discuss the three-mode squeezing operator squeezed |p, X2, X3〉→μ^-3/2|p/μ, X2/μ, X3/μ) and the optical implement to...We introduce the three-mode entangled state and set up an experiment to generate it. Then we discuss the three-mode squeezing operator squeezed |p, X2, X3〉→μ^-3/2|p/μ, X2/μ, X3/μ) and the optical implement to realize such a squeezed state. We also reveal that c-number .asymmetric shrink transform in the three-mode entangled state, i.e. |p, X2,X3)→μ^-1/2|p/μ, X2,X3), maps onto a kind of one-sided three-mode squeezing operator {iλ (∑i^3=1 Pi) (∑i^3=1 Qi) -λ/2}. Using the technique of integration within an ordered product (IWOP) of operators, we derive their normally ordered forms and construct the corresponding squeezed states.展开更多
At present,convolutional neural networks(CNNs)and transformers surpass humans in many situations(such as face recognition and object classification),but do not work well in identifying fibers in textile surface images...At present,convolutional neural networks(CNNs)and transformers surpass humans in many situations(such as face recognition and object classification),but do not work well in identifying fibers in textile surface images.Hence,this paper proposes an architecture named FiberCT which takes advantages of the feature extraction capability of CNNs and the long-range modeling capability of transformer decoders to adaptively extract multiple types of fiber features.Firstly,the convolution module extracts fiber features from the input textile surface images.Secondly,these features are sent into the transformer decoder module where label embeddings are compared with the features of each type of fibers through multi-head cross-attention and the desired features are pooled adaptively.Finally,an asymmetric loss further purifies the extracted fiber representations.Experiments show that FiberCT can more effectively extract the representations of various types of fibers and improve fiber identification accuracy than state-of-the-art multi-label classification approaches.展开更多
Practically,the load currents in three phases are asymmetric in the power system.It means that the impedances are different in all three phases.If the consumer’s transformer neutral cut off and/or was disconnected fr...Practically,the load currents in three phases are asymmetric in the power system.It means that the impedances are different in all three phases.If the consumer’s transformer neutral cut off and/or was disconnected from the neutral of power supply source,then there will be some trouble and failure occurred.The current in the neutral wire drops down to zero when the neutral wire is cut off and the phase currents of all three-phase equal to each other since there was no return wire.The currents are equal but the voltages at the phase consumers are different.Especially for residential single-phase consumers,the voltage at the consumers of the phase varies differently for three phase systems when the neutral wire was disconnected at consumer side and even the voltage at the consumers one or two of those three phases becomes over nominal voltage or reaches nearly line voltage.In this case,the electronic appliances in that phase will be fed by high voltage than the rated value and they can be broken down.In the power system of UB(Ulaanbaatar)city,there are some occasional such kind of failures every year.Obviously,many electronic appliances were broken down due to high voltage and the electricity utility companies respond for service charge of damaged parts.展开更多
A privileged strategy has been developed for the precise construction of enantioenriched azaspiro polycyclic scaffolds.Structurally diverse azaspiro polycycles bearing multiple contiguous stereocenters are obtained wi...A privileged strategy has been developed for the precise construction of enantioenriched azaspiro polycyclic scaffolds.Structurally diverse azaspiro polycycles bearing multiple contiguous stereocenters are obtained with excellent results(up to 99:1 e.r.,>95:5 d.r.) via sequential enantioselective four-component Ugi reactions/post-Ugi transformations with substrates containing prerequisite functional groups in the presence of anionic stereogenic-at-cobalt(Ⅲ) complexes.展开更多
针对射频指纹识别中单一特征无法全面表示信号的完整性,且类间特征差异较小从而限制识别准确率等问题,提出了一种基于时频和双谱特征融合的DA-ResNeXt50(ResNeXt50 with dense connection and ACBlock)射频指纹识别方法。首先,对采集到...针对射频指纹识别中单一特征无法全面表示信号的完整性,且类间特征差异较小从而限制识别准确率等问题,提出了一种基于时频和双谱特征融合的DA-ResNeXt50(ResNeXt50 with dense connection and ACBlock)射频指纹识别方法。首先,对采集到的不同设备的信号分别进行短时傅里叶变换(short-time Fourier transform,STFT)和双谱变换,将得到的图像二值化处理并拼接,综合利用两种变换分别在时频域和高阶统计特性上的优势,更全面地提取和表征不同设备的射频指纹特征;然后,提出了DA-ResNeXt50网络模型,借鉴密集连接思想,使四层残差单元每一层都与前面所有层直接相连,促进了特征的复用和传递,能更好地捕捉类间细微差异;最后,使用非对称卷积模块(asymmetric convolution block,ACBlock)替换模型最后一层残差单元的3×3卷积,可以有效地增加网络的感受野,增强卷积核的骨架部分,从而提高射频指纹识别性能。实验结果表明,相较于使用单一特征提取方法,提出的特征融合方法的性能有较大的提升,改进后的模型与多种经典模型相比,具有较高的识别精度。展开更多
An N-heterocyclic carbene(NHC)-catalyzed enantioselective Mannich reaction of the remoteγ-carbon of cyclopropylcarbaldehydes is disclosed for the first time.Diastereo-and enantiomerically enriched multicyclicδ-lacta...An N-heterocyclic carbene(NHC)-catalyzed enantioselective Mannich reaction of the remoteγ-carbon of cyclopropylcarbaldehydes is disclosed for the first time.Diastereo-and enantiomerically enriched multicyclicδ-lactam compound is afforded as the main product from 8 possible stereo-specific isomers through dynamic kinetic asymmetric transformation(DYKAT)processes.Multiple chiral functional molecules can be afforded from the lactam products through simple protocols with retentions of the optical purities.展开更多
A color information encryption method using phase-truncated gyrator transform domain is proposed. In this technique, the color image is decomposed into R, G and B channels. The decomposed three RBG channels evade the ...A color information encryption method using phase-truncated gyrator transform domain is proposed. In this technique, the color image is decomposed into R, G and B channels. The decomposed three RBG channels evade the interference of crosstalks efficiently. Each channel is separately modulated to the first random phase mask and then gyrator transformed. The transformed image is phase-truncated to get first encoded image and amplitude-truncated to produce first asymmetric phase key. The obtained image is modulated to the second random phase mask and then again gyrator transformed. The resulted image is phase-truncated to obtain second encoded image and amplitude-truncated to generate second asymmetric phase key. The proposed system includes transformation angles of GT and asymmetric phase keys as decryption keys. The proposed system can be implemented digitally or optically. The optical setup is free from optical misalignment problem. The theoretical analysis and numerical simulation results both validate the proposed technique.展开更多
基金the Fundamental Research Funds for the Central Universities(Grant No.2024MS126).
文摘The Riemann–Hilbert approach is demonstrated to investigate the defocusing Lakshmanan–Porsezian–Daniel equation under fully asymmetric nonzero boundary conditions.In contrast to the symmetry case,this paper focuses on the branch points related to the scattering problem rather than using the Riemann surfaces.For the direct problem,we analyze the Jost solution of lax pairs and some properties of scattering matrix,including two kinds of symmetries.The inverse problem at branch points can be presented,corresponding to the associated Riemann–Hilbert.Moreover,we investigate the time evolution problem and estimate the value of solving the solutions by Jost function.For the inverse problem,we construct it as a Riemann–Hilbert problem and formulate the reconstruction formula for the defocusing Lakshmanan–Porsezian–Daniel equation.The solutions of the Riemann–Hilbert problem can be constructed by estimating the solutions.Finally,we work out the solutions under fully asymmetric nonzero boundary conditions precisely via utilizing the Sokhotski–Plemelj formula and the square of the negative column transformation with the assistance of Riemann surfaces.These results are valuable for understanding physical phenomena and developing further applications of optical problems.
文摘This report describes an equivalent doping profile transformation method with which the avalanche breakdown voltage of the asymmetric linearly graded junction was analytically predicted.The maximum breakdown voltage and the different depletion layer extension on the diffused side and substrate side are demonstrated in the report.The report shows the equivalent doping profile method is valid to predict the breakdown voltage of the complex P N junction.The analytical results agree with the experimental breakdown voltage in comparison with the abrupt junction and symmetric linearly graded junction approximations.
文摘This article is concerned with the extended homogeneous balance method for studying the abundant localized solution structure of the (2+1) dimensional asymmetric Nizhnik Novikov Veselov equation. A B a¨ cklund transformation was first obtained, and then the richness of the localized coherent structures was found, which was caused by the entrance of two variable separated arbitrary functions, in the model. For some special choices of the arbitrary functions, it is shown that the localized structures of the model may be dromions, lumps, and ring solitons.
文摘The method of preparing D-phenylalanine by asymmetric transformation is reported. D-phenylalanine was prepared from DL-phenylalanine by two-step reaction. D-phenylalanine (2S, 3S)-tartrate was prepared by heating DL-phenylalanine, salicylaldehyde, and (2S, 3S)-tartaric acid in propionic acid; the obtained D-phenylalanine (2S, 3S)-tartrate was treated with triethylamine in ethanol giving D-phenylalanine with 98% optical purity in 69% yield.
基金Project (Nos. 60372076 and 60272082) supported by the National Natural Science Foundation of China
文摘A new asymmetric watermarking scheme is proposed in this letter. In the proposed scheme, a secret real fractional DCT-I transform and a primitive watermark are employed to generate an asymmetric watermark. The secret watermark for em-bedding is derived from the primitive watermark, and is embedded in the large fractional DCT-I transformation coefficients of a cover signal. The asymmetric detection procedure is performed using a correlation test. Simulation results showed that the asymmetric detection is reliable, and that the scheme can provide minimum security.
基金supported by the National Natural Science Foundation of China(21971227,22222113)CAS Project for Young Scientists in Basic Research(YSBR-054)+1 种基金the Fundamental Research Funds for the Central Universities(WK9990000090,WK9990000111)the Chinese Postdoctoral Science Foundation(2022TQ0324,2023M733376)。
文摘Electrosynthesis has gained widespread recognition for its extraordinary ability to precisely control the redox process.This outstanding capability enables the direct conversion of non-functionalized substrates into reactive intermediates by utilizing easily accessible starting materials, eliminating the need for preliminary functionalization procedures and allowing for unconventional bond activations.
文摘Although the application of Symmetrical Components to time-dependent variables was introduced by Lyon in 1954, for many years its application was essentially restricted to electric machines. Recently, thanks to its advantages, the Lyon transformation is also applied to power network calculation. In this paper, time-dependent symmetrical components are used to study the dynamic analysis of asymmetrical faults in a power system. The Lyon approach allows the calculation of the maximum values of overvoltages and overcurrents under transient conditions and to study network under non-sinusoidal conditions. Finally, some examples with longitudinal asymmetrical faults are illustrated.
基金Open Foundation of Laboratory of High- Intensity Optics
文摘We introduce the three-mode entangled state and set up an experiment to generate it. Then we discuss the three-mode squeezing operator squeezed |p, X2, X3〉→μ^-3/2|p/μ, X2/μ, X3/μ) and the optical implement to realize such a squeezed state. We also reveal that c-number .asymmetric shrink transform in the three-mode entangled state, i.e. |p, X2,X3)→μ^-1/2|p/μ, X2,X3), maps onto a kind of one-sided three-mode squeezing operator {iλ (∑i^3=1 Pi) (∑i^3=1 Qi) -λ/2}. Using the technique of integration within an ordered product (IWOP) of operators, we derive their normally ordered forms and construct the corresponding squeezed states.
基金National Natural Science Foundation of China(No.61972081)Fundamental Research Funds for the Central Universities,China(No.2232023Y-01)Natural Science Foundation of Shanghai,China(No.22ZR1400200)。
文摘At present,convolutional neural networks(CNNs)and transformers surpass humans in many situations(such as face recognition and object classification),but do not work well in identifying fibers in textile surface images.Hence,this paper proposes an architecture named FiberCT which takes advantages of the feature extraction capability of CNNs and the long-range modeling capability of transformer decoders to adaptively extract multiple types of fiber features.Firstly,the convolution module extracts fiber features from the input textile surface images.Secondly,these features are sent into the transformer decoder module where label embeddings are compared with the features of each type of fibers through multi-head cross-attention and the desired features are pooled adaptively.Finally,an asymmetric loss further purifies the extracted fiber representations.Experiments show that FiberCT can more effectively extract the representations of various types of fibers and improve fiber identification accuracy than state-of-the-art multi-label classification approaches.
文摘Practically,the load currents in three phases are asymmetric in the power system.It means that the impedances are different in all three phases.If the consumer’s transformer neutral cut off and/or was disconnected from the neutral of power supply source,then there will be some trouble and failure occurred.The current in the neutral wire drops down to zero when the neutral wire is cut off and the phase currents of all three-phase equal to each other since there was no return wire.The currents are equal but the voltages at the phase consumers are different.Especially for residential single-phase consumers,the voltage at the consumers of the phase varies differently for three phase systems when the neutral wire was disconnected at consumer side and even the voltage at the consumers one or two of those three phases becomes over nominal voltage or reaches nearly line voltage.In this case,the electronic appliances in that phase will be fed by high voltage than the rated value and they can be broken down.In the power system of UB(Ulaanbaatar)city,there are some occasional such kind of failures every year.Obviously,many electronic appliances were broken down due to high voltage and the electricity utility companies respond for service charge of damaged parts.
基金supported by the National Natural Science Foundation of China (92156022)the Anhui Provincial Natural Science Funds (1908085J07,1908085QB79,2308085MB44,2308085QB44)the Shen-Nong Scholar Program of Anhui Agricultural University。
文摘A privileged strategy has been developed for the precise construction of enantioenriched azaspiro polycyclic scaffolds.Structurally diverse azaspiro polycycles bearing multiple contiguous stereocenters are obtained with excellent results(up to 99:1 e.r.,>95:5 d.r.) via sequential enantioselective four-component Ugi reactions/post-Ugi transformations with substrates containing prerequisite functional groups in the presence of anionic stereogenic-at-cobalt(Ⅲ) complexes.
文摘针对射频指纹识别中单一特征无法全面表示信号的完整性,且类间特征差异较小从而限制识别准确率等问题,提出了一种基于时频和双谱特征融合的DA-ResNeXt50(ResNeXt50 with dense connection and ACBlock)射频指纹识别方法。首先,对采集到的不同设备的信号分别进行短时傅里叶变换(short-time Fourier transform,STFT)和双谱变换,将得到的图像二值化处理并拼接,综合利用两种变换分别在时频域和高阶统计特性上的优势,更全面地提取和表征不同设备的射频指纹特征;然后,提出了DA-ResNeXt50网络模型,借鉴密集连接思想,使四层残差单元每一层都与前面所有层直接相连,促进了特征的复用和传递,能更好地捕捉类间细微差异;最后,使用非对称卷积模块(asymmetric convolution block,ACBlock)替换模型最后一层残差单元的3×3卷积,可以有效地增加网络的感受野,增强卷积核的骨架部分,从而提高射频指纹识别性能。实验结果表明,相较于使用单一特征提取方法,提出的特征融合方法的性能有较大的提升,改进后的模型与多种经典模型相比,具有较高的识别精度。
基金This work was supported by the National Natural Science Foundation of China(21772029,21801051,21961006,22071036,82360589,81360589)The 10 Talent Plan(Shicengci)of Guizhou Province([2016]5649)+5 种基金the Guizhou Province Returned Oversea Student Science and Technology Activity Program[(2014)-2]the Science and Technology Department of Guizhou Province([2018]2802,[2019]1020)the Program of Introducing Talents of Discipline to Universities of China(111 Program,D20023)at Guizhou University,Frontiers Science Center for Asymmetric Synthesis and Medicinal Molecules,Department of Education,Guizhou Province[Qianjiaohe KY(2020)004]the Guizhou Province First-Class Disciplines Project[(Yiliu Xueke Jianshe Xiangmu)-GNYL(2017)008]Guizhou University of Traditional Chinese Medicine(China),and Guizhou University.
文摘An N-heterocyclic carbene(NHC)-catalyzed enantioselective Mannich reaction of the remoteγ-carbon of cyclopropylcarbaldehydes is disclosed for the first time.Diastereo-and enantiomerically enriched multicyclicδ-lactam compound is afforded as the main product from 8 possible stereo-specific isomers through dynamic kinetic asymmetric transformation(DYKAT)processes.Multiple chiral functional molecules can be afforded from the lactam products through simple protocols with retentions of the optical purities.
文摘A color information encryption method using phase-truncated gyrator transform domain is proposed. In this technique, the color image is decomposed into R, G and B channels. The decomposed three RBG channels evade the interference of crosstalks efficiently. Each channel is separately modulated to the first random phase mask and then gyrator transformed. The transformed image is phase-truncated to get first encoded image and amplitude-truncated to produce first asymmetric phase key. The obtained image is modulated to the second random phase mask and then again gyrator transformed. The resulted image is phase-truncated to obtain second encoded image and amplitude-truncated to generate second asymmetric phase key. The proposed system includes transformation angles of GT and asymmetric phase keys as decryption keys. The proposed system can be implemented digitally or optically. The optical setup is free from optical misalignment problem. The theoretical analysis and numerical simulation results both validate the proposed technique.