The hydrodynamics of active liquid crystal models has attracted much attention in recent years due to many applications of these models.In this paper,we study the weak-strong uniqueness for the Leray-Hopf type weak so...The hydrodynamics of active liquid crystal models has attracted much attention in recent years due to many applications of these models.In this paper,we study the weak-strong uniqueness for the Leray-Hopf type weak solutions to the incompressible active liquid crystals in R^(3).Our results yield that if there exists a strong solution,then it is unique among the Leray-Hopf type weak solutions associated with the same initial data.展开更多
In this paper,we prove the local existence and uniqueness of solutions to the evolutionary model for magnetoviscoelasticity in R^(2),R^(3).This model consists of an incompressible Navier-Stokes,a regularized system fo...In this paper,we prove the local existence and uniqueness of solutions to the evolutionary model for magnetoviscoelasticity in R^(2),R^(3).This model consists of an incompressible Navier-Stokes,a regularized system for the evolution of the deformation gradient and the Landau-Lifshitz-Gilbert system for the dynamics of the mag-netization.Our approach depends on approximating the system with a sequence of perturbed systems.展开更多
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai...System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing.展开更多
High-entropy alloys(HEAs),which were introduced as a pioneering concept in 2004,have captured the keen interest of nu-merous researchers.Entropy,in this context,can be perceived as representing disorder and randomness...High-entropy alloys(HEAs),which were introduced as a pioneering concept in 2004,have captured the keen interest of nu-merous researchers.Entropy,in this context,can be perceived as representing disorder and randomness.By contrast,elemental composi-tions within alloy systems occupy specific structural sites in space,a concept referred to as structure.In accordance with Shannon entropy,structure is analogous to information.Generally,the arrangement of atoms within a material,termed its structure,plays a pivotal role in dictating its properties.In addition to expanding the array of options for alloy composites,HEAs afford ample opportunities for diverse structural designs.The profound influence of distinct structural features on the exceptional behaviors of alloys is underscored by numer-ous examples.These features include remarkably high fracture strength with excellent ductility,antiballistic capability,exceptional radi-ation resistance,and corrosion resistance.In this paper,we delve into various unique material structures and properties while elucidating the intricate relationship between structure and performance.展开更多
A global weak solution to the isentropic Navier-Stokes equation with initial data around a constant state in the L^(1)∩BV class was constructed in[1].In the current paper,we will continue to study the uniqueness and ...A global weak solution to the isentropic Navier-Stokes equation with initial data around a constant state in the L^(1)∩BV class was constructed in[1].In the current paper,we will continue to study the uniqueness and regularity of the constructed solution.The key ingredients are the Holder continuity estimates of the heat kernel in both spatial and time variables.With these finer estimates,we obtain higher order regularity of the constructed solution to Navier-Stokes equation,so that all of the derivatives in the equation of conservative form are in the strong sense.Moreover,this regularity also allows us to identify a function space such that the stability of the solutions can be established there,which eventually implies the uniqueness.展开更多
In this paper,we establish the unique determination result for inverse acoustic scattering of a penetrable obstacle with a general conductive boundary condition by using phaseless far field data at a fixed frequency.I...In this paper,we establish the unique determination result for inverse acoustic scattering of a penetrable obstacle with a general conductive boundary condition by using phaseless far field data at a fixed frequency.It is well-known that the modulus of the far field pattern is invariant under translations of the scattering obstacle if only one plane wave is used as the incident field,so it is impossible to reconstruct the location of the underlying scatterers.Based on some new research results on the impenetrable obstacle and inhomogeneous isotropic medium,we consider different types of superpositions of incident waves to break the translation invariance property.展开更多
In this paper, we study the Dirichlet boundary value problem involving the highly degenerate and h-homogeneous quasilinear operator associated with the infinity Laplacian, where the right hand side term is and the bou...In this paper, we study the Dirichlet boundary value problem involving the highly degenerate and h-homogeneous quasilinear operator associated with the infinity Laplacian, where the right hand side term is and the boundary value is . First, we establish the comparison principle by the double variables method based on the viscosity solutions theory for the general equation in. We propose two different conditions for the right hand side and get the comparison principle results under different conditions by making different perturbations. Then, we obtain the uniqueness of the viscosity solution to the Dirichlet boundary value problem by the comparison principle. Moreover, we establish the local Lipschitz continuity of the viscosity solution.展开更多
The boundary value problems of the third-order ordinary differential equation have many practical application backgrounds and their some special cases have been studied by many authors. However, few scholars have stud...The boundary value problems of the third-order ordinary differential equation have many practical application backgrounds and their some special cases have been studied by many authors. However, few scholars have studied the boundary value problems of the complete third-order differential equations u′′′(t) = f (t,u(t),u′(t),u′′(t)). In this paper, we discuss the existence and uniqueness of solutions and positive solutions of the fully third-order ordinary differential equation on [0,1] with the boundary condition u(0) = u′(1) = u′′(1) = 0. Under some inequality conditions on nonlinearity f some new existence and uniqueness results of solutions and positive solutions are obtained.展开更多
In this paper,we study the existence and local uniqueness of multi-peak solutions to the Kirchhoff type equations-(ε^(2)a+εb∫_(R^(3))|■u|^(2))△u+V(x)u=u^(p),u>0 in R^(3),which concentrate at non-degenerate cri...In this paper,we study the existence and local uniqueness of multi-peak solutions to the Kirchhoff type equations-(ε^(2)a+εb∫_(R^(3))|■u|^(2))△u+V(x)u=u^(p),u>0 in R^(3),which concentrate at non-degenerate critical points of the potential function V(x),where a,b>0,1<p<5 are constants,andε>0 is a parameter.Applying the Lyapunov-Schmidt reduction method and a local Pohozaev type identity,we establish the existence and local uniqueness results of multi-peak solutions,which concentrate at{a_(i)}1≤i≤k,where{a_(i)}1≤i≤k are non-degenerate critical points of V(x)asε→0.展开更多
We study the global unique solutions to the 2-D inhomogeneous incompressible MHD equations,with the initial data(u0,B0)being located in the critical Besov space■and the initial densityρ0 being close to a positive co...We study the global unique solutions to the 2-D inhomogeneous incompressible MHD equations,with the initial data(u0,B0)being located in the critical Besov space■and the initial densityρ0 being close to a positive constant.By using weighted global estimates,maximal regularity estimates in the Lorentz space for the Stokes system,and the Lagrangian approach,we show that the 2-D MHD equations have a unique global solution.展开更多
When initializing cryptographic systems or running cryptographic protocols, the randomness of critical parameters, like keys or key components, is one of the most crucial aspects. But, randomly chosen parameters come ...When initializing cryptographic systems or running cryptographic protocols, the randomness of critical parameters, like keys or key components, is one of the most crucial aspects. But, randomly chosen parameters come with the intrinsic chance of duplicates, which finally may cause cryptographic systems including RSA, ElGamal and Zero-Knowledge proofs to become insecure. When concerning digital identifiers, we need uniqueness in order to correctly identify a specific action or object. Unfortunately we also need randomness here. Without randomness, actions become linkable to each other or to their initiator’s digital identity. So ideally the employed (cryptographic) parameters should fulfill two potentially conflicting requirements simultaneously: randomness and uniqueness. This article proposes an efficient mechanism to provide both attributes at the same time without highly constraining the first one and never violating the second one. After defining five requirements on random number generators and discussing related work, we will describe the core concept of the generation mechanism. Subsequently we will prove the postulated properties (security, randomness, uniqueness, efficiency and privacy protection) and present some application scenarios including system-wide unique parameters, cryptographic keys and components, identifiers and digital pseudonyms.展开更多
The problem of strong uniqueness of best approximation from an RS set in a Banach space is considered. For a fixed RS set G and an element x∈X , we proved that the best approximation g * to x from ...The problem of strong uniqueness of best approximation from an RS set in a Banach space is considered. For a fixed RS set G and an element x∈X , we proved that the best approximation g * to x from G is strongly unique.展开更多
Aim To prove the uniqueness of the viscosity solutions for the initial value problems of one type of second order parabolic partial differential equations: Methods Using comparison theorem. Results and Conclusion If u...Aim To prove the uniqueness of the viscosity solutions for the initial value problems of one type of second order parabolic partial differential equations: Methods Using comparison theorem. Results and Conclusion If u0 is uniform continuousfunction in RN , F is continuous function in RNx(N) and F is degenerate elliptic, then thisequation has the sole viscosity solution.展开更多
Contact problems and elastoplastic problems are unified and described by the variational inequality formulation, in which the constraints of the constitutional relations for elastoplastic materials and the contact con...Contact problems and elastoplastic problems are unified and described by the variational inequality formulation, in which the constraints of the constitutional relations for elastoplastic materials and the contact conditions are relaxed totally. First, the coerciveness of the functional is proved. Then the uniqueness of the solution of variational inequality for the elastoplastic contact problems is demonstrated. The existence of the solution is also demonstrated according to the sufficient conditions for the solution of the elliptic variational inequality. A mathematical foundation is developed for the variational extremum principle of elastoplastic contact problems. The developed variational extremum forms can give an effective and strict mathematical modeling to solve contact problems with mathematical programming.展开更多
We deal with the problem of entire functions sharing one value weakly. Moreover, we improve and generalize some former results obtained by J.-F.Chen, et al. [6], Y.Xu and H.L.Qiu [4], M.L. Fang [5], C.C. Yang, and X.H...We deal with the problem of entire functions sharing one value weakly. Moreover, we improve and generalize some former results obtained by J.-F.Chen, et al. [6], Y.Xu and H.L.Qiu [4], M.L. Fang [5], C.C. Yang, and X.H. Hua [3].展开更多
We consider the zeros distributions of difference-differential polynomials which are the derivatives of difference products of entire functions. We also investigate the uniqueness problems of difference-differential p...We consider the zeros distributions of difference-differential polynomials which are the derivatives of difference products of entire functions. We also investigate the uniqueness problems of difference-differential polynomials of entire functions sharing a common value.展开更多
In this article, we deal with the uniqueness problems on meromorphic functions sharing two finite sets in an angular domain instead of the whole plane C. In particular, we investigate the uniqueness for meromorphic fu...In this article, we deal with the uniqueness problems on meromorphic functions sharing two finite sets in an angular domain instead of the whole plane C. In particular, we investigate the uniqueness for meromorphic functions of infinite order in an angular domain and obtain some results. Moreover, examples show that the conditions in theorems are necessary.展开更多
基金partially supported by NSFC(11831003,12031012)the Institute of Modern Analysis-A Frontier Research Center of Shanghai。
文摘The hydrodynamics of active liquid crystal models has attracted much attention in recent years due to many applications of these models.In this paper,we study the weak-strong uniqueness for the Leray-Hopf type weak solutions to the incompressible active liquid crystals in R^(3).Our results yield that if there exists a strong solution,then it is unique among the Leray-Hopf type weak solutions associated with the same initial data.
文摘In this paper,we prove the local existence and uniqueness of solutions to the evolutionary model for magnetoviscoelasticity in R^(2),R^(3).This model consists of an incompressible Navier-Stokes,a regularized system for the evolution of the deformation gradient and the Landau-Lifshitz-Gilbert system for the dynamics of the mag-netization.Our approach depends on approximating the system with a sequence of perturbed systems.
基金funded by the National Natural Science Foundation of China(62172418)the Joint Funds of the National Natural Science Foundation of China and the Civil Aviation Administration of China(U2133203)+1 种基金the Education Commission Scientific Research Project of Tianjin China(2022KJ081)the Open Fund of Key Laboratory of Civil Aircraft Airworthiness Technology(SH2021111907).
文摘System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing.
基金supported by the National Natural Science Foundation of China(No.52273280)the Creative Research Groups of China(No.51921001).
文摘High-entropy alloys(HEAs),which were introduced as a pioneering concept in 2004,have captured the keen interest of nu-merous researchers.Entropy,in this context,can be perceived as representing disorder and randomness.By contrast,elemental composi-tions within alloy systems occupy specific structural sites in space,a concept referred to as structure.In accordance with Shannon entropy,structure is analogous to information.Generally,the arrangement of atoms within a material,termed its structure,plays a pivotal role in dictating its properties.In addition to expanding the array of options for alloy composites,HEAs afford ample opportunities for diverse structural designs.The profound influence of distinct structural features on the exceptional behaviors of alloys is underscored by numer-ous examples.These features include remarkably high fracture strength with excellent ductility,antiballistic capability,exceptional radi-ation resistance,and corrosion resistance.In this paper,we delve into various unique material structures and properties while elucidating the intricate relationship between structure and performance.
基金partially the National Key R&D Program of China(2022YFA1007300)the NSFC(11901386,12031013)+2 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences(XDA25010403)the NSFC(11801194,11971188)the Hubei Key Laboratory of Engineering Modeling and Scientific Computing。
文摘A global weak solution to the isentropic Navier-Stokes equation with initial data around a constant state in the L^(1)∩BV class was constructed in[1].In the current paper,we will continue to study the uniqueness and regularity of the constructed solution.The key ingredients are the Holder continuity estimates of the heat kernel in both spatial and time variables.With these finer estimates,we obtain higher order regularity of the constructed solution to Navier-Stokes equation,so that all of the derivatives in the equation of conservative form are in the strong sense.Moreover,this regularity also allows us to identify a function space such that the stability of the solutions can be established there,which eventually implies the uniqueness.
文摘In this paper,we establish the unique determination result for inverse acoustic scattering of a penetrable obstacle with a general conductive boundary condition by using phaseless far field data at a fixed frequency.It is well-known that the modulus of the far field pattern is invariant under translations of the scattering obstacle if only one plane wave is used as the incident field,so it is impossible to reconstruct the location of the underlying scatterers.Based on some new research results on the impenetrable obstacle and inhomogeneous isotropic medium,we consider different types of superpositions of incident waves to break the translation invariance property.
文摘In this paper, we study the Dirichlet boundary value problem involving the highly degenerate and h-homogeneous quasilinear operator associated with the infinity Laplacian, where the right hand side term is and the boundary value is . First, we establish the comparison principle by the double variables method based on the viscosity solutions theory for the general equation in. We propose two different conditions for the right hand side and get the comparison principle results under different conditions by making different perturbations. Then, we obtain the uniqueness of the viscosity solution to the Dirichlet boundary value problem by the comparison principle. Moreover, we establish the local Lipschitz continuity of the viscosity solution.
文摘The boundary value problems of the third-order ordinary differential equation have many practical application backgrounds and their some special cases have been studied by many authors. However, few scholars have studied the boundary value problems of the complete third-order differential equations u′′′(t) = f (t,u(t),u′(t),u′′(t)). In this paper, we discuss the existence and uniqueness of solutions and positive solutions of the fully third-order ordinary differential equation on [0,1] with the boundary condition u(0) = u′(1) = u′′(1) = 0. Under some inequality conditions on nonlinearity f some new existence and uniqueness results of solutions and positive solutions are obtained.
基金supported by the Natural Science Foundation of China(11771166,12071169)the Hubei Key Laboratory of Mathematical Sciences and Program for Changjiang Scholars and Innovative Research Team in University#IRT17R46。
文摘In this paper,we study the existence and local uniqueness of multi-peak solutions to the Kirchhoff type equations-(ε^(2)a+εb∫_(R^(3))|■u|^(2))△u+V(x)u=u^(p),u>0 in R^(3),which concentrate at non-degenerate critical points of the potential function V(x),where a,b>0,1<p<5 are constants,andε>0 is a parameter.Applying the Lyapunov-Schmidt reduction method and a local Pohozaev type identity,we establish the existence and local uniqueness results of multi-peak solutions,which concentrate at{a_(i)}1≤i≤k,where{a_(i)}1≤i≤k are non-degenerate critical points of V(x)asε→0.
基金supported by the National Natural Science Foundation of China(12371211,12126359)the postgraduate Scientific Research Innovation Project of Hunan Province(XDCX2022Y054,CX20220541).
文摘We study the global unique solutions to the 2-D inhomogeneous incompressible MHD equations,with the initial data(u0,B0)being located in the critical Besov space■and the initial densityρ0 being close to a positive constant.By using weighted global estimates,maximal regularity estimates in the Lorentz space for the Stokes system,and the Lagrangian approach,we show that the 2-D MHD equations have a unique global solution.
文摘When initializing cryptographic systems or running cryptographic protocols, the randomness of critical parameters, like keys or key components, is one of the most crucial aspects. But, randomly chosen parameters come with the intrinsic chance of duplicates, which finally may cause cryptographic systems including RSA, ElGamal and Zero-Knowledge proofs to become insecure. When concerning digital identifiers, we need uniqueness in order to correctly identify a specific action or object. Unfortunately we also need randomness here. Without randomness, actions become linkable to each other or to their initiator’s digital identity. So ideally the employed (cryptographic) parameters should fulfill two potentially conflicting requirements simultaneously: randomness and uniqueness. This article proposes an efficient mechanism to provide both attributes at the same time without highly constraining the first one and never violating the second one. After defining five requirements on random number generators and discussing related work, we will describe the core concept of the generation mechanism. Subsequently we will prove the postulated properties (security, randomness, uniqueness, efficiency and privacy protection) and present some application scenarios including system-wide unique parameters, cryptographic keys and components, identifiers and digital pseudonyms.
文摘The problem of strong uniqueness of best approximation from an RS set in a Banach space is considered. For a fixed RS set G and an element x∈X , we proved that the best approximation g * to x from G is strongly unique.
文摘Aim To prove the uniqueness of the viscosity solutions for the initial value problems of one type of second order parabolic partial differential equations: Methods Using comparison theorem. Results and Conclusion If u0 is uniform continuousfunction in RN , F is continuous function in RNx(N) and F is degenerate elliptic, then thisequation has the sole viscosity solution.
基金The National Natural Science Foundation of China(No.10672039)the Key Project of Ministry of Education of China(No.105083)
文摘Contact problems and elastoplastic problems are unified and described by the variational inequality formulation, in which the constraints of the constitutional relations for elastoplastic materials and the contact conditions are relaxed totally. First, the coerciveness of the functional is proved. Then the uniqueness of the solution of variational inequality for the elastoplastic contact problems is demonstrated. The existence of the solution is also demonstrated according to the sufficient conditions for the solution of the elliptic variational inequality. A mathematical foundation is developed for the variational extremum principle of elastoplastic contact problems. The developed variational extremum forms can give an effective and strict mathematical modeling to solve contact problems with mathematical programming.
基金supported by NSF of Fujian Province,China(S0750013),supported by NSF of Fujian Province,China(2008J0190)the Research Foundation of Ningde Normal University(2008J001)the Scientific Research Foundation for the Returned Overseas Chinese Scholars,State Education Ministry
文摘We deal with the problem of entire functions sharing one value weakly. Moreover, we improve and generalize some former results obtained by J.-F.Chen, et al. [6], Y.Xu and H.L.Qiu [4], M.L. Fang [5], C.C. Yang, and X.H. Hua [3].
基金supported by the NSFC(11026110,11101201)the NSF of Jiangxi(2010GQS0144)
文摘We consider the zeros distributions of difference-differential polynomials which are the derivatives of difference products of entire functions. We also investigate the uniqueness problems of difference-differential polynomials of entire functions sharing a common value.
基金Supported by the NNSFC (10671109)the NSFFC(2008J0190)+1 种基金the Research Fund for Talent Introduction of Ningde Teachers College (2009Y019)the Scitific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry
文摘In this article, we deal with the uniqueness problems on meromorphic functions sharing two finite sets in an angular domain instead of the whole plane C. In particular, we investigate the uniqueness for meromorphic functions of infinite order in an angular domain and obtain some results. Moreover, examples show that the conditions in theorems are necessary.
基金Project supported by NSFC(10571135)Doctoral Program Foundation of the Ministry of Education of China(20050240771)Funds of the Science and Technology Committee of Shanghai(03JC14027)
文摘In this article, two uniqueness theorems of meromorphic mappings on moving targets with truncated multiplicities are proved.