期刊文献+
共找到115篇文章
< 1 2 6 >
每页显示 20 50 100
Normality Criteria of Meromorphic Functions Concerning Shared Fixed-points 被引量:1
1
作者 杨祺 《Chinese Quarterly Journal of Mathematics》 2015年第1期20-29,共10页
In this paper, we study the normality criteria of meromorphic functions concerning shared fixed-points, we obtain: Let F be a family of meromorphic functions defined in a domain D. Let n, k ≥ 2 be two positive intege... In this paper, we study the normality criteria of meromorphic functions concerning shared fixed-points, we obtain: Let F be a family of meromorphic functions defined in a domain D. Let n, k ≥ 2 be two positive integers. For every f ∈ F, all of whose zeros have multiplicity at least (nk+2)/(n-1). If f(f(k))nand g(g(k))nshare z in D for each pair of functions f and g, then F is normal. 展开更多
关键词 meromorphic function fixed-points shared value normal criterion
下载PDF
Sparse-Grid Implementation of Fixed-Point Fast Sweeping WENO Schemes for Eikonal Equations
2
作者 Zachary M.Miksis Yong-Tao Zhang 《Communications on Applied Mathematics and Computation》 EI 2024年第1期3-29,共27页
Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of ... Fixed-point fast sweeping methods are a class of explicit iterative methods developed in the literature to efficiently solve steady-state solutions of hyperbolic partial differential equations(PDEs).As other types of fast sweeping schemes,fixed-point fast sweeping methods use the Gauss-Seidel iterations and alternating sweeping strategy to cover characteristics of hyperbolic PDEs in a certain direction simultaneously in each sweeping order.The resulting iterative schemes have a fast convergence rate to steady-state solutions.Moreover,an advantage of fixed-point fast sweeping methods over other types of fast sweeping methods is that they are explicit and do not involve the inverse operation of any nonlinear local system.Hence,they are robust and flexible,and have been combined with high-order accurate weighted essentially non-oscillatory(WENO)schemes to solve various hyperbolic PDEs in the literature.For multidimensional nonlinear problems,high-order fixed-point fast sweeping WENO methods still require quite a large amount of computational costs.In this technical note,we apply sparse-grid techniques,an effective approximation tool for multidimensional problems,to fixed-point fast sweeping WENO methods for reducing their computational costs.Here,we focus on fixed-point fast sweeping WENO schemes with third-order accuracy(Zhang et al.2006[41]),for solving Eikonal equations,an important class of static Hamilton-Jacobi(H-J)equations.Numerical experiments on solving multidimensional Eikonal equations and a more general static H-J equation are performed to show that the sparse-grid computations of the fixed-point fast sweeping WENO schemes achieve large savings of CPU times on refined meshes,and at the same time maintain comparable accuracy and resolution with those on corresponding regular single grids. 展开更多
关键词 fixed-point fast sweeping methods Weighted essentially non-oscillatory(WENO)schemes Sparse grids Static Hamilton-Jacobi(H-J)equations Eikonal equations
下载PDF
A Secure and Effective Energy-Aware Fixed-Point Quantization Scheme for Asynchronous Federated Learning
3
作者 Zerui Zhen Zihao Wu +3 位作者 Lei Feng Wenjing Li Feng Qi Shixuan Guo 《Computers, Materials & Continua》 SCIE EI 2023年第5期2939-2955,共17页
Asynchronous federated learning(AsynFL)can effectivelymitigate the impact of heterogeneity of edge nodes on joint training while satisfying participant user privacy protection and data security.However,the frequent ex... Asynchronous federated learning(AsynFL)can effectivelymitigate the impact of heterogeneity of edge nodes on joint training while satisfying participant user privacy protection and data security.However,the frequent exchange of massive data can lead to excess communication overhead between edge and central nodes regardless of whether the federated learning(FL)algorithm uses synchronous or asynchronous aggregation.Therefore,there is an urgent need for a method that can simultaneously take into account device heterogeneity and edge node energy consumption reduction.This paper proposes a novel Fixed-point Asynchronous Federated Learning(FixedAsynFL)algorithm,which could mitigate the resource consumption caused by frequent data communication while alleviating the effect of device heterogeneity.FixedAsynFL uses fixed-point quantization to compress the local and global models in AsynFL.In order to balance energy consumption and learning accuracy,this paper proposed a quantization scale selection mechanism.This paper examines the mathematical relationship between the quantization scale and energy consumption of the computation/communication process in the FixedAsynFL.Based on considering the upper bound of quantization noise,this paper optimizes the quantization scale by minimizing communication and computation consumption.This paper performs pertinent experiments on the MNIST dataset with several edge nodes of different computing efficiency.The results show that the FixedAsynFL algorithm with an 8-bit quantization can significantly reduce the communication data size by 81.3%and save the computation energy in the training phase by 74.9%without significant loss of accuracy.According to the experimental results,we can see that the proposed AsynFixedFL algorithm can effectively solve the problem of device heterogeneity and energy consumption limitation of edge nodes. 展开更多
关键词 Asynchronous federated learning artificial intelligence model compression energy consumption fixed-point quantization learning accuracy
下载PDF
A Fixed-Point Iterative Method for Discrete Tomography Reconstruction Based on Intelligent Optimization
4
作者 Luyao Yang Hao Chen +2 位作者 Haocheng Yu Jin Qiu Shuxian Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期731-745,共15页
Discrete Tomography(DT)is a technology that uses image projection to reconstruct images.Its reconstruction problem,especially the binary image(0–1matrix)has attracted strong attention.In this study,a fixed point iter... Discrete Tomography(DT)is a technology that uses image projection to reconstruct images.Its reconstruction problem,especially the binary image(0–1matrix)has attracted strong attention.In this study,a fixed point iterative method of integer programming based on intelligent optimization is proposed to optimize the reconstructedmodel.The solution process can be divided into two procedures.First,the DT problem is reformulated into a polyhedron judgment problembased on lattice basis reduction.Second,the fixed-point iterativemethod of Dang and Ye is used to judge whether an integer point exists in the polyhedron of the previous program.All the programs involved in this study are written in MATLAB.The final experimental data show that this method is obviously better than the branch and bound method in terms of computational efficiency,especially in the case of high dimension.The branch and bound method requires more branch operations and takes a long time.It also needs to store a large number of leaf node boundaries and the corresponding consumptionmatrix,which occupies a largememory space. 展开更多
关键词 Discrete tomography integer programming fixed-point iterative algorithm intelligent optimization lattice basis reduction
下载PDF
A Fixed-Point Fast Sweeping WENO Method with Inverse Lax-Wendroff Boundary Treatment for Steady State of Hyperbolic Conservation Laws
5
作者 Liang Li Jun Zhu +1 位作者 Chi-Wang Shu Yong-Tao Zhang 《Communications on Applied Mathematics and Computation》 2023年第1期403-427,共25页
Fixed-point fast sweeping WENO methods are a class of efficient high-order numerical methods to solve steady-state solutions of hyperbolic partial differential equations(PDEs).The Gauss-Seidel iterations and alternati... Fixed-point fast sweeping WENO methods are a class of efficient high-order numerical methods to solve steady-state solutions of hyperbolic partial differential equations(PDEs).The Gauss-Seidel iterations and alternating sweeping strategy are used to cover characteristics of hyperbolic PDEs in each sweeping order to achieve fast convergence rate to steady-state solutions.A nice property of fixed-point fast sweeping WENO methods which distinguishes them from other fast sweeping methods is that they are explicit and do not require inverse operation of nonlinear local systems.Hence,they are easy to be applied to a general hyperbolic system.To deal with the difficulties associated with numerical boundary treatment when high-order finite difference methods on a Cartesian mesh are used to solve hyperbolic PDEs on complex domains,inverse Lax-Wendroff(ILW)procedures were developed as a very effective approach in the literature.In this paper,we combine a fifthorder fixed-point fast sweeping WENO method with an ILW procedure to solve steadystate solution of hyperbolic conservation laws on complex computing regions.Numerical experiments are performed to test the method in solving various problems including the cases with the physical boundary not aligned with the grids.Numerical results show highorder accuracy and good performance of the method.Furthermore,the method is compared with the popular third-order total variation diminishing Runge-Kutta(TVD-RK3)time-marching method for steady-state computations.Numerical examples show that for most of examples,the fixed-point fast sweeping method saves more than half CPU time costs than TVD-RK3 to converge to steady-state solutions. 展开更多
关键词 fixed-point fast sweeping methods Multi-resolution WENO schemes Steady state ILW procedure Convergence
下载PDF
The Criteria for Reducing Centrally Restricted Three-Body Problem to Two-Body Problem
6
作者 Bijay Kumar Sharma 《International Journal of Astronomy and Astrophysics》 2024年第1期1-19,共19页
Our Solar System contains eight planets and their respective natural satellites excepting the inner two planets Mercury and Venus. A satellite hosted by a given Planet is well protected by the gravitational pertubatio... Our Solar System contains eight planets and their respective natural satellites excepting the inner two planets Mercury and Venus. A satellite hosted by a given Planet is well protected by the gravitational pertubation of much heavier planets such as Jupiter and Saturn if the natural satellite lies deep inside the respective host Planet Hill sphere. Each planet has a Hill radius a<sub>H</sub> and planet mean radius R<sub>P </sub>and the ratio R<sub>1</sub>=R<sub>P</sub>/a<sub>H</sub>. Under very low R<sub>1 </sub>(less than 0.006) the approximation of CRTBP (centrally restricted three-body problem) to two-body problem is valid and planet has spacious Hill lobe to capture a satellite and retain it. This ensures a high probability of capture of natural satellite by the given planet and Sun’s perturbation on Planet-Satellite binary can be neglected. This is the case with Earth, Mars, Jupiter, Saturn, Neptune and Uranus. But Mercury and Venus has R<sub>1</sub>=R<sub>P</sub>/a<sub>H</sub> =0.01 and 5.9862 × 10<sup>-3</sup> respectively hence they have no satellites. There is a limit to the dimension of the captured body. It must be a much smaller body both dimensionally as well masswise. The qantitative limit is a subject of an independent study. 展开更多
关键词 Hill’s Radius Two-Body Problem fixed-point Solution Lagrange Points Earth-Moon-Test Particle CRTBP
下载PDF
Quantum Polynomial-Time Fixed-Point Attack for RSA 被引量:3
7
作者 Yahui Wang Huanguo Zhang Houzhen Wang 《China Communications》 SCIE CSCD 2018年第2期25-32,共8页
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d... Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed. 展开更多
关键词 information security cryptogra-phy RSA fixed-point quantum computing
下载PDF
Fixed-Point Iteration Method for Solving the Convex Quadratic Programming with Mixed Constraints 被引量:1
8
作者 Ruopeng Wang Hong Shi +1 位作者 Kai Ruan Xiangyu Gao 《Applied Mathematics》 2014年第2期256-262,共7页
The present paper is devoted to a novel smoothing function method for convex quadratic programming problem with mixed constrains, which has important application in mechanics and engineering science. The problem is re... The present paper is devoted to a novel smoothing function method for convex quadratic programming problem with mixed constrains, which has important application in mechanics and engineering science. The problem is reformulated as a system of non-smooth equations, and then a smoothing function for the system of non-smooth equations is proposed. The condition of convergences of this iteration algorithm is given. Theory analysis and primary numerical results illustrate that this method is feasible and effective. 展开更多
关键词 fixed-point ITERATION CONVEX QUADRATIC Programming Problem Convergence SMOOTHING Function
下载PDF
Attractive fixed-point solution study of shell model for homogeneous isotropic turbulence
9
作者 郭昊 李超 +1 位作者 屈秋林 刘沛清 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2013年第3期259-268,共10页
The attractive fixed-point solution of a nonlinear cascade model is stud- ied for the homogeneous isotropic turbulence containing a parameter C, introduced by Desnyansky and Novikov. With a traditional constant positi... The attractive fixed-point solution of a nonlinear cascade model is stud- ied for the homogeneous isotropic turbulence containing a parameter C, introduced by Desnyansky and Novikov. With a traditional constant positive external force added on the first shell equation, it can be found that the attractive fixed-point solution of the model depends on both the parameter C and the external force. Thus, an explicit force is introduced to remove the effects of the external force on the attractive fixed-point solu- tion. F^arthermore, two groups of attractive fixed-point solutions are derived theoretically and studied numerically. One of the groups has the same scaling behavior of the velocity in the whole inertial range and agrees well with those observed by Bell and Nelkin for the nonnegative parameters. The other is found to have different scaling behaviors of the velocity at the odd and even number shells for the negative parameters. This special characteristic may be used to study the anomalous scaling behavior of the turbulence. 展开更多
关键词 TURBULENCE shell model attractive fixed-point SCALING
下载PDF
Quantum search for unknown number of target items by hybridizing fixed-point method with trail-and-error method
10
作者 Tan Li Shuo Zhang +4 位作者 Xiang-Qun Fu Xiang Wang Yang Wang Jie Lin Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第12期68-74,共7页
For the unsorted database quantum search with the unknown fraction λ of target items, there are mainly two kinds of methods, i.e., fixed-point and trail-and-error.(i) In terms of the fixed-point method, Yoder et al. ... For the unsorted database quantum search with the unknown fraction λ of target items, there are mainly two kinds of methods, i.e., fixed-point and trail-and-error.(i) In terms of the fixed-point method, Yoder et al. [Phys. Rev. Lett.113 210501(2014)] claimed that the quadratic speedup over classical algorithms has been achieved. However, in this paper, we point out that this is not the case, because the query complexity of Yoder’s algorithm is actually in O(1/λ01/2)rather than O(1/λ1/2), where λ0 is a known lower bound of λ.(ii) In terms of the trail-and-error method, currently the algorithm without randomness has to take more than 1 times queries or iterations than the algorithm with randomly selected parameters. For the above problems, we provide the first hybrid quantum search algorithm based on the fixed-point and trail-and-error methods, where the matched multiphase Grover operations are trialed multiple times and the number of iterations increases exponentially along with the number of trials. The upper bound of expected queries as well as the optimal parameters are derived. Compared with Yoder’s algorithm, the query complexity of our algorithm indeed achieves the optimal scaling in λ for quantum search, which reconfirms the practicality of the fixed-point method. In addition, our algorithm also does not contain randomness, and compared with the existing deterministic algorithm, the query complexity can be reduced by about 1/3. Our work provides a new idea for the research on fixed-point and trial-and-error quantum search. 展开更多
关键词 quantum search fixed-point trail-and-error unknown number of target items
下载PDF
Investigation on dynamic characteristics of a rod fastening rotor-bearing coupling system with fixed-point rubbing
11
作者 Yang YANG HJOUYANG +3 位作者 Jin ZENG Hui MA Yiren YANG Dengqing CAO 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2022年第7期1063-1080,共18页
The aim of this paper is to gain insight into the nonlinear vibration feature of a dynamic model of a gas turbine.First,a rod fastening rotor-bearing coupling model with fixed-point rubbing is proposed,where the fract... The aim of this paper is to gain insight into the nonlinear vibration feature of a dynamic model of a gas turbine.First,a rod fastening rotor-bearing coupling model with fixed-point rubbing is proposed,where the fractal theory and the finite element method are utilized.For contact analysis,a novel contact force model is introduced in this paper.Meanwhile,the Coulomb model is adopted to expound the friction characteristics.Second,the governing equations of motion of the rotor system are numerically solved,and the nonlinear dynamic characteristics are analyzed in terms of the bifurcation diagram,Poincarémap,and time history.Third,the potential effects provided by contact degree of joint interface,distribution position,and amount of contact layer are discussed in detail.Finally,the contrast analysis between the integral rotor and the rod fastening rotor is conducted under the condition of fixed-point rubbing. 展开更多
关键词 rod fastening rotor joint interface fixed-point rubbing nonlinear dynamic characteristic
下载PDF
Study on growth cycle and ultrastructure of calmodulin fixed-point yeast mutant
12
作者 陈孙孝 姚志荣 +3 位作者 温海 邓安梅 仲人前 廖万清 《Journal of Medical Colleges of PLA(China)》 CAS 2002年第2期85-87,111,共4页
Objective: To study the effects of the fixed-point mutant on growth cycle and ultrastructure of the Calmodulin fixed-point mutant yeast. Methods: Growth cycle and ultrastructure of the Calmodulin fixed-point mutant ye... Objective: To study the effects of the fixed-point mutant on growth cycle and ultrastructure of the Calmodulin fixed-point mutant yeast. Methods: Growth cycle and ultrastructure of the Calmodulin fixed-point mutant yeast were studied by using cytometry and scan electron microscope. Results: After culture at 30'C for 36 h, the content of aneuploidy of the temperature-sensitive recombinant yeast monoploid B(F92+) and E(F89+FH1 + ) strains were 63. 87% and 63. 55%, respectively. These were significantly different from control OP<0. 01) ; The content of the non-temperature-sensitive recombinant yeast monoploid A(F89+) and C(F141+) strains were 100. 00% and 99. 97% , respectively, which were not significantly different from control value (P>0. 05). Observed by scan electron microscope, the control group, A and C strain's buds were spherical or oval and those bud-necks were fairly shorter; the B and E strain's buds were slender, some cell were abnormal and some buds might show spherical or oval. Conclusion: DNA division and growth velocity of the temperature-sensitive recombinant B and E strains are slower than those of control group and the non-temperature-sensitive recombinant A and C strains. 展开更多
关键词 CALMODULIN fixed-point mutant RECOMBINANT life cycle ULTRASTRUCTURE
下载PDF
FIXED-POINT BLIND ADAPTIVE MULTIUSER DETECTION ALGORITHM FOR IR UWB SYSTEMS IN MULTIPATH CHANNEL
13
作者 Wang Feng Xu Chengqi 《Journal of Electronics(China)》 2010年第2期157-165,共9页
Using the hypothesis that data transmitted by different users are statistically independent of each other,this paper proposes a fixed-point blind adaptive multiuser detection algorithm for Time-Hopping (TH) Impulse Ra... Using the hypothesis that data transmitted by different users are statistically independent of each other,this paper proposes a fixed-point blind adaptive multiuser detection algorithm for Time-Hopping (TH) Impulse Radio (IR) Ultra Wide Band (UWB) systems in multipath channel,which is based on Independent Component Analysis (ICA) idea. The proposed algorithm employs maximizing negentropy criterion to separate the data packets of different users. Then the user characteristic se-quences are utilized to identify the data packet order of the desired user. This algorithm only needs the desired user’s characteristic sequence instead of channel information,power information and time-hoping code of any user. Due to using hypothesis of statistical independence among users,the proposed algorithm has the outstanding Bit Error Rate (BER) performance and the excellent ability of near-far resistance. Simulation results demonstrate that this algorithm has the performance close to that of Maximum-Likelihood (ML) algorithm and is a suboptimum blind adaptive multiuser detection algorithm of excellent near-far resistance and low complexity. 展开更多
关键词 Ultra Wide Band (UWB) MultiUser Detection (MUD) Bind adaptive fixed-point Multipath channel
下载PDF
THE FAST FIXED-POINT ALGORITHM FOR SPECKLE REDUCTION OF POLARIMETRIC SAR IMAGE
14
作者 FuYusheng ChertXiaoning PiYiming HouYinming 《Journal of Electronics(China)》 2005年第3期288-293,共6页
In this letter, a simple and efficient method of image speckle reduction for polari- metric SAR is put forward. It is based on the fast fixed-point ICA (Independent Component Analysis) algorithm of orthogonal and symm... In this letter, a simple and efficient method of image speckle reduction for polari- metric SAR is put forward. It is based on the fast fixed-point ICA (Independent Component Analysis) algorithm of orthogonal and symmetric matrix. Simulation experiment is carried out to separate speckle noise from the polarimetric SAR images, and it indicates that this algorithm has high convergency speed and stability, the image speckle noise is reduced effectively and the speckle index is low, and the image quality is improved obviously. 展开更多
关键词 SAR Fast fixed-point Independent Component Analysis (ICA) Principal Com- ponent Analysis (PCA) KURTOSIS SPECKLE
下载PDF
Solving a Class of Brouwer Fixed-point Problems via a Modified Aggregate Constraint Homotopy Method
15
作者 苏孟龙 吕显瑞 《Northeastern Mathematical Journal》 CSCD 2007年第5期377-385,共9页
In this paper, we provide an aggregate function homotopy interior point method to solve a class of Brouwer fixed-point problems. Compared with the homotopy method (proposed by Yu and Lin, Appl. Math. Comput., 74(199... In this paper, we provide an aggregate function homotopy interior point method to solve a class of Brouwer fixed-point problems. Compared with the homotopy method (proposed by Yu and Lin, Appl. Math. Comput., 74(1996), 65), the main adavantages of this method are as foUows: on the one hand, it can solve the Brouwer fixed-point problems in a broader class of nonconvex subsets Ω in R^n (in this paper, we let Ω={x∈ R^n : gi(x) ≤0, i= 1,... , m}); on the other hand, it can also deal with the subsets Ω with larger amount of constraints more effectively. 展开更多
关键词 homotopy method Brouwer fixed-point problem nonconvex subset
下载PDF
Modified Homotopy Method for a Class of Brouwer Fixed-point Problems
16
作者 苏孟龙 吕显瑞 《Northeastern Mathematical Journal》 CSCD 2007年第1期35-42,共8页
In this paper, we modify the homotopy method (proposed by Yu and Lin, Appl. Math. Comput., 74(1996), 65) and hence make the modified method be able to solve Brouwer fixed-point problems in a broader class of nonco... In this paper, we modify the homotopy method (proposed by Yu and Lin, Appl. Math. Comput., 74(1996), 65) and hence make the modified method be able to solve Brouwer fixed-point problems in a broader class of nonconvex subsets in Rn. In addition, a simple example is given to show the effectiveness of the modified method. 展开更多
关键词 homotopy method Brouwer fixed-point problem nonconvex subset
下载PDF
Traversable Wormholes and the Brouwer Fixed-Point Theorem
17
作者 Peter K. F. Kuhfittig 《Journal of Applied Mathematics and Physics》 2020年第7期1263-1268,共6页
The Brouwer fixed-point theorem in topology states that for any continuous mapping <em>f</em> on a compact convex set into itself admits a fixed point, <em>i.e.</em>, a point <em>x</em... The Brouwer fixed-point theorem in topology states that for any continuous mapping <em>f</em> on a compact convex set into itself admits a fixed point, <em>i.e.</em>, a point <em>x</em><sub>0</sub> such that<em> f</em>(<em>x</em><sub>0</sub>) = <em>x</em><sub>0</sub>. Under suitable conditions, this fixed point corresponds to the throat of a traversable wormhole, <em>i.e.</em>, <em>b</em>(<em>r</em><sub>0</sub>) = <em>r</em><sub>0</sub> for the shape function <em>b</em> = <em>b</em>(<em>r</em>). The possible existence of wormholes can therefore be deduced from purely mathematical considerations without going beyond the existing physical requirements. 展开更多
关键词 Traversable Wormholes Brouwer fixed-point Theorem
下载PDF
Maximum Correntropy Kalman Filtering for Non-Gaussian Systems With State Saturations and Stochastic Nonlinearities 被引量:1
18
作者 Bo Shen Xuelin Wang Lei Zou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1223-1233,共11页
This paper tackles the maximum correntropy Kalman filtering problem for discrete time-varying non-Gaussian systems subject to state saturations and stochastic nonlinearities. The stochastic nonlinearities, which take ... This paper tackles the maximum correntropy Kalman filtering problem for discrete time-varying non-Gaussian systems subject to state saturations and stochastic nonlinearities. The stochastic nonlinearities, which take the form of statemultiplicative noises, are introduced in systems to describe the phenomenon of nonlinear disturbances. To resist non-Gaussian noises, we consider a new performance index called maximum correntropy criterion(MCC) which describes the similarity between two stochastic variables. To enhance the “robustness” of the kernel parameter selection on the resultant filtering performance, the Cauchy kernel function is adopted to calculate the corresponding correntropy. The goal of this paper is to design a Kalman-type filter for the underlying systems via maximizing the correntropy between the system state and its estimate. By taking advantage of an upper bound on the one-step prediction error covariance, a modified MCC-based performance index is constructed. Subsequently, with the assistance of a fixed-point theorem, the filter gain is obtained by maximizing the proposed cost function. In addition, a sufficient condition is deduced to ensure the uniqueness of the fixed point. Finally, the validity of the filtering method is tested by simulating a numerical example. 展开更多
关键词 fixed-point theorem maximum correntropy criterion non-Gaussian noises state saturations stochastic nonlinearities
下载PDF
Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks 被引量:1
19
作者 Kangkang Zhang Christodoulos Keliris +2 位作者 Thomas Parisini Bin Jiang Marios M.Polycarpou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期898-915,共18页
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integri... This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integrity attack strategy is first proposed by modifying a zero-dynamics attack model.The stealthiness of the generated attacks is rigorously investigated under the condition that the adversary does not know precisely the system state values.In order to help detect such attacks,a backward-in-time detection residual is proposed based on an equivalent quantity of the system state change,due to the attack,at a time prior to the attack occurrence time.A key characteristic of this residual is that its magnitude increases every time a new attack occurs.To estimate this unknown residual,an optimal fixed-point smoother is proposed by minimizing a piece-wise linear quadratic cost function with a set of specifically designed weighting matrices.The smoother design guarantees robustness with respect to process disturbances and measurement noise,and is also able to maintain sensitivity as time progresses to intermittent integrity attack by resetting the covariance matrix based on the weighting matrices.The adaptive threshold is designed based on the estimated backward-in-time residual,and the attack detectability analysis is rigorously investigated to characterize quantitatively the class of attacks that can be detected by the proposed methodology.Finally,a simulation example is used to demonstrate the effectiveness of the developed methodology. 展开更多
关键词 Backward-in-time equivalent quantity fixed-point smoother intermittent integrity attacks
下载PDF
THE EXISTENCE AND MULTIPLICITY OF k-CONVEX SOLUTIONS FOR A COUPLED k-HESSIAN SYSTEM
20
作者 高承华 何兴玥 王晶晶 《Acta Mathematica Scientia》 SCIE CSCD 2023年第6期2615-2628,共14页
In this paper,we focus on the following coupled system of k-Hessian equations:{S_(k)(λ(D^(2)u))=f_(1)(|x|,-v)in B,S_(k)(λ(D^(2)v))=f2(|x|,-u)in B,u=v=0 on■B.Here B is a unit ball with center 0 and fi(i=1,2)are cont... In this paper,we focus on the following coupled system of k-Hessian equations:{S_(k)(λ(D^(2)u))=f_(1)(|x|,-v)in B,S_(k)(λ(D^(2)v))=f2(|x|,-u)in B,u=v=0 on■B.Here B is a unit ball with center 0 and fi(i=1,2)are continuous and nonnegative functions.By introducing some new growth conditions on the nonlinearities f_(1) and f_(2),which are more flexible than the existing conditions for the k-Hessian systems(equations),several new existence and multiplicity results for k-convex solutions for this kind of problem are obtained. 展开更多
关键词 system of k-Hessian equations k-convex solutions EXISTENCE MULTIPLICITY fixed-point theorem
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部