At present, new integrated navigation, which usesthe location function of reference gravity anomaly map to control the errors of the inertial navigation system (INS), has been developed in marine navigation. It is nam...At present, new integrated navigation, which usesthe location function of reference gravity anomaly map to control the errors of the inertial navigation system (INS), has been developed in marine navigation. It is named the gravity-aided INS. Both the INS and real-time computation of gravity anomalies need a 3-D marine normal gravity model. Conventionally, a reduction method applied in geophysical survey is directiy introduced to observed data processing. This reduction does not separate anomaly from normal gravity in the observed data, so errors cannot be avoided. The 3-D marine normal gravity model was derived from the J2 gravity model, and is suitable for the region whose depth is less than 1000 m.展开更多
A series of extraction equilibrium experiments for aminobenzoic acid with di(2-ethylhexyl)phosphoric acid (D2EHPA) dissolved in n-octane or 1-octanol was carried out. The effects of aminobenzoic acid concentration,D2E...A series of extraction equilibrium experiments for aminobenzoic acid with di(2-ethylhexyl)phosphoric acid (D2EHPA) dissolved in n-octane or 1-octanol was carried out. The effects of aminobenzoic acid concentration,D2EHPA concentration and pH on the distribution ratio were discussed in detail. The infrared spectra of the organic phase loaded with solute illustrated that pH had little effect on the structure of the complex formed. There proceed ion association and cation-exchange.reaction in the extraction. An expression of the equilibrium distribution was proposed.展开更多
Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography.The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cr...Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography.The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cryp-tographie properties of high security, fast encryption (decryption) speed, and robustness against noise disturbances in communication channel. The overall features of this spatiotemporal-chaos-based cryptosystem are better than chaotic cryptosystems known so far, and also than currently used conventional cryptosystems, such as the Advanced Encryption Standard (AES).展开更多
All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in ea...All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in each group as a key. In the watermarking extraction procedure, users in different group can obtain different watermark by combining their shadows with the extracted one from the watermarked signal. Analysis and experimental results show that the new watermarking method is novel, secure and robust.展开更多
For α ∈ (0, ∞), let Hα∞ (or Hα,0∞) denote the collection of all functions f which are analytic on the unit disc D and satisfy |f(z)|(1-|z|2)α = O(1) (or |f(z)|(1 - |z|2)α = o(1) as |z| → 1). Hα∞(or Hα,0∞...For α ∈ (0, ∞), let Hα∞ (or Hα,0∞) denote the collection of all functions f which are analytic on the unit disc D and satisfy |f(z)|(1-|z|2)α = O(1) (or |f(z)|(1 - |z|2)α = o(1) as |z| → 1). Hα∞(or Hα,0∞) is called a Bers-type space (or a little Bers-type space).In this paper, we give some basic properties of Hα∞. C, the composition operator associated with a symbol function which is an analytic self map of D, is difined by Cf = f o . We characterize the boundedness and compactness of C which sends one Bers-type space to another function space.展开更多
基金the National Natural Science Foundation of China under Grant No.61170269,No.61170272,No.61202082,No.61003285,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308,No.BUPT2013RC0311
文摘At present, new integrated navigation, which usesthe location function of reference gravity anomaly map to control the errors of the inertial navigation system (INS), has been developed in marine navigation. It is named the gravity-aided INS. Both the INS and real-time computation of gravity anomalies need a 3-D marine normal gravity model. Conventionally, a reduction method applied in geophysical survey is directiy introduced to observed data processing. This reduction does not separate anomaly from normal gravity in the observed data, so errors cannot be avoided. The 3-D marine normal gravity model was derived from the J2 gravity model, and is suitable for the region whose depth is less than 1000 m.
文摘A series of extraction equilibrium experiments for aminobenzoic acid with di(2-ethylhexyl)phosphoric acid (D2EHPA) dissolved in n-octane or 1-octanol was carried out. The effects of aminobenzoic acid concentration,D2EHPA concentration and pH on the distribution ratio were discussed in detail. The infrared spectra of the organic phase loaded with solute illustrated that pH had little effect on the structure of the complex formed. There proceed ion association and cation-exchange.reaction in the extraction. An expression of the equilibrium distribution was proposed.
基金This work was supported in part by National Natural Science Foundation of China under Grants No.61101108,National S&T Major Program under Grants No.2011ZX03002-005-01
文摘Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography.The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cryp-tographie properties of high security, fast encryption (decryption) speed, and robustness against noise disturbances in communication channel. The overall features of this spatiotemporal-chaos-based cryptosystem are better than chaotic cryptosystems known so far, and also than currently used conventional cryptosystems, such as the Advanced Encryption Standard (AES).
基金Supported by the National Natural Science Foundation of China (No.90204017, 60373059)National 973 Project (G1999035805) ISN Open Foundation
文摘All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in each group as a key. In the watermarking extraction procedure, users in different group can obtain different watermark by combining their shadows with the extracted one from the watermarked signal. Analysis and experimental results show that the new watermarking method is novel, secure and robust.
文摘For α ∈ (0, ∞), let Hα∞ (or Hα,0∞) denote the collection of all functions f which are analytic on the unit disc D and satisfy |f(z)|(1-|z|2)α = O(1) (or |f(z)|(1 - |z|2)α = o(1) as |z| → 1). Hα∞(or Hα,0∞) is called a Bers-type space (or a little Bers-type space).In this paper, we give some basic properties of Hα∞. C, the composition operator associated with a symbol function which is an analytic self map of D, is difined by Cf = f o . We characterize the boundedness and compactness of C which sends one Bers-type space to another function space.
基金This work was supported in part by China National Natural Science Foundation under Grant 61271185,and the Fundamental Research Funds for the Central Universities
基金the National Natural Science Foundation of China under contract NO 61271235 and No.60973146,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308