Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel dist...Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel distributed algorithm was proposed to achieve the multi-hop authentication for mobile ad hoc networks. In addition, a protocol verifying the identity with zero knowledge proofs was designed so that the reuse of certificates comes into truth. Moreover, the security of this algorithm was proved through the random oracle model. With the lower cost of computation and communication, this algorithm is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.展开更多
In this paper we extend the construction of the field of rational numbers from the ring of integers to an arbitrary commutative ordered semigroup. We first construct a fractional ordered semigroup and a homomorphism ...In this paper we extend the construction of the field of rational numbers from the ring of integers to an arbitrary commutative ordered semigroup. We first construct a fractional ordered semigroup and a homomorphism φs : R → S^-1 R. Secondly, we characterize the commutative ordered semigroup so constructed by a universal mapping property.展开更多
Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two...Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure. We show that some parameters should be carefully selected in the scheme to resist our attacks.展开更多
Aiming at the group of autonomous agents consisting of multiple leader agents and multiple follower ones,a flocking behavior method with multiple leaders and a global trajectory was proposed.In this flocking method,th...Aiming at the group of autonomous agents consisting of multiple leader agents and multiple follower ones,a flocking behavior method with multiple leaders and a global trajectory was proposed.In this flocking method,the group leaders can attain the information of the global trajectory,while each follower can communicate with its neighbors and corresponding leader but does not have global knowledge.Being to a distributed control method,the proposed method firstly sets a movable imaginary point on the global trajectory to ensure that the center and average velocity of the leader agents satisfy the constraints of the global trajectory.Secondly,a two-stage strategy was proposed to make the whole group satisfy the constraints of the global trajectory.Moreover,the distance between the center of the group and the desired trajectory was analyzed in detail according to the number ratio of the followers to the leaders.In this way,on one hand,the agents of the group emerge a basic flocking behavior; on the other hand,the center of the group satisfies the constraints of global trajectory.Simulation results demonstrate the effectiveness of the proposed method.展开更多
Each nationality has formed unique ethnic culture in the long history. Ethnic culture is spatially reflected byethnic distribution. The distribution of nationalities is influenced by ethnic history, culture, society a...Each nationality has formed unique ethnic culture in the long history. Ethnic culture is spatially reflected byethnic distribution. The distribution of nationalities is influenced by ethnic history, culture, society and religion, alsoaffected by regional physical setting. This paper analyzes the relationship between ethnic distribution pattern and naturalsetting with contrast analytical method. The digital elevation model (DEM) is established on basis of contour map on ascale of 1:250,000 in the Nujiang River basin, Yunnan Province by ArcGIS, a Geographic Information System (GIS)software. Based on DEM, the spatial analysis and statistical function of GIS, the landscape patterns of populationdistribution of the selected minorities is described, and 4 sub-regions are divided in the Nujiang River basin of YunnanProvince while the features and disparity of landscape pattern and its forming mechanism are discussed, along withhistorical and archaeological data. The conclusions are as follow: (1) The ethnic distribution is mosaic in the matrix ofother racial distribution, and have a distinct spatial correlation. (2) For the difference in cultivation between differentnationalities, certain nationality lived in the area suitable for production mode of its own and coincident with appropriategeographical setting. (3) The spatial distribution of settlement spots of the minorities is controlled by the convenience ofwater supply. The landscape pattern of ethnic distribution is closely relative to natural environment.展开更多
Pig-tailed macaques(Macaca nemistrina group) have been extensively used as non-human primate animal models for various human diseases in recent years, notably for AIDS research due to their sensitivity to HIV-1. North...Pig-tailed macaques(Macaca nemistrina group) have been extensively used as non-human primate animal models for various human diseases in recent years, notably for AIDS research due to their sensitivity to HIV-1. Northern pig-tailed macaques(M. leonina) are distributed in China and other surrounding Southeast Asia countries. Although northern pig-tailed macaques have been bred on a large scale as experimental animals since 2012, the reference value of normal levels of leukocytes is not available. To obtain such information, 62 blood samples from male and female healthy northern pig-tailed macaques at different ages were collected. The normal range of major leukocyte subpopulations, such as T lymphocytes, B lymphocytes, natural killer(NK) cells, monocytes, and the expression levels of activation or differentiation related molecules(CD38, HLA-DR, CCR5, CD21, IgD, CD80 and CD86) on lymphocytes were analyzed by flow cytometry. The counts of B cells decreased with age, but those of CD8+ T cells and NK cells and the frequency of CD38+HLA-DR+CD4+ T cells were positively correlated with age. The counts of leukocyte subpopulations were higher in males than those in females except for CD4+ T cells. Males also showed higher expression levels of Ig D and CD21 within B cells. This study provides basic data about the leukocyte subpopulations of northern pig-tailed macaques and compares this species with commonly used Chinese rhesus macaques(M. mulatta), which is meaningful for the biomedical application of northern pig-tailed macaques.展开更多
Task allocation is a key issue of agent cooperation mechanism in Multi-Agent Systems. The important features of an agent system such as the latency of the network infrastructure, dynamic topology, and node heterogenei...Task allocation is a key issue of agent cooperation mechanism in Multi-Agent Systems. The important features of an agent system such as the latency of the network infrastructure, dynamic topology, and node heterogeneity impose new challenges on the task allocation in Multi-Agent environments. Based on the traditional parallel computing task allocation method and Ant Colony Optimization (ACO), a novel task allocation method named Collection Path Ant Colony Optimization (CPACO) is proposed to achieve global optimization and reduce processing time. The existing problems of ACO are analyzed; CPACO overcomes such problems by modifying the heuristic function and the update strategy in the Ant-Cycle Model and establishing a threedimensional path pheromone storage space. The experimental results show that CPACO consumed only 10.3% of the time taken by the Global Search Algorithm and exhibited better performance than the Forward Optimal Heuristic Algorithm.展开更多
The transformation groups and symmetries of the baroclinic mode for rotating stratified flow can be obtained via the standard approach. Applying the symmetry group on some special solutions, the newly obtained results...The transformation groups and symmetries of the baroclinic mode for rotating stratified flow can be obtained via the standard approach. Applying the symmetry group on some special solutions, the newly obtained results disprove a known conjecture.展开更多
The global financial and economic crisis has negatively affected all business units. Tough fight for the market position results in effort to create efficient methods to maintain company's competitiveness. Some of sm...The global financial and economic crisis has negatively affected all business units. Tough fight for the market position results in effort to create efficient methods to maintain company's competitiveness. Some of small and medium entrepreneurs have started to search the business allies. As an example of such possibility of cooperation the formation of clusters should be mention. The main intention of this paper is to demonstrate possibility for small and medium-sized enterprises (SMEs) to cooperatively penetrate new markets. Attention is focused mainly on a real export-oriented cluster. Ambition is to use costs and benefits analysis to test ability of the cluster to improve chances of companies to penetrate new markets. In order to link this analysis to real life as much as possible, existing cluster was used and on its accomplishments and failures costs and benefits of clustering are demonstrated.展开更多
In this paper,we focus on studying weighted Poincare inequalities on stratified Lie groups.We derive various Poincaréinequalities in the case 1<p=q<∞ in the high order Sobolev space Wm,p.We derive several ...In this paper,we focus on studying weighted Poincare inequalities on stratified Lie groups.We derive various Poincaréinequalities in the case 1<p=q<∞ in the high order Sobolev space Wm,p.We derive several Poincare inequalities that complement existing results,which have only been proved for the case 1<p<q<∞.展开更多
By means of the theory of harmonic maps into the unitary group U(N), the authors study harmonic maps into the symplectic group Sp(N). The symplectic uniton and symplectic ex--tended uniton are introduced. The method o...By means of the theory of harmonic maps into the unitary group U(N), the authors study harmonic maps into the symplectic group Sp(N). The symplectic uniton and symplectic ex--tended uniton are introduced. The method of the symplectic Backlund transformation and the Darboux transformation is used to construct new symplectic unitons from a known one.展开更多
Exponential stability of the first order singular distributed parameter systems is discussedin the light of degenerate semi-group methods,which is described by the abstract developing equationin Hilbert space.The nece...Exponential stability of the first order singular distributed parameter systems is discussedin the light of degenerate semi-group methods,which is described by the abstract developing equationin Hilbert space.The necessary and sufficient conditions concerning the exponential stability of thefirst order singular distributed parameter systems are given.展开更多
Many sensor network applications require location awareness,but it is often too expensive to equip a global positioning system(GPS) receiver for each network node.Hence,localization schemes for sensor networks typical...Many sensor network applications require location awareness,but it is often too expensive to equip a global positioning system(GPS) receiver for each network node.Hence,localization schemes for sensor networks typically use a small number of seed nodes that know their locations and protocols whereby other nodes estimate their locations from the messages they receive.For the inherent shortcomings of general particle filter(the sequential Monte Carlo method) this paper introduces particle swarm optimization and weighted centroid algorithm to optimize it.Based on improvement a distributed localization algorithm named WC-IPF(weighted centroid algorithm improved particle filter) has been proposed for localization.In this localization scheme the initial estimate position can be acquired by weighted centroid algorithm.Then the accurate position can be gotten via improved particle filter recursively.The extend simulation results show that the proposed algorithm is efficient for most condition.展开更多
An explicit demonstration of the changes in fish assemblages is required to reveal the influence of damming on fish species.However,information from which to draw general conclusions regarding changes in fish assembla...An explicit demonstration of the changes in fish assemblages is required to reveal the influence of damming on fish species.However,information from which to draw general conclusions regarding changes in fish assemblages is insufficient because of the limitations of available approaches.We used a combination of acoustic surveys,gillnet sampling,and geostatistical simulations to document the spatiotemporal variations in the fish assemblages downstream of the Gezhouba Dam,before and after the third impoundment of Three Gorges Reservoir(TGR).To conduct a hydroacoustic identification of individual species,we matched the size distributions of the fishes captured by gillnet with those of the acoustic surveys.An optimum threshold of target strength of 50 dB re 1 m 2 was defined,and acoustic surveys were purposefully extended to the selected fish assemblages(i.e.,endemic Coreius species) that was acquired by the size and species selectivity of the gillnet sampling.The relative proportion of fish species in acoustic surveys was allocated based on the composition(%) of the harvest in the gillnet surveys.Geostatistical simulations were likewise used to generate spatial patterns of fish distribution,and to determine the absolute abundance of the selected fish assemblages.We observed both the species composition and the spatial distribution of the selected fish assemblages changed significantly after implementation of new flow regulation in the TGR,wherein an immediate sharp population decline in the Coreius occurred.Our results strongly suggested that the new flow regulation in the TGR impoundment adversely affected downstream fish species,particularly the endemic Coreius species.To determine the factors responsible for the decline,we associated the variation in the fish assemblage patterns with changes in the environment and determined that substrate erosion resulting from trapping practices in the TGR likely played a key role.展开更多
A boundedness criterion is set up for some convolution operators on a compact Lie group.By this criterion a Hormander multiplier theorem is proved in the Hardy spaces on SU(2).
Given a large positive number x and a positive integer k, we denote by Qk(x) the set of congruent elliptic curves E(n): y2= z3- n2 z with positive square-free integers n x congruent to one modulo eight,having k prime ...Given a large positive number x and a positive integer k, we denote by Qk(x) the set of congruent elliptic curves E(n): y2= z3- n2 z with positive square-free integers n x congruent to one modulo eight,having k prime factors and each prime factor congruent to one modulo four. We obtain the asymptotic formula for the number of congruent elliptic curves E(n)∈ Qk(x) with Mordell-Weil ranks zero and 2-primary part of Shafarevich-Tate groups isomorphic to(Z/2Z)2. We also get a lower bound for the number of E(n)∈ Qk(x)with Mordell-Weil ranks zero and 2-primary part of Shafarevich-Tate groups isomorphic to(Z/2Z)4. The key ingredient of the proof of these results is an independence property of residue symbols. This property roughly says that the number of positive square-free integers n x with k prime factors and residue symbols(quadratic and quartic) among its prime factors being given compatible values does not depend on the actual values.展开更多
Mayer derived the Mayer series from both the canonical ensemble and the grand canonical ensemble by use of the cluster expansion method. In 2002, we conjectured a recursion formula of the canonical partition function ...Mayer derived the Mayer series from both the canonical ensemble and the grand canonical ensemble by use of the cluster expansion method. In 2002, we conjectured a recursion formula of the canonical partition function of a fluid(X.Z. Wang, Phys. Rev. E66(2002) 056102). In this paper we give a proof for this formula by developing an appropriate expansion of the integrand of the canonical partition function. We further derive the Mayer series solely from the canonical ensemble by use of this recursion formula.展开更多
We propose an efficient numerical method for two population models, based on the nonstandard finite difference (NSFD) schemes and composition methods with complex time steps. The NSFD scheme is able to give positive...We propose an efficient numerical method for two population models, based on the nonstandard finite difference (NSFD) schemes and composition methods with complex time steps. The NSFD scheme is able to give positive numerical solutions that satisfy the conservation law, which is a key property for biological population models. The accuracy is improved by using the composition methods with complex time steps. Numerical tests on the plankton nutrient model and whooping cough model are presented to show the efficiency and advantage of the proposed numerical method.展开更多
文摘Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel distributed algorithm was proposed to achieve the multi-hop authentication for mobile ad hoc networks. In addition, a protocol verifying the identity with zero knowledge proofs was designed so that the reuse of certificates comes into truth. Moreover, the security of this algorithm was proved through the random oracle model. With the lower cost of computation and communication, this algorithm is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.
基金Supported by the Natural Science Foundation of Hubei Province in China(2004D006)
文摘In this paper we extend the construction of the field of rational numbers from the ring of integers to an arbitrary commutative ordered semigroup. We first construct a fractional ordered semigroup and a homomorphism φs : R → S^-1 R. Secondly, we characterize the commutative ordered semigroup so constructed by a universal mapping property.
基金Project (No. 60472032) supported by the National Natural Science Foundation of China
文摘Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure. We show that some parameters should be carefully selected in the scheme to resist our attacks.
基金Projects(61170160,61202338)supported by the National Natural Science Foundation of China
文摘Aiming at the group of autonomous agents consisting of multiple leader agents and multiple follower ones,a flocking behavior method with multiple leaders and a global trajectory was proposed.In this flocking method,the group leaders can attain the information of the global trajectory,while each follower can communicate with its neighbors and corresponding leader but does not have global knowledge.Being to a distributed control method,the proposed method firstly sets a movable imaginary point on the global trajectory to ensure that the center and average velocity of the leader agents satisfy the constraints of the global trajectory.Secondly,a two-stage strategy was proposed to make the whole group satisfy the constraints of the global trajectory.Moreover,the distance between the center of the group and the desired trajectory was analyzed in detail according to the number ratio of the followers to the leaders.In this way,on one hand,the agents of the group emerge a basic flocking behavior; on the other hand,the center of the group satisfies the constraints of global trajectory.Simulation results demonstrate the effectiveness of the proposed method.
文摘Each nationality has formed unique ethnic culture in the long history. Ethnic culture is spatially reflected byethnic distribution. The distribution of nationalities is influenced by ethnic history, culture, society and religion, alsoaffected by regional physical setting. This paper analyzes the relationship between ethnic distribution pattern and naturalsetting with contrast analytical method. The digital elevation model (DEM) is established on basis of contour map on ascale of 1:250,000 in the Nujiang River basin, Yunnan Province by ArcGIS, a Geographic Information System (GIS)software. Based on DEM, the spatial analysis and statistical function of GIS, the landscape patterns of populationdistribution of the selected minorities is described, and 4 sub-regions are divided in the Nujiang River basin of YunnanProvince while the features and disparity of landscape pattern and its forming mechanism are discussed, along withhistorical and archaeological data. The conclusions are as follow: (1) The ethnic distribution is mosaic in the matrix ofother racial distribution, and have a distinct spatial correlation. (2) For the difference in cultivation between differentnationalities, certain nationality lived in the area suitable for production mode of its own and coincident with appropriategeographical setting. (3) The spatial distribution of settlement spots of the minorities is controlled by the convenience ofwater supply. The landscape pattern of ethnic distribution is closely relative to natural environment.
基金This work was supported by the National Special Science Research Program of China (2012CBA01305) the National Natural Science Foundation of China (81172876, U0832601, 81273251, U1202228) the Knowledge Innovation Program of CAS (KSCX2-EW-R-13) and the National Science and Technology Major Project (2013ZX10001-002, 2012ZX10001-007)We thank Mr. Zhen-Fei Hu,Gui Li and Dong-Ti Huang of Kunming Primate Research Center for their assistance with the experiments.
文摘Pig-tailed macaques(Macaca nemistrina group) have been extensively used as non-human primate animal models for various human diseases in recent years, notably for AIDS research due to their sensitivity to HIV-1. Northern pig-tailed macaques(M. leonina) are distributed in China and other surrounding Southeast Asia countries. Although northern pig-tailed macaques have been bred on a large scale as experimental animals since 2012, the reference value of normal levels of leukocytes is not available. To obtain such information, 62 blood samples from male and female healthy northern pig-tailed macaques at different ages were collected. The normal range of major leukocyte subpopulations, such as T lymphocytes, B lymphocytes, natural killer(NK) cells, monocytes, and the expression levels of activation or differentiation related molecules(CD38, HLA-DR, CCR5, CD21, IgD, CD80 and CD86) on lymphocytes were analyzed by flow cytometry. The counts of B cells decreased with age, but those of CD8+ T cells and NK cells and the frequency of CD38+HLA-DR+CD4+ T cells were positively correlated with age. The counts of leukocyte subpopulations were higher in males than those in females except for CD4+ T cells. Males also showed higher expression levels of Ig D and CD21 within B cells. This study provides basic data about the leukocyte subpopulations of northern pig-tailed macaques and compares this species with commonly used Chinese rhesus macaques(M. mulatta), which is meaningful for the biomedical application of northern pig-tailed macaques.
基金supported by National Natural Science Foundation of China under Grant No.61170117Major National Science and Technology Programs under Grant No.2010ZX07102006+3 种基金National Key Technology R&D Program under Grant No.2012BAH25B02the National 973 Program of China under Grant No.2011CB505402the Guangdong Province University-Industry Cooperation under Grant No.2011A090200008the Scientific Research Foundation, Returned Overseas Chinese Scholars, State Education Ministry
文摘Task allocation is a key issue of agent cooperation mechanism in Multi-Agent Systems. The important features of an agent system such as the latency of the network infrastructure, dynamic topology, and node heterogeneity impose new challenges on the task allocation in Multi-Agent environments. Based on the traditional parallel computing task allocation method and Ant Colony Optimization (ACO), a novel task allocation method named Collection Path Ant Colony Optimization (CPACO) is proposed to achieve global optimization and reduce processing time. The existing problems of ACO are analyzed; CPACO overcomes such problems by modifying the heuristic function and the update strategy in the Ant-Cycle Model and establishing a threedimensional path pheromone storage space. The experimental results show that CPACO consumed only 10.3% of the time taken by the Global Search Algorithm and exhibited better performance than the Forward Optimal Heuristic Algorithm.
基金Supported by National Natural Science Foundation of China under Grant Nos.10735030,10675065,and 90503006PCSIRT (IRT0734)+1 种基金the National Basic Research Programme of China under Grant Nos.2007CB814800K.C.Wong Magna Fund in Ningbo University
文摘The transformation groups and symmetries of the baroclinic mode for rotating stratified flow can be obtained via the standard approach. Applying the symmetry group on some special solutions, the newly obtained results disprove a known conjecture.
文摘The global financial and economic crisis has negatively affected all business units. Tough fight for the market position results in effort to create efficient methods to maintain company's competitiveness. Some of small and medium entrepreneurs have started to search the business allies. As an example of such possibility of cooperation the formation of clusters should be mention. The main intention of this paper is to demonstrate possibility for small and medium-sized enterprises (SMEs) to cooperatively penetrate new markets. Attention is focused mainly on a real export-oriented cluster. Ambition is to use costs and benefits analysis to test ability of the cluster to improve chances of companies to penetrate new markets. In order to link this analysis to real life as much as possible, existing cluster was used and on its accomplishments and failures costs and benefits of clustering are demonstrated.
文摘In this paper,we focus on studying weighted Poincare inequalities on stratified Lie groups.We derive various Poincaréinequalities in the case 1<p=q<∞ in the high order Sobolev space Wm,p.We derive several Poincare inequalities that complement existing results,which have only been proved for the case 1<p<q<∞.
基金Project supported by the National Natural Science Foundation of China (No.19531050)the Scientific Foundation of the Minnstr
文摘By means of the theory of harmonic maps into the unitary group U(N), the authors study harmonic maps into the symplectic group Sp(N). The symplectic uniton and symplectic ex--tended uniton are introduced. The method of the symplectic Backlund transformation and the Darboux transformation is used to construct new symplectic unitons from a known one.
基金This research is supported by the National Natural Science Foundation of China under Grant No.60674018.
文摘Exponential stability of the first order singular distributed parameter systems is discussedin the light of degenerate semi-group methods,which is described by the abstract developing equationin Hilbert space.The necessary and sufficient conditions concerning the exponential stability of thefirst order singular distributed parameter systems are given.
文摘Many sensor network applications require location awareness,but it is often too expensive to equip a global positioning system(GPS) receiver for each network node.Hence,localization schemes for sensor networks typically use a small number of seed nodes that know their locations and protocols whereby other nodes estimate their locations from the messages they receive.For the inherent shortcomings of general particle filter(the sequential Monte Carlo method) this paper introduces particle swarm optimization and weighted centroid algorithm to optimize it.Based on improvement a distributed localization algorithm named WC-IPF(weighted centroid algorithm improved particle filter) has been proposed for localization.In this localization scheme the initial estimate position can be acquired by weighted centroid algorithm.Then the accurate position can be gotten via improved particle filter recursively.The extend simulation results show that the proposed algorithm is efficient for most condition.
基金supported by the National Natural Science Foundation of China (Grant No. 51079089)Key Project of the National Twelfth-Five Year Research Program of China (Grant No.2012BAC06B04)the Ecological and Environmental Monitoring Programs of China Three Gorges Project Corporation (Grant Nos. 241202004and SXSN/2726)
文摘An explicit demonstration of the changes in fish assemblages is required to reveal the influence of damming on fish species.However,information from which to draw general conclusions regarding changes in fish assemblages is insufficient because of the limitations of available approaches.We used a combination of acoustic surveys,gillnet sampling,and geostatistical simulations to document the spatiotemporal variations in the fish assemblages downstream of the Gezhouba Dam,before and after the third impoundment of Three Gorges Reservoir(TGR).To conduct a hydroacoustic identification of individual species,we matched the size distributions of the fishes captured by gillnet with those of the acoustic surveys.An optimum threshold of target strength of 50 dB re 1 m 2 was defined,and acoustic surveys were purposefully extended to the selected fish assemblages(i.e.,endemic Coreius species) that was acquired by the size and species selectivity of the gillnet sampling.The relative proportion of fish species in acoustic surveys was allocated based on the composition(%) of the harvest in the gillnet surveys.Geostatistical simulations were likewise used to generate spatial patterns of fish distribution,and to determine the absolute abundance of the selected fish assemblages.We observed both the species composition and the spatial distribution of the selected fish assemblages changed significantly after implementation of new flow regulation in the TGR,wherein an immediate sharp population decline in the Coreius occurred.Our results strongly suggested that the new flow regulation in the TGR impoundment adversely affected downstream fish species,particularly the endemic Coreius species.To determine the factors responsible for the decline,we associated the variation in the fish assemblage patterns with changes in the environment and determined that substrate erosion resulting from trapping practices in the TGR likely played a key role.
文摘A boundedness criterion is set up for some convolution operators on a compact Lie group.By this criterion a Hormander multiplier theorem is proved in the Hardy spaces on SU(2).
基金supported by National Natural Science Foundation of China (Grant No. 11501541)
文摘Given a large positive number x and a positive integer k, we denote by Qk(x) the set of congruent elliptic curves E(n): y2= z3- n2 z with positive square-free integers n x congruent to one modulo eight,having k prime factors and each prime factor congruent to one modulo four. We obtain the asymptotic formula for the number of congruent elliptic curves E(n)∈ Qk(x) with Mordell-Weil ranks zero and 2-primary part of Shafarevich-Tate groups isomorphic to(Z/2Z)2. We also get a lower bound for the number of E(n)∈ Qk(x)with Mordell-Weil ranks zero and 2-primary part of Shafarevich-Tate groups isomorphic to(Z/2Z)4. The key ingredient of the proof of these results is an independence property of residue symbols. This property roughly says that the number of positive square-free integers n x with k prime factors and residue symbols(quadratic and quartic) among its prime factors being given compatible values does not depend on the actual values.
文摘Mayer derived the Mayer series from both the canonical ensemble and the grand canonical ensemble by use of the cluster expansion method. In 2002, we conjectured a recursion formula of the canonical partition function of a fluid(X.Z. Wang, Phys. Rev. E66(2002) 056102). In this paper we give a proof for this formula by developing an appropriate expansion of the integrand of the canonical partition function. We further derive the Mayer series solely from the canonical ensemble by use of this recursion formula.
文摘We propose an efficient numerical method for two population models, based on the nonstandard finite difference (NSFD) schemes and composition methods with complex time steps. The NSFD scheme is able to give positive numerical solutions that satisfy the conservation law, which is a key property for biological population models. The accuracy is improved by using the composition methods with complex time steps. Numerical tests on the plankton nutrient model and whooping cough model are presented to show the efficiency and advantage of the proposed numerical method.