期刊文献+
共找到26,780篇文章
< 1 2 250 >
每页显示 20 50 100
Influence of acceleration stage electrode voltage on the performance of double-stage Hall effect thruster with adjustable zero magnetic point
1
作者 陈龙 高维富 +5 位作者 崔作君 段萍 许雪松 阚子晨 檀聪琦 陈俊宇 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第6期60-69,共10页
The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak... The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak type double-stage Hall thruster configuration, and a particle-in-cell simulation is carried out to investigate the influences of both acceleration electrode voltage value and zero magnetic point position on the thruster discharge characteristics and performances.The results indicate that increasing the acceleration voltage leads to a larger potential drop in the acceleration stage, allowing ions to gain higher energy, while electrons are easily absorbed by the intermediate electrode, resulting in a decrease in the anode current and ionization rate. When the acceleration voltage reaches 500 V, the thrust and efficiency are maximized, resulting in a 15%increase in efficiency. After the acceleration voltage exceeds 500 V, a potential barrier forms within the channel, leading to a decrease in thruster efficiency. Further study shows that as the second zero magnetic point moves towards the outlet of the channel, more electrons easily traverse the zero magnetic field region, participating in the ionization. The increase in the ionization rate leads to a gradual enhancement in both thrust and efficiency. 展开更多
关键词 Hall thruster particle-in-cell simulation intermediate electrode zero magnetic point
下载PDF
Vector magnetometry in zero bias magnetic field using nitrogen-vacancy ensembles
2
作者 Chunxing Li Fa-Zhan Shi +1 位作者 Jingwei Zhou Peng-Fei Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期21-29,共9页
The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with ... The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with microscale spatialresolution.However,a bias magnetic field is necessary to fully separate the resonance lines of optically detected magneticresonance(ODMR)spectrum of NV ensembles.This brings disturbances in samples being detected and limits the rangeof application.Here,we demonstrate a method of vector magnetometry in zero bias magnetic field using NV ensembles.By utilizing the anisotropy property of fluorescence excited from NV centers,we analyzed the ODMR spectrum of NVensembles under various polarized angles of excitation laser in zero bias magnetic field with a quantitative numerical modeland reconstructed the magnetic field vector.The minimum magnetic field modulus that can be resolved accurately is downto~0.64 G theoretically depending on the ODMR spectral line width(1.8 MHz),and~2 G experimentally due to noisesin fluorescence signals and errors in calibration.By using 13C purified and low nitrogen concentration diamond combinedwith improving calibration of unknown parameters,the ODMR spectral line width can be further decreased below 0.5 MHz,corresponding to~0.18 G minimum resolvable magnetic field modulus. 展开更多
关键词 vector magnetometry NV ensembles optically detected magnetic resonance(ODMR) zero bias magnetic field
下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
3
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
下载PDF
NORMALITY AND THE NUMBER OF ZEROS
4
作者 WANG Guang-sheng WEI Dong-mei XU Yan 《数学杂志》 2024年第5期377-382,共6页
In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential pol... In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential polynomial,which extends the related result of Li,and Chen et al..An example is given to show that the hypothesis on the zeros of a(z)is necessary. 展开更多
关键词 Meromorphic function normal family differential polynomial zero
下载PDF
A Cross-Sectional Study on the Impact of Operation Triple Zero (OTZ) Program on Viral Load Suppression amongst Members of the Adolescent Club in 68 Nigerian Army Reference Hospital Yaba Lagos, Nigeria
5
作者 Nkechinyere Harrison Ismail Lawal +7 位作者 Yakubu Adamu Kehinde Aribisala Adegbenga Olarinoye Uzoamaka Agbaim Funmilayo Owolabi Dooshima Okonkwo Laura Chittenden Nathan Okeji 《World Journal of AIDS》 2024年第2期35-44,共10页
Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national ... Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national challenges with poor viral suppression. The OTZ program aligns with the UNAIDS 95-95-95 goals. It seeks to empower AYPLHIV to be in charge of their treatment and commit to triple zero outcomeszero missed appointments, zero missed drugs, and zero viral loads. The purpose of the study was to assess the impact of the OTZ program on viral load suppression among members of the adolescent club in 68 NARHY, Lagos. Method: A cross-sectional retrospective study to evaluate the impact of the OTZ program on the viral load of 53 AYP enrolled in the OTZ program between March 2019 to December 2019 was analyzed. The Percentage of viral load suppression before enrollment compared with 6 and 12 months after enrollment into the OTZ program. The AYP is grouped into 10 - 14, 15 - 19, and 20 - 24 years. Activities conducted were peer driven monthly meetings with the AYP during which the adolescents interacted on issues relating to improving their treatment outcomes, healthcare workers reviewed their clinical status, viral load result, provider peer counseling, and caregivers engagement to support adherence to medication and ARV refills. Results: Before OTZ, 81% aged 10 - 14 years, 75% aged 15 - 19 years, and 25% aged 20 - 24 years were virally suppressed (VL less than 1000 copies/ml). Six months after enrollment, 94% were virally suppressed95% aged 10 - 14 years, 96% aged 15 - 19 years, and 66% aged 20-24 years. Twelve months after enrollment, 96% of AYP were virally suppressed100% aged 10-14 years, 93% aged 15 - 19 years, and 100% aged 20 - 24 years. Males viral load (VL) suppression improved from 79% to 96% and 92%, while females VL suppression improved from 69% to 93% and 100% at 6 and 12 months respectively. Conclusion: The OTZ activities contributed to improved viral load suppression in the AYP of the facility. 展开更多
关键词 Impact Operation Triple zero ADOLESCENT Viral Load NIGERIA
下载PDF
Algorithm for Visualization of Zero Divisor Graphs of the Ring ℤn Using MAPLE Coding
6
作者 Nasir Ali 《Open Journal of Discrete Mathematics》 2024年第1期1-8,共8页
This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study ... This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study of ring theory, depict relationships between elements of a ring that multiply to zero. The paper explores the development and implementation of algorithms in MAPLE for constructing these ZDGs. The comparative study aims to discern the strengths, limitations, and computational efficiency of different MAPLE algorithms for creating zero divisor graphs offering insights for mathematicians, researchers, and computational enthusiasts involved in ring theory and mathematical computations. 展开更多
关键词 zero Divisor Graph Ring Theory Maple Algorithm n Modulo n Graph Theory Mathematical Computing
下载PDF
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
7
作者 Fazal Raheman 《Journal of Computer and Communications》 2024年第3期252-282,共31页
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ... Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats. 展开更多
关键词 CYBERSECURITY Quantum Computers Post Quantum Cryptography Q-Day zero Trust
下载PDF
基于MIKE ZERO 2020的郁江贵港河段一维水质模型
8
作者 王思雅 吕俊 《广西水利水电》 2024年第5期130-137,共8页
基于MIKE ZERO 2020软件中的HD水动力学模块和AD对流扩散模块,建立郁江贵港市河段的水文、水质信息耦合模型,对郁江贵港河段的水位、流量以及污染物在水体中迁移扩散衰减情况进行了模拟分析。根据郁江近年来的水文资料对模型进行率定并... 基于MIKE ZERO 2020软件中的HD水动力学模块和AD对流扩散模块,建立郁江贵港市河段的水文、水质信息耦合模型,对郁江贵港河段的水位、流量以及污染物在水体中迁移扩散衰减情况进行了模拟分析。根据郁江近年来的水文资料对模型进行率定并验证。将该模型应用于2023年6月21日~7月6日的洪水过程,结果表明,所建立的模型在率定和验证及应用期间模拟效果均表现良好,模拟精度高。充分证明该模型适用于模拟郁江贵港河段的水文、水质信息变化特征,为提高贵港市防洪、水情预报及水污染预测提供了重要的技术支撑。 展开更多
关键词 MIKE zero 2020 HD水动力模型 AD对流扩散模型 耦合模拟分析 郁江贵港河段
下载PDF
基于强化学习与Zero-DCE的图像增强方法
9
作者 王鹏飞 单新文 +1 位作者 奚梦婷 魏晓龙 《电工技术》 2024年第1期47-51,共5页
在深度学习技术不断演进的背景下,图像增强技术在图像处理领域备受瞩目。尽管传统的处理方法在改善图像质量方面有所成就,但对于高动态范围、高噪声、低对比度等复杂场景的图像处理需求,其效果通常难以令人满意。采用了创新性的图像增... 在深度学习技术不断演进的背景下,图像增强技术在图像处理领域备受瞩目。尽管传统的处理方法在改善图像质量方面有所成就,但对于高动态范围、高噪声、低对比度等复杂场景的图像处理需求,其效果通常难以令人满意。采用了创新性的图像增强方法,将图像分解为照明和反射两部分,以实现更为出色的增强效果。综合运用Retinex、Zero-DCE和强化学习技术,提升了图像质量和可视性,在处理复杂场景中展现了显著的效果。通过强化学习和组合损失函数,使得图像增强效果更显著。基于Retinex理论的实现方式进一步加强了整体算法的性能。此外,结合Zero-DCE的方法,通过深度曲线估计照明和反射两部分,有效区分了不同场景的图像增强需求。 展开更多
关键词 强化学习 微光增强 zero-DCE RETINEX
下载PDF
虚拟桌面与零客户端在实验室管理中的研究应用——VMware Horizon View与Dell Wyse Zero Client的融合研究
10
作者 吴磊 《佳木斯大学学报(自然科学版)》 CAS 2024年第1期125-128,共4页
我校计算机实验室至今仍在使用2006年开发的机房计费管理系统,此系统的刷卡终端安装于实验室外,常年运行在恶劣的户外环境中,因此故障频发,无法长时间正常运行。面对上述问题,我校教学环境部利用当前已趋于成熟的虚拟桌面技术,让机房计... 我校计算机实验室至今仍在使用2006年开发的机房计费管理系统,此系统的刷卡终端安装于实验室外,常年运行在恶劣的户外环境中,因此故障频发,无法长时间正常运行。面对上述问题,我校教学环境部利用当前已趋于成熟的虚拟桌面技术,让机房计费管理系统的刷卡终端能够稳定地运行在恶劣的户外环境中,并且能够便利地对其进行管理和维护。 展开更多
关键词 计算机实验室 刷卡终端 虚拟桌面 零客户端
下载PDF
Zero-p融合器置入与钛板内固定治疗单节段脊髓型颈椎病临床疗效比较 被引量:1
11
作者 耿寅 刘晨 +3 位作者 肖良 张玙 江雨剑 吴仲宣 《沈阳医学院学报》 2023年第1期5-9,共5页
目的:比较Zero-p融合器置入与钛板内固定治疗单节段脊髓型颈椎病的临床疗效,为临床的实际应用提供实践参考。方法:回顾性分析2015年5月至2020年8月于我院接受手术治疗的单节段脊髓型颈椎病78例患者的临床资料。按照手术方式不同分为对照... 目的:比较Zero-p融合器置入与钛板内固定治疗单节段脊髓型颈椎病的临床疗效,为临床的实际应用提供实践参考。方法:回顾性分析2015年5月至2020年8月于我院接受手术治疗的单节段脊髓型颈椎病78例患者的临床资料。按照手术方式不同分为对照组(采用钛板内固定)和研究组(采用Zero-p融合器置入),对照组32例,研究组46例。采用VAS评分、JOA评分及NDI评分评估和比较2组患者术前和末次随访时的神经功能差异性。测量和比较2组患者手术前后C2-C7 Cobb角及手术节段椎间隙高度(IDH)差异性。结果:研究组手术时间、术中出血量低于对照组(P<0.05)。对照组患者手术前后颈椎Cobb角、IDH差异有统计学意义(P<0.05);研究组患者手术前后IDH差异有统计学意义(P<0.05),颈椎Cobb角差异无统计学意义(P>0.05)。2组的VAS、JOA、NDI评分在末次随访时较术前均有明显改善(P<0.05),2组NDI术后比较差异有统计学意义(P<0.05)。研究组吞咽困难、邻近节段退变的发生率低于对照组。结论:对于单节段脊髓型颈椎病,Zero-p融合器置入与钛板内固定具有相似的临床疗效,但Zero-p融合器置入手术创伤更小,并发症发生率更低,颈椎功能恢复更好。 展开更多
关键词 钛板 zero-p 脊髓型颈椎病 手术疗效
下载PDF
Zero-P颈椎前路融合系统治疗双节段颈椎病的临床研究 被引量:1
12
作者 张硕 刘正 +3 位作者 吴四军 贾俊秀 唐冲 汪文龙 《颈腰痛杂志》 2023年第2期193-196,共4页
目的探讨Zero-P颈椎前路融合系统治疗双节段颈椎病的临床疗效。方法选取2013年1月~2017年12月于本院因颈椎退行性疾病行双节段前路颈椎间盘切除椎间融合术的患者,应用传统椎间融合器+钉板固定系统者为A组,应用Zero-P融合器者为B组。对... 目的探讨Zero-P颈椎前路融合系统治疗双节段颈椎病的临床疗效。方法选取2013年1月~2017年12月于本院因颈椎退行性疾病行双节段前路颈椎间盘切除椎间融合术的患者,应用传统椎间融合器+钉板固定系统者为A组,应用Zero-P融合器者为B组。对两组患者的围手术期指标和术后疗效、并发症情况进行评价。结果A组患者手术时间显著长于B组(P<0.05),术后吞咽困难发生率显著高于B组(P<0.05)。与术前相比,两组患者术后3个月、12个月和末次随访时(>24个月)的JOA评分、NDI指数和VAS评分均显著改善(P<0.05),但组间差异无统计学意义(P>0.05)。两组术后各时间点的颈椎整体前凸角、颈椎间隙高度均较术前显著矫正(P<0.05);与术后3个月相比,上述指标在末次随访时的矫正程度有所丢失,但差异无统计学意义(P>0.05)。结论Zero-P手术治疗双节段颈椎病,可取得与传统钉板系统固定同样的手术效果,且手术时间短、吞咽困难发生率低。 展开更多
关键词 颈椎病 零切迹融合器 颈椎前路手术 椎间融合 吞咽困难
下载PDF
一类Z_(2)对称三次jerk系统的zero-Hopf分支
13
作者 胡小燕 桑波 《中山大学学报(自然科学版)(中英文)》 CAS CSCD 北大核心 2023年第3期169-174,共6页
基于线性空间理论,构造了一类Z_(2)对称三次jerk系统,使得当ε=0时系统以原点为zero-Hopf奇点,即具有一个零特征根和一对纯虚特征根的孤立奇点。在此基础上,讨论了扰动系统的小振幅极限环的个数。利用四阶平均理论,证明扰动系统从奇点... 基于线性空间理论,构造了一类Z_(2)对称三次jerk系统,使得当ε=0时系统以原点为zero-Hopf奇点,即具有一个零特征根和一对纯虚特征根的孤立奇点。在此基础上,讨论了扰动系统的小振幅极限环的个数。利用四阶平均理论,证明扰动系统从奇点至多可分支出5个小振幅极限环且此上界是可达的,从而改进了已有的一个结果。 展开更多
关键词 zero-Hopf奇点 平均理论 极限环
下载PDF
ZERO DISSIPATION LIMIT TO A RAREFACTION WAVE WITH A VACUUM FOR A COMPRESSIBLE,HEAT CONDUCTING REACTING MIXTURE
14
作者 苌生闯 段然 《Acta Mathematica Scientia》 SCIE CSCD 2023年第6期2533-2552,共20页
In this paper,we study the zero dissipation limit with a vacuum for the reacting mixture Navier-Stokes equations.For proper smooth initial data that the initial density tends to zero as the relevant physical coefficie... In this paper,we study the zero dissipation limit with a vacuum for the reacting mixture Navier-Stokes equations.For proper smooth initial data that the initial density tends to zero as the relevant physical coefficients tend to zero,we demonstrate that the solution tends to a rarefaction wave connected to a vacuum on the left side coupled with a zero mass fraction of reactant.What is more,the uniform convergence rate is obtained. 展开更多
关键词 zero dissipation limit VACUUM reacting mixture Navier-Stokes equations
下载PDF
NONLINEAR STABILITY OF RAREFACTION WAVES TO THE COMPRESSIBLE NAVIER-STOKES EQUATIONS FOR A REACTING MIXTURE WITH ZERO HEAT CONDUCTIVITY
15
作者 彭利双 黎勇 《Acta Mathematica Scientia》 SCIE CSCD 2023年第5期2179-2203,共25页
In this paper,we study the time-asymptotically nonlinear stability of rarefaction waves for the Cauchy problem of the compressible Navier-Stokes equations for a reacting mixture with zero heat conductivity in one dime... In this paper,we study the time-asymptotically nonlinear stability of rarefaction waves for the Cauchy problem of the compressible Navier-Stokes equations for a reacting mixture with zero heat conductivity in one dimension.If the corresponding Riemann problem for the compressible Euler system admits the solutions consisting of rarefaction waves only,it is shown that its Cauchy problem has a unique global solution which tends time-asymptotically towards the rarefaction waves,while the initial perturbation and the strength of rarefaction waves are suitably small. 展开更多
关键词 rarefaction waves reacting mixture nonlinear stability zero heat conductivity
下载PDF
THE ZERO LIMIT OF THERMAL DIFFUSIVITY FOR THE 2D DENSITY-DEPENDENT BOUSSINESQ EQUATIONS
16
作者 叶霞 徐艳霞 王泽佳 《Acta Mathematica Scientia》 SCIE CSCD 2023年第4期1800-1818,共19页
This paper is concerned with the asymptotic behavior of solutions to the initial boundary problem of the two-dimensional density-dependent Boussinesq equations.It is shown that the solutions of the Boussinesq equation... This paper is concerned with the asymptotic behavior of solutions to the initial boundary problem of the two-dimensional density-dependent Boussinesq equations.It is shown that the solutions of the Boussinesq equations converge to those of zero thermal diffusivity Boussinesq equations as the thermal diffusivity tends to zero,and the convergence rate is established.In addition,we prove that the boundary-layer thickness is of the valueδ(k)=k^(α)with anyα∈(0,1/4)for a small diffusivity coefficient k>0,and we also find a function to describe the properties of the boundary layer. 展开更多
关键词 density-dependent Boussinesq equation zero thermal diffusivity convergence rate boundary layer
下载PDF
Zero distribution of some difference polynomials
17
作者 LI Qian LIU Dan HUANG Zhi-bo 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2023年第3期392-402,共11页
In this paper,suppose that a,c∈C{0},c_(j)∈C(j=1,2,···,n) are not all zeros and n≥2,and f (z) is a finite order transcendental entire function with Borel finite exceptional value or with infinitely ma... In this paper,suppose that a,c∈C{0},c_(j)∈C(j=1,2,···,n) are not all zeros and n≥2,and f (z) is a finite order transcendental entire function with Borel finite exceptional value or with infinitely many multiple zeros,the zero distribution of difference polynomials of f (z+c)-af^(n)(z) and f (z)f (z+c_1)···f (z+c_n) are investigated.A number of examples are also presented to show that our results are best possible in a certain sense. 展开更多
关键词 difference polynomial zero distribution Borel exceptional value
下载PDF
Majorana zero modes induced by skyrmion lattice
18
作者 靖东洋 王寰宇 +1 位作者 郭文祥 刘伍明 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期478-482,共5页
One-dimensional s-wave superconductor with spin-orbit coupling is a platform for the realization of Majorana zero modes. The spin-exchange with the magnetic skyrmion lattice can induce spin-orbit coupling in a s-wave ... One-dimensional s-wave superconductor with spin-orbit coupling is a platform for the realization of Majorana zero modes. The spin-exchange with the magnetic skyrmion lattice can induce spin-orbit coupling in a s-wave superconductor system and the effects are different from the constant spin–orbit coupling. The strength of the effective spin–orbit coupling as well as the rich topoloigcal phase diagram are directly connected to the radius of the skyrmion lattice R. We obtain the rich topological phase diagram of this system with different skyrmion lattice radii by numerically evaluating the spectrum of the system under the periodic boundary condition, and we also find the Majorana zero modes under the open boundary condition to verify the bulk–edge correspondence. 展开更多
关键词 topological superconductor Majorana zero mode spin–orbit coupling
下载PDF
Inequalities for Sums and Products of Complex Zeros of Solutions to ODE with Polynomial Right Parts
19
作者 Michael Gil’ 《Communications on Applied Mathematics and Computation》 EI 2023年第4期1524-1533,共10页
The paper is devoted to non-homogeneous second-order differential equations with polynomial right parts and polynomial coefficients.We derive estimates for the partial sums and products of the zeros of solutions to th... The paper is devoted to non-homogeneous second-order differential equations with polynomial right parts and polynomial coefficients.We derive estimates for the partial sums and products of the zeros of solutions to the considered equations.These estimates give us bounds for the function counting the zeros of solutions and information about the zero-free domains. 展开更多
关键词 Ordinary differential equations Linear equations zeros of solutions
下载PDF
Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi
20
作者 Doaa Sami Khafaga Sarah M.Alhammad +3 位作者 Amal Magdi Osama ElKomy Nabil ALashin Khalid M.Hosny 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1967-1986,共20页
Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentica... Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentication increases.Many techniques,such as watermarking and encryption,are used for securing images transmitted via the Internet.The majority of watermarking systems are PC-based,but they are not very portable.Hardwarebased watermarking methods need to be developed to accommodate real-time applications and provide portability.This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel orthogonal Legendre Fourier moments of fractional orders(MFrLFMs)and the advanced encryption standard(AES)algorithm on a low-cost Raspberry Pi.In order to increase embedding robustness,the watermark picture is scrambled using the Arnold method.Zero watermarking is implemented on the Raspberry Pi to produce a real-time ownership verification key.Before sending the ownership verification key and the original image to the monitoring station,we can encrypt the transmitted data with AES for additional security and hide any viewable information.The receiver next verifies the received image’s integrity to confirm its authenticity and that it has not been tampered with.We assessed the suggested algorithm’s resistance to many attacks.The suggested algorithm provides a reasonable degree of robustness while still being perceptible.The proposed method provides improved bit error rate(BER)and normalized correlation(NC)values compared to previous zero watermarking approaches.AES performance analysis is performed to demonstrate its effectiveness.Using a 256×256 image size,it takes only 2 s to apply the zero-watermark algorithm on the Raspberry Pi. 展开更多
关键词 zero watermarking Raspberry Pi advanced encryption standard
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部