Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It i...Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It is a perfect combination of attribute-based encryption(ABE)and public key encryption with keyword search(PEKS).Nevertheless,most of the existing ABEKS schemes have limited search capabilities and only support single or simple conjunctive keyword search.Due to the weak search capability and inaccurate search results,it is difficult to apply these schemes to practical applications.In this paper,an effi-cient expressive ABEKS(EABEKS)scheme supporting unbounded keyword uni-verse over prime-order groups is designed,which supplies the expressive keyword search function supporting the logical connectives of“AND”and“OR”.The proposed scheme not only leads to low computation and communica-tion costs,but also supports unbounded keyword universe.In the standard model,the scheme is proven to be secure under the chosen keyword attack and the cho-sen plaintext attack.The comparison analysis and experimental results show that it has better performance than the existing EABEKS schemes in the storage,com-putation and communication costs.展开更多
In article, I present a study on upper and lower statistical convergence, and upper and lower strong fractional weighted mean convergence by moduli for triple sequences. One of the generalizations of the discrete oper...In article, I present a study on upper and lower statistical convergence, and upper and lower strong fractional weighted mean convergence by moduli for triple sequences. One of the generalizations of the discrete operator Cesàro, was weighted mean operators, which are linear operators, too. Given a modulus function f, I established that a triple sequence that is f-upper or lower strong fractional weighted mean convergent, in some supplementary conditions, is also f-lower or upper statistically convergent. The results of this paper adapt the results obtained in [1] and [2] to upper and lower strong fractional weighted mean convergence and to triple sequence concept. Furthermore, new concepts can be applied to the approximation theory, topology, Fourier analysis, analysis interdisciplinary with applications electrical engineering, robotics and other domains.展开更多
In this paper, we consider the unboundedness of solutions for the asymmetric equation x00+ax+?bx?+?(x)ψ(x0)+f(x)+g(x0)=p(t), where x+ = max{x, 0}, x? = max{?x, 0}, a and b are two different posit...In this paper, we consider the unboundedness of solutions for the asymmetric equation x00+ax+?bx?+?(x)ψ(x0)+f(x)+g(x0)=p(t), where x+ = max{x, 0}, x? = max{?x, 0}, a and b are two different positive constants, f (x) is locally Lipschitz continuous and bounded,?(x), ψ(x), g(x) and p(t) are continuous functions, p(t) is a 2π-periodic function. We discuss the existence of unbounded solutions under two classes of conditions: the resonance case √1a+ √1b ∈Q and the nonresonance case√1a + √1b /∈Q.展开更多
Beginning with a Lagrangian, we derived an approximate relativistic orbit equation which describes relativistic corrections to Keplerian orbits. The critical angular moment to guarantee the existence of periodic orbit...Beginning with a Lagrangian, we derived an approximate relativistic orbit equation which describes relativistic corrections to Keplerian orbits. The critical angular moment to guarantee the existence of periodic orbits is determined. An approximate relativistic Kepler’s elliptic orbit is illustrated by numerical simulation via a second-order perturbation method of averaging.展开更多
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide application.However,it has attracted increasing attent...As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide application.However,it has attracted increasing attention from industry and academia.The blockchain is based on a distributed network and has the characteristics of non-tampering and traceability of block data.It is thus naturally able to solve the security problems of the sensor networks.Accordingly,this paper first analyzes the security risks associated with data storage in the sensor networks,then proposes using blockchain technology to ensure that data storage in the sensor networks is secure.In the traditional blockchain,the data layer uses a Merkle hash tree to store data;however,the Merkle hash tree cannot provide non-member proof,which makes it unable to resist the attacks of malicious nodes in networks.To solve this problem,this paper utilizes a cryptographic accumulator rather than a Merkle hash tree to provide both member proof and non-member proof.Moreover,the number of elements in the existing accumulator is limited and unable to meet the blockchain’s expansion requirements.This paper therefore proposes a new type of unbounded accumulator and provides its definition and security model.Finally,this paper constructs an unbounded accumulator scheme using bilinear pairs and analyzes its performance.展开更多
In this paper, the generalized Dodd-Bullough-Mikhailov equation is studied. The existence of periodic wave and unbounded wave solutions is proved by using the method of bifurcation theory of dynamical systems. Under d...In this paper, the generalized Dodd-Bullough-Mikhailov equation is studied. The existence of periodic wave and unbounded wave solutions is proved by using the method of bifurcation theory of dynamical systems. Under different parametric conditions, various sufficient conditions to guarantee the existence of the above solutions are given.Some exact explicit parametric representations of the above travelling solutions are obtained.展开更多
In this paper, we prove the existence of random attractors for a stochastic reaction-diffusion equation with distribution derivatives on unbounded domains. The nonlinearity is dissipative for large values of the state...In this paper, we prove the existence of random attractors for a stochastic reaction-diffusion equation with distribution derivatives on unbounded domains. The nonlinearity is dissipative for large values of the state and the stochastic nature of the equation appears spatially distributed temporal white noise. The stochastic reaction-diffusion equation is recast as a continuous random dynamical system and asymptotic compactness for this demonstrated by using uniform estimates far-field values of solutions. The results are new and appear to be optimal.展开更多
In the past few years, much and much attention has been paid to the method for solving non-convex programming. Many convergence results are obtained for bounded sets. In this paper, we get global convergence results f...In the past few years, much and much attention has been paid to the method for solving non-convex programming. Many convergence results are obtained for bounded sets. In this paper, we get global convergence results for non-convex programming in unbounded sets under suitable conditions.展开更多
0 IntroductionLet L = ab be a non-closed smooth arc oriented from a to b, t∈ L, t≠a,b, be the fixed point, andf(t) ∈H. (L) . The usual Hadamard principal value is defined asAbout properties and applications of sing...0 IntroductionLet L = ab be a non-closed smooth arc oriented from a to b, t∈ L, t≠a,b, be the fixed point, andf(t) ∈H. (L) . The usual Hadamard principal value is defined asAbout properties and applications of singular integals of high order were investigated by many authors([1],[2],[3] etc. ) In 1987, the concepts of Hadamard principal value at one-side for singular integralsof high order and the rules of their differentiation are introduced [4]. In this paper we established the rulesof substitution of variable for one-sided Hadamard principal value of singular integrals of high order, andthen, we gave some applications in evaluation of real definite integrals.展开更多
By the interpolating inequality and a priori estimates in the weighted space,the existence of the global solutions for the Ginzburg-Landau equation coupled with the BBM equation in an unbounded domain is considered, a...By the interpolating inequality and a priori estimates in the weighted space,the existence of the global solutions for the Ginzburg-Landau equation coupled with the BBM equation in an unbounded domain is considered, and the existence of the maximal attractor is obtained.展开更多
The author studies the infinite element method for the boundary value problems of second order elliptic equations on unbounded and multiply connected domains. The author makes a partition of the domain into infinite n...The author studies the infinite element method for the boundary value problems of second order elliptic equations on unbounded and multiply connected domains. The author makes a partition of the domain into infinite number of elements. Without dividing the domain, as usual, into a bounded one and an exterior one, he derives an initial value problem of an ordinary differential equation for the combined stiffness matrix, then obtains the approximate solution with a small amount of computer work. Numerical examples are given.展开更多
In 1960s, Hartman and Grobman pointed out that if all eigenvalues of a matrix A have no zero real part and f(x) is small Lipchitzian, then x′=Ax+f(x) can be locally linearized on a neighborhood of the origin. Later, ...In 1960s, Hartman and Grobman pointed out that if all eigenvalues of a matrix A have no zero real part and f(x) is small Lipchitzian, then x′=Ax+f(x) can be locally linearized on a neighborhood of the origin. Later, the above result was generalized to global under the condition that f(x) is a bounded function. In this paper, we delete the condition that f(x) is a bounded function, and prove that if f(x) has suitable structure, then x′=Ax+f(x) can be linearized.展开更多
The existence and uniqueness of solutions to backward stochastic differential equations with jumps and with unbounded stopping time as terminal under the non_Lipschitz condition are obtained. The convergence of soluti...The existence and uniqueness of solutions to backward stochastic differential equations with jumps and with unbounded stopping time as terminal under the non_Lipschitz condition are obtained. The convergence of solutions and the continuous dependence of solutions on parameters are also derived. Then the probabilistic interpretation of solutions to some kinds of quasi_linear elliptic type integro_differential equations is obtained.展开更多
In this paper, we propose a homotopy continuous method (HCM) for solving a weak efficient solution of multiobjective optimization problem (MOP) with feasible set unbounded condition, which is arising in Economical Dis...In this paper, we propose a homotopy continuous method (HCM) for solving a weak efficient solution of multiobjective optimization problem (MOP) with feasible set unbounded condition, which is arising in Economical Distributions, Engineering Decisions, Resource Allocations and other field of mathematical economics and engineering problems. Under the suitable assumption, it is proved to globally converge to a weak efficient solution of (MOP), if its x-branch has no weak infinite solution.展开更多
In this paper, a deterministic delay differential pantograph equation (DDPE) with an unbounded memory is stochastically perturbed by an Ito-type noise. The contribution of white noise to the oscillatory behaviour of...In this paper, a deterministic delay differential pantograph equation (DDPE) with an unbounded memory is stochastically perturbed by an Ito-type noise. The contribution of white noise to the oscillatory behaviour of the new stochastic delay differential pantograph equation (SDDPE) is investigated. It is established that under certain conditions and with a highly positive probability, the new stochastic delay differential pantograph equation has an oscillatory solution influenced by the presence of the noise. This is not possible with the original deterministic system which has a non-oscillatory solution due to the absence of noise.展开更多
Unbounded operators can transform arbitrarily small vectors into arbitrarily large vectors—a phenomenon known as instability. Stabilization methods strive to approximate a value of an unbounded operator by applying a...Unbounded operators can transform arbitrarily small vectors into arbitrarily large vectors—a phenomenon known as instability. Stabilization methods strive to approximate a value of an unbounded operator by applying a family of bounded operators to rough approximate data that do not necessarily lie within the domain of unbounded operator. In this paper we shall be concerned with the stable method of computing values of unbounded operators having perturbations and the stability is established for this method.展开更多
By combining the classical appropriate functions “1, x, x 2” with the method of multiplier enlargement, this paper establishes a theorem to approximate any unbounded continuous functions with modified positive...By combining the classical appropriate functions “1, x, x 2” with the method of multiplier enlargement, this paper establishes a theorem to approximate any unbounded continuous functions with modified positive linear operators. As an example, Hermite Fejér interpolation polynomial operators are analysed and studied, and a general conclusion is obtained.展开更多
A standard assumption in the literature of learning theory is the samples which are drawn independently from an identical distribution with a uniform bounded output. This excludes the common case with Gaussian distrib...A standard assumption in the literature of learning theory is the samples which are drawn independently from an identical distribution with a uniform bounded output. This excludes the common case with Gaussian distribution. In this paper we extend these assumptions to a general case. To be precise, samples are drawn from a sequence of unbounded and non-identical probability distributions. By drift error analysis and Bennett inequality for the unbounded random variables, we derive a satisfactory learning rate for the ERM algorithm.展开更多
In this paper, we use the concentration-compactness principle together with the Mountain Pass Lemma to get the existence of nontrivial solutions and the existence of infinitely many solutions of the problem need not b...In this paper, we use the concentration-compactness principle together with the Mountain Pass Lemma to get the existence of nontrivial solutions and the existence of infinitely many solutions of the problem need not be compact operators from E to R~1.展开更多
We consider fully nonlinear equations of the formF(z,u,Du,D<sup>2</sup>u) = F(x,y,u,u<sub>z</sub>,u<sub>y</sub>,u<sub>z</sub>z,u<sub>z</sub>y,u<sub>...We consider fully nonlinear equations of the formF(z,u,Du,D<sup>2</sup>u) = F(x,y,u,u<sub>z</sub>,u<sub>y</sub>,u<sub>z</sub>z,u<sub>z</sub>y,u<sub>y</sub>y) = 0 (1)in unbounded open subset G = R<sup>2</sup>\Ωof the plane R<sup>2</sup>,where F is a real continuous function on U = G×R×R<sup>2</sup>×R<sup>3</sup> and Ω= Ω<sub>i</sub>,Ω<sub>i</sub> is a simply connected region (i=1,2,"",N) . We assume the function F hascontinuous partial der ivatives F<sub>u<sub>z</sub>z</sub>, F<sub>u<sub>z</sub>y</sub>, F<sub>u<sub>y</sub>y</sub>. on U.For a real function r C( G) a real function u(x,y) is called a solution of (1) satisfyingu = r on G,(2)if there exists a constant P0】2 such that u C<sup>1</sup> ( ) W<sup>2.p</sup><sub>Loc</sub>0 (G) satisfies (1) almost everywhere and (2)in the common sense.The method for treating the above exterior Dirichlet problem in a given unbounded region is as fol-展开更多
基金supported in part by the National Natural Science Foundation of China under Grant No.61772009the Natural Science Foundation of Jiangsu Province under Grant No.BK20181304.
文摘Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It is a perfect combination of attribute-based encryption(ABE)and public key encryption with keyword search(PEKS).Nevertheless,most of the existing ABEKS schemes have limited search capabilities and only support single or simple conjunctive keyword search.Due to the weak search capability and inaccurate search results,it is difficult to apply these schemes to practical applications.In this paper,an effi-cient expressive ABEKS(EABEKS)scheme supporting unbounded keyword uni-verse over prime-order groups is designed,which supplies the expressive keyword search function supporting the logical connectives of“AND”and“OR”.The proposed scheme not only leads to low computation and communica-tion costs,but also supports unbounded keyword universe.In the standard model,the scheme is proven to be secure under the chosen keyword attack and the cho-sen plaintext attack.The comparison analysis and experimental results show that it has better performance than the existing EABEKS schemes in the storage,com-putation and communication costs.
文摘In article, I present a study on upper and lower statistical convergence, and upper and lower strong fractional weighted mean convergence by moduli for triple sequences. One of the generalizations of the discrete operator Cesàro, was weighted mean operators, which are linear operators, too. Given a modulus function f, I established that a triple sequence that is f-upper or lower strong fractional weighted mean convergent, in some supplementary conditions, is also f-lower or upper statistically convergent. The results of this paper adapt the results obtained in [1] and [2] to upper and lower strong fractional weighted mean convergence and to triple sequence concept. Furthermore, new concepts can be applied to the approximation theory, topology, Fourier analysis, analysis interdisciplinary with applications electrical engineering, robotics and other domains.
基金Supported by the Tianyuan Special Foundation(11526148) Supported by the National Natural Science Foundation of China(l1571187, 11461056)
文摘In this paper, we consider the unboundedness of solutions for the asymmetric equation x00+ax+?bx?+?(x)ψ(x0)+f(x)+g(x0)=p(t), where x+ = max{x, 0}, x? = max{?x, 0}, a and b are two different positive constants, f (x) is locally Lipschitz continuous and bounded,?(x), ψ(x), g(x) and p(t) are continuous functions, p(t) is a 2π-periodic function. We discuss the existence of unbounded solutions under two classes of conditions: the resonance case √1a+ √1b ∈Q and the nonresonance case√1a + √1b /∈Q.
文摘Beginning with a Lagrangian, we derived an approximate relativistic orbit equation which describes relativistic corrections to Keplerian orbits. The critical angular moment to guarantee the existence of periodic orbits is determined. An approximate relativistic Kepler’s elliptic orbit is illustrated by numerical simulation via a second-order perturbation method of averaging.
基金supported by the NSFC(61772454)the Researchers Supporting Project No.RSP-2020/102 King Saud University,Riyadh,Saudi Arabiafunded by National Key Research and Development Program of China(2019YFC1511000).
文摘As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide application.However,it has attracted increasing attention from industry and academia.The blockchain is based on a distributed network and has the characteristics of non-tampering and traceability of block data.It is thus naturally able to solve the security problems of the sensor networks.Accordingly,this paper first analyzes the security risks associated with data storage in the sensor networks,then proposes using blockchain technology to ensure that data storage in the sensor networks is secure.In the traditional blockchain,the data layer uses a Merkle hash tree to store data;however,the Merkle hash tree cannot provide non-member proof,which makes it unable to resist the attacks of malicious nodes in networks.To solve this problem,this paper utilizes a cryptographic accumulator rather than a Merkle hash tree to provide both member proof and non-member proof.Moreover,the number of elements in the existing accumulator is limited and unable to meet the blockchain’s expansion requirements.This paper therefore proposes a new type of unbounded accumulator and provides its definition and security model.Finally,this paper constructs an unbounded accumulator scheme using bilinear pairs and analyzes its performance.
基金Supported by the NNSF of China(60464001) Guangxi Science Foundation(0575092).
文摘In this paper, the generalized Dodd-Bullough-Mikhailov equation is studied. The existence of periodic wave and unbounded wave solutions is proved by using the method of bifurcation theory of dynamical systems. Under different parametric conditions, various sufficient conditions to guarantee the existence of the above solutions are given.Some exact explicit parametric representations of the above travelling solutions are obtained.
文摘In this paper, we prove the existence of random attractors for a stochastic reaction-diffusion equation with distribution derivatives on unbounded domains. The nonlinearity is dissipative for large values of the state and the stochastic nature of the equation appears spatially distributed temporal white noise. The stochastic reaction-diffusion equation is recast as a continuous random dynamical system and asymptotic compactness for this demonstrated by using uniform estimates far-field values of solutions. The results are new and appear to be optimal.
基金The NNSF (10071031) of China China Postdoctoral Science Foundation.
文摘In the past few years, much and much attention has been paid to the method for solving non-convex programming. Many convergence results are obtained for bounded sets. In this paper, we get global convergence results for non-convex programming in unbounded sets under suitable conditions.
文摘0 IntroductionLet L = ab be a non-closed smooth arc oriented from a to b, t∈ L, t≠a,b, be the fixed point, andf(t) ∈H. (L) . The usual Hadamard principal value is defined asAbout properties and applications of singular integals of high order were investigated by many authors([1],[2],[3] etc. ) In 1987, the concepts of Hadamard principal value at one-side for singular integralsof high order and the rules of their differentiation are introduced [4]. In this paper we established the rulesof substitution of variable for one-sided Hadamard principal value of singular integrals of high order, andthen, we gave some applications in evaluation of real definite integrals.
文摘By the interpolating inequality and a priori estimates in the weighted space,the existence of the global solutions for the Ginzburg-Landau equation coupled with the BBM equation in an unbounded domain is considered, and the existence of the maximal attractor is obtained.
基金This work was supported by the China State Major Key Project for Basic Researches Science Fund of the Ministry of Education
文摘The author studies the infinite element method for the boundary value problems of second order elliptic equations on unbounded and multiply connected domains. The author makes a partition of the domain into infinite number of elements. Without dividing the domain, as usual, into a bounded one and an exterior one, he derives an initial value problem of an ordinary differential equation for the combined stiffness matrix, then obtains the approximate solution with a small amount of computer work. Numerical examples are given.
基金NSFC!( 1 9671 0 1 7) and NSF!( A970 1 2 ) of Fujian.
文摘In 1960s, Hartman and Grobman pointed out that if all eigenvalues of a matrix A have no zero real part and f(x) is small Lipchitzian, then x′=Ax+f(x) can be locally linearized on a neighborhood of the origin. Later, the above result was generalized to global under the condition that f(x) is a bounded function. In this paper, we delete the condition that f(x) is a bounded function, and prove that if f(x) has suitable structure, then x′=Ax+f(x) can be linearized.
文摘The existence and uniqueness of solutions to backward stochastic differential equations with jumps and with unbounded stopping time as terminal under the non_Lipschitz condition are obtained. The convergence of solutions and the continuous dependence of solutions on parameters are also derived. Then the probabilistic interpretation of solutions to some kinds of quasi_linear elliptic type integro_differential equations is obtained.
文摘In this paper, we propose a homotopy continuous method (HCM) for solving a weak efficient solution of multiobjective optimization problem (MOP) with feasible set unbounded condition, which is arising in Economical Distributions, Engineering Decisions, Resource Allocations and other field of mathematical economics and engineering problems. Under the suitable assumption, it is proved to globally converge to a weak efficient solution of (MOP), if its x-branch has no weak infinite solution.
文摘In this paper, a deterministic delay differential pantograph equation (DDPE) with an unbounded memory is stochastically perturbed by an Ito-type noise. The contribution of white noise to the oscillatory behaviour of the new stochastic delay differential pantograph equation (SDDPE) is investigated. It is established that under certain conditions and with a highly positive probability, the new stochastic delay differential pantograph equation has an oscillatory solution influenced by the presence of the noise. This is not possible with the original deterministic system which has a non-oscillatory solution due to the absence of noise.
文摘Unbounded operators can transform arbitrarily small vectors into arbitrarily large vectors—a phenomenon known as instability. Stabilization methods strive to approximate a value of an unbounded operator by applying a family of bounded operators to rough approximate data that do not necessarily lie within the domain of unbounded operator. In this paper we shall be concerned with the stable method of computing values of unbounded operators having perturbations and the stability is established for this method.
文摘By combining the classical appropriate functions “1, x, x 2” with the method of multiplier enlargement, this paper establishes a theorem to approximate any unbounded continuous functions with modified positive linear operators. As an example, Hermite Fejér interpolation polynomial operators are analysed and studied, and a general conclusion is obtained.
文摘A standard assumption in the literature of learning theory is the samples which are drawn independently from an identical distribution with a uniform bounded output. This excludes the common case with Gaussian distribution. In this paper we extend these assumptions to a general case. To be precise, samples are drawn from a sequence of unbounded and non-identical probability distributions. By drift error analysis and Bennett inequality for the unbounded random variables, we derive a satisfactory learning rate for the ERM algorithm.
文摘In this paper, we use the concentration-compactness principle together with the Mountain Pass Lemma to get the existence of nontrivial solutions and the existence of infinitely many solutions of the problem need not be compact operators from E to R~1.
基金The project is supported by the Natural Science Foundation of Fujian,P.R.China.
文摘We consider fully nonlinear equations of the formF(z,u,Du,D<sup>2</sup>u) = F(x,y,u,u<sub>z</sub>,u<sub>y</sub>,u<sub>z</sub>z,u<sub>z</sub>y,u<sub>y</sub>y) = 0 (1)in unbounded open subset G = R<sup>2</sup>\Ωof the plane R<sup>2</sup>,where F is a real continuous function on U = G×R×R<sup>2</sup>×R<sup>3</sup> and Ω= Ω<sub>i</sub>,Ω<sub>i</sub> is a simply connected region (i=1,2,"",N) . We assume the function F hascontinuous partial der ivatives F<sub>u<sub>z</sub>z</sub>, F<sub>u<sub>z</sub>y</sub>, F<sub>u<sub>y</sub>y</sub>. on U.For a real function r C( G) a real function u(x,y) is called a solution of (1) satisfyingu = r on G,(2)if there exists a constant P0】2 such that u C<sup>1</sup> ( ) W<sup>2.p</sup><sub>Loc</sub>0 (G) satisfies (1) almost everywhere and (2)in the common sense.The method for treating the above exterior Dirichlet problem in a given unbounded region is as fol-