In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential pol...In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential polynomial,which extends the related result of Li,and Chen et al..An example is given to show that the hypothesis on the zeros of a(z)is necessary.展开更多
The paper is devoted to non-homogeneous second-order differential equations with polynomial right parts and polynomial coefficients.We derive estimates for the partial sums and products of the zeros of solutions to th...The paper is devoted to non-homogeneous second-order differential equations with polynomial right parts and polynomial coefficients.We derive estimates for the partial sums and products of the zeros of solutions to the considered equations.These estimates give us bounds for the function counting the zeros of solutions and information about the zero-free domains.展开更多
The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak...The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak type double-stage Hall thruster configuration, and a particle-in-cell simulation is carried out to investigate the influences of both acceleration electrode voltage value and zero magnetic point position on the thruster discharge characteristics and performances.The results indicate that increasing the acceleration voltage leads to a larger potential drop in the acceleration stage, allowing ions to gain higher energy, while electrons are easily absorbed by the intermediate electrode, resulting in a decrease in the anode current and ionization rate. When the acceleration voltage reaches 500 V, the thrust and efficiency are maximized, resulting in a 15%increase in efficiency. After the acceleration voltage exceeds 500 V, a potential barrier forms within the channel, leading to a decrease in thruster efficiency. Further study shows that as the second zero magnetic point moves towards the outlet of the channel, more electrons easily traverse the zero magnetic field region, participating in the ionization. The increase in the ionization rate leads to a gradual enhancement in both thrust and efficiency.展开更多
Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national ...Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national challenges with poor viral suppression. The OTZ program aligns with the UNAIDS 95-95-95 goals. It seeks to empower AYPLHIV to be in charge of their treatment and commit to triple zero outcomeszero missed appointments, zero missed drugs, and zero viral loads. The purpose of the study was to assess the impact of the OTZ program on viral load suppression among members of the adolescent club in 68 NARHY, Lagos. Method: A cross-sectional retrospective study to evaluate the impact of the OTZ program on the viral load of 53 AYP enrolled in the OTZ program between March 2019 to December 2019 was analyzed. The Percentage of viral load suppression before enrollment compared with 6 and 12 months after enrollment into the OTZ program. The AYP is grouped into 10 - 14, 15 - 19, and 20 - 24 years. Activities conducted were peer driven monthly meetings with the AYP during which the adolescents interacted on issues relating to improving their treatment outcomes, healthcare workers reviewed their clinical status, viral load result, provider peer counseling, and caregivers engagement to support adherence to medication and ARV refills. Results: Before OTZ, 81% aged 10 - 14 years, 75% aged 15 - 19 years, and 25% aged 20 - 24 years were virally suppressed (VL less than 1000 copies/ml). Six months after enrollment, 94% were virally suppressed95% aged 10 - 14 years, 96% aged 15 - 19 years, and 66% aged 20-24 years. Twelve months after enrollment, 96% of AYP were virally suppressed100% aged 10-14 years, 93% aged 15 - 19 years, and 100% aged 20 - 24 years. Males viral load (VL) suppression improved from 79% to 96% and 92%, while females VL suppression improved from 69% to 93% and 100% at 6 and 12 months respectively. Conclusion: The OTZ activities contributed to improved viral load suppression in the AYP of the facility.展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study ...This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study of ring theory, depict relationships between elements of a ring that multiply to zero. The paper explores the development and implementation of algorithms in MAPLE for constructing these ZDGs. The comparative study aims to discern the strengths, limitations, and computational efficiency of different MAPLE algorithms for creating zero divisor graphs offering insights for mathematicians, researchers, and computational enthusiasts involved in ring theory and mathematical computations.展开更多
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ...Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats.展开更多
In the context of globalization,zero translation words are more and more frequently used in news discourse.This article aims to explore the reasons for the frequent use of zero translation words in news discourse and ...In the context of globalization,zero translation words are more and more frequently used in news discourse.This article aims to explore the reasons for the frequent use of zero translation words in news discourse and their impact on news discourse from the perspectives of translation studies and journalism and communication studies.展开更多
In this article, we study the complex oscillation problems of entire solutions to homogeneous and nonhomogeneous linear difference equations, and obtain some relations of the exponent of convergence of zeros and the o...In this article, we study the complex oscillation problems of entire solutions to homogeneous and nonhomogeneous linear difference equations, and obtain some relations of the exponent of convergence of zeros and the order of growth of entire solutions to complex linear difference equations.展开更多
We consider the zeros distributions of difference-differential polynomials which are the derivatives of difference products of entire functions. We also investigate the uniqueness problems of difference-differential p...We consider the zeros distributions of difference-differential polynomials which are the derivatives of difference products of entire functions. We also investigate the uniqueness problems of difference-differential polynomials of entire functions sharing a common value.展开更多
The paper gives two estimates of the distance between adjacent zeros of solutions of the first\|order delay differential equation x′(t)+p(t)x(t-τ) =0 in the case when p(t)≥0 and ∫ t t-τ p(s)d s-1e ...The paper gives two estimates of the distance between adjacent zeros of solutions of the first\|order delay differential equation x′(t)+p(t)x(t-τ) =0 in the case when p(t)≥0 and ∫ t t-τ p(s)d s-1e oscillates or p(t) itself oscillates.展开更多
We study zeros of the Jones polynomial and their distributions for torus knots and 2-bridge knots. We prove that e(2m+1)πi/2and e(2m+1)πi/4(m is a positive integer)can not be the zeros of Jones polynomial for torus ...We study zeros of the Jones polynomial and their distributions for torus knots and 2-bridge knots. We prove that e(2m+1)πi/2and e(2m+1)πi/4(m is a positive integer)can not be the zeros of Jones polynomial for torus knots T p,q by the knowledge of the trigonometric function. We elicit the normal form of Jones polynomials of the 2-bridge knot C(-2, 2, ···,(-1)r2) by the recursive form and discuss the distribution of their zeros.展开更多
In this article, we investigate the exponent of convergence of zeros of solutions for some higher-order homogeneous linear differential equation, and prove that if Ak-1 is the dominant coefficient, then every transcen...In this article, we investigate the exponent of convergence of zeros of solutions for some higher-order homogeneous linear differential equation, and prove that if Ak-1 is the dominant coefficient, then every transcendental solution f(z) of equation……satisfies )λ(f) =∞, where A(f) denotes the exponent of convergence of zeros of the meromor- phic function f(z).展开更多
Suppose that function f(z) is transcendental and meromorphic in the plane. The aim of this work is to investigate the conditions in which differential monomials f(z)f(k)(z) takes any non-zero finite complex nu...Suppose that function f(z) is transcendental and meromorphic in the plane. The aim of this work is to investigate the conditions in which differential monomials f(z)f(k)(z) takes any non-zero finite complex number infinitely times and to consider the normality relation to differential monomials f(z)f(k) (z).展开更多
Let f be a transcendental meromorphic function and △f(z) = f(z + 1) -- f(z) A number of results are proved concerning the existences of zeros and fixed points of Af(z) and △f(z)/f(z) when f(z) is of o...Let f be a transcendental meromorphic function and △f(z) = f(z + 1) -- f(z) A number of results are proved concerning the existences of zeros and fixed points of Af(z) and △f(z)/f(z) when f(z) is of order σ(f)=1. Examples show that some of the results are sharp.展开更多
The author proves that if f : C → C^n is a transcendental vector valued mero-morphic function of finite order and assume, This result extends the related results for meromorphic function by Singh and Kulkarni.
In this paper we shall obtain some interesting extensions and generalizations of a well-known theorem due to Enestrom and Kakeya according to which all the zeros of a polynomial P(Z =αnZn+...+α1Z+α0satisfying the r...In this paper we shall obtain some interesting extensions and generalizations of a well-known theorem due to Enestrom and Kakeya according to which all the zeros of a polynomial P(Z =αnZn+...+α1Z+α0satisfying the restriction αn≥αn-1≥...≥α1≥α0≥0 lie in the closed unit disk.展开更多
文摘In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential polynomial,which extends the related result of Li,and Chen et al..An example is given to show that the hypothesis on the zeros of a(z)is necessary.
文摘The paper is devoted to non-homogeneous second-order differential equations with polynomial right parts and polynomial coefficients.We derive estimates for the partial sums and products of the zeros of solutions to the considered equations.These estimates give us bounds for the function counting the zeros of solutions and information about the zero-free domains.
基金supported by National Natural Science Foundation of China (Nos. 11975062, 11605021 and 12375009)the Fundamental Research Funds for the Central Universities (No. 3132023192)。
文摘The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak type double-stage Hall thruster configuration, and a particle-in-cell simulation is carried out to investigate the influences of both acceleration electrode voltage value and zero magnetic point position on the thruster discharge characteristics and performances.The results indicate that increasing the acceleration voltage leads to a larger potential drop in the acceleration stage, allowing ions to gain higher energy, while electrons are easily absorbed by the intermediate electrode, resulting in a decrease in the anode current and ionization rate. When the acceleration voltage reaches 500 V, the thrust and efficiency are maximized, resulting in a 15%increase in efficiency. After the acceleration voltage exceeds 500 V, a potential barrier forms within the channel, leading to a decrease in thruster efficiency. Further study shows that as the second zero magnetic point moves towards the outlet of the channel, more electrons easily traverse the zero magnetic field region, participating in the ionization. The increase in the ionization rate leads to a gradual enhancement in both thrust and efficiency.
文摘Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national challenges with poor viral suppression. The OTZ program aligns with the UNAIDS 95-95-95 goals. It seeks to empower AYPLHIV to be in charge of their treatment and commit to triple zero outcomeszero missed appointments, zero missed drugs, and zero viral loads. The purpose of the study was to assess the impact of the OTZ program on viral load suppression among members of the adolescent club in 68 NARHY, Lagos. Method: A cross-sectional retrospective study to evaluate the impact of the OTZ program on the viral load of 53 AYP enrolled in the OTZ program between March 2019 to December 2019 was analyzed. The Percentage of viral load suppression before enrollment compared with 6 and 12 months after enrollment into the OTZ program. The AYP is grouped into 10 - 14, 15 - 19, and 20 - 24 years. Activities conducted were peer driven monthly meetings with the AYP during which the adolescents interacted on issues relating to improving their treatment outcomes, healthcare workers reviewed their clinical status, viral load result, provider peer counseling, and caregivers engagement to support adherence to medication and ARV refills. Results: Before OTZ, 81% aged 10 - 14 years, 75% aged 15 - 19 years, and 25% aged 20 - 24 years were virally suppressed (VL less than 1000 copies/ml). Six months after enrollment, 94% were virally suppressed95% aged 10 - 14 years, 96% aged 15 - 19 years, and 66% aged 20-24 years. Twelve months after enrollment, 96% of AYP were virally suppressed100% aged 10-14 years, 93% aged 15 - 19 years, and 100% aged 20 - 24 years. Males viral load (VL) suppression improved from 79% to 96% and 92%, while females VL suppression improved from 69% to 93% and 100% at 6 and 12 months respectively. Conclusion: The OTZ activities contributed to improved viral load suppression in the AYP of the facility.
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
文摘This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study of ring theory, depict relationships between elements of a ring that multiply to zero. The paper explores the development and implementation of algorithms in MAPLE for constructing these ZDGs. The comparative study aims to discern the strengths, limitations, and computational efficiency of different MAPLE algorithms for creating zero divisor graphs offering insights for mathematicians, researchers, and computational enthusiasts involved in ring theory and mathematical computations.
文摘Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats.
文摘In the context of globalization,zero translation words are more and more frequently used in news discourse.This article aims to explore the reasons for the frequent use of zero translation words in news discourse and their impact on news discourse from the perspectives of translation studies and journalism and communication studies.
基金supported by the National Natural Science Foundation of China (11171119 and 10871076)
文摘In this article, we study the complex oscillation problems of entire solutions to homogeneous and nonhomogeneous linear difference equations, and obtain some relations of the exponent of convergence of zeros and the order of growth of entire solutions to complex linear difference equations.
基金supported by the NSFC(11026110,11101201)the NSF of Jiangxi(2010GQS0144)
文摘We consider the zeros distributions of difference-differential polynomials which are the derivatives of difference products of entire functions. We also investigate the uniqueness problems of difference-differential polynomials of entire functions sharing a common value.
文摘The paper gives two estimates of the distance between adjacent zeros of solutions of the first\|order delay differential equation x′(t)+p(t)x(t-τ) =0 in the case when p(t)≥0 and ∫ t t-τ p(s)d s-1e oscillates or p(t) itself oscillates.
基金Supported by the National Science Foundation of China(11471151) Supported by Program for Liaoning Excellent Talents in University(LR2011031)
Acknowledgment The authors would like to thank the referees for kind suggestions and many useful comments
文摘We study zeros of the Jones polynomial and their distributions for torus knots and 2-bridge knots. We prove that e(2m+1)πi/2and e(2m+1)πi/4(m is a positive integer)can not be the zeros of Jones polynomial for torus knots T p,q by the knowledge of the trigonometric function. We elicit the normal form of Jones polynomials of the 2-bridge knot C(-2, 2, ···,(-1)r2) by the recursive form and discuss the distribution of their zeros.
基金supported by the National Natura Science Foundation of China (11171119)Funding of Tianyuan (11226090)
文摘In this article, we investigate the exponent of convergence of zeros of solutions for some higher-order homogeneous linear differential equation, and prove that if Ak-1 is the dominant coefficient, then every transcendental solution f(z) of equation……satisfies )λ(f) =∞, where A(f) denotes the exponent of convergence of zeros of the meromor- phic function f(z).
基金Foundation item: Supported by the National Natural Science Foundation of Education Department of Sichuan Province(2002A031) Supported by the "11.5" Research and Study Programs of SWUST(06zx2116) Supported by the National Natural Science Foundation of China(10271122)
文摘Suppose that function f(z) is transcendental and meromorphic in the plane. The aim of this work is to investigate the conditions in which differential monomials f(z)f(k)(z) takes any non-zero finite complex number infinitely times and to consider the normality relation to differential monomials f(z)f(k) (z).
基金supported by the NSF of Shandong Province, China (ZR2010AM030)the NNSF of China (11171013 & 11041005)
文摘Let f be a transcendental meromorphic function and △f(z) = f(z + 1) -- f(z) A number of results are proved concerning the existences of zeros and fixed points of Af(z) and △f(z)/f(z) when f(z) is of order σ(f)=1. Examples show that some of the results are sharp.
基金supported by the National Natural Science Foundation of China(11201395)supported by the Science Foundation of Educational Commission of Hubei Province(Q20132801)
文摘The author proves that if f : C → C^n is a transcendental vector valued mero-morphic function of finite order and assume, This result extends the related results for meromorphic function by Singh and Kulkarni.
文摘In this paper we shall obtain some interesting extensions and generalizations of a well-known theorem due to Enestrom and Kakeya according to which all the zeros of a polynomial P(Z =αnZn+...+α1Z+α0satisfying the restriction αn≥αn-1≥...≥α1≥α0≥0 lie in the closed unit disk.