提出了基于抽象解释框架自动合成数组程序不变式的方法,它能够分析按照特定顺序访问一维或者多维数组的程序,然后合成不变式.该方法将性质(包括区间全称量词性质和原子性质)集合作为抽象域,通过前向迭代数据流分析合成数组性质.证明了...提出了基于抽象解释框架自动合成数组程序不变式的方法,它能够分析按照特定顺序访问一维或者多维数组的程序,然后合成不变式.该方法将性质(包括区间全称量词性质和原子性质)集合作为抽象域,通过前向迭代数据流分析合成数组性质.证明了该方法的正确性和收敛性,并通过一些实例展示了该方法的灵活性.开发了一种原型工具,该工具在各种数组程序(包括competition on software verification中的array-examples benchmark)上的实验展示了方法的可行性和有效性.展开更多
Copy-paste forgery is a very common type of forgery in JPEG images.The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation.This phenomenon in JPEG image forgeries is cal...Copy-paste forgery is a very common type of forgery in JPEG images.The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation.This phenomenon in JPEG image forgeries is called the shifted double JPEG(SDJPEG) compression.Detection of SDJPEG compressed image patches can make crucial contribution to detect and locate the tampered region.However,the existing SDJPEG compression tampering detection methods cannot achieve satisfactory results especially when the tampered region is small.In this paper,an effective SDJPEG compression tampering detection method utilizing both intra-block and inter-block correlations is proposed.Statistical artifacts are left by the SDJPEG compression among the magnitudes of JPEG quantized discrete cosine transform(DCT) coefficients.Firstly,difference 2D arrays,which describe the differences between the magnitudes of neighboring JPEG quantized DCT coefficients on the intrablock and inter-block,are used to enhance the SDJPEG compression artifacts.Then,the thresholding technique is used to deal with these difference 2D arrays for reducing computational cost.After that,co-occurrence matrix is used to model these difference 2D arrays so as to take advantage of second-order statistics.All elements of these co-occurrence matrices are served as features for SDJPEG compression tampering detection.Finally,support vector machine(SVM) classifier is employed to distinguish the SDJPEG compressed image patches from the single JPEG compressed image patches using the developed feature set.Experimental results demonstrate the efficiency of the proposed method.展开更多
Let N be the Lie algebra of all n x n dominant block upper triangular matrices over a field F. In this paper, we explicitly describe all Lie triple derivations of N when char(F) ≠ 2. As an application, we character...Let N be the Lie algebra of all n x n dominant block upper triangular matrices over a field F. In this paper, we explicitly describe all Lie triple derivations of N when char(F) ≠ 2. As an application, we characterize Lie derivations of N when char(F) ≠ 2.展开更多
In this paper, a susceptible-exposed infective-recovered-susceptible (SEIRS) epidemic model with vaccination has been formulated. We studied the global stability of the corresponding single-group model, multi-group ...In this paper, a susceptible-exposed infective-recovered-susceptible (SEIRS) epidemic model with vaccination has been formulated. We studied the global stability of the corresponding single-group model, multi-group model with strongly connected network and multi-group model without strongly connected network by means of analyzing their basic reproduction numbers and the application of Lyapunov functionals. Finally, we provide some numerical simulations to illustrate our analysis results.展开更多
文摘提出了基于抽象解释框架自动合成数组程序不变式的方法,它能够分析按照特定顺序访问一维或者多维数组的程序,然后合成不变式.该方法将性质(包括区间全称量词性质和原子性质)集合作为抽象域,通过前向迭代数据流分析合成数组性质.证明了该方法的正确性和收敛性,并通过一些实例展示了该方法的灵活性.开发了一种原型工具,该工具在各种数组程序(包括competition on software verification中的array-examples benchmark)上的实验展示了方法的可行性和有效性.
基金the National Natural Science Foundation of China(Nos.61071152 and 61271316)the National Basic Research Program (973) of China (Nos.2010CB731403 and 2010CB731406)the National "Twelfth Five-Year" Plan for Science and Technology Support(No.2012BAH38 B04)
文摘Copy-paste forgery is a very common type of forgery in JPEG images.The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation.This phenomenon in JPEG image forgeries is called the shifted double JPEG(SDJPEG) compression.Detection of SDJPEG compressed image patches can make crucial contribution to detect and locate the tampered region.However,the existing SDJPEG compression tampering detection methods cannot achieve satisfactory results especially when the tampered region is small.In this paper,an effective SDJPEG compression tampering detection method utilizing both intra-block and inter-block correlations is proposed.Statistical artifacts are left by the SDJPEG compression among the magnitudes of JPEG quantized discrete cosine transform(DCT) coefficients.Firstly,difference 2D arrays,which describe the differences between the magnitudes of neighboring JPEG quantized DCT coefficients on the intrablock and inter-block,are used to enhance the SDJPEG compression artifacts.Then,the thresholding technique is used to deal with these difference 2D arrays for reducing computational cost.After that,co-occurrence matrix is used to model these difference 2D arrays so as to take advantage of second-order statistics.All elements of these co-occurrence matrices are served as features for SDJPEG compression tampering detection.Finally,support vector machine(SVM) classifier is employed to distinguish the SDJPEG compressed image patches from the single JPEG compressed image patches using the developed feature set.Experimental results demonstrate the efficiency of the proposed method.
文摘Let N be the Lie algebra of all n x n dominant block upper triangular matrices over a field F. In this paper, we explicitly describe all Lie triple derivations of N when char(F) ≠ 2. As an application, we characterize Lie derivations of N when char(F) ≠ 2.
基金This research is supported by National Natural Science Foundation of China (No. 11371111), Weihai Science and Technology Development Plan Project (No. 2013DXGJ06) and Shandong Provincial Natural Science Foundation of China (No. ZR2015AM018).
文摘In this paper, a susceptible-exposed infective-recovered-susceptible (SEIRS) epidemic model with vaccination has been formulated. We studied the global stability of the corresponding single-group model, multi-group model with strongly connected network and multi-group model without strongly connected network by means of analyzing their basic reproduction numbers and the application of Lyapunov functionals. Finally, we provide some numerical simulations to illustrate our analysis results.