Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear ...Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational.展开更多
In order to assist the design of short interfering ribonucleic acids (siRNA), 573 non-redundant siRNAs were collected from published literatures and the relationship between siRNAs sequences and RNA interference (R...In order to assist the design of short interfering ribonucleic acids (siRNA), 573 non-redundant siRNAs were collected from published literatures and the relationship between siRNAs sequences and RNA interference (RNAi) effect is analyzed by a support vector machine (SVM) based algorithm relied on a basebase correlation (BBC) feature. The results show that the proposed algorithm has the highest area under curve (AUC) value (0. 73) of the receive operating characteristic (ROC) curve and the greatest r value (0. 43) of the Pearson's correlation coefficient. This indicates that the proposed algorithm is better than the published algorithms on the collected datasets and that more attention should be paid to the base-base correlation information in future siRNA design.展开更多
This report describes an equivalent doping profile transformation method with which the avalanche breakdown voltage of the asymmetric linearly graded junction was analytically predicted.The maximum breakdown voltage a...This report describes an equivalent doping profile transformation method with which the avalanche breakdown voltage of the asymmetric linearly graded junction was analytically predicted.The maximum breakdown voltage and the different depletion layer extension on the diffused side and substrate side are demonstrated in the report.The report shows the equivalent doping profile method is valid to predict the breakdown voltage of the complex P N junction.The analytical results agree with the experimental breakdown voltage in comparison with the abrupt junction and symmetric linearly graded junction approximations.展开更多
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o...To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.展开更多
The delay-dependent absolute stability for a class of Lurie systems with interval time-varying delay is studied. By employing an augmented Lyapunov functional and combining a free-weighting matrix approach and the rec...The delay-dependent absolute stability for a class of Lurie systems with interval time-varying delay is studied. By employing an augmented Lyapunov functional and combining a free-weighting matrix approach and the reciprocal convex technique, an improved stability condition is derived in terms of linear matrix inequalities (LMIs). By retaining some useful terms that are usually ignored in the derivative of the Lyapunov function, the proposed sufficient condition depends not only on the lower and upper bounds of both the delay and its derivative, but it also depends on their differences, which has wider application fields than those of present results. Moreover, a new type of equality expression is developed to handle the sector bounds of the nonlinear function, which achieves fewer LMIs in the derived condition, compared with those based on the convex representation. Therefore, the proposed method is less conservative than the existing ones. Simulation examples are given to demonstrate the validity of the approach.展开更多
New developments have been made on the applications of the differential quadrature(DQ)method to analysis of structural problems recently.The method is used to obtain solutions of large deflections, membrane and bendin...New developments have been made on the applications of the differential quadrature(DQ)method to analysis of structural problems recently.The method is used to obtain solutions of large deflections, membrane and bending stresses of circular plates with movable and immovable edges under uniform pressures or a central point load.The shortcomings existing in the earlier analysis by the DQ method have been overcome by a new approach in applying the boundary conditions. The accuracy and the efficiency of the newly developed method for solving nonlinear problems are demonstrated.展开更多
A novel hashing method based on multiple heterogeneous features is proposed to improve the accuracy of the image retrieval system. First, it leverages the imbalanced distribution of the similar and dissimilar samples ...A novel hashing method based on multiple heterogeneous features is proposed to improve the accuracy of the image retrieval system. First, it leverages the imbalanced distribution of the similar and dissimilar samples in the feature space to boost the performance of each weak classifier in the asymmetric boosting framework. Then, the weak classifier based on a novel linear discriminate analysis (LDA) algorithm which is learned from the subspace of heterogeneous features is integrated into the framework. Finally, the proposed method deals with each bit of the code sequentially, which utilizes the samples misclassified in each round in order to learn compact and balanced code. The heterogeneous information from different modalities can be effectively complementary to each other, which leads to much higher performance. The experimental results based on the two public benchmarks demonstrate that this method is superior to many of the state- of-the-art methods. In conclusion, the performance of the retrieval system can be improved with the help of multiple heterogeneous features and the compact hash codes which can be learned by the imbalanced learning method.展开更多
In classical nonlinear programming, it is a general method of developing optimality conditions that a nonlinear programming problem is linearized as a linear programming problem by using first order approximations of ...In classical nonlinear programming, it is a general method of developing optimality conditions that a nonlinear programming problem is linearized as a linear programming problem by using first order approximations of the functions at a given feasible point. The linearized procedure for differentiable nonlinear programming problems can be naturally generalized to the quasi differential case. As in classical case so called constraint qualifications have to be imposed on the constraint functions to guarantee that for a given local minimizer of the original problem the nullvector is an optimal solution of the corresponding 'quasilinearized' problem. In this paper, constraint qualifications for inequality constrained quasi differentiable programming problems of type min {f(x)|g(x)≤0} are considered, where f and g are qusidifferentiable functions in the sense of Demyanov. Various constraint qualifications for this problem are presented and a new one is proposed. The relations among these conditions are investigated. Moreover, a Wolf dual problem for this problem is introduced, and the corresponding dual theorems are given.展开更多
[Objective] This study aimed to optimize the chromatographic conditions for detecting ellagic acid in pomegranate peels using HPLC method. [Method] By using 0.2 mg/ml ellagic acid standard solution, on the basis of si...[Objective] This study aimed to optimize the chromatographic conditions for detecting ellagic acid in pomegranate peels using HPLC method. [Method] By using 0.2 mg/ml ellagic acid standard solution, on the basis of single-factor experiment and orthogonal experiment, chromatographic conditions (mobile phase ratio, flow rate, col- umn temperature) for detecting ellagic acid using HPLC were optimized. Based on the optimal chromatographic conditions, the ellagic acid content in experimental pomegranate peels was determined. [Resull] The optimal chromatographic conditions for detecting ellagic acid in pomegranate peels using HPLC method are: 1.2% phos- phoric acid:acetonitrile=85:15, column temperature of 35 ℃, and flow rate of 1.0 ml/min. The linear regression equation of ellagic acid is: y=2.9e+0.6x+4.4e+5 (FF=9 999). Ac- cording to the standard addition recovery test, the average recovery rate of ellagic acid is 98.20%, and RSD is 0.60%. Under above optimized chromatographic condi- tions, ellagic acid can be well separated from other interfering components in pomegranate peels, with shorter peak time and ideal effect, which is convenient for the detection in production practices. [Conclusion] This study laid the foundation for detecting ellagic acid in pomegranate peels using HPLC method.展开更多
In this paper, we give a Z 2 index theory of generalized critical point. By this theory we get a sufficient condition on the existing result of a class functional, as an example we give a new result that the equa...In this paper, we give a Z 2 index theory of generalized critical point. By this theory we get a sufficient condition on the existing result of a class functional, as an example we give a new result that the equation-Δu+u=|u| p-1 u, x∈R N,(1)has infinite solutions.展开更多
With the rural concealed communication cable as the study object, the shielding effectiveness of different slot shapes was analyzed by using LBEM (linear boundary element method). The engineering example results sho...With the rural concealed communication cable as the study object, the shielding effectiveness of different slot shapes was analyzed by using LBEM (linear boundary element method). The engineering example results showed that for twocore shielded cable, the coupling capacitance of trapezoid slots (asymmetric and symmetric) changed the most, followed by rectangular slots (asymmetric and symmetric), and the changes of wedge slots were the smallest, but the change tenden- cies were consistent. In addition, with the increase of slot width of different slots, the coupling capacitance of tow-cored shielded cable showed small change.展开更多
The present paper discusses a class of nonlinear diffusion-convection equations with source. The method that we use is the conditional symmetry method. It is shown that the equation admits certain conditional symmetri...The present paper discusses a class of nonlinear diffusion-convection equations with source. The method that we use is the conditional symmetry method. It is shown that the equation admits certain conditional symmetries for coefficient functions of the equations. As a consequence, solutions to the resulting equations are obtained.展开更多
Painleve property and infinite symmetries of the (2+1)-dimensional higher-order Broer-Kaup (HBK) system are studied in this paper. Using the modified direct method, we derive the theorem of general symmetry gro.u...Painleve property and infinite symmetries of the (2+1)-dimensional higher-order Broer-Kaup (HBK) system are studied in this paper. Using the modified direct method, we derive the theorem of general symmetry gro.ups to (2+1)-dimensional HBK system. Based on our theorem, some new forms of solutions are obtained. We also find infinite number of conservation laws of the (2+1)-dimensional HBK system.展开更多
By analyzing the observed phenomena and the data collected in the study, a multi-compartment linear circulation model for targeting drug delivery system was developed and the function formulas of the drug concentratio...By analyzing the observed phenomena and the data collected in the study, a multi-compartment linear circulation model for targeting drug delivery system was developed and the function formulas of the drug concentration-time in blood and target organ by computing were figured out. The drug concentration-time curve for target organ can be plotted with reference to the data of drug concentration in blood according to the model. The pharmacokinetic parameters of the drug in target organ could also be obtained. The practicability of the model was further checked by the curves of drug concentration-time in blood and target organ(liver) of liver-targeting nanoparticles in animal tests. Based on the liver drug concentration-time curves calculated by the function formula of the drug in target organ, the pharmacokinetic behavior of the drug in target organ(liver) was analyzed by statistical moment, and its pharmacokinetic parameters in liver were obtained. It is suggested that the (relative targeting index( can be used for quantitative evaluation of the targeting drug delivery systems.展开更多
Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi...Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure.展开更多
The generalized conditional symmetry and sign-invariant approaches are developed to study the nonlinear diffusion equations with x-dependent convection and source terms. We obtain conditions under which the equations ...The generalized conditional symmetry and sign-invariant approaches are developed to study the nonlinear diffusion equations with x-dependent convection and source terms. We obtain conditions under which the equations admit the second-order generalized conditional symmetries and the first-order sign-invariants on the solutions. Several types of different generalized conditional symmetries and first-order sign-invariants for the equations with diffusion of power law are obtained. Exact solutions to the resulting equations are constructed.展开更多
The widely used conventional linearized error models or perturbation models are not effective to represent the nonlinear characteristics of SINS error propagation with large attitude errors.Error equations in terms of...The widely used conventional linearized error models or perturbation models are not effective to represent the nonlinear characteristics of SINS error propagation with large attitude errors.Error equations in terms of quaternion error are derived,and extended Kalman filter techniques are used to solve the in-flight alignment problems.In the case of small attitude errors,the nonlinear models can be reduced to conventional phi-angle models.The simulation results show that the proposed error models may improve the performance of alignment.展开更多
Influence of identical applied initial pressures on the radial surfaces of a hollow cylinder which is compose of materials with first power hypo-elastic constitutive model was investigated.The basic equations of the p...Influence of identical applied initial pressures on the radial surfaces of a hollow cylinder which is compose of materials with first power hypo-elastic constitutive model was investigated.The basic equations of the problem were built up based on the framework of piecewise homogeneous body model with the use of three-dimensional linearized theory of elastic waves in initially stressed bodies(TLTEWISB).With the method proposed previously,this problem was then solved numerically.Moreover,the dispersion group velocity of the lowest order mode with different initial pressures was also studied.It can be concluded that the initial pressure and the geometry parameters will induce considerable changes of different degrees in dispersive relation between phase velocity and wave number in opposite trend(positive in initial pressure and negative in thickness).展开更多
基金Supported by the National Science Foundation for Young Scholars of China(61001091)~~
文摘Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational.
基金The National Natural Science Foundation of China(No60671018,60121101)
文摘In order to assist the design of short interfering ribonucleic acids (siRNA), 573 non-redundant siRNAs were collected from published literatures and the relationship between siRNAs sequences and RNA interference (RNAi) effect is analyzed by a support vector machine (SVM) based algorithm relied on a basebase correlation (BBC) feature. The results show that the proposed algorithm has the highest area under curve (AUC) value (0. 73) of the receive operating characteristic (ROC) curve and the greatest r value (0. 43) of the Pearson's correlation coefficient. This indicates that the proposed algorithm is better than the published algorithms on the collected datasets and that more attention should be paid to the base-base correlation information in future siRNA design.
文摘This report describes an equivalent doping profile transformation method with which the avalanche breakdown voltage of the asymmetric linearly graded junction was analytically predicted.The maximum breakdown voltage and the different depletion layer extension on the diffused side and substrate side are demonstrated in the report.The report shows the equivalent doping profile method is valid to predict the breakdown voltage of the complex P N junction.The analytical results agree with the experimental breakdown voltage in comparison with the abrupt junction and symmetric linearly graded junction approximations.
基金The National Natural Science Foundation of China(No.60473028)the Natural Science Foundation of Zhengzhou University of Light Industry(No.2006XXJ18)the Doctor Foundation of Zhengzhou University of Light Industry(No.20080014)
文摘To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.
基金The National Natural Science Foundation of China(No.60835001,60875035,60905009,61004032,61004064,11071001)China Postdoctoral Science Foundation(No.201003546)+2 种基金the Ph.D.Programs Foundation of Ministry of Education of China(No.20093401110001)the Major Program of Higher Education of Anhui Province(No.KJ2010ZD02)the Natural Science Research Project of Higher Education of Anhui Province(No.KJ2011A020)
文摘The delay-dependent absolute stability for a class of Lurie systems with interval time-varying delay is studied. By employing an augmented Lyapunov functional and combining a free-weighting matrix approach and the reciprocal convex technique, an improved stability condition is derived in terms of linear matrix inequalities (LMIs). By retaining some useful terms that are usually ignored in the derivative of the Lyapunov function, the proposed sufficient condition depends not only on the lower and upper bounds of both the delay and its derivative, but it also depends on their differences, which has wider application fields than those of present results. Moreover, a new type of equality expression is developed to handle the sector bounds of the nonlinear function, which achieves fewer LMIs in the derived condition, compared with those based on the convex representation. Therefore, the proposed method is less conservative than the existing ones. Simulation examples are given to demonstrate the validity of the approach.
文摘New developments have been made on the applications of the differential quadrature(DQ)method to analysis of structural problems recently.The method is used to obtain solutions of large deflections, membrane and bending stresses of circular plates with movable and immovable edges under uniform pressures or a central point load.The shortcomings existing in the earlier analysis by the DQ method have been overcome by a new approach in applying the boundary conditions. The accuracy and the efficiency of the newly developed method for solving nonlinear problems are demonstrated.
基金The National Natural Science Foundation of China(No.61305058)the Natural Science Foundation of Higher Education Institutions of Jiangsu Province(No.12KJB520003)+1 种基金the Natural Science Foundation of Jiangsu Province(No.BK20130471)the Scientific Research Foundation for Advanced Talents by Jiangsu University(No.13JDG093)
文摘A novel hashing method based on multiple heterogeneous features is proposed to improve the accuracy of the image retrieval system. First, it leverages the imbalanced distribution of the similar and dissimilar samples in the feature space to boost the performance of each weak classifier in the asymmetric boosting framework. Then, the weak classifier based on a novel linear discriminate analysis (LDA) algorithm which is learned from the subspace of heterogeneous features is integrated into the framework. Finally, the proposed method deals with each bit of the code sequentially, which utilizes the samples misclassified in each round in order to learn compact and balanced code. The heterogeneous information from different modalities can be effectively complementary to each other, which leads to much higher performance. The experimental results based on the two public benchmarks demonstrate that this method is superior to many of the state- of-the-art methods. In conclusion, the performance of the retrieval system can be improved with the help of multiple heterogeneous features and the compact hash codes which can be learned by the imbalanced learning method.
文摘In classical nonlinear programming, it is a general method of developing optimality conditions that a nonlinear programming problem is linearized as a linear programming problem by using first order approximations of the functions at a given feasible point. The linearized procedure for differentiable nonlinear programming problems can be naturally generalized to the quasi differential case. As in classical case so called constraint qualifications have to be imposed on the constraint functions to guarantee that for a given local minimizer of the original problem the nullvector is an optimal solution of the corresponding 'quasilinearized' problem. In this paper, constraint qualifications for inequality constrained quasi differentiable programming problems of type min {f(x)|g(x)≤0} are considered, where f and g are qusidifferentiable functions in the sense of Demyanov. Various constraint qualifications for this problem are presented and a new one is proposed. The relations among these conditions are investigated. Moreover, a Wolf dual problem for this problem is introduced, and the corresponding dual theorems are given.
文摘[Objective] This study aimed to optimize the chromatographic conditions for detecting ellagic acid in pomegranate peels using HPLC method. [Method] By using 0.2 mg/ml ellagic acid standard solution, on the basis of single-factor experiment and orthogonal experiment, chromatographic conditions (mobile phase ratio, flow rate, col- umn temperature) for detecting ellagic acid using HPLC were optimized. Based on the optimal chromatographic conditions, the ellagic acid content in experimental pomegranate peels was determined. [Resull] The optimal chromatographic conditions for detecting ellagic acid in pomegranate peels using HPLC method are: 1.2% phos- phoric acid:acetonitrile=85:15, column temperature of 35 ℃, and flow rate of 1.0 ml/min. The linear regression equation of ellagic acid is: y=2.9e+0.6x+4.4e+5 (FF=9 999). Ac- cording to the standard addition recovery test, the average recovery rate of ellagic acid is 98.20%, and RSD is 0.60%. Under above optimized chromatographic condi- tions, ellagic acid can be well separated from other interfering components in pomegranate peels, with shorter peak time and ideal effect, which is convenient for the detection in production practices. [Conclusion] This study laid the foundation for detecting ellagic acid in pomegranate peels using HPLC method.
文摘In this paper, we give a Z 2 index theory of generalized critical point. By this theory we get a sufficient condition on the existing result of a class functional, as an example we give a new result that the equation-Δu+u=|u| p-1 u, x∈R N,(1)has infinite solutions.
基金Supported by the Science and Technology Program of the Education Department of Shaanxi Provincial Government(09JK378)the Key Scientific Research Fund of Shaanxi University of Technology(SLGKY12-02)~~
文摘With the rural concealed communication cable as the study object, the shielding effectiveness of different slot shapes was analyzed by using LBEM (linear boundary element method). The engineering example results showed that for twocore shielded cable, the coupling capacitance of trapezoid slots (asymmetric and symmetric) changed the most, followed by rectangular slots (asymmetric and symmetric), and the changes of wedge slots were the smallest, but the change tenden- cies were consistent. In addition, with the increase of slot width of different slots, the coupling capacitance of tow-cored shielded cable showed small change.
基金The project supported by National Natural Science Foundation of China under Grant No. 10371098 and the Program for New Century Excellent Talents in Universities under Grant No. NCET-04-0968.
文摘The present paper discusses a class of nonlinear diffusion-convection equations with source. The method that we use is the conditional symmetry method. It is shown that the equation admits certain conditional symmetries for coefficient functions of the equations. As a consequence, solutions to the resulting equations are obtained.
基金The project supported by the Natural Science Foundation of Shandong Province of China under Grant No. 2004 zx 16
文摘Painleve property and infinite symmetries of the (2+1)-dimensional higher-order Broer-Kaup (HBK) system are studied in this paper. Using the modified direct method, we derive the theorem of general symmetry gro.ups to (2+1)-dimensional HBK system. Based on our theorem, some new forms of solutions are obtained. We also find infinite number of conservation laws of the (2+1)-dimensional HBK system.
文摘By analyzing the observed phenomena and the data collected in the study, a multi-compartment linear circulation model for targeting drug delivery system was developed and the function formulas of the drug concentration-time in blood and target organ by computing were figured out. The drug concentration-time curve for target organ can be plotted with reference to the data of drug concentration in blood according to the model. The pharmacokinetic parameters of the drug in target organ could also be obtained. The practicability of the model was further checked by the curves of drug concentration-time in blood and target organ(liver) of liver-targeting nanoparticles in animal tests. Based on the liver drug concentration-time curves calculated by the function formula of the drug in target organ, the pharmacokinetic behavior of the drug in target organ(liver) was analyzed by statistical moment, and its pharmacokinetic parameters in liver were obtained. It is suggested that the (relative targeting index( can be used for quantitative evaluation of the targeting drug delivery systems.
基金supported by the National Natural Science Foundation of China under Grants No.61272499,No.10990011
文摘Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure.
基金The project supported in part by National Natural Science Foundation of China under Grant No.19901027the Natural Science Foundation of Shaanxi Province of China
文摘The generalized conditional symmetry and sign-invariant approaches are developed to study the nonlinear diffusion equations with x-dependent convection and source terms. We obtain conditions under which the equations admit the second-order generalized conditional symmetries and the first-order sign-invariants on the solutions. Several types of different generalized conditional symmetries and first-order sign-invariants for the equations with diffusion of power law are obtained. Exact solutions to the resulting equations are constructed.
文摘The widely used conventional linearized error models or perturbation models are not effective to represent the nonlinear characteristics of SINS error propagation with large attitude errors.Error equations in terms of quaternion error are derived,and extended Kalman filter techniques are used to solve the in-flight alignment problems.In the case of small attitude errors,the nonlinear models can be reduced to conventional phi-angle models.The simulation results show that the proposed error models may improve the performance of alignment.
基金Project(51378463)supported by National Natural Science Foundation of China
文摘Influence of identical applied initial pressures on the radial surfaces of a hollow cylinder which is compose of materials with first power hypo-elastic constitutive model was investigated.The basic equations of the problem were built up based on the framework of piecewise homogeneous body model with the use of three-dimensional linearized theory of elastic waves in initially stressed bodies(TLTEWISB).With the method proposed previously,this problem was then solved numerically.Moreover,the dispersion group velocity of the lowest order mode with different initial pressures was also studied.It can be concluded that the initial pressure and the geometry parameters will induce considerable changes of different degrees in dispersive relation between phase velocity and wave number in opposite trend(positive in initial pressure and negative in thickness).