期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Relative Spectral Lag: a New Redshift Indicator of Gamma-ray Bursts 被引量:5
1
作者 Zhi-Bin Zhang Jia-Gan Deng +1 位作者 Rui-Jing Lu Hai-Feng Gao 《Chinese Journal of Astronomy and Astrophysics》 CSCD 2006年第3期312-322,共11页
Using 64 ms count data of long gamma-ray bursts (T90 〉 2.6 s), we analyze the quantity named relative spectral lag (RSL), T31/FWHM(1). We investigated in detail all the correlations between the RSL and other pa... Using 64 ms count data of long gamma-ray bursts (T90 〉 2.6 s), we analyze the quantity named relative spectral lag (RSL), T31/FWHM(1). We investigated in detail all the correlations between the RSL and other parameters for a sample of nine long bursts, using the general cross-correlation technique that includes the lag between two different energy bands. We conclude that the distribution of RSLs is normal and has a mean value of 0.1; that the RSLs are weakly correlated with the FWHM, the asymmetry, peak flux (Fp), peak energy (Ep) and spectral indexes (α and β), while they are uncorrelated with τ31, the hardness- ratio (HR31) and the peak time (tm). Our important discovery is that redshift (z) and peak luminosity (Lp) are strongly correlated with the RSL, which can be measured easily and directly, making the RSL a good redshift and peak luminosity indicator. 展开更多
关键词 gamma-rays: bursts - methods: data analysis
下载PDF
Analysis and Improvement of Authenticatable Ring Signcryption Scheme 被引量:9
2
作者 李发根 Shirase Masaaki Takagi Tsuyoshi 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期679-683,共5页
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the... We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability. 展开更多
关键词 密码识别 双线配对 环形符号 信息技术
原文传递
KaKs_Calculator:Calculating Ka and Ks Through Model Selection and Model Averaging 被引量:89
3
作者 Zhang Zhang Jun Li +3 位作者 Xiao-Qian Zhao Jun Wang Gane Ka-Shu Wong Jun Yu 《Genomics, Proteomics & Bioinformatics》 SCIE CAS CSCD 2006年第4期259-263,共5页
KaKs_Calculator is a software package that calculates nonsynonymous (Ka) and synonymous (Ks) substitution rates through model selection and model averaging. Since existing methods for this estimation adopt their s... KaKs_Calculator is a software package that calculates nonsynonymous (Ka) and synonymous (Ks) substitution rates through model selection and model averaging. Since existing methods for this estimation adopt their specific mutation (substitution) models that consider different evolutionary features, leading to diverse estimates, KaKs_Calculator implements a set of candidate models in a maximum likelihood framework and adopts the Akaike information criterion to measure fitness between models and data, aiming to include as many features as needed for accurately capturing evolutionary information in protein-coding sequences. In addition, several existing methods for calculating Ka and Ks are also incorporated into this software. KaKs_Calculator, including source codes, compiled executables, and documentation, is freely available for academic use at http://evolution.genomics.org.cn/software.htm. 展开更多
关键词 model selection model averaging AIC approximate method maximum likelihoodmethod
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部