In this paper, the determinacy of regular lexical selectional restrictions is examined from both the internal structures of the single selectional restrictions (i.e.semantic selectional restrictions) and relationship ...In this paper, the determinacy of regular lexical selectional restrictions is examined from both the internal structures of the single selectional restrictions (i.e.semantic selectional restrictions) and relationship between the structures of several selectional restrictions. Hence, our analysis and description are shifted from casual and indeterminate strings and markers on case basis to determined rules and circumspect dynamic systems, from lexical precepts to knowledge precepts, from the state of memory to rational deduction and rhetorical devices. Further studies indicate that selectional restrictions are intertwined structures, a feature that makes it possible to be one of the bases for lexical selectional restrictions to come into existence. Its related theories are the grarantee for scientific observations of selectional restriction structures.展开更多
We dealt in a series of previous publications with some geometric aspects of the mappings by functions obtained as analytic continuations to the whole complex plane of general Dirichlet series. Pictures illustrating t...We dealt in a series of previous publications with some geometric aspects of the mappings by functions obtained as analytic continuations to the whole complex plane of general Dirichlet series. Pictures illustrating those aspects contain a lot of other information which has been waiting for a rigorous proof. Such a task is partially fulfilled in this paper, where we succeeded among other things, to prove a theorem about general Dirichlet series having as corollary the Speiser’s theorem. We have also proved that those functions do not possess multiple zeros of order higher than 2 and the double zeros have very particular locations. Moreover, their derivatives have only simple zeros. With these results at hand, we revisited GRH for a simplified proof.展开更多
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ...In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security.展开更多
We consider the harmonic analysis associated with the Dunkl operators on Rd. We study the Dunkl mean-periodic functions on the space ε(Rd) (the space of C∞-functions). We characterize also the continuous linear mapp...We consider the harmonic analysis associated with the Dunkl operators on Rd. We study the Dunkl mean-periodic functions on the space ε(Rd) (the space of C∞-functions). We characterize also the continuous linear mappings from ε(Rd) into itself which commute with the Dunkl operators.展开更多
The construction of an unprecedented intertwined spiral solvent channel is driven by weak C–Cl…O and C–H…N interactions based on extraordinary parallel spirals which were structured from supramolecular synthon mac...The construction of an unprecedented intertwined spiral solvent channel is driven by weak C–Cl…O and C–H…N interactions based on extraordinary parallel spirals which were structured from supramolecular synthon macrocycle 1(C44H44N4O4) with a propargylamine backbone. The product is characterized by ^1H NMR, ^13C NMR, IR and HRMS, and further confirmed by single-crystal X-ray diffraction. It crystallizes in the monoclinic system, space group C2/c, with a = 28.922(3), b = 8.5069(9), c = 21.687(2)A^°, β = 130.6320(10)°, V = 4049.4(7) A^°3 and Z = 8. A total of 11874 reflections were collected, of which 4942 were independent(Rint = 0.0590) and 2937 were observed with I 〉 2σ(I). The final full-matrix least-squares refinement gave R(I 〉 2s(I)) = 0.069 and w R = 0.167, S = 1.05,(Δρ)max = 0.20 and(Δρ)min =-0.22 e·A^1-3. The fluorescence of the product is discussed.展开更多
文摘In this paper, the determinacy of regular lexical selectional restrictions is examined from both the internal structures of the single selectional restrictions (i.e.semantic selectional restrictions) and relationship between the structures of several selectional restrictions. Hence, our analysis and description are shifted from casual and indeterminate strings and markers on case basis to determined rules and circumspect dynamic systems, from lexical precepts to knowledge precepts, from the state of memory to rational deduction and rhetorical devices. Further studies indicate that selectional restrictions are intertwined structures, a feature that makes it possible to be one of the bases for lexical selectional restrictions to come into existence. Its related theories are the grarantee for scientific observations of selectional restriction structures.
文摘We dealt in a series of previous publications with some geometric aspects of the mappings by functions obtained as analytic continuations to the whole complex plane of general Dirichlet series. Pictures illustrating those aspects contain a lot of other information which has been waiting for a rigorous proof. Such a task is partially fulfilled in this paper, where we succeeded among other things, to prove a theorem about general Dirichlet series having as corollary the Speiser’s theorem. We have also proved that those functions do not possess multiple zeros of order higher than 2 and the double zeros have very particular locations. Moreover, their derivatives have only simple zeros. With these results at hand, we revisited GRH for a simplified proof.
基金supported by the National Natural Science Foundation of China(Grant Nos.61602124,61273021,11526057,and 11301091)the Natural Science Foundation of Guangdong Province,China(Grant Nos.2016A030310333,2015A030313614,and 2015A030313620)+3 种基金the Science & Technology Planning Projects of Zhanjiang City,China(Grant Nos.2015B01098 and 2015B01051)the Project Foundation of Chongqing Municipal Education Committee of China(Grant No.KJ1500501)the Program for Scientific Research Start-up Funds of Guangdong Ocean University of Chinathe Special Funding Program for Excellent Young Scholars of Guangdong Ocean University of China
文摘In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security.
文摘We consider the harmonic analysis associated with the Dunkl operators on Rd. We study the Dunkl mean-periodic functions on the space ε(Rd) (the space of C∞-functions). We characterize also the continuous linear mappings from ε(Rd) into itself which commute with the Dunkl operators.
基金supported by the Natural Science Foundation of Anhui Province Education Department(No.KJ2014A141,No.KJ2015A243,No.KJ2016A862)
文摘The construction of an unprecedented intertwined spiral solvent channel is driven by weak C–Cl…O and C–H…N interactions based on extraordinary parallel spirals which were structured from supramolecular synthon macrocycle 1(C44H44N4O4) with a propargylamine backbone. The product is characterized by ^1H NMR, ^13C NMR, IR and HRMS, and further confirmed by single-crystal X-ray diffraction. It crystallizes in the monoclinic system, space group C2/c, with a = 28.922(3), b = 8.5069(9), c = 21.687(2)A^°, β = 130.6320(10)°, V = 4049.4(7) A^°3 and Z = 8. A total of 11874 reflections were collected, of which 4942 were independent(Rint = 0.0590) and 2937 were observed with I 〉 2σ(I). The final full-matrix least-squares refinement gave R(I 〉 2s(I)) = 0.069 and w R = 0.167, S = 1.05,(Δρ)max = 0.20 and(Δρ)min =-0.22 e·A^1-3. The fluorescence of the product is discussed.