http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
On the Hyers-Ulam-Rassias stability of Jensen's equation
Dongyan Zhang,Jian Wang 대한수학회 2009 대한수학회보 Vol.46 No.4
J. Wang [21] proposed a problem: whether the Hyers-Ulam- Rassias stability of Jensen’'s equation for the case p, q, r, s ∈(β,1/β)\{1} holds or not under the assumption that G and E are β-homogeneous F-space (0<β<1). The main purpose of this paper is to give an answer to Wang’'s problem. Furthermore, we proved that the stability property of Jensen’'s equation is not true as long as p or q is equal to β,1/β, or ¯β_(2)/β_(1) (0<β_(1),β_(2)≤1). J. Wang [21] proposed a problem: whether the Hyers-Ulam- Rassias stability of Jensen’'s equation for the case p, q, r, s ∈(β,1/β)\{1} holds or not under the assumption that G and E are β-homogeneous F-space (0<β<1). The main purpose of this paper is to give an answer to Wang’'s problem. Furthermore, we proved that the stability property of Jensen’'s equation is not true as long as p or q is equal to β,1/β, or ¯β_(2)/β_(1) (0<β_(1),β_(2)≤1).
ON THE HYERS-ULAM-RASSIAS STABILITY OF JENSEN'S EQUATION
Zhang, Dongyan,Wang, Jian Korean Mathematical Society 2009 대한수학회보 Vol.46 No.4
J. Wang [21] proposed a problem: whether the Hyers-Ulam-Rassias stability of Jensen's equation for the case p, q, r, s $\in$ ($\beta$, $\frac{1}{\beta}$) \ {1} holds or not under the assumption that G and E are $\beta$-homogeneous Fspace (0 < $\beta\;\leq$ 1). The main purpose of this paper is to give an answer to Wang's problem. Furthermore, we proved that the stability property of Jensen's equation is not true as long as p or q is equal to $\beta$, $\frac{1}{\beta}$, or $\frac{\beta_2}{\beta_1}$ (0 < $\beta_1,\beta_2\leq$ 1).
Drying performance and energy consumption of Camellia oleifera seeds under microwave-vacuum drying
Dongyan Zhang,Dan Huang,Xiyang Zhang,Hangyi Zhao,Guiliang Gong,Xiaohong Tang,Lijun Li 한국식품과학회 2023 Food Science and Biotechnology Vol.32 No.7
Microwave-vacuum drying performance and energy consumption of Camellia oleifera seeds were studied in this paper. The effects of microwave power, vacuum pressure and loading quantity were evaluated and discussed. Orthogonal experiments were also conducted to optimize the drying process. A new drying model based on the weibull distribution model was developed. Results showed that the microwave-vacuum drying process was dominated by internal water diffusion and surface water evaporation. As the microwave power and vacuum pressure increased and the loading quantity decreased, the drying time and energy consumption both decreased. However, too low or too high microwave power would increase the energy consumption. The optimal microwave-vacuum drying conditions were found to be a loading quantity of 150 g, a microwave power of 350 W and a vacuum pressure of 0.09 MPa. The developed drying model and the calculated scale and shape parameter were all consistent with experimental results.
Blind Color Image Watermarking Based on DWT and LU Decomposition
( Dongyan Wang ),( Fanfan Yang ),( Heng Zhang ) 한국정보처리학회 2016 Journal of information processing systems Vol.12 No.4
In watermarking schemes, the discrete wavelet transform (DWT) is broadly used because its frequency component separation is very useful. Moreover, LU decomposition has little influence on the visual quality of the watermark. Hence, in this paper, a novel blind watermark algorithm is presented based on LU transform and DWT for the copyright protection of digital images. In this algorithm, the color host image is first performed with DWT. Then, the horizontal and vertical diagonal high frequency components are extracted from the wavelet domain, and the sub-images are divided into 4×4 non-overlapping image blocks. Next, each sub-block is performed with LU decomposition. Finally, the color image watermark is transformed by Arnold permutation, and then it is inserted into the upper triangular matrix. The experimental results imply that this algorithm has good features of invisibility and it is robust against different attacks to a certain degree, such as contrast adjustment, JPEG compression, salt and pepper noise, cropping, and Gaussian noise.
Studies on the Terpenoids in the Volatile Constituents of Liaoning Schisandra Chinensis Baillon
Hou, Dongyan,Zhang, Weihua,Hui, Ruihua 한국분석과학회 1995 분석과학 Vol.8 No.4
The terpenoids in the volatile constituents of Liaoning Shcisandra Chinesis Baillon have been determined by the analytical method of GC/MS. Thirty terpenoids molecular structure were characterized. They are 11.89% monterpenes, 4.60% monoterpene oxides, 58.74% sesquiterpene hydrocarbons, and 1.62% oxygen-containing sesquiterpenoids in the total volatile constituents quantified by chromatograph. Among them, the sesquiterpene make up the characteristic constituents. Every terpenoid constituent percent content was obtained using area normalization method of HP-59970 chemstation.
Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors
( Zhi Zhang ),( Dongyan Wang ),( Chengyou Wang ),( Xiao Zhou ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.9
With the growth of the Internet and the extensive applications of image editing software, it has become easier to manipulate digital images without leaving obvious traces. Copy-move is one of the most common techniques for image forgery. Image blind forensics is an effective technique for detecting tampered images. This paper proposes an improved copy-move forgery detection method based on the discrete cosine transform (DCT). The quantized DCT coefficients, which are feature representations of image blocks, are truncated using a truncation factor to reduce the feature dimensions. A method for judging whether two image blocks are similar is proposed to improve the accuracy of similarity judgments. The main transfer vectors whose frequencies exceed a threshold are found to locate the copied and pasted regions in forged images. Several experiments are conducted to test the practicability of the proposed algorithm using images from copy-move databases and to evaluate its robustness against post-processing methods such as additive white Gaussian noise (AWGN), Gaussian blurring, and JPEG compression. The results of experiments show that the proposed scheme effectively detects both copied region and pasted region of forged images and that it is robust to the post-processing methods mentioned above.