http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Yangwei Liao,Demin Liu 대한수학회 2024 대한수학회보 Vol.61 No.1
In this paper, the Gauge-Uzawa methods for the Darcy-Brinkman equations driven by temperature and salt concentration \linebreak (DBTC) are proposed. The first order backward difference formula is adopted to approximate the time derivative term, and the linear term is treated implicitly, the nonlinear terms are treated semi-implicit. In each time step, the coupling elliptic problems of velocity, temperature and salt concentration are solved, and then the pressure is solved. The unconditional stability and error estimations of the first order semi-discrete scheme are derived, at the same time, the unconditional stability of the first order fully discrete scheme is obtained. Some numerical experiments verify the theoretical prediction and show the effectiveness of the proposed methods.
Research on Security Transmission of Perceptual Hash Values Based on ECC and Digital Watermarking
Zhang Qiuyu,Xing Pengfei,Liu Yangwei,Zhang Qianyun,Huang Yibo 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.3
In this paper, a secure method of transmitting perceptual hash is proposed based on error correcting codes (ECC) and digital watermarking, aiming at the fact that perceptual hash string used in audio authentication is easy to alter after been attacked in transmission and the need of extra channel. In this method we embed the binary perceptual hash values into the compressed audio as a digital watermark so that authentication data is dispersed. An ECC is used to pre-process perceptual hash sequence to ensure that speech signal with watermarking can be extracted watermarking information (the perceptual hash values) after been attacked. The experimental result illustrate that this method embeds information without influencing on the content. It is robust to noise and can prevent from common attack. At the same time, this method ensures the hearing transparency of audio perceptual content, the high efficiency of watermark extraction and the efficiency and security of algorithm.