期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于虚拟仪器技术的谐波分析系统设计
1
作者 徐海凯 《中国科技财富》 2010年第12期274-274,共1页
采用加窗的快速傅立叶变换的谐波测量方法,在LabVIEW软件平台上开发了谐波分析系统,提高谐波测量的精度,并为谐波的分析和抑制提供依据。
关键词 谐波 FFT 富函数
下载PDF
Optimal Military Spending,Trade and Stochastic Economic Growth 被引量:1
2
作者 WANG Dengshan WANG Yan 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2016年第3期736-751,共16页
Based on the procedure of dynamic programming,this paper investigates the military spending,trade and wealth accumulation in a stochastic endogenous economic growth model.For the Cobb-Dauglas utility function,explicit... Based on the procedure of dynamic programming,this paper investigates the military spending,trade and wealth accumulation in a stochastic endogenous economic growth model.For the Cobb-Dauglas utility function,explicit solutions of the optimal problem of the home country are obtained.Meanwhile,the optimal consumptions of domestic goods and foreign goods,the share of domestic capital stock and foreign bond holdings are derived explicitly.The comparative dynamic analysis shows that when intertemporal substitution in consumption is relative elastic,economic growth has a positive correlation with foreign military spending,has a negative correlation with variance of foreign military spending,and has a positive correlation with variance of capital or bonds if capital and bonds yields the same benefits.However,in the case of inelasticity,variance of foreign military spending may stimulate or weaken economic development. 展开更多
关键词 Foreign bond holdings military spending stochastic economic growth TRADE wealth accumulation.
原文传递
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme 被引量:1
3
作者 CHEN Yu CHEN LiQun LIN DongDai 《Science China Mathematics》 SCIE 2013年第7期1385-1401,共17页
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash func... In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement. 展开更多
关键词 identity-based encryption Fujisaki-Okamoto transformation provable security cascading reduction
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部