-
461
Multiplicity of Positive Solutions for Fractional Differential Equation with p-Laplacian Boundary Value Problems
Published 2016-01-01“…We investigate the existence of multiple positive solutions of fractional differential equations with p-Laplacian operator Da+β(ϕp(Da+αu(t)))=f(t,u(t)), a<t<b, uja=0, j=0,1,2,…,n-2, u(α1)(b)=ξu(α1)(η), ϕp(Da+αu(a))=0=Da+β1(ϕp(Da+αu(b))), where β∈(1,2], α∈(n-1,n], n≥3, ξ∈(0,∞), η∈(a,b), β1∈(0,1], α1∈{1,2,…,α-2} is a fixed integer, and ϕp(s)=|s|p-2s, p>1, ϕp-1=ϕq, (1/p)+(1/q)=1, by applying Leggett–Williams fixed point theorems and fixed point index theory.…”
Get full text
Article -
462
Numerical Characteristic of Gear System Attractor in Phase Space based on G-P Algorithm of Correlation Dimension
Published 2019-07-01“…The results show that the more complex of attractor structure generates the larger correlation dimension values, and causing strong vibration to the system, correlation dimension of chaotic attractor is between integer 1 and 2 with fractal characteristic.…”
Get full text
Article -
463
Resource management in blockchain-enabled heterogeneous edge computing system
Published 2020-10-01“…In blockchain-enabled mobile edge computing (BMEC) systems,a new class of blockchain application related computation tasks was introduced to the system.Due to the differences of parallelism among computation tasks,heterogenous computing framework was introduced to suitably split various computation tasks on processors with vastly different processing power to achieve efficient task execution.Under the limited computation and communication resources,a system-wide utility maximization problem by jointly considering heterogeneous processor scheduling,computation and bandwidth resource allocation was formulated as a mixed-integer nonlinear programming problem.To solve the problem efficiently,the formulated problem was transformed into two sub-problems,namely application-driven heterogeneous processor scheduling and joint resource allocation,and a Lagrange-dual based algorithm was proposed.Simulation results show that the proposed scheme can effectively improve the system-wide utility of the BMEC system.…”
Get full text
Article -
464
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
465
Conformable Fractional-Order Modeling and Analysis of HIV/AIDS Transmission Dynamics
Published 2024-01-01“…Additionally, varied values of fractional orders are simulated numerically, demonstrating that the results generated by the conformable fractional derivative-based model are more physiologically plausible than integer-order derivatives.…”
Get full text
Article -
466
Network slicing deployment method based on isolation level
Published 2020-04-01“…In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.…”
Get full text
Article -
467
The Dynamic Spread of the Forward CDS with General Random Loss
Published 2014-01-01“…We assume that the filtration F is generated by a d-dimensional Brownian motion W=(W1,…,Wd)′ as well as an integer-valued random measure μ(du,dy). The random variable τ~ is the default time and L is the default loss. …”
Get full text
Article -
468
On the Construction of Regular Solutions for a Class of Generalized Cauchy–Riemann Systems with Coefficients Bounded on the Entire Plane
Published 2024-10-01“…The coefficient for the conjugation of the desired function belongs to the H¨older space and, for |z| > 1 , equals eimϕ , where m is an integer. For m ≤ 0 , the system was shown to have no nonzero solutions that grow no faster than a polynomial. …”
Get full text
Article -
469
Research on the Scheduling Problem of Movie Scenes
Published 2019-01-01“…This paper considers the factors affecting the cost of movie scenes shooting in the real world and constructs an integer linear programming model. A tabu search based method (TSBM) and a particle swarm optimization based method (PSOBM) are designed to solve larger-scale problems. …”
Get full text
Article -
470
Extensions of Some Parametric Families of D(16)-Triples
Published 2007-01-01“…Let n be an integer. A set of m positive integers is called a D(n)-m-tuple if the product of any two of them increased by n is a perfect square. …”
Get full text
Article -
471
On Properties of Class A(n) and n-Paranormal Operators
Published 2014-01-01“…Let n be a positive integer, and an operator T∈B(ℋ) is called a class A(n) operator if T1+n2/1+n≥|T|2 and n-paranormal operator if T1+nx1/1+n≥||Tx|| for every unit vector x∈ℋ, which are common generalizations of class A and paranormal, respectively. …”
Get full text
Article -
472
Research of the Method of Determining k Value in VMD based on Kurtosis
Published 2018-01-01“…Basis on the question above,a method of determining k by kurtosis is proposed. Selecting an integer value of k between 2 and n,every k kurtosis of the maximum correlation coefficient is calculated,and the variation curve of kurtosis is plotted. …”
Get full text
Article -
473
Dynamical Analysis of Approximate Solutions of HIV-1 Model with an Arbitrary Order
Published 2019-01-01“…For this purpose, first, the proposed integer order model is converted into fractional order model. …”
Get full text
Article -
474
Interlayer phase coherence and composite fermions
Published 2025-01-01“…In bilayer systems there is a regime at integer filling of the lowest Landau level that displays a spontaneous breakdown of the U(1) relative phase between the two layers. …”
Get full text
Article -
475
Indoor EKF localization algorithm based on RFID carrier phase
Published 2022-03-01“…In order to solve the problem of low localization accuracy caused by indoor environment interference in the existing UHF RFID localization methods, an indoor extended Kalman filter (EKF) localization algorithm based on frequency hopping assisted RFID carrier phase was proposed.The virtual large bandwidth obtained by frequency hopping was used for rough distance estimation to realize multipath suppression, and the reliable dual frequency point selection and parameter optimization were completed through the phase after multipath suppression.Finally, EKF algorithm was used to realize high-precision and fast localization.Experimental results show that the average localization error of the proposed algorithm is 9.35 cm, and the real-time performance of the localization solution is nearly 10 times higher than the traditional integer solution method based on Chinese remainder theorem (CRT).…”
Get full text
Article -
476
A Note on Caputo’s Derivative Operator Interpretation in Economy
Published 2018-01-01“…The reaction of economic agents due to recurrence identical alteration is minimized by using the modified Caputo’s derivative operator of order λ instead of integer order derivative n. The two sides of Caputo’s derivative are expressed by a brief time-line. …”
Get full text
Article -
477
Stabilization of the FO-BLDCM Chaotic System in the Sense of Lyapunov
Published 2015-01-01“…Based on an integer-order Brushless DC motors (IO-BLDCM) system, we give a fractional-order Brushless DC motors (FO-BLDCM) system in this paper. …”
Get full text
Article -
478
On close-to-convex functions of complex order
Published 1990-01-01“…The authors using the Ruscheweyh derivatives introduce the class K(b) of functions close-to-convex of complex order b, b≠0 and its generalization, the classes Kn(b) where n is a nonnegative integer. Here S*(b)⊂K(b)=K0(b). Sharp coefficient bounds are determined for Kn(b) as well as several sufficient conditions for functions to belong to Kn(b). …”
Get full text
Article -
479
On weakly prime-additive numbers with length $4k+3$
Published 2024-05-01“…If a positive integer $n$ has at least two distinct prime divisors and can be written as $n=p_1^{\alpha _1}+\dots +p_t^{\alpha _t}$, where $p_1<\dots 3$. …”
Get full text
Article -
480
Threshold Accepting Heuristic for Fair Flow Optimization in Wireless Mesh Networks
Published 2014-01-01“…In the underlaying optimization problem, the physical medium properties cause strong interference among simultaneously operating node devices, leading to nonlinearities in the mixed-integer pricing subproblem. That is where the threshold accepting procedure is applied. …”
Get full text
Article