In this paper, we introduce the A, weights into the tent space, many important results in the tent space are generalized. Also, new relations between the A, weights and Carleson measures are obtained.
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process...A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.展开更多
A research was conducted to assess the effects of three different drying techniques, namely open sun drying (OSD), solar dryers (SD) and solar tent dryers (STD). Data on physical characteristics such as weight, ...A research was conducted to assess the effects of three different drying techniques, namely open sun drying (OSD), solar dryers (SD) and solar tent dryers (STD). Data on physical characteristics such as weight, total length and standard length were recorded and proximate composition of the fish sample Clarias gariepinus (Burchell, 1822) was carried out before, during and after drying to assess changes on physical characteristics and nutrient composition at different level. After drying, the samples were subjected to storage for eight weeks. The result obtained shows that there was no significant (P 〉 0.01) difference in the drying weight of the fish samples between the direct SD and the STD. However, for the total and standard length there was significant (P 〈 0.01) difference in the drying techniques, but no significant difference (P 〉 0.05) in the drying period. There was no significant (P 〉 0.05) difference on the physical parameters, storage period, proximate composition of both direct SD and STD and the drying period, respectively. Therefore, direct SD can be substituted with the STD without altering the quality of the product.展开更多
A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position i...A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position index of blocked messages is chosen, and blocked massages translated into ASCII code values are employed as the iteration time of the chaotic tent map. The final 128-bit hash value is generated by logical XOR operation on intermediate hash values. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash function.展开更多
文摘In this paper, we introduce the A, weights into the tent space, many important results in the tent space are generalized. Also, new relations between the A, weights and Carleson measures are obtained.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China under Grants No. 61073187 and No. 61161006 the Hunan Provincial Natural Science Foundation of China under Grant No. 10JJ6093 and the Hunan Provincial Science and Technology Program under Ccant No. 2010GK2003.
文摘A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.
文摘A research was conducted to assess the effects of three different drying techniques, namely open sun drying (OSD), solar dryers (SD) and solar tent dryers (STD). Data on physical characteristics such as weight, total length and standard length were recorded and proximate composition of the fish sample Clarias gariepinus (Burchell, 1822) was carried out before, during and after drying to assess changes on physical characteristics and nutrient composition at different level. After drying, the samples were subjected to storage for eight weeks. The result obtained shows that there was no significant (P 〉 0.01) difference in the drying weight of the fish samples between the direct SD and the STD. However, for the total and standard length there was significant (P 〈 0.01) difference in the drying techniques, but no significant difference (P 〉 0.05) in the drying period. There was no significant (P 〉 0.05) difference on the physical parameters, storage period, proximate composition of both direct SD and STD and the drying period, respectively. Therefore, direct SD can be substituted with the STD without altering the quality of the product.
基金Supported by the National Natural Science Foundation of China (No. 61173178, 61003247, 61070246) and the Fundamental Research Funds for the Central University (No. COJER1018002,cdjerl018003).
文摘A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position index of blocked messages is chosen, and blocked massages translated into ASCII code values are employed as the iteration time of the chaotic tent map. The final 128-bit hash value is generated by logical XOR operation on intermediate hash values. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash function.