This paper is concerned with the minimizers of L^(2)-subcritical constraint variar tional problems with spatially decaying nonlinearities in a bounded domain Ω of R~N(N≥1).We prove that the problem admits minimizers...This paper is concerned with the minimizers of L^(2)-subcritical constraint variar tional problems with spatially decaying nonlinearities in a bounded domain Ω of R~N(N≥1).We prove that the problem admits minimizers for any M> 0.Moreover,the limiting behavior of minimizers as M→∞ is also analyzed rigorously.展开更多
In this paper we show that if K(x)=Ω(x)l|\x|~n is a Calderon-Zygmu- nd kernel,where Ω∈L^q(S^(n-1)) for some 1<q≤∞,and b(x) is a radial function such that |b(r)|~p·dr≤cR for all R>0 and some 1<p_0&...In this paper we show that if K(x)=Ω(x)l|\x|~n is a Calderon-Zygmu- nd kernel,where Ω∈L^q(S^(n-1)) for some 1<q≤∞,and b(x) is a radial function such that |b(r)|~p·dr≤cR for all R>0 and some 1<p_0<∞,then Tf=P.V.(bK)*f is bounded on L^p() for 1<p≤∞ and n≥2.Moreover, we show that T is bounded from BMO to BMO iff b(x) is satisfied the condition star (*).展开更多
In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge...In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed.展开更多
Let (E,ξ)=indlim (En,ξn) be an inductive limit of a sequence of locally convex spaces,For brevity,denote by (DS) each set Bbounded in (E,ξ) is contained in some En; and (DST) each set B bounded in (E,ξ) is co...Let (E,ξ)=indlim (En,ξn) be an inductive limit of a sequence of locally convex spaces,For brevity,denote by (DS) each set Bbounded in (E,ξ) is contained in some En; and (DST) each set B bounded in (E,ξ) is contained and bounded in some (En,ξn). Theovem 1.(DS) holds provided that (i) for each n∈N,there is a neighborhood Un of o in (En,ξn) and m(n)∈ such that -↑Un^E包含于Em(n),and (ii) for any neighborhood V n of o in (En,ξn),∞↑Un=1 Vn absorbs every bounded set in (E,ξ). theorem 2 Let all (En,ξn) be metrizable and (DS) hold,then for each bounded set B IN (E,ξ)and each n ∈N thcrc is a neighborhood U k of o in (Ek,ξk), 1≤k≤n ,and m(n)∈N such that ——↑(B+U1+U2+…+Un)^E包含于 Em(n). theorem 3. Let all (En,ξn) be Frechet spaces.Then (DST) holds if and only if (i) for each n ∈N,there is u neighborhood U n of in (En,ξn) and m(n)∈N such that 0↑Un^E包含于Em(n),and (ii) for each each closed ,absosed,absolutely conuex,bounded set B in (E,ξ),∞↑Un=1((εnB)∩Un)absorbs B,where U n is any neighborhood of o in (En,ξn) and εn is any positive number for every n ∈N。展开更多
In this article, the globally bounded in-time pointwise estimate of solutions to the simplified Keller-Segel system modelling chemotaxis are derived. Moreover, a local existence theorem is obtained.
In this paper, we investigate a new perturbation theorem for the Moore-Penrose metric generalized inverses of a bounded linear operator in Banach space. The main tool in this paper is "the generalized Neumann lemma"...In this paper, we investigate a new perturbation theorem for the Moore-Penrose metric generalized inverses of a bounded linear operator in Banach space. The main tool in this paper is "the generalized Neumann lemma" which is quite different from the method in [12] where "the generalized Banach lemma" was used. By the method of the perturba- tion analysis of bounded linear operators, we obtain an explicit perturbation theorem and three inequalities about error estimates for the Moore-Penrose metric generalized inverse of bounded linear operator under the generalized Neumann lemma and the concept of stable perturbations in Banach spaces.展开更多
LetΩ be a bounded symmetric domain in Cn. The purpose of this article is to define and characterize the general function space F(p, q, s) on Ω. Characterizing functions in the F(p, q, s) space is a work of consi...LetΩ be a bounded symmetric domain in Cn. The purpose of this article is to define and characterize the general function space F(p, q, s) on Ω. Characterizing functions in the F(p, q, s) space is a work of considerable interest nowadays. In this article, the authors give several equivalent descriptions of the functions in the F(p, q, s) space on Ω in terms of fractional differential operators. At the same time, the authors give the relationship between F(p, q, s) space and Bloch type space on Ω too.展开更多
Linearized shallow water perturbation equations with approximation in an equatorial β plane are used to obtain the analytical solution of wave packet anomalies in the upper bounded equatorial ocean. The main results ...Linearized shallow water perturbation equations with approximation in an equatorial β plane are used to obtain the analytical solution of wave packet anomalies in the upper bounded equatorial ocean. The main results are as follows. The wave packet is a superposition of eastward travelling Kelvin waves and westward travelling Rossby waves with the slowest speed, and satisfies the boundary conditions of eastern and western coasts, respectively.The decay coefficient of this solution to the north and south sides of the equator is inversely proportional only to the phase velocity of Kelvin waves in the upper water. The oscillation frequency of the wave packet, which is also the natural frequency of the ocean, is proportional to its mode number and the phase velocity of Kelvin waves and is inversely proportional to the length of the equatorial ocean in the east-west direction. The flow anomalies of the wave packet of Mode 1 most of the time appear as zonal flows with the same direction. They reach the maximum at the center of the equatorial ocean and decay rapidly away from the equator, manifested as equatorially trapped waves. The flow anomalies of the wave packet of Mode 2 appear as the zonal flows with the same direction most of the time in half of the ocean, and are always 0 at the center of the entire ocean which indicates stagnation, while decaying away from the equator with the same speed as that of Mode 1. The spatial structure and oscillation period of the wave packet solution of Mode 1 and Mode 2 are consistent with the changing periods of the surface spatial field and time coefficient of the first and second modes of complex empirical orthogonal function(EOF)analysis of flow anomalies in the actual equatorial ocean. This indicates that the solution does exist in the real ocean, and that El Ni?o-Southern Oscillation(ENSO) and Indian Ocean dipole(IOD) are both related to Mode 2.After considering the Indonesian throughflow, we can obtain the length of bounded equatorial ocean by taking the sum of that of the tropical Indian Ocean and the tropical Pacific Ocean, thus this wave packet can also explain the decadal variability(about 20 a) of the equatorial Pacific and Indian Oceans.展开更多
By Mobile Edge Computing(MEC), computation-intensive tasks are offloaded from mobile devices to cloud servers, and thus the energy consumption of mobile devices can be notably reduced. In this paper, we study task off...By Mobile Edge Computing(MEC), computation-intensive tasks are offloaded from mobile devices to cloud servers, and thus the energy consumption of mobile devices can be notably reduced. In this paper, we study task offloading in multi-user MEC systems with heterogeneous clouds, including edge clouds and remote clouds. Tasks are forwarded from mobile devices to edge clouds via wireless channels, and they can be further forwarded to remote clouds via the Internet. Our objective is to minimize the total energy consumption of multiple mobile devices, subject to bounded-delay requirements of tasks. Based on dynamic programming, we propose an algorithm that minimizes the energy consumption, by jointly allocating bandwidth and computational resources to mobile devices. The algorithm is of pseudo-polynomial complexity. To further reduce the complexity, we propose an approximation algorithm with energy discretization, and its total energy consumption is proved to be within a bounded gap from the optimum. Simulation results show that, nearly 82.7% energy of mobile devices can be saved by task offloading compared with mobile device execution.展开更多
A robust controller for bank to turn(BTT) missiles with aerodynamic fins and reaction jet control system(RCS) is developed based on nonlinear control dynamic models comprising couplings and aerodynamic uncertainties. ...A robust controller for bank to turn(BTT) missiles with aerodynamic fins and reaction jet control system(RCS) is developed based on nonlinear control dynamic models comprising couplings and aerodynamic uncertainties. The fixed time convergence theory is incorporated with the sliding mode control technique to ensure that the system tracks the desired command within uniform bounded time under different initial conditions. Unlike previous terminal sliding mode approaches, the bound of settling time is independent of the initial state, which means performance metrics like convergence rate can be predicted beforehand. To reduce the burden of control design in terms of robustness, extended state observer(ESO) is introduced for uncertainty estimation with the output substituted into the controller as feedforward compensation. Cascade control structure is employed with the proposed control law and therein the compound control signal is obtained.Afterwards, control inputs for two kinds of actuators are allocated on the basis of their inherent characteristics. Finally, a number of simulations are carried out and demonstrate the effectiveness of the designed controller.展开更多
The incompressible limit of the non-isentropic magnetohydrodynamic equations with zero thermal coefficient, in a two dimensional bounded domain with the Dirichlet condi- tion for velocity and perfectly conducting boun...The incompressible limit of the non-isentropic magnetohydrodynamic equations with zero thermal coefficient, in a two dimensional bounded domain with the Dirichlet condi- tion for velocity and perfectly conducting boundary condition for magnetic field, is rigorously justified.展开更多
The strict bounded real lemma for linear system with finite discrete jumps was considered. Especially, the case where D matrices in the system are not assumed to be zero was dealt. Several versions of the bounded real...The strict bounded real lemma for linear system with finite discrete jumps was considered. Especially, the case where D matrices in the system are not assumed to be zero was dealt. Several versions of the bounded real lemma are presented in terms of solution to Riccati differential equations or inequalities with finite discrete jumps. Both the finite and infinite horizon cases are considered. These results generalize the existed bounded real lemma for linear systems.展开更多
This paper investigates the stochastic bounded consensus of leader-following second-order multi-agent systems in a noisy environment. It is assumed that each agent received the information of its neighbors corrupted b...This paper investigates the stochastic bounded consensus of leader-following second-order multi-agent systems in a noisy environment. It is assumed that each agent received the information of its neighbors corrupted by noises and time delays. Based on the graph theory, stochastic tools, and the Lyapunov function method, we derive the sufficient conditions under which the systems would reach stochastic bounded consensus in mean square with the protocol we designed. Finally, a numerical simulation is illustrated to check the effectiveness of the proposed algorithms.展开更多
基金supported by the Graduate Education Innovation Funds(2022CXZZ088)at Central China Normal University in Chinasupported by the NSFC(12225106,11931012)the Fundamental Research Funds(CCNU22LJ002)for the Central Universities in China。
文摘This paper is concerned with the minimizers of L^(2)-subcritical constraint variar tional problems with spatially decaying nonlinearities in a bounded domain Ω of R~N(N≥1).We prove that the problem admits minimizers for any M> 0.Moreover,the limiting behavior of minimizers as M→∞ is also analyzed rigorously.
文摘In this paper we show that if K(x)=Ω(x)l|\x|~n is a Calderon-Zygmu- nd kernel,where Ω∈L^q(S^(n-1)) for some 1<q≤∞,and b(x) is a radial function such that |b(r)|~p·dr≤cR for all R>0 and some 1<p_0<∞,then Tf=P.V.(bK)*f is bounded on L^p() for 1<p≤∞ and n≥2.Moreover, we show that T is bounded from BMO to BMO iff b(x) is satisfied the condition star (*).
基金The National Natural Science Foundation of China (No.10974093)the Scientific Research Foundation for Senior Personnel of Jiangsu University (No.07JDG014)the Natural Science Foundation of Higher Education Institutions of Jiangsu Province (No.08KJD520015)
文摘In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed.
文摘Let (E,ξ)=indlim (En,ξn) be an inductive limit of a sequence of locally convex spaces,For brevity,denote by (DS) each set Bbounded in (E,ξ) is contained in some En; and (DST) each set B bounded in (E,ξ) is contained and bounded in some (En,ξn). Theovem 1.(DS) holds provided that (i) for each n∈N,there is a neighborhood Un of o in (En,ξn) and m(n)∈ such that -↑Un^E包含于Em(n),and (ii) for any neighborhood V n of o in (En,ξn),∞↑Un=1 Vn absorbs every bounded set in (E,ξ). theorem 2 Let all (En,ξn) be metrizable and (DS) hold,then for each bounded set B IN (E,ξ)and each n ∈N thcrc is a neighborhood U k of o in (Ek,ξk), 1≤k≤n ,and m(n)∈N such that ——↑(B+U1+U2+…+Un)^E包含于 Em(n). theorem 3. Let all (En,ξn) be Frechet spaces.Then (DST) holds if and only if (i) for each n ∈N,there is u neighborhood U n of in (En,ξn) and m(n)∈N such that 0↑Un^E包含于Em(n),and (ii) for each each closed ,absosed,absolutely conuex,bounded set B in (E,ξ),∞↑Un=1((εnB)∩Un)absorbs B,where U n is any neighborhood of o in (En,ξn) and εn is any positive number for every n ∈N。
基金Supported by the NSF of Jiangxi Province, the NSFC (10225105, 10671023) and a CAEP grant
文摘In this article, the globally bounded in-time pointwise estimate of solutions to the simplified Keller-Segel system modelling chemotaxis are derived. Moreover, a local existence theorem is obtained.
基金Supported by the Nature Science Foundation of China(11471091 and 11401143)
文摘In this paper, we investigate a new perturbation theorem for the Moore-Penrose metric generalized inverses of a bounded linear operator in Banach space. The main tool in this paper is "the generalized Neumann lemma" which is quite different from the method in [12] where "the generalized Banach lemma" was used. By the method of the perturba- tion analysis of bounded linear operators, we obtain an explicit perturbation theorem and three inequalities about error estimates for the Moore-Penrose metric generalized inverse of bounded linear operator under the generalized Neumann lemma and the concept of stable perturbations in Banach spaces.
基金supported by the National Natural Science Foundation of China(11571104)the Hunan Provincial Innovation Foundation for Postgraduate(CX2017B220)Supported by the Construct Program of the Key Discipline in Hunan Province
文摘LetΩ be a bounded symmetric domain in Cn. The purpose of this article is to define and characterize the general function space F(p, q, s) on Ω. Characterizing functions in the F(p, q, s) space is a work of considerable interest nowadays. In this article, the authors give several equivalent descriptions of the functions in the F(p, q, s) space on Ω in terms of fractional differential operators. At the same time, the authors give the relationship between F(p, q, s) space and Bloch type space on Ω too.
基金The National Major Research High Performance Computing Program of China under contract 2016YFB0200800the Strategic Priority Research Program of Chinese Academy of Sciences under contract No.XDA20060501
文摘Linearized shallow water perturbation equations with approximation in an equatorial β plane are used to obtain the analytical solution of wave packet anomalies in the upper bounded equatorial ocean. The main results are as follows. The wave packet is a superposition of eastward travelling Kelvin waves and westward travelling Rossby waves with the slowest speed, and satisfies the boundary conditions of eastern and western coasts, respectively.The decay coefficient of this solution to the north and south sides of the equator is inversely proportional only to the phase velocity of Kelvin waves in the upper water. The oscillation frequency of the wave packet, which is also the natural frequency of the ocean, is proportional to its mode number and the phase velocity of Kelvin waves and is inversely proportional to the length of the equatorial ocean in the east-west direction. The flow anomalies of the wave packet of Mode 1 most of the time appear as zonal flows with the same direction. They reach the maximum at the center of the equatorial ocean and decay rapidly away from the equator, manifested as equatorially trapped waves. The flow anomalies of the wave packet of Mode 2 appear as the zonal flows with the same direction most of the time in half of the ocean, and are always 0 at the center of the entire ocean which indicates stagnation, while decaying away from the equator with the same speed as that of Mode 1. The spatial structure and oscillation period of the wave packet solution of Mode 1 and Mode 2 are consistent with the changing periods of the surface spatial field and time coefficient of the first and second modes of complex empirical orthogonal function(EOF)analysis of flow anomalies in the actual equatorial ocean. This indicates that the solution does exist in the real ocean, and that El Ni?o-Southern Oscillation(ENSO) and Indian Ocean dipole(IOD) are both related to Mode 2.After considering the Indonesian throughflow, we can obtain the length of bounded equatorial ocean by taking the sum of that of the tropical Indian Ocean and the tropical Pacific Ocean, thus this wave packet can also explain the decadal variability(about 20 a) of the equatorial Pacific and Indian Oceans.
基金the National Key R&D Program of China 2018YFB1800804the Nature Science Foundation of China (No. 61871254,No. 61861136003,No. 91638204)Hitachi Ltd.
文摘By Mobile Edge Computing(MEC), computation-intensive tasks are offloaded from mobile devices to cloud servers, and thus the energy consumption of mobile devices can be notably reduced. In this paper, we study task offloading in multi-user MEC systems with heterogeneous clouds, including edge clouds and remote clouds. Tasks are forwarded from mobile devices to edge clouds via wireless channels, and they can be further forwarded to remote clouds via the Internet. Our objective is to minimize the total energy consumption of multiple mobile devices, subject to bounded-delay requirements of tasks. Based on dynamic programming, we propose an algorithm that minimizes the energy consumption, by jointly allocating bandwidth and computational resources to mobile devices. The algorithm is of pseudo-polynomial complexity. To further reduce the complexity, we propose an approximation algorithm with energy discretization, and its total energy consumption is proved to be within a bounded gap from the optimum. Simulation results show that, nearly 82.7% energy of mobile devices can be saved by task offloading compared with mobile device execution.
基金supported by the National Natural Science Foundation of China(11572036)
文摘A robust controller for bank to turn(BTT) missiles with aerodynamic fins and reaction jet control system(RCS) is developed based on nonlinear control dynamic models comprising couplings and aerodynamic uncertainties. The fixed time convergence theory is incorporated with the sliding mode control technique to ensure that the system tracks the desired command within uniform bounded time under different initial conditions. Unlike previous terminal sliding mode approaches, the bound of settling time is independent of the initial state, which means performance metrics like convergence rate can be predicted beforehand. To reduce the burden of control design in terms of robustness, extended state observer(ESO) is introduced for uncertainty estimation with the output substituted into the controller as feedforward compensation. Cascade control structure is employed with the proposed control law and therein the compound control signal is obtained.Afterwards, control inputs for two kinds of actuators are allocated on the basis of their inherent characteristics. Finally, a number of simulations are carried out and demonstrate the effectiveness of the designed controller.
基金supported by NSFC(11371042)China 973 program(2011 CB808002)+2 种基金BSFC(1132006)CIT&TCD(20130312)the fund of the Beijing Education Committee(KZ 201210005005)
文摘The incompressible limit of the non-isentropic magnetohydrodynamic equations with zero thermal coefficient, in a two dimensional bounded domain with the Dirichlet condi- tion for velocity and perfectly conducting boundary condition for magnetic field, is rigorously justified.
基金National Natural Science Foundation of China(No.60274058)
文摘The strict bounded real lemma for linear system with finite discrete jumps was considered. Especially, the case where D matrices in the system are not assumed to be zero was dealt. Several versions of the bounded real lemma are presented in terms of solution to Riccati differential equations or inequalities with finite discrete jumps. Both the finite and infinite horizon cases are considered. These results generalize the existed bounded real lemma for linear systems.
基金supported by the National Natural Science Foundation of China(Grant Nos.61573156,61273126,61503142,61272382,and 61573154)the Fundamental Research Funds for the Central Universities(Grant No.x2zd D2153620)
文摘This paper investigates the stochastic bounded consensus of leader-following second-order multi-agent systems in a noisy environment. It is assumed that each agent received the information of its neighbors corrupted by noises and time delays. Based on the graph theory, stochastic tools, and the Lyapunov function method, we derive the sufficient conditions under which the systems would reach stochastic bounded consensus in mean square with the protocol we designed. Finally, a numerical simulation is illustrated to check the effectiveness of the proposed algorithms.