期刊文献+
共找到108篇文章
< 1 2 6 >
每页显示 20 50 100
Distinction of self-synchronous scrambled linear blockcodes based on multi-fractal spectrum 被引量:2
1
作者 xinhao li min zhang +1 位作者 shu'nan han quan yuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第5期968-978,共11页
This study proposes a novel multi-fractal spectrumbasedapproach to distinguish linear block codes from its selfsynchronousscrambled codes. Given that the linear block codeand self-synchronous scrambled linear block co... This study proposes a novel multi-fractal spectrumbasedapproach to distinguish linear block codes from its selfsynchronousscrambled codes. Given that the linear block codeand self-synchronous scrambled linear block code share the propertyof linear correlation, the existing linear correlation-basedidentification method is invalid for this case. This drawback can becircumvented by introducing a novel multi-fractal spectrum-basedmethod. Simulation results show that the new method has highrobustness and under the same conditions of bit error, the lowerthe code rate, the higher the recognition rate. Thus, the methodhas significant potential for future application in engineering. 展开更多
关键词 linear block code self-synchronous scrambled code multi-fractal spectrum statistical physics algorithm.
在线阅读 下载PDF
A class of primitive substitutions and scrambled sets 被引量:7
2
作者 LIAO GongFu FAN QinJie WANG LiDong 《Science China Mathematics》 SCIE 2008年第3期369-375,共7页
Consider the subshifts induced by constant-length primitive substitutions on two symbols. By investigating the equivalent version for the existence of Li-Yorke scrambled sets and by proving the non-existence of Schwei... Consider the subshifts induced by constant-length primitive substitutions on two symbols. By investigating the equivalent version for the existence of Li-Yorke scrambled sets and by proving the non-existence of Schweizer-Smítal scrambled sets, we completely reveal for this class of subshifts the chaotic behaviors possibly occurring in the sense of Li-Yorke and Schweizer-Smítal. 展开更多
关键词 primitive substitution SUBSHIFT Li-Yorke scrambled set Schweizer-Smítal scrambled set 54H20 58F03 58F08
原文传递
Continuous maps with the whole space being a scrambled set 被引量:5
3
作者 MAI JiehuaInstitute of Mathematics, Shantou University, Shantou 515063, China 《Chinese Science Bulletin》 SCIE EI CAS 1997年第19期1603-1606,共4页
1 A problem or scrambled setCHAOTIC behavior is a manifestation of complexity of nonlinear dynamical systems. Since theobjects, methods, aims, or emphases of study are distinct, there are some variant definitionsof ch... 1 A problem or scrambled setCHAOTIC behavior is a manifestation of complexity of nonlinear dynamical systems. Since theobjects, methods, aims, or emphases of study are distinct, there are some variant definitionsof chaos given by different authors, or given by the same author in his different works. Thefollowing definition mainly stems from Li and Yorke. 展开更多
关键词 scrambled SET expansive MAP ANALYTIC homeomorphism.
在线阅读 下载PDF
Medical Image Encryption Based on Fisher-Yates Scrambling and Filter Diffusion 被引量:1
4
作者 HUANG Jiacin GUO Yali +1 位作者 GAO Ruoyun LI Shanshan 《Journal of Shanghai Jiaotong university(Science)》 2025年第1期136-152,共17页
A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,whic... A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,which is used for the scrambling,substitution and diffusion processes.The three-dimensional Fisher-Yates scrambling,S-box substitution and diffusion are employed for the first round of encryption.The chaotic sequence is adopted for secondary encryption to scramble the ciphertext obtained in the first round.Then,three-dimensional filter is applied to diffusion for further useful information hiding.The key to the algorithm is generated by the combination of hash value of plaintext image and the input parameters.It improves resisting ability of plaintext attacks.The security analysis shows that the algorithm is effective and efficient.It can resist common attacks.In addition,the good diffusion effect shows that the scheme can solve the differential attacks encountered in the transmission of medical images and has positive implications for future research. 展开更多
关键词 medical image encryption Fisher-Yates scrambling three-dimensional filter diffusion bidirectional diffusion S-box substitution
原文传递
An Efficient Scrambled Estimator of Population Mean of Quantitative Sensitive Variable Using General Linear Transformation of Non-sensitive Auxiliary Variable
5
作者 Lovleen Kumar Grover Amanpreet Kaur 《Communications in Mathematics and Statistics》 SCIE 2019年第4期401-415,共15页
In the present paper,we propose an efficient scrambled estimator of population mean of quantitative sensitive study variable,using general linear transformation of nonsensitive auxiliary variable.Efficiency comparison... In the present paper,we propose an efficient scrambled estimator of population mean of quantitative sensitive study variable,using general linear transformation of nonsensitive auxiliary variable.Efficiency comparisons with the existing estimators have been carried out both theoretically and numerically.It has been found that our optimal scrambled estimator is always more efficient than most of the existing scrambled estimators and also it is more efficient than few other scrambled estimators under some conditions. 展开更多
关键词 BIAS Efficiency Non-sensitive auxiliary variable Randomized response technique scrambled estimator Sensitive study variable Simple random sampling without replacement Percent relative efficiency
原文传递
Hyper-Chaos and CNN-Based Image Encryption Scheme for Wireless Communication Transmission
6
作者 Gang Liu Guosheng Xu +1 位作者 Chenyu Wang Guoai Xu 《Computers, Materials & Continua》 2025年第9期4851-4868,共18页
In wireless communication transmission,image encryption plays a key role in protecting data privacy against unauthorized access.However,conventional encryption methods often face challenges in key space security,parti... In wireless communication transmission,image encryption plays a key role in protecting data privacy against unauthorized access.However,conventional encryption methods often face challenges in key space security,particularly when relying on chaotic sequences,which may exhibit vulnerabilities to brute-force and predictability-based attacks.To address the limitations,this paper presents a robust and efficient encryption scheme that combines iterative hyper-chaotic systems and Convolutional Neural Networks(CNNs).Firstly,a novel two-dimensional iterative hyper-chaotic system is proposed because of its complex dynamic behavior and expanded parameter space,which can enhance the key space complexity and randomness,ensuring resistance against cryptanalysis.Secondly,an innovative CNN architecture is introduced for generating the key stream for the cryptographic system.CNN architecture exhibits excellent nonlinearity and can further optimize the key generation process.To rigorously evaluate the encryption performance,extensive simulation analyses were conducted,including visualization,statistical histogram,information entropy,correlation,differential attack,and resistance.The method has shown a high NPCR(Number of Pixel Change Rate)of 99.642%and a UACI(Unified Average Changing Intensity)value of 33.465%,exhibiting powerful resistance to differential attacks.A series of comprehensive experimental tests have illustrated that the proposed scheme exhibits superior distribution characteristics,which underscores the robustness and efficacy of the image encryption,and helps for communication security. 展开更多
关键词 Wireless communication image encryption two-dimensional iterative hyper-chaos convolutional neural network diffusion and scrambling
在线阅读 下载PDF
Random Strip Peeling:A novel lightweight image encryption for IoT devices based on colour planes permutation
7
作者 Kenan Ince Cemile Ince Davut Hanbay 《CAAI Transactions on Intelligence Technology》 2025年第2期529-544,共16页
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale... This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N. 展开更多
关键词 chaotic encryption image scrambling algorithm lightweight image encryption symmetric encryption
在线阅读 下载PDF
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
8
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
原文传递
Double quantum images encryption scheme based on chaotic system
9
作者 蒋社想 李杨 +1 位作者 石锦 张茹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期305-320,共16页
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti... This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities. 展开更多
关键词 double quantum images encryption chaotic system pixel scrambling XOR operation
原文传递
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
10
作者 苏静明 方士辉 +1 位作者 洪炎 温言 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期233-243,共11页
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc. 展开更多
关键词 color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling
原文传递
Image encryption algorithm based on multiple chaotic systems and improved Joseph block scrambling
11
作者 Dingkang Mou Yumin Dong 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期248-257,共10页
With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and... With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and protect intellectual property rights,this study proposes an innovative color image encryption algorithm.Initially,the Mersenne Twister algorithm is utilized to generate high-quality pseudo-random numbers,establishing a robust basis for subsequent operations.Subsequently,two distinct chaotic systems,the autonomous non-Hamiltonian chaotic system and the tentlogistic-cosine chaotic mapping,are employed to produce chaotic random sequences.These chaotic sequences are used to control the encoding and decoding process of the DNA,effectively scrambling the image pixels.Furthermore,the complexity of the encryption process is enhanced through improved Joseph block scrambling.Thorough experimental verification,research,and analysis,the average value of the information entropy test data reaches as high as 7.999.Additionally,the average value of the number of pixels change rate(NPCR)test data is 99.6101%,which closely approaches the ideal value of 99.6094%.This algorithm not only guarantees image quality but also substantially raises the difficulty of decryption. 展开更多
关键词 mersenne twister algorithm DNA coding confusion pixel XOR operation improved Joseph block scrambling
原文传递
Multispectral image compression and encryption method based on tensor decomposition in wavelet domain
12
作者 XU Dongdong DU Limin DU Yunlong 《High Technology Letters》 EI CAS 2024年第3期244-251,共8页
Multispectral image compression and encryption algorithms commonly suffer from issues such as low compression efficiency,lack of synchronization between the compression and encryption proces-ses,and degradation of int... Multispectral image compression and encryption algorithms commonly suffer from issues such as low compression efficiency,lack of synchronization between the compression and encryption proces-ses,and degradation of intrinsic image structure.A novel approach is proposed to address these is-sues.Firstly,a chaotic sequence is generated using the Lorenz three-dimensional chaotic mapping to initiate the encryption process,which is XORed with each spectral band of the multispectral image to complete the initial encryption of the image.Then,a two-dimensional lifting 9/7 wavelet transform is applied to the processed image.Next,a key-sensitive Arnold scrambling technique is employed on the resulting low-frequency image.It effectively eliminates spatial redundancy in the multispectral image while enhancing the encryption process.To optimize the compression and encryption processes further,fast Tucker decomposition is applied to the wavelet sub-band tensor.It effectively removes both spectral redundancy and residual spatial redundancy in the multispectral image.Finally,the core tensor and pattern matrix obtained from the decomposition are subjected to entropy encoding,and real-time chaotic encryption is implemented during the encoding process,effectively integrating compression and encryption.The results show that the proposed algorithm is suitable for occasions with high requirements for compression and encryption,and it provides valuable insights for the de-velopment of compression and encryption in multispectral field. 展开更多
关键词 multi-spectral image compression encryption Lorenz three-dimensional chaotic mapping Arnold scrambling transform fast Tucker decomposition
在线阅读 下载PDF
Dynamics of Non-Markovianity, Quantum Correlations and Information Scrambling of Three Qubits Systems Interacting via Rashba Interaction
13
作者 Nasser Metwally Fawzeya Ebrahim 《Journal of Quantum Information Science》 CAS 2024年第2期52-67,共16页
The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate be... The behavior of the quantum correlations, information scrambling and the non-Markovianity of three entangling qubits systems via Rashba is discussed. The results showed that, the three physical quantities oscillate between their upper and lower bounds, where the number of oscillations increases as the Rashba interaction strength increases. The exchanging rate of these three quantities depends on the Rashba strength, and whether the entangled state is generated via direct/indirect interaction. Moreover, the coherence parameter can be used as a control parameter to maximize or minimize the three physical quantities. 展开更多
关键词 Markovianity Correlations Rashba Interaction Scrambling Information
在线阅读 下载PDF
关于两种混沌映射的有限乘积性质 被引量:5
14
作者 吴新星 朱培勇 《纯粹数学与应用数学》 CSCD 2011年第1期129-137,共9页
首先在一般度量空间上给出有限积映射是Li-Yorke混沌的一个判据,并且用反例展示:当有限积映射是Li-Yorke混沌时,未必一定存在因子映射是Li-Yorke混沌的.然后,利用上述判据,在[0,1]N上证明有限积映射有不可数scrsmbled集的一个充要条件.... 首先在一般度量空间上给出有限积映射是Li-Yorke混沌的一个判据,并且用反例展示:当有限积映射是Li-Yorke混沌时,未必一定存在因子映射是Li-Yorke混沌的.然后,利用上述判据,在[0,1]N上证明有限积映射有不可数scrsmbled集的一个充要条件.进而,推出关于有限积映射为Li-Yorke混沌的一组等价刻画.最后指出:Devaney混沌的有限乘积性质与Li-Yorke混沌的情形恰好相反,即有限积映射是Devaney混沌的,它的每个因子映射必然都是Devaney混沌的,并且,反之则不然. 展开更多
关键词 LI-YORKE混沌 DEVANEY混沌 有限积映射 scrambled 拓扑混合
在线阅读 下载PDF
半群作用Li-Yorke对的存在性 被引量:1
15
作者 苏郇立 《纯粹数学与应用数学》 CSCD 2010年第4期608-614,共7页
设X为紧度量空间,T为半群,本文研究了动力系统(X,T)上Li-Yorke对的存在性问题,证明了当(X,T)拓扑可迁且包含周期点时,在(X,T)上存在无限scrambled集.另外,列举了一些不包含Li-Yorke对的动力系统.
关键词 Li-Yorke对 邻近 渐近 scrambled
在线阅读 下载PDF
Contourlet watermarking algorithm based on Arnold scrambling and singular value decomposition 被引量:3
16
作者 陈立全 孙晓燕 +1 位作者 卢苗 邵辰 《Journal of Southeast University(English Edition)》 EI CAS 2012年第4期386-391,共6页
A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and... A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured. 展开更多
关键词 digital watermarking contourlet transform Arnold scrambling singular value decomposition (SVD)
在线阅读 下载PDF
本原有向图D_(n,q,s)的scrambling指数 被引量:2
17
作者 尤利华 陈芳 《华南师范大学学报(自然科学版)》 CAS 北大核心 2013年第5期7-12,共6页
设n,q,s是正整数,满足1≤s<q≤n,g.c.d.(q,s)=1,且q+s≥n+1.定义有向图D n,q,s=(V,E),其中V={1,2,…,n},E={(i,i+1)1≤i≤n-1}∪{(s,1),(n,n-q+1)}.显然,D n,q,s是本原有向图,且是一类重要的极图.运用了数论和图论的方法得到了Dn,q,s... 设n,q,s是正整数,满足1≤s<q≤n,g.c.d.(q,s)=1,且q+s≥n+1.定义有向图D n,q,s=(V,E),其中V={1,2,…,n},E={(i,i+1)1≤i≤n-1}∪{(s,1),(n,n-q+1)}.显然,D n,q,s是本原有向图,且是一类重要的极图.运用了数论和图论的方法得到了Dn,q,s的scrambling指数,根据本原有向图D的本原指数exp(D)与scrambling指数k(D)的已知结论,猜想lim n→∞k(D)exp(D)=1/2. 展开更多
关键词 本原有向图 SCRAMBLING指数 缺数段 指数集
在线阅读 下载PDF
一类特殊本原有向图的广义competiton指数 被引量:1
18
作者 方炜 王新年 高玉斌 《太原师范学院学报(自然科学版)》 2012年第2期6-10,共5页
在2010年,Hwa Kyung Kim和Sung Gi Park共同提出了本原有向图的广义com-petiton指数这一概念.文章考虑了一类特殊本原有向图的广义competiton指数,它含有t个2长圈和一个n-t长圈,n与t的奇偶性不同,其中1≤t≤n-3,n≥4,给出了该类本原有... 在2010年,Hwa Kyung Kim和Sung Gi Park共同提出了本原有向图的广义com-petiton指数这一概念.文章考虑了一类特殊本原有向图的广义competiton指数,它含有t个2长圈和一个n-t长圈,n与t的奇偶性不同,其中1≤t≤n-3,n≥4,给出了该类本原有向图的广义competiton指数. 展开更多
关键词 本原指数 有向图 广义competiton指数 SCRAMBLING指数
在线阅读 下载PDF
几类本原有向图Scrambling指数极图的广义Competition指数
19
作者 杜建伟 邵燕灵 孙晓玲 《中北大学学报(自然科学版)》 CAS 北大核心 2014年第4期365-369,共5页
设D为n阶本原有向图,对于D中的每一对顶点x,y,存在正整数m,1≤m≤n,在D中总能找到m个不同的顶点v1,v2,…,vm,使得x和y到vi(1≤i≤m)都存在k长的途径,上述k中的最小者称为D的广义Competition指数(m-Competition指数).广义Competition指... 设D为n阶本原有向图,对于D中的每一对顶点x,y,存在正整数m,1≤m≤n,在D中总能找到m个不同的顶点v1,v2,…,vm,使得x和y到vi(1≤i≤m)都存在k长的途径,上述k中的最小者称为D的广义Competition指数(m-Competition指数).广义Competition指数是本原指数和Scrambling指数的推广.采用图论与组合矩阵论的方法,对几类本原有向图Scrambling指数极图的广义Competition指数进行研究,给出了这几类极图的广义Competition指数. 展开更多
关键词 本原指数 本原有向图 对称本原有向图 SCRAMBLING指数 广义Competition指数
在线阅读 下载PDF
本原θ-图与本原广义θ-图的Scrambling指数
20
作者 杜建伟 邵燕灵 孙晓玲 《中北大学学报(自然科学版)》 CAS 北大核心 2014年第1期1-6,共6页
设D是本原有向图,存在正整数k,对任意一对顶点x,y,一定存在一个顶点w,使得x到y与y到x皆有k长的途径,这样的正整数中的最小者称为D的Scrambling指数.对本原θ-图与本原广义θ-图的Scrambling指数进行了研究.采用图论与组合矩阵论的方法,... 设D是本原有向图,存在正整数k,对任意一对顶点x,y,一定存在一个顶点w,使得x到y与y到x皆有k长的途径,这样的正整数中的最小者称为D的Scrambling指数.对本原θ-图与本原广义θ-图的Scrambling指数进行了研究.采用图论与组合矩阵论的方法,得到了本原θ-图与本原广义θ-图的Scrambling指数的上界,并且给出了一类Scrambling指数达到上界的本原θ-图与本原广义θ-图. 展开更多
关键词 本原 Θ-图 广义θ-图 SCRAMBLING指数
在线阅读 下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部