期刊文献+
共找到108篇文章
< 1 2 6 >
每页显示 20 50 100
A General Algorithm for Biorthogonal Functions and Performance Analysis of Biorthogonal Scramble Modulation System
1
作者 Yueyun Chen Zhenhui Tan 《Wireless Sensor Network》 2010年第3期199-205,共7页
Applying the theorems of Mobius inverse and Dirichlet inverse, a general algorithm to obtain biorthogonal functions based on generalized Fourier series analysis is introduced. In the algorithm, the orthogonal function... Applying the theorems of Mobius inverse and Dirichlet inverse, a general algorithm to obtain biorthogonal functions based on generalized Fourier series analysis is introduced. In the algorithm, the orthogonal function can be not only Fourier or Legendre series, but also can be any one of all orthogonal function systems. These kinds of biorthogonal function sets are used as scramble signals to construct biorthogonal scramble modulation (BOSM) wireless transmission systems. In a BOSM system, the transmitted signal has significant security performance. Several different BOSM and orthogonal systems are compared on aspects of BER performance and spectrum efficiency, simulation results show that the BOSM systems based on Chebyshev polynomial and Legendre polynomial are better than BOSM system based on Fourier series, also better than orthogonal MCM and OFDM systems. 展开更多
关键词 BIORTHOGONAL FUNCTIONS BIORTHOGONAL scramble Modulation Generalized FOURIER Series MOBIUS INVERSE Wireless Transmission
在线阅读 下载PDF
Distinction of self-synchronous scrambled linear blockcodes based on multi-fractal spectrum 被引量:2
2
作者 xinhao li min zhang +1 位作者 shu'nan han quan yuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第5期968-978,共11页
This study proposes a novel multi-fractal spectrumbasedapproach to distinguish linear block codes from its selfsynchronousscrambled codes. Given that the linear block codeand self-synchronous scrambled linear block co... This study proposes a novel multi-fractal spectrumbasedapproach to distinguish linear block codes from its selfsynchronousscrambled codes. Given that the linear block codeand self-synchronous scrambled linear block code share the propertyof linear correlation, the existing linear correlation-basedidentification method is invalid for this case. This drawback can becircumvented by introducing a novel multi-fractal spectrum-basedmethod. Simulation results show that the new method has highrobustness and under the same conditions of bit error, the lowerthe code rate, the higher the recognition rate. Thus, the methodhas significant potential for future application in engineering. 展开更多
关键词 linear block code self-synchronous scrambled code multi-fractal spectrum statistical physics algorithm.
在线阅读 下载PDF
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm 被引量:1
3
作者 苏静明 方士辉 +1 位作者 洪炎 温言 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期233-243,共11页
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc. 展开更多
关键词 color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling
原文传递
Severity Based Light-Weight Encryption Model for Secure Medical Information System
4
作者 Firas Abedi Subhi R.M.Zeebaree +10 位作者 Zainab Salih Ageed Hayder M.A.Ghanimi Ahmed Alkhayyat Mohammed A.M.Sadeeq Sarmad Nozad Mahmood Ali S.Abosinnee Zahraa H.Kareem Ali Hashim Abbas Waleed Khaild Al-Azzawi Mustafa Musa Jaber Mohammed Dauwed 《Computers, Materials & Continua》 SCIE EI 2023年第3期5691-5704,共14页
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o... As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques. 展开更多
关键词 Deep learning ENCRYPTION medical images SCRAMBLING security skew tent map rotation zigzag pattern
在线阅读 下载PDF
Double quantum images encryption scheme based on chaotic system
5
作者 蒋社想 李杨 +1 位作者 石锦 张茹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期305-320,共16页
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti... This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities. 展开更多
关键词 double quantum images encryption chaotic system pixel scrambling XOR operation
原文传递
Video Transmission Secrecy Improvement Based on Fractional Order Hyper Chaotic System
6
作者 S.Kayalvizhi S.Malarvizhi 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1201-1214,共14页
In the Digital World scenario,the confidentiality of information in video transmission plays an important role.Chaotic systems have been shown to be effective for video signal encryption.To improve video transmission ... In the Digital World scenario,the confidentiality of information in video transmission plays an important role.Chaotic systems have been shown to be effective for video signal encryption.To improve video transmission secrecy,compressive encryption method is proposed to accomplish compression and encryption based on fractional order hyper chaotic system that incorporates Compressive Sensing(CS),pixel level,bit level scrambling and nucleotide Sequences operations.The measurement matrix generates by the fractional order hyper chaotic system strengthens the efficiency of the encryption process.To avoid plain text attack,the CS measurement is scrambled to its pixel level,bit level scrambling decreases the similarity between the adjacent measurements and the nucleotide sequence operations are done on the scrambled bits,increasing the encryption.Two stages are comprised in the reconstruction technique,the first stage uses the intra-frame similarity and offers robust preliminary retrieval for each frame,and the second stage iteratively improves the efficiency of reconstruction by integrating inter frame Multi Hypothesis(MH)estimation and weighted residual sparsity modeling.In each iteration,the residual coefficient weights are modified using a mathematical approach based on the MH predictions,and the Split Bregman iteration algorithm is defined to resolve weighted l1 regularization.Experimental findings show that the proposed algorithm provides good compression of video coupled with an efficient encryption method that is resistant to multiple attacks. 展开更多
关键词 Fractional order hyper chaotic system compressive sensing pixel level scrambling bit level scrambling nucleotide sequences
在线阅读 下载PDF
Image encryption algorithm based on multiple chaotic systems and improved Joseph block scrambling
7
作者 Dingkang Mou Yumin Dong 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期248-257,共10页
With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and... With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and protect intellectual property rights,this study proposes an innovative color image encryption algorithm.Initially,the Mersenne Twister algorithm is utilized to generate high-quality pseudo-random numbers,establishing a robust basis for subsequent operations.Subsequently,two distinct chaotic systems,the autonomous non-Hamiltonian chaotic system and the tentlogistic-cosine chaotic mapping,are employed to produce chaotic random sequences.These chaotic sequences are used to control the encoding and decoding process of the DNA,effectively scrambling the image pixels.Furthermore,the complexity of the encryption process is enhanced through improved Joseph block scrambling.Thorough experimental verification,research,and analysis,the average value of the information entropy test data reaches as high as 7.999.Additionally,the average value of the number of pixels change rate(NPCR)test data is 99.6101%,which closely approaches the ideal value of 99.6094%.This algorithm not only guarantees image quality but also substantially raises the difficulty of decryption. 展开更多
关键词 mersenne twister algorithm DNA coding confusion pixel XOR operation improved Joseph block scrambling
原文传递
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
8
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
原文传递
Parallel Techniques for Frame Synchronous Scrambler
9
作者 Xiaoru, Zh. Lieguang, Z. 《High Technology Letters》 EI CAS 1995年第1期51-54,共4页
In high speed transmission system such as SDH,parallel scrambling technique is re-quired.This paper presents a method of expanding matrix,which makes the traditional ma-trix method capable of realizing parallel scramb... In high speed transmission system such as SDH,parallel scrambling technique is re-quired.This paper presents a method of expanding matrix,which makes the traditional ma-trix method capable of realizing parallel scramblers of any size.A novel method called delayoperator method is also described in this paper.The 8-bit parallel scrambling circuitry ofSDH has been realized with the two methods. 展开更多
关键词 Parallel scramble Matrix method Delay operator method
在线阅读 下载PDF
Dynamics of Non-Markovianity, Quantum Correlations and Information Scrambling of Three Qubits Systems Interacting via Rashba Interaction
10
作者 Nasser Metwally Fawzeya Ebrahim 《Journal of Quantum Information Science》 CAS 2024年第2期52-67,共16页
The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate be... The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate between their upper and lower bounds, where the number of oscillations increases as the Rashba interaction strength increases. The exchanging rate of these three quantities depends on the Rashba strength, and whether the entangled state is generated via direct/indirect interaction. Moreover, the coherence parameter can be used as a control parameter to maximize or minimize the three physical quantities. 展开更多
关键词 Markovianity Correlations Rashba Interaction Scrambling Information
在线阅读 下载PDF
Foreign Aviation Companies Scramble for the Chinese Market
11
作者 LiuXin 《China's Foreign Trade》 2000年第4期29-29,共1页
关键词 Foreign Aviation Companies scramble for the Chinese Market
在线阅读 下载PDF
Medical Image Encryption Based on Fisher-Yates Scrambling and Filter Diffusion 被引量:1
12
作者 HUANG Jiacin GUO Yali +1 位作者 GAO Ruoyun LI Shanshan 《Journal of Shanghai Jiaotong university(Science)》 2025年第1期136-152,共17页
A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,whic... A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,which is used for the scrambling,substitution and diffusion processes.The three-dimensional Fisher-Yates scrambling,S-box substitution and diffusion are employed for the first round of encryption.The chaotic sequence is adopted for secondary encryption to scramble the ciphertext obtained in the first round.Then,three-dimensional filter is applied to diffusion for further useful information hiding.The key to the algorithm is generated by the combination of hash value of plaintext image and the input parameters.It improves resisting ability of plaintext attacks.The security analysis shows that the algorithm is effective and efficient.It can resist common attacks.In addition,the good diffusion effect shows that the scheme can solve the differential attacks encountered in the transmission of medical images and has positive implications for future research. 展开更多
关键词 medical image encryption Fisher-Yates scrambling three-dimensional filter diffusion bidirectional diffusion S-box substitution
原文传递
Hyper-Chaos and CNN-Based Image Encryption Scheme for Wireless Communication Transmission
13
作者 Gang Liu Guosheng Xu +1 位作者 Chenyu Wang Guoai Xu 《Computers, Materials & Continua》 2025年第9期4851-4868,共18页
In wireless communication transmission,image encryption plays a key role in protecting data privacy against unauthorized access.However,conventional encryption methods often face challenges in key space security,parti... In wireless communication transmission,image encryption plays a key role in protecting data privacy against unauthorized access.However,conventional encryption methods often face challenges in key space security,particularly when relying on chaotic sequences,which may exhibit vulnerabilities to brute-force and predictability-based attacks.To address the limitations,this paper presents a robust and efficient encryption scheme that combines iterative hyper-chaotic systems and Convolutional Neural Networks(CNNs).Firstly,a novel two-dimensional iterative hyper-chaotic system is proposed because of its complex dynamic behavior and expanded parameter space,which can enhance the key space complexity and randomness,ensuring resistance against cryptanalysis.Secondly,an innovative CNN architecture is introduced for generating the key stream for the cryptographic system.CNN architecture exhibits excellent nonlinearity and can further optimize the key generation process.To rigorously evaluate the encryption performance,extensive simulation analyses were conducted,including visualization,statistical histogram,information entropy,correlation,differential attack,and resistance.The method has shown a high NPCR(Number of Pixel Change Rate)of 99.642%and a UACI(Unified Average Changing Intensity)value of 33.465%,exhibiting powerful resistance to differential attacks.A series of comprehensive experimental tests have illustrated that the proposed scheme exhibits superior distribution characteristics,which underscores the robustness and efficacy of the image encryption,and helps for communication security. 展开更多
关键词 Wireless communication image encryption two-dimensional iterative hyper-chaos convolutional neural network diffusion and scrambling
在线阅读 下载PDF
Random Strip Peeling:A novel lightweight image encryption for IoT devices based on colour planes permutation
14
作者 Kenan Ince Cemile Ince Davut Hanbay 《CAAI Transactions on Intelligence Technology》 2025年第2期529-544,共16页
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale... This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N. 展开更多
关键词 chaotic encryption image scrambling algorithm lightweight image encryption symmetric encryption
在线阅读 下载PDF
Contourlet watermarking algorithm based on Arnold scrambling and singular value decomposition 被引量:3
15
作者 陈立全 孙晓燕 +1 位作者 卢苗 邵辰 《Journal of Southeast University(English Edition)》 EI CAS 2012年第4期386-391,共6页
A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and... A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured. 展开更多
关键词 digital watermarking contourlet transform Arnold scrambling singular value decomposition (SVD)
在线阅读 下载PDF
关于两种混沌映射的有限乘积性质 被引量:5
16
作者 吴新星 朱培勇 《纯粹数学与应用数学》 CSCD 2011年第1期129-137,共9页
首先在一般度量空间上给出有限积映射是Li-Yorke混沌的一个判据,并且用反例展示:当有限积映射是Li-Yorke混沌时,未必一定存在因子映射是Li-Yorke混沌的.然后,利用上述判据,在[0,1]N上证明有限积映射有不可数scrsmbled集的一个充要条件.... 首先在一般度量空间上给出有限积映射是Li-Yorke混沌的一个判据,并且用反例展示:当有限积映射是Li-Yorke混沌时,未必一定存在因子映射是Li-Yorke混沌的.然后,利用上述判据,在[0,1]N上证明有限积映射有不可数scrsmbled集的一个充要条件.进而,推出关于有限积映射为Li-Yorke混沌的一组等价刻画.最后指出:Devaney混沌的有限乘积性质与Li-Yorke混沌的情形恰好相反,即有限积映射是Devaney混沌的,它的每个因子映射必然都是Devaney混沌的,并且,反之则不然. 展开更多
关键词 LI-YORKE混沌 DEVANEY混沌 有限积映射 scrambled集 拓扑混合
在线阅读 下载PDF
本原有向图D_(n,q,s)的scrambling指数 被引量:2
17
作者 尤利华 陈芳 《华南师范大学学报(自然科学版)》 CAS 北大核心 2013年第5期7-12,共6页
设n,q,s是正整数,满足1≤s<q≤n,g.c.d.(q,s)=1,且q+s≥n+1.定义有向图D n,q,s=(V,E),其中V={1,2,…,n},E={(i,i+1)1≤i≤n-1}∪{(s,1),(n,n-q+1)}.显然,D n,q,s是本原有向图,且是一类重要的极图.运用了数论和图论的方法得到了Dn,q,s... 设n,q,s是正整数,满足1≤s<q≤n,g.c.d.(q,s)=1,且q+s≥n+1.定义有向图D n,q,s=(V,E),其中V={1,2,…,n},E={(i,i+1)1≤i≤n-1}∪{(s,1),(n,n-q+1)}.显然,D n,q,s是本原有向图,且是一类重要的极图.运用了数论和图论的方法得到了Dn,q,s的scrambling指数,根据本原有向图D的本原指数exp(D)与scrambling指数k(D)的已知结论,猜想lim n→∞k(D)exp(D)=1/2. 展开更多
关键词 本原有向图 SCRAMBLING指数 缺数段 指数集
在线阅读 下载PDF
半群作用Li-Yorke对的存在性 被引量:1
18
作者 苏郇立 《纯粹数学与应用数学》 CSCD 2010年第4期608-614,共7页
设X为紧度量空间,T为半群,本文研究了动力系统(X,T)上Li-Yorke对的存在性问题,证明了当(X,T)拓扑可迁且包含周期点时,在(X,T)上存在无限scrambled集.另外,列举了一些不包含Li-Yorke对的动力系统.
关键词 Li-Yorke对 邻近 渐近 scrambled集
在线阅读 下载PDF
一类特殊本原有向图的广义competiton指数 被引量:1
19
作者 方炜 王新年 高玉斌 《太原师范学院学报(自然科学版)》 2012年第2期6-10,共5页
在2010年,Hwa Kyung Kim和Sung Gi Park共同提出了本原有向图的广义com-petiton指数这一概念.文章考虑了一类特殊本原有向图的广义competiton指数,它含有t个2长圈和一个n-t长圈,n与t的奇偶性不同,其中1≤t≤n-3,n≥4,给出了该类本原有... 在2010年,Hwa Kyung Kim和Sung Gi Park共同提出了本原有向图的广义com-petiton指数这一概念.文章考虑了一类特殊本原有向图的广义competiton指数,它含有t个2长圈和一个n-t长圈,n与t的奇偶性不同,其中1≤t≤n-3,n≥4,给出了该类本原有向图的广义competiton指数. 展开更多
关键词 本原指数 有向图 广义competiton指数 SCRAMBLING指数
在线阅读 下载PDF
几类本原有向图Scrambling指数极图的广义Competition指数
20
作者 杜建伟 邵燕灵 孙晓玲 《中北大学学报(自然科学版)》 CAS 北大核心 2014年第4期365-369,共5页
设D为n阶本原有向图,对于D中的每一对顶点x,y,存在正整数m,1≤m≤n,在D中总能找到m个不同的顶点v1,v2,…,vm,使得x和y到vi(1≤i≤m)都存在k长的途径,上述k中的最小者称为D的广义Competition指数(m-Competition指数).广义Competition指... 设D为n阶本原有向图,对于D中的每一对顶点x,y,存在正整数m,1≤m≤n,在D中总能找到m个不同的顶点v1,v2,…,vm,使得x和y到vi(1≤i≤m)都存在k长的途径,上述k中的最小者称为D的广义Competition指数(m-Competition指数).广义Competition指数是本原指数和Scrambling指数的推广.采用图论与组合矩阵论的方法,对几类本原有向图Scrambling指数极图的广义Competition指数进行研究,给出了这几类极图的广义Competition指数. 展开更多
关键词 本原指数 本原有向图 对称本原有向图 SCRAMBLING指数 广义Competition指数
在线阅读 下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部