1,751 research outputs found

    Topological Structure of Fractal Squares

    Full text link
    Given an integer n2n\geq 2 and a digit set D0,1,...,n12{\mathcal D}\subsetneq {0,1,...,n-1}^2, there is a self-similar set FR2F \subset {\Bbb R}^2 satisfying the set equation: F=(F+D)/nF=(F+{\mathcal D})/n. We call such FF a fractal square. By studying a periodic extension H=F+Z2H= F+ {\mathbb Z}^2, we classify FF into three types according to their topological properties. We also provide some simple criteria for such classification.Comment: 17 pages, 12 figure

    Analytic study of superradiant stability of Kerr-Newman black holes under charged massive scalar perturbation

    Full text link
    The superradiant stability of a Kerr-Newman black hole and charged massive scalar perturbation is investigated. We treat the black hole as a background geometry and study the equation of motion of the scalar perturbation. From the radial equation of motion, we derive the effective potential experienced by the scalar perturbation. By a careful analysis of this effective potential, it is found that when the inner and outer horizons of Kerr-Newman black hole satisfy rr+13\frac{r_-}{r_+}\leqslant\frac{1}{3} and the charge-to-mass ratios of scalar perturbation and black hole satisfy qμQM>1 \frac{q}{\mu }\frac{Q}{ M}>1 , the Kerr-Newman black hole and scalar perturbation system is superradiantly stable.Comment: 7 pages, references adde

    5-Fluoro-1H-indole-3-carb­oxy­lic acid

    Get PDF
    In the title compound, C9H6FNO2, the carboxyl group is twisted slightly away from the indole-ring plane [dihedral angle = 7.39 (10)°]. In the crystal, carboxyl inversion dimers linked by pairs of O—H⋯O hydrogen bonds generate R 2 2(8) loops and N—H⋯O hydrogen bonds connect the dimers into (10) sheets

    A novel image encryption scheme based on Kepler’s third law and random Hadamard transform

    Get PDF
    In this paper, a novel image encryption scheme based on Kepler’s third law and random Hadamard transform is proposed to ensure the security of a digital image. First, a set of Kepler periodic sequences is generated to permutate image data, which is characteristic of the plain-image and the Kepler’s third law. Then, a random Hadamard matrix is constructed by combining the standard Hadamard matrix with the hyper-Chen chaotic system, which is used to further scramble the image coefficients when the image is transformed through random Hadamard transform. In the end, the permuted image presents interweaving diffusion based on two special matrices, which are constructed by Kepler periodic sequence and chaos system. The experimental results and performance analysis show that the proposed encrypted scheme is highly sensitive to the plain-image and external keys, and has a high security and speed, which are very suitable for secure real-time communication of image data
    corecore