期刊文献+
共找到1,594篇文章
< 1 2 80 >
每页显示 20 50 100
Blind channel identication of nonlinear folding mixing model 被引量:1
1
作者 Su Yong Xu Shangzhi Ye Zhongfu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期509-512,共4页
Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to ident... Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to identify/recover the channels and the sources. BSS/ICA of nonlinear mixing models are difficult problems. For instance, the post-nonlinear model has been studied by several authors. It is noticed that in most cases, the proposed models are always with an invertible mixing. According to this fact there is an interesting question, how about the situation of the non-invertible non-linear mixing in BSS or ICA? A new simple non-linear mixing model is proposed with a kind of non-invertible mixing, the folding mixing, and method to identify its channel, blindly. 展开更多
关键词 BLIND channel identication non-linear mixing non-invertible.
在线阅读 下载PDF
A Continuous Time Domain Direct Identication Method for Unsteady Fluid Dynamic Model in Incompressible Flow 被引量:1
2
作者 Xianwu Lin Tao Li +1 位作者 Lixun Xiong Delin Luo 《Guidance, Navigation and Control》 2023年第1期85-116,共32页
To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method ... To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method is more accurate and appropriate for identifying unsteady°uid dynamic model in incompressible°ow in comparison with the classical frequency domain or discrete domain method.This new method is applied to identify the unsteady°uid dynamic models of a NACA0012 airfoil and the e®ect of the°uid viscosity on the model parameter is analyzed.The result shows that the added mass in viscous°ow is dependent on the input signal frequency and is exactly the added mass in inviscid°ow when the frequency approaches innity.Based on this discovery,the long controversy on the relationship of added mass between viscous and inviscid°ow is solved.Then,the enlightenment of this discovery on the identication of both linear and nonlinear unsteady aerodynamic model in incompressible°ow is illustrated.At last,the advantage of the new acquired unsteady°uid dynamic model is discussed in comparison with the classical quasi-steady aerodynamic model. 展开更多
关键词 Model identication unsteady fluid dynamics added mass non-causal system.
在线阅读 下载PDF
A blockchain-based user-centric identity management toward 6G networks
3
作者 Guoqiang Zhang Qiwei Hu +1 位作者 Yu Zhang Tao Jiang 《Digital Communications and Networks》 2026年第1期1-10,共10页
The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between... The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between various entities in 6G networks can not only induce increasing complications of digital identity management,but also raise material concerns about the security and privacy of the user identity.In this paper,we design a user-centric identity management that returns the sole control to the user self and achieves identity sovereignty toward 6G networks.Specifically,we propose a blockchain-based Identity Management(IDM)architecture for 6G networks,which provides a practical method to secure digital identity management.Subsequently,we develop a fully privacy-preserving identity attribute management scheme by using zero-knowledge proof to protect the privacy-sensitive identity attribute.In particular,the scheme achieves an identity attribute hiding and verification protocol to support users in obtaining and applying their identity attributes without revealing concrete data.Finally,we analyze the security of the proposed architecture and implement a prototype system to evaluate its performance.The results demonstrate that our architecture ensures effective user digital identity management in 6G networks. 展开更多
关键词 The sixth generation(6G)network User-centric identity management Blockchain Decentralized identity Privacy preservation
在线阅读 下载PDF
A certificateless identity authentication scheme for UAVs via blockchain sharding
4
作者 Zhi-Peng Zhong Xiao Chen +3 位作者 Mu-Hong Huang Hao-Zhe Wang Sheng Cao Xiao-Song Zhang 《Journal of Electronic Science and Technology》 2026年第1期1-13,共13页
With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuri... With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication. 展开更多
关键词 Blockchain CERTIFICATELESS Identity authentication Registration-based encryption UAV swarms
在线阅读 下载PDF
China’s Snow Boom:From Olympic Dream to Economic Engine
5
作者 ZACHARY G.LUNDQUIST 《China Today》 2026年第2期36-39,共4页
How is a nation’s embrace of snow and ice shaping a new cultural identity and igniting a multi-trillion-yuan economic boom?ADRIAAN Smit now cannot imagine a life without snowboarding,a passion that has become central... How is a nation’s embrace of snow and ice shaping a new cultural identity and igniting a multi-trillion-yuan economic boom?ADRIAAN Smit now cannot imagine a life without snowboarding,a passion that has become central to his world.He is excited to witness how winter sports are fostering a new winter culture in China.Listening to Smit speaking so enthusiastically about the slopes,one might assume he was raised in a region where snow sports are a way of life,but the fact is quite the contrary. 展开更多
关键词 winter sports SNOWBOARDING China Olympic dream snow sports economic boom cultural identity
在线阅读 下载PDF
三角恒等变换题型总结
6
作者 陈海峰 《中学生数理化(高一数学)》 2026年第1期11-11,共1页
一、和角公式的应用例1已知tanatanβ=2,cos(a-β)=/,则cos(a+β)=__。解析:因为tanatanβ=sina·sinβ/cosa·cosβ=2,所以sinasinβ=2cos acosβ。
关键词 trigonometric identities sum formulas cosine function cotangent
在线阅读 下载PDF
Research on the Influence of Professional Identity of Specialized Nurses on Core Competency Development and Enhancement Pathways
7
作者 Alima Khulan Gaalan +1 位作者 Solongo Dashnyam Baasanjav Nachin 《Journal of Clinical and Nursing Research》 2026年第2期385-389,共5页
Within contemporary healthcare systems, professional identity among specialized nurses serves as a pivotal intrinsic factor influencing the development of their core competencies. This review synthesizes existing rese... Within contemporary healthcare systems, professional identity among specialized nurses serves as a pivotal intrinsic factor influencing the development of their core competencies. This review synthesizes existing research, revealing that professional identity positively impacts the development of core competencies through multiple pathways, including psychological drive, behavioral facilitation, teamwork, and career stability. Building on this analysis, this paper proposes systematic enhancement strategies from four dimensions: education and training, organizational environment, cultural development, and individual growth, aiming to provide a reference for nursing practice and professional development. 展开更多
关键词 Specialized nurse Professional identity Core competency Nursing education Career development Enhancement pathways
暂未订购
National identity and subjective well-being among college students:A sequential mediation analysis of collective and personal self-esteem
8
作者 Luming Zhao Jiaxi Zhang +1 位作者 Yan Zhang Jiaxi Peng 《Journal of Psychology in Africa》 2026年第1期1-8,共8页
The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49... The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49%;mean age=19.25±1.85 years).They completed measures of national identity,collective self-esteem,personal self-esteem,and subjective well-being.Path analysis findings result indicated national identity to influence the students’subjective wellbeing through three pathways:(1)national identity→collective self-esteem→subjective well-being,meaning higher subjective wellbeing with collective self-esteem.(2)national identity→personal self-esteem→subjective well-being,to suggest higher personal self-esteem was associated with subjective wellbeing;(3)national identity→collective selfesteem→personal self-esteem→subjective well-being.Compared to simple mediation models constructed with only personal self-esteem or collective self-esteem as a single mediating variable,the chain mediation model better explains the mediating mechanism of national identity on subjective well-being(the variance explained by the mediating variables increased by 65.38%and 59.26%,respectively).The collective self-esteem and personal self-esteem mediation is consistent with social identity theory,whereby national identity enhances collective self-evaluation,which in turn bolsters personal self-worth and subjective well-being.These findings of the current study offer new insights into how national identity affects subjective well-being in collectivistic culture. 展开更多
关键词 National identity collective self-esteem personal self-esteem mediating effect
在线阅读 下载PDF
MMF-CycleGAN:A Multi-Scale Generative Framework for Robust and Identity-Preserving Face Frontalization
9
作者 Swetha K Shiloah Elizabeth Darmanayagam Sunil Retmin Raj Cyril 《Computer Modeling in Engineering & Sciences》 2026年第3期934-966,共33页
Recognizing frontal faces from non-frontal or profile images is a major problem due to pose changes,self-occlusions,and the complete loss of important structural and textural components,depressing recognition accuracy... Recognizing frontal faces from non-frontal or profile images is a major problem due to pose changes,self-occlusions,and the complete loss of important structural and textural components,depressing recognition accuracy and visual fidelity.This paper introduces a new deep generative framework,Modified Multi-Scale Fused CycleGAN(MMF-CycleGAN),for robust and photo-realistic profile-to-frontal face synthesis.The MMF-CycleGAN framework utilizes pre-processing and then the generator employs a Deep Dilated DenseNet encoder-based hierarchical feature extraction along with a transformer and decoder.The proposed Multi-Scale Fusion PatchGAN discriminator enforces consistency at multiple spatial resolutions,leading to sharper textures and improved global facial geometry.Also,GAN training stability and identity preservation are improved through the Ranger optimizer,which effectively balances adversarial,identity,and cycle-consistency losses.Experiments on three benchmark datasets show that MMFCycleGAN achieves accuracy of 0.9541,0.9455,and 0.9422,F1-scores of 0.9654,0.9641,and 0.9614,and AUC values of 0.9742,0.9714,and 0.9698,respectively,and the extreme-pose accuracy(yaw>60°)reaches 0.92.Despite its enhanced architecture,the framework maintains an efficient inference time of 0.042 s per image,making it suitable for real-time biometric authentication,surveillance,and security applications in unconstrained environments. 展开更多
关键词 Face image frontalization CycleGAN DenseNet feature fusion PatchGAN discriminator optimization and identity preservation
在线阅读 下载PDF
IOTA-Based Authentication for IoT Devices in Satellite Networks
10
作者 D.Bernal O.Ledesma +1 位作者 P.Lamo J.Bermejo 《Computers, Materials & Continua》 2026年第1期1885-1923,共39页
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi... This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks. 展开更多
关键词 Satellite IoT decentralized authentication directed acyclic graph IOTA identity verifiable credentials
在线阅读 下载PDF
The Influence of Discrimination Perception on the Psychological Resilience among Vocational High School Students:Longitudinal Mediating Effect of Vocational Identity
11
作者 Lingyan Zhang Yuying Yang Zhuoxuan Huang 《International Journal of Mental Health Promotion》 2026年第2期112-124,共13页
Objectives:Psychological resilience is a critical resource for vocational high school students navigating social biases and fostering mental well-being.This six-month longitudinal study investigated the developmental ... Objectives:Psychological resilience is a critical resource for vocational high school students navigating social biases and fostering mental well-being.This six-month longitudinal study investigated the developmental trajectories of discrimination perception,vocational identity,and psychological resilience in this population.It further examined the longitudinal mediating role of vocational identity in the relationship between discrimination perception and psychological resilience.Methods:A total of 526 students from five vocational high schools in Guangdong,China,were assessed via convenience sampling at two time points:baseline(T1,September 2023)and six-month follow-up(T2,March 2024).Measures of discrimination perception,psychological resilience,and vocational identity were administered.Data were analyzed using a cross-lagged panel model to test for bidirectional relationships.Results:Over the six-month period,students showed significant decreases in discrimination perception and vocational identity,but a significant increase in psychological resilience.The cross-lagged model revealed significant bidirectional relationships:discrimination perception and psychological resilience negatively predicted each other over time(β=−0.124,p<0.01;β=−0.200,p<0.001),while psychological resilience and vocational identity positively predicted each other(β=0.084,p<0.05;β=0.076,p<0.05).The mediation analysis revealed a dual-pathway mechanism.T1 discrimination perception exerted both a significant direct negative effect on T2 psychological resilience(β=−0.332,p<0.001)and a significant indirect positive effect via T1 vocational identity(indirect effect=0.020,95%CI[0.001,0.046]).This confirms a partial mediating role,indicating that vocational identity functions as a compensatory mechanism,transforming the experience of discrimination perception into a potential source of psychological resilience.Conclusions:For vocational high school students,perception of discrimination directly undermines psychological resilience,but also indirectly fosters it through the positive development of vocational identity.These findings highlight vocational identity as a pivotal mechanism in the complex relationship between social adversity and mental resilience. 展开更多
关键词 Vocational high school students vocational identity discrimination perception psychological resilience
在线阅读 下载PDF
Self-Presentation onWeChat Moments and Ego Identity in Emerging Adults: The Role of Online Positive Feedback and Gender
12
作者 Shuqing Wang Xiaorui Zhu +2 位作者 Xin Gao Jialing Deng Xiumei Yan 《International Journal of Mental Health Promotion》 2026年第3期183-204,共22页
Background:Emerging adulthood is a critical period for ego identity exploration and consolidation,and self-presentation on social media constitutes a salient online context for this developmental process.However,limit... Background:Emerging adulthood is a critical period for ego identity exploration and consolidation,and self-presentation on social media constitutes a salient online context for this developmental process.However,limited research has explored the associations between self-presentation on WeChat Moments and ego identity.This study aims to examine these associations,focusing on the mediating role of online positive feedback and the moderating role of gender.Methods:Using a three-wave longitudinal design,this study followed 767 Chinese college students(Mean age=18.96 years)through cluster sampling.Participants completed self-report questionnaires assessing self-presentation on WeChat Moments,online positive feedback,and ego identity status.Data analyses were conducted using mediation modeling and multi-group structural equation modeling.Results:Authentic self-presentation was positively associated with identity achievement and negatively associated with identity diffusion,whereas positive self-presentation was linked to higher levels of identity foreclosure.Online positive feedback played a significant mediating role in the associations between self-presentation strategies and identity statuses,and gender differences were observed in this mediating pathway.For both males and females,authentic self-presentation was associated with higher identity achievement through online positive feedback.However,indirect associations with identity foreclosure and diffusion were observed only among females:authentic self-presentation was linked to lower levels,whereas positive self-presentation was linked to higher levels of foreclosure and diffusion through online positive feedback.No comparable indirect associations were detected among males.Conclusions:Online positive feedback is closely linked to self-presentation strategies and ego identity statuses,with these associations varying by gender. 展开更多
关键词 Self-presentation on WeChat moments ego identity online positive feedback emerging adults
在线阅读 下载PDF
FedCCM:Communication-Efficient Federated Learning via Clustered Client Momentum in Non-IID Settings
13
作者 Hang Wen Kai Zeng 《Computers, Materials & Continua》 2026年第3期1690-1707,共18页
Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different e... Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different edge devices varies significantly.As a result,communication overhead increases,which further slows down the convergence process.To address this challenge,we propose a simple yet effective federated learning framework that improves consistency among edge devices.The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates.In parallel,a global momentum is applied during model aggregation,enabling faster convergence while preserving personalization.This strategy enables efficient propagation of the estimated global update direction to all participating edge devices and maintains alignment in local training,without introducing extra memory or communication overhead.We conduct extensive experiments on benchmark datasets such as Cifar100 and Tiny-ImageNet.The results confirm the effectiveness of our framework.On CIFAR-100,our method reaches 55%accuracy with 37 fewer rounds and achieves a competitive final accuracy of 65.46%.Even under extreme non-IID scenarios,it delivers significant improvements in both accuracy and communication efficiency.The implementation is publicly available at https://github.com/sjmp525/CollaborativeComputing/tree/FedCCM(accessed on 20 October 2025). 展开更多
关键词 Federated learning distributed computation communication efficient momentum clustering non-independent and identically distributed(non-IID)
在线阅读 下载PDF
From Identification to Obfuscation:A Survey of Cross-Network Mapping and Anti-Mapping Methods
14
作者 Shaojie Min Yaxiao Luo +2 位作者 Kebing Liu Qingyuan Gong Yang Chen 《Computers, Materials & Continua》 2026年第2期96-118,共23页
User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy ris... User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy risks.Over the past decade,the research community has developed a wide range of UIL methods,from structural embeddings tomultimodal fusion architectures.However,corresponding adversarial and defensive approaches remain fragmented and comparatively understudied.In this survey,we provide a unified overview of both mapping and antimappingmethods for UIL.We categorize representativemappingmodels by learning paradigmand datamodality,and systematically compare them with emerging countermeasures including adversarial injection,structural perturbation,and identity obfuscation.To bridge these two threads,we introduce amodality-oriented taxonomy and a formal gametheoretic framing that casts cross-network mapping as a contest between mappers and anti-mappers.This framing allows us to construct a cross-modality dependency matrix,which reveals structural information as themost contested signal,identifies node injection as the most robust defensive strategy,and points to multimodal integration as a promising direction.Our survey underscores the need for balanced,privacy-preserving identity inference and provides a foundation for future research on the adversarial dynamics of social identity mapping and defense. 展开更多
关键词 User identity linkage(UIL) cross-network mapping adversarial attacks privacy protection online social networks
在线阅读 下载PDF
FedReg^(*):Addressing Non-Independent and Identically Distributed Challenges in Federated Learning
15
作者 SHI Xiujin ZHU Xiaolong XIAO Wentao 《Journal of Donghua University(English Edition)》 2026年第1期41-49,共9页
In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a meth... In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a method based on hybrid regularization aimed at enhancing federated learning in non-IID scenarios.It introduces hybrid regularization to replace traditional L2 regularization,combining the advantages of L1 and L2 regularization to enable feature selection while preventing overfitting.This method better adapts to the diverse data distributions of different clients,improving the overall model performance.FedReg^(*)combines hybrid regularization with weighted model aggregation.In addition to the benefits of hybrid regularization,FedReg^(*)applies a weighted averaging method in the model aggregation process,calculating weights based on the cosine similarity between each client gradient and the global gradient to more reasonably distribute client contributions.By considering variations in data quality and quantity among clients,FedReg^(*)highlights the importance of key clients and enhances the model’s generalization performance.These improvement methods enhance model accuracy and communication efficiency. 展开更多
关键词 federated learning non-independent and identically distributed(non-IID)data hybrid regularization cosine similarity
在线阅读 下载PDF
THE BOUNDEDNESS OF INHOMOGENEOUS CALDERÓN-ZYGMUND CONVOLUTION OPERATORS ON LOCAL PRODUCT HARDY SPACES
16
作者 Shaoyong HE Jiecheng CHEN 《Acta Mathematica Scientia》 2026年第1期99-111,共13页
It is well known that the inhomogeneous Calderón-Zygmund convolution operators are bounded on the local Hardy spaces.In this paper,we prove that these operators are bounded on the local product Hardy spaces and t... It is well known that the inhomogeneous Calderón-Zygmund convolution operators are bounded on the local Hardy spaces.In this paper,we prove that these operators are bounded on the local product Hardy spaces and the Lipschitz spaces.The key ideas used here are the discrete local Calderón identity and a density argument for the inhomogeneous product Lipschitz spaces in the weak sense. 展开更多
关键词 local Hardy space Lipschitz space inhomogeneous Calderón-Zygmund operator discrete Calderón identity
在线阅读 下载PDF
城市形象系列地图设计——以武汉市为例
17
作者 苏世亮 黄煦原 +2 位作者 杜清运 亢孟军 翁敏 《测绘地理信息》 2025年第2期1-5,共5页
良好的城市形象是城市蓬勃发展的内生动力。凭借地图媒介对城市形象进行刻画演绎,有助于城市形象的传播与营销。然而,目前学术界少有关于系统性开展城市形象系列地图设计的案例研究。针对这一问题,本文以城市形象特征系统理论为基础,构... 良好的城市形象是城市蓬勃发展的内生动力。凭借地图媒介对城市形象进行刻画演绎,有助于城市形象的传播与营销。然而,目前学术界少有关于系统性开展城市形象系列地图设计的案例研究。针对这一问题,本文以城市形象特征系统理论为基础,构建了“理念-行为-视觉景观”的主题内容选取框架;进而结合地图载体的优势特点,提出了制定表达策略的四大原则;最后以武汉市为实践案例,详细演绎了地图设计的具体过程,以期为城市形象系列地图的设计提供理论依据和实践参考。 展开更多
关键词 地图设计 城市形象 企业识别系统(corporate identity system CIS)理论 文化资本
原文传递
Trends of Disease Burden of Pancreatic Cancer Attributed to High Fasting Plasma Glucose in China,1990-2021: Insights from the Global Burden of Disease Study 2021 被引量:1
18
作者 Xiaochen Chen Feifei Zhong Juan Li 《Biomedical and Environmental Sciences》 2025年第3期379-384,共6页
Pancreatic cancer is a highly malignant tumor with low early detection rates and poor prognoses,reflected in a five-year survival rate below 10.The morbidity and mortality rates for this cancer type are nearly identic... Pancreatic cancer is a highly malignant tumor with low early detection rates and poor prognoses,reflected in a five-year survival rate below 10.The morbidity and mortality rates for this cancer type are nearly identical,indicating a substantial disease burden[1].In China,pancreatic cancer ranks as the sixth leading cause of cancer deaths for both sexes.In 2019,approximately 114,964 cases were recorded,resulting in an incidence rate of 5.78 per 100,000,reflecting an increase of 329.40%in cases and 82.11%in incidence since 1990[2]. 展开更多
关键词 PANCREATIC MORTALITY identical
暂未订购
Least Energy Solutions for the Fractional Schrodinger–Poisson System with General Potential and Nonlinearity
19
作者 ZHU Shaojuan HUANG Xianjiu 《数学进展》 北大核心 2025年第5期1031-1058,共28页
In this paper,we study the existence of least energy solutions for the following nonlinear fractional Schrodinger–Poisson system{(−∆)^(s)u+V(x)u+φu=f(u)in R^(3),(−∆)^(t)φ=u^(2)in R^(3),where s∈(3/4,1),t∈(0,1).Und... In this paper,we study the existence of least energy solutions for the following nonlinear fractional Schrodinger–Poisson system{(−∆)^(s)u+V(x)u+φu=f(u)in R^(3),(−∆)^(t)φ=u^(2)in R^(3),where s∈(3/4,1),t∈(0,1).Under some assumptions on V(x)and f,using Nehari–Pohozaev identity and the arguments of Brezis–Nirenberg,the monotonic trick and global compactness lemma,we prove the existence of a nontrivial least energy solution. 展开更多
关键词 fractional Schrodinger-Poisson system variational method Nehari-Pohozaev identity least energy solution
原文传递
上一页 1 2 80 下一页 到第
使用帮助 返回顶部