• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
Liang Zaizhong. Discussion of Stability of the Trivial Solution for a Nonlinear Equation of Order Four[J]. Journal of Beijing University of Technology, 1992, 18(3): 83-86.
Citation: Liang Zaizhong. Discussion of Stability of the Trivial Solution for a Nonlinear Equation of Order Four[J]. Journal of Beijing University of Technology, 1992, 18(3): 83-86.

Discussion of Stability of the Trivial Solution for a Nonlinear Equation of Order Four

More Information
  • Received Date: June 25, 1991
  • Available Online: August 08, 2022
  • Published Date: September 09, 1992
  • Discussed the stability of the trivial solution for a more general equation of order four with two nonlinear terms.Sufficient cinditions are obtained for stability of these equations trivial solution and the corresponding results in Ogurtsov A I are extended.
  • Related Articles

    [1]CAI Yong-quan, XUE Fei, YANG Yi. Rational Threshold Signature Based on Hierarchical Key[J]. Journal of Beijing University of Technology, 2013, 39(9): 1366-1370.
    [2]ZHOU You-sheng, XIN Yang, QING Si-han, YANG Yi-xian. Forward-backward Secure Group Signature Scheme[J]. Journal of Beijing University of Technology, 2012, 38(5): 736-739.
    [3]CAI Yong-quan, CHENG Fu-lai. Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial[J]. Journal of Beijing University of Technology, 2012, 38(5): 727-729.
    [4]CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235.
    [5]LIU Zhen-hua, ZHANG Xiang-song, TIAN Xu-an, HU Yu-pu. Identity-based Signature Scheme with Partial Message Recovery in the Standard Model[J]. Journal of Beijing University of Technology, 2010, 36(5): 654-658.
    [6]DING Li, ZHOU Yuan, QIAN Hai-feng. Security Analysis and Improvement of Digital Multi-signature on the Generalized Conic Curve[J]. Journal of Beijing University of Technology, 2010, 36(5): 646-650.
    [7]YI Xiao-lin, ZHOU Wei, LU Peng-cheng. A Blind Signature Scheme Based on Hyperelliptic Curve[J]. Journal of Beijing University of Technology, 2010, 36(2): 261-267.
    [8]CAI Yong-quan, WANG Ya-li. Conference Key Agreement Protocol Based on Elliptic Curve[J]. Journal of Beijing University of Technology, 2007, 33(8): 870-873.
    [9]CAI Mian, KANG Li. Undeniable Multiple Grade Proxy Signature Scheme[J]. Journal of Beijing University of Technology, 2006, 32(10): 953-957.
    [10]CAI Mian, SUN Xing-fang. A Secure Authorized Group Signatures[J]. Journal of Beijing University of Technology, 2006, 32(5): 431-435.

Catalog

    Article views (168) PDF downloads (31) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return