The unmanned aerial vehicle(UAV)images captured under low-light conditions are often suffering from noise and uneven illumination.To address these issues,we propose a low-light image enhancement algorithm for UAV imag...The unmanned aerial vehicle(UAV)images captured under low-light conditions are often suffering from noise and uneven illumination.To address these issues,we propose a low-light image enhancement algorithm for UAV images,which is inspired by the Retinex theory and guided by a light weighted map.Firstly,we propose a new network for reflectance component processing to suppress the noise in images.Secondly,we construct an illumination enhancement module that uses a light weighted map to guide the enhancement process.Finally,the processed reflectance and illumination components are recombined to obtain the enhancement results.Experimental results show that our method can suppress the noise in images while enhancing image brightness,and prevent over enhancement in bright regions.Code and data are available at https://gitee.com/baixiaotong2/uav-images.git.展开更多
In this paper,the Paley-Wiener theorem is extended to the analytic function spaces with general weights.We first generalize the theorem to weighted Hardy spaces Hp(0<p<∞)on tube domains by constructing a sequen...In this paper,the Paley-Wiener theorem is extended to the analytic function spaces with general weights.We first generalize the theorem to weighted Hardy spaces Hp(0<p<∞)on tube domains by constructing a sequence of L^(1)functions converging to the given function and verifying their representation in the form of Fourier transform to establish the desired result of the given function.Applying this main result,we further generalize the Paley-Wiener theorem for band-limited functions to the analytic function spaces L^(p)(0<p<∞)with general weights.展开更多
The boundness and compactness of products of multiplication,composition and differentiation on weighted Bergman spaces in the unit ball are studied.We define the differentiation operator on the space of holomorphic fu...The boundness and compactness of products of multiplication,composition and differentiation on weighted Bergman spaces in the unit ball are studied.We define the differentiation operator on the space of holomorphic functions in the unit ball by radial derivative.Then we extend the Sharma's results.展开更多
The aim of the present paper is to study 2-complex symmetric bounded weighted composition operators on the Fock space of C^(N) with the conjugations J and J_(t,A,b) defined by ■ respectively,where k(z_(1),...,z_N)=(...The aim of the present paper is to study 2-complex symmetric bounded weighted composition operators on the Fock space of C^(N) with the conjugations J and J_(t,A,b) defined by ■ respectively,where k(z_(1),...,z_N)=(■,...,■),t∈C,b∈C^(N) and A is a linear operator on C^(N).An example of 2-complex symmetric bounded weighted composition operator with the conjugation J_(t,A,b) is given.展开更多
The complete convergence for weighted sums of sequences of independent,identically distributed random variables under sublinear expectation space is studied.By moment inequality and truncation methods,we establish the...The complete convergence for weighted sums of sequences of independent,identically distributed random variables under sublinear expectation space is studied.By moment inequality and truncation methods,we establish the equivalent conditions of complete convergence for weighted sums of sequences of independent,identically distributed random variables under sublinear expectation space.The results complement the corresponding results in probability space to those for sequences of independent,identically distributed random variables under sublinear expectation space.展开更多
In this paper,by utilizing the Marcinkiewicz-Zygmund inequality and Rosenthal-type inequality of negatively superadditive dependent(NSD)random arrays and truncated method,we investigate the complete f-moment convergen...In this paper,by utilizing the Marcinkiewicz-Zygmund inequality and Rosenthal-type inequality of negatively superadditive dependent(NSD)random arrays and truncated method,we investigate the complete f-moment convergence of NSD random variables.We establish and improve a general result on the complete f-moment convergence for Sung’s type randomly weighted sums of NSD random variables under some general assumptions.As an application,we show the complete consistency for the randomly weighted estimator in a nonparametric regression model based on NSD errors.展开更多
Inhomogeneous Calderon-Zygmund operator T maps each atom into an approximate molecule of weighted local Hardy space if and only if some approximate cancellation condition holds for T.An equivalent norm for weighted Le...Inhomogeneous Calderon-Zygmund operator T maps each atom into an approximate molecule of weighted local Hardy space if and only if some approximate cancellation condition holds for T.An equivalent norm for weighted Lebesgue space which has vanishing moments up to order s plays an important role,where s∈N.展开更多
Letϕbe a smooth radial weight that decays faster than the class Gaussian ones.We obtain certain estimates for the reproducing kernels and the Lp-estimates for solutions of theδ-equation on the weighted Fock spaces F_...Letϕbe a smooth radial weight that decays faster than the class Gaussian ones.We obtain certain estimates for the reproducing kernels and the Lp-estimates for solutions of theδ-equation on the weighted Fock spaces F_(ϕ)^(p)(1≤p≤∞),which extends the classical Hörmander Theorem.Furthermore,for a suitable f,we completely characterize the boundedness and compactness of the Hankel operator H_(f):F_(ϕ)^(p)→L^(q)(C,e^(qϕ(·))dm)for all possible 1≤p,q<∞and also characterize the Schatten-p class Hankel operator Hf from F_(ϕ)^(2)to L^(2)(C,E^(-2ϕ)dm) for all 0<p<∞. As an application, we give a complete characterization of the simultaneously bounded, compact and Schatten-p classes Hankel operators H_(f) and h_(f)^(-) on F_(ϕ)^(2).展开更多
The weighted Drazin invertibility of rectangular matrixs over an arbitrary ring are studied.Some equivalent conditions and Characterizations are given for existence of the weighted Drazin inverse of a rectangular matr...The weighted Drazin invertibility of rectangular matrixs over an arbitrary ring are studied.Some equivalent conditions and Characterizations are given for existence of the weighted Drazin inverse of a rectangular matrix over an arbitrary ring.Moreover,the weighted Drazin inverse of a rectangular matrices product PAQ can be characterized and computed.This generalizes results obtained for the Drazin inverse of such product of square matrices.The results also apply to morphisms in(additive)categories.展开更多
The increasing prevalence of multi-view data has made multi-view clustering a crucial technique for discovering latent structures from heterogeneous representations.However,traditional fuzzy clustering algorithms show...The increasing prevalence of multi-view data has made multi-view clustering a crucial technique for discovering latent structures from heterogeneous representations.However,traditional fuzzy clustering algorithms show limitations with the inherent uncertainty and imprecision of such data,as they rely on a single-dimensional membership value.To overcome these limitations,we propose an auto-weighted multi-view neutrosophic fuzzy clustering(AW-MVNFC)algorithm.Our method leverages the neutrosophic framework,an extension of fuzzy sets,to explicitly model imprecision and ambiguity through three membership degrees.The core novelty of AWMVNFC lies in a hierarchical weighting strategy that adaptively learns the contributions of both individual data views and the importance of each feature within a view.Through a unified objective function,AW-MVNFC jointly optimizes the neutrosophic membership assignments,cluster centers,and the distributions of view and feature weights.Comprehensive experiments conducted on synthetic and real-world datasets demonstrate that our algorithm achieves more accurate and stable clustering than existing methods,demonstrating its effectiveness in handling the complexities of multi-view data.展开更多
Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptibl...Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.展开更多
There is still a dearth of systematic study on picture stitching techniques for the natural tubular structures of intestines,and traditional stitching techniques have a poor application to endoscopic images with deep ...There is still a dearth of systematic study on picture stitching techniques for the natural tubular structures of intestines,and traditional stitching techniques have a poor application to endoscopic images with deep scenes.In order to recreate the intestinal wall in two dimensions,a method is developed.The normalized Laplacian algorithm is used to enhance the image and transform it into polar coordinates according to the characteristics that intestinal images are not obvious and usually arranged in a circle,in order to extract the new image segments of the current image relative to the previous image.The improved weighted fusion algorithm is then used to sequentially splice the segment images.The experimental results demonstrate that the suggested approach can improve image clarity and minimize noise while maintaining the information content of intestinal images.In addition,the method's seamless transition between the final portions of a panoramic image also demonstrates that the stitching trace has been removed.展开更多
In this paper,for the 1-D semilinear wave equation∂_(t)^(2)u-∂_(x)^(2)u+μ/t∂_(t)u=|u|~p with scaling invariant damping,where t≥1,p>1 andμ∈(0,1)∪(1,4/3),we establish the global weighted space-time estimates as ...In this paper,for the 1-D semilinear wave equation∂_(t)^(2)u-∂_(x)^(2)u+μ/t∂_(t)u=|u|~p with scaling invariant damping,where t≥1,p>1 andμ∈(0,1)∪(1,4/3),we establish the global weighted space-time estimates as well as the global existence of small data weak solution u when the nonlinearity power p is larger than some critical power p_(crit)(μ).Our proof is based on a class of new weighted Strichartz estimates with the weight t^(θ)|(1-μ)^(2)t^(2/|1-μ|)-x^(2)|^(γ)(θ>0andγ>0 are appropriate constants)for the solution of linear generalized Tricomi equation∂_(t)^(2)φ-t^(m)∂_(x)^(2)φ=0 with m being any fixed positive number.展开更多
Traditional cross-correlation algorithms are prone to time-of-flight(TOF)calculation errors under conditions of strong noise interference and complex temperature gradients,resulting in a decline in the accuracy of ult...Traditional cross-correlation algorithms are prone to time-of-flight(TOF)calculation errors under conditions of strong noise interference and complex temperature gradients,resulting in a decline in the accuracy of ultrasonic temperature measurement.To this end,this paper proposes an ultrasonic temperature measurement method that combines YOLOv11 target detection with energy-type weighted cross-correlation algorithm.The YOLOv11 model is utilized to conduct target detection and key area positioning on the ultrasonic signal waveform diagram,automatically identifying characteristic waveforms such as node waves and end face waves,and achieving adaptive extraction of the effective signal interval.Further introduce the energy-based weighted cross-correlation algorithm.Based on the signal energy distribution,the cross-correlation results are weighted and processed to enhance the main wave response and suppress noise interference.Experiments show that the YOLOv11 model has high detection accuracy(Precision=0.987,Recall=0.958,mAP@50=0.988);The proposed method maintains the stability of time delay estimation under strong noise and high temperature(>1200℃),with the average time delay error reduced by approximately 35%to 50%compared to traditional algorithms.This verifies its high robustness and temperature measurement accuracy in complex environments,and it has a promising engineering application prospect.展开更多
Combining TT* argument and bilinear interpolation,this paper obtains the Strichartz and smoothing estimates of dispersive semigroup e^(-itP(D)) in weighted L^(2) spaces.Among other things,we recover the results in[1]....Combining TT* argument and bilinear interpolation,this paper obtains the Strichartz and smoothing estimates of dispersive semigroup e^(-itP(D)) in weighted L^(2) spaces.Among other things,we recover the results in[1].Moreover,the application of these results to the well-posedness of some equations are shown in the last section.展开更多
In high-speed multiuser Time Reversal(TR)downlink systems,the transmission rate is degraded due to the presence of severe inter-user and inter-symbol interference.Moreover,maximizing the weighted sum rate in such syst...In high-speed multiuser Time Reversal(TR)downlink systems,the transmission rate is degraded due to the presence of severe inter-user and inter-symbol interference.Moreover,maximizing the weighted sum rate in such systems is a critical objective,since the weighting factors represent the priority of different users in different applications.However,it faces significant challenges as it is an NP-hard and non-convex problem.In order to suppress these interferences and maximize the weighted sum rate,in this paper we present a novel approach for the joint design of the pre-filters.The proposed method applies successive convex approximation to transform the original problem into a Second-Order Cone Programming(SOCP)problem.Then,a low-complexity iterative algorithm is provided to effectively solve the resulting SOCP problem.According to the simulation results,the proposed method reaches a local optimum within a few iterations and demonstrates superior performance in terms of weighted sum rate compared to the current algorithm.展开更多
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu...Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources.展开更多
In this paper,we propose a new full-Newton step feasible interior-point algorithm for the special weighted linear complementarity problems.The proposed algorithm employs the technique of algebraic equivalent transform...In this paper,we propose a new full-Newton step feasible interior-point algorithm for the special weighted linear complementarity problems.The proposed algorithm employs the technique of algebraic equivalent transformation to derive the search direction.It is shown that the proximity measure reduces quadratically at each iteration.Moreover,the iteration bound of the algorithm is as good as the best-known polynomial complexity for these types of problems.Furthermore,numerical results are presented to show the efficiency of the proposed algorithm.展开更多
In this paper,we study composition operators on weighted Bergman spaces of Dirichlet series.We first establish some Littlewood-type inequalities for generalized mean counting functions.Then we give sufficient conditio...In this paper,we study composition operators on weighted Bergman spaces of Dirichlet series.We first establish some Littlewood-type inequalities for generalized mean counting functions.Then we give sufficient conditions for a composition operator with zero characteristic to be bounded or compact on weighted Bergman spaces of Dirichlet series.The corresponding sufficient condition for compactness in the case of positive characteristics is also obtained.展开更多
Cultural landscape zoning research of traditional villages is the basic premise for carrying out overall protection and regional development.Through the clustering algorithm,cultural area zoning research of traditiona...Cultural landscape zoning research of traditional villages is the basic premise for carrying out overall protection and regional development.Through the clustering algorithm,cultural area zoning research of traditional villages can provide objective basis for its overall protection and development.Based on the field research,drawing on the theory of cultural landscape,southwest Hubei is taken as the research object,and the index system of cultural landscape type division of traditional villages is constructed from three levels of culture,geography and village carrier.Adopting the multi-attribute weighted k-modes clustering algorithm,92 traditional villages in southwest Hubei are divided into three major types,which are the western Tujia cultural characteristic area,the southern Tujia-Miao cultural penetration area,and the northern multi-ethnic cultural mixed area,and the characteristics of each area are summarized.The regional characteristics of traditional villages in southwest Hubei at the cultural landscape level are analysed from a macro point of view,which provides a reference for more objective cognition of the distribution law of traditional villages in southwest Hubei,and carrying out the contiguous protection of traditional villages.展开更多
基金supported by the National Natural Science Foundation of China(Nos.62201454 and 62306235)the Xi’an Science and Technology Program of Xi’an Science and Technology Bureau(No.23SFSF0004)。
文摘The unmanned aerial vehicle(UAV)images captured under low-light conditions are often suffering from noise and uneven illumination.To address these issues,we propose a low-light image enhancement algorithm for UAV images,which is inspired by the Retinex theory and guided by a light weighted map.Firstly,we propose a new network for reflectance component processing to suppress the noise in images.Secondly,we construct an illumination enhancement module that uses a light weighted map to guide the enhancement process.Finally,the processed reflectance and illumination components are recombined to obtain the enhancement results.Experimental results show that our method can suppress the noise in images while enhancing image brightness,and prevent over enhancement in bright regions.Code and data are available at https://gitee.com/baixiaotong2/uav-images.git.
基金Supported by the National Natural Science Foundation of China(12301101)the Guangdong Basic and Applied Basic Research Foundation(2022A1515110019 and 2020A1515110585)。
文摘In this paper,the Paley-Wiener theorem is extended to the analytic function spaces with general weights.We first generalize the theorem to weighted Hardy spaces Hp(0<p<∞)on tube domains by constructing a sequence of L^(1)functions converging to the given function and verifying their representation in the form of Fourier transform to establish the desired result of the given function.Applying this main result,we further generalize the Paley-Wiener theorem for band-limited functions to the analytic function spaces L^(p)(0<p<∞)with general weights.
基金Supported by Natural Science Foundation of Guangdong Province in China(2018KTSCX161)。
文摘The boundness and compactness of products of multiplication,composition and differentiation on weighted Bergman spaces in the unit ball are studied.We define the differentiation operator on the space of holomorphic functions in the unit ball by radial derivative.Then we extend the Sharma's results.
基金Supported by Sichuan Science and Technology Program (No.2022ZYD0010)。
文摘The aim of the present paper is to study 2-complex symmetric bounded weighted composition operators on the Fock space of C^(N) with the conjugations J and J_(t,A,b) defined by ■ respectively,where k(z_(1),...,z_N)=(■,...,■),t∈C,b∈C^(N) and A is a linear operator on C^(N).An example of 2-complex symmetric bounded weighted composition operator with the conjugation J_(t,A,b) is given.
基金supported by Doctoral Scientific Research Starting Foundation of Jingdezhen Ceramic University(Grant No.102/01003002031)Re-accompanying Funding Project of Academic Achievements of Jingdezhen Ceramic University(Grant Nos.215/20506277,215/20506341)。
文摘The complete convergence for weighted sums of sequences of independent,identically distributed random variables under sublinear expectation space is studied.By moment inequality and truncation methods,we establish the equivalent conditions of complete convergence for weighted sums of sequences of independent,identically distributed random variables under sublinear expectation space.The results complement the corresponding results in probability space to those for sequences of independent,identically distributed random variables under sublinear expectation space.
基金supported by the National Social Science Fundation(Grant No.21BTJ040)the Project of Outstanding Young People in University of Anhui Province(Grant Nos.2023AH020037,SLXY2024A001).
文摘In this paper,by utilizing the Marcinkiewicz-Zygmund inequality and Rosenthal-type inequality of negatively superadditive dependent(NSD)random arrays and truncated method,we investigate the complete f-moment convergence of NSD random variables.We establish and improve a general result on the complete f-moment convergence for Sung’s type randomly weighted sums of NSD random variables under some general assumptions.As an application,we show the complete consistency for the randomly weighted estimator in a nonparametric regression model based on NSD errors.
文摘Inhomogeneous Calderon-Zygmund operator T maps each atom into an approximate molecule of weighted local Hardy space if and only if some approximate cancellation condition holds for T.An equivalent norm for weighted Lebesgue space which has vanishing moments up to order s plays an important role,where s∈N.
文摘Letϕbe a smooth radial weight that decays faster than the class Gaussian ones.We obtain certain estimates for the reproducing kernels and the Lp-estimates for solutions of theδ-equation on the weighted Fock spaces F_(ϕ)^(p)(1≤p≤∞),which extends the classical Hörmander Theorem.Furthermore,for a suitable f,we completely characterize the boundedness and compactness of the Hankel operator H_(f):F_(ϕ)^(p)→L^(q)(C,e^(qϕ(·))dm)for all possible 1≤p,q<∞and also characterize the Schatten-p class Hankel operator Hf from F_(ϕ)^(2)to L^(2)(C,E^(-2ϕ)dm) for all 0<p<∞. As an application, we give a complete characterization of the simultaneously bounded, compact and Schatten-p classes Hankel operators H_(f) and h_(f)^(-) on F_(ϕ)^(2).
文摘The weighted Drazin invertibility of rectangular matrixs over an arbitrary ring are studied.Some equivalent conditions and Characterizations are given for existence of the weighted Drazin inverse of a rectangular matrix over an arbitrary ring.Moreover,the weighted Drazin inverse of a rectangular matrices product PAQ can be characterized and computed.This generalizes results obtained for the Drazin inverse of such product of square matrices.The results also apply to morphisms in(additive)categories.
文摘The increasing prevalence of multi-view data has made multi-view clustering a crucial technique for discovering latent structures from heterogeneous representations.However,traditional fuzzy clustering algorithms show limitations with the inherent uncertainty and imprecision of such data,as they rely on a single-dimensional membership value.To overcome these limitations,we propose an auto-weighted multi-view neutrosophic fuzzy clustering(AW-MVNFC)algorithm.Our method leverages the neutrosophic framework,an extension of fuzzy sets,to explicitly model imprecision and ambiguity through three membership degrees.The core novelty of AWMVNFC lies in a hierarchical weighting strategy that adaptively learns the contributions of both individual data views and the importance of each feature within a view.Through a unified objective function,AW-MVNFC jointly optimizes the neutrosophic membership assignments,cluster centers,and the distributions of view and feature weights.Comprehensive experiments conducted on synthetic and real-world datasets demonstrate that our algorithm achieves more accurate and stable clustering than existing methods,demonstrating its effectiveness in handling the complexities of multi-view data.
文摘Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.
基金the Special Research Fund for the Natural Science Foundation of Chongqing(No.cstc2019jcyjmsxm1351)the Science and Technology Research Project of Chongqing Education Commission(No.KJQN2020006300)。
文摘There is still a dearth of systematic study on picture stitching techniques for the natural tubular structures of intestines,and traditional stitching techniques have a poor application to endoscopic images with deep scenes.In order to recreate the intestinal wall in two dimensions,a method is developed.The normalized Laplacian algorithm is used to enhance the image and transform it into polar coordinates according to the characteristics that intestinal images are not obvious and usually arranged in a circle,in order to extract the new image segments of the current image relative to the previous image.The improved weighted fusion algorithm is then used to sequentially splice the segment images.The experimental results demonstrate that the suggested approach can improve image clarity and minimize noise while maintaining the information content of intestinal images.In addition,the method's seamless transition between the final portions of a panoramic image also demonstrates that the stitching trace has been removed.
基金supported by the NSFC(12331007)the National Key Research and Development Program of China(2020YFA0713803)。
文摘In this paper,for the 1-D semilinear wave equation∂_(t)^(2)u-∂_(x)^(2)u+μ/t∂_(t)u=|u|~p with scaling invariant damping,where t≥1,p>1 andμ∈(0,1)∪(1,4/3),we establish the global weighted space-time estimates as well as the global existence of small data weak solution u when the nonlinearity power p is larger than some critical power p_(crit)(μ).Our proof is based on a class of new weighted Strichartz estimates with the weight t^(θ)|(1-μ)^(2)t^(2/|1-μ|)-x^(2)|^(γ)(θ>0andγ>0 are appropriate constants)for the solution of linear generalized Tricomi equation∂_(t)^(2)φ-t^(m)∂_(x)^(2)φ=0 with m being any fixed positive number.
文摘Traditional cross-correlation algorithms are prone to time-of-flight(TOF)calculation errors under conditions of strong noise interference and complex temperature gradients,resulting in a decline in the accuracy of ultrasonic temperature measurement.To this end,this paper proposes an ultrasonic temperature measurement method that combines YOLOv11 target detection with energy-type weighted cross-correlation algorithm.The YOLOv11 model is utilized to conduct target detection and key area positioning on the ultrasonic signal waveform diagram,automatically identifying characteristic waveforms such as node waves and end face waves,and achieving adaptive extraction of the effective signal interval.Further introduce the energy-based weighted cross-correlation algorithm.Based on the signal energy distribution,the cross-correlation results are weighted and processed to enhance the main wave response and suppress noise interference.Experiments show that the YOLOv11 model has high detection accuracy(Precision=0.987,Recall=0.958,mAP@50=0.988);The proposed method maintains the stability of time delay estimation under strong noise and high temperature(>1200℃),with the average time delay error reduced by approximately 35%to 50%compared to traditional algorithms.This verifies its high robustness and temperature measurement accuracy in complex environments,and it has a promising engineering application prospect.
基金supported by the NSFC(12071437)the National Key R&D Program of China(2022YFA1005700).
文摘Combining TT* argument and bilinear interpolation,this paper obtains the Strichartz and smoothing estimates of dispersive semigroup e^(-itP(D)) in weighted L^(2) spaces.Among other things,we recover the results in[1].Moreover,the application of these results to the well-posedness of some equations are shown in the last section.
基金partially supported by the following funding sources:The National Natural Science Foundation of China(No.61771084)the Chongqing Graduate Scientific Research Innovation Project(No.CYB21200)。
文摘In high-speed multiuser Time Reversal(TR)downlink systems,the transmission rate is degraded due to the presence of severe inter-user and inter-symbol interference.Moreover,maximizing the weighted sum rate in such systems is a critical objective,since the weighting factors represent the priority of different users in different applications.However,it faces significant challenges as it is an NP-hard and non-convex problem.In order to suppress these interferences and maximize the weighted sum rate,in this paper we present a novel approach for the joint design of the pre-filters.The proposed method applies successive convex approximation to transform the original problem into a Second-Order Cone Programming(SOCP)problem.Then,a low-complexity iterative algorithm is provided to effectively solve the resulting SOCP problem.According to the simulation results,the proposed method reaches a local optimum within a few iterations and demonstrates superior performance in terms of weighted sum rate compared to the current algorithm.
基金Programs for Science and Technology Development of Henan Province,grant number 242102210152The Fundamental Research Funds for the Universities of Henan Province,grant number NSFRF240620+1 种基金Key Scientific Research Project of Henan Higher Education Institutions,grant number 24A520015Henan Key Laboratory of Network Cryptography Technology,grant number LNCT2022-A11.
文摘Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources.
基金Supported by the Optimisation Theory and Algorithm Research Team(Grant No.23kytdzd004)University Science Research Project of Anhui Province(Grant No.2024AH050631)the General Programs for Young Teacher Cultivation of Educational Commission of Anhui Province(Grant No.YQYB2023090).
文摘In this paper,we propose a new full-Newton step feasible interior-point algorithm for the special weighted linear complementarity problems.The proposed algorithm employs the technique of algebraic equivalent transformation to derive the search direction.It is shown that the proximity measure reduces quadratically at each iteration.Moreover,the iteration bound of the algorithm is as good as the best-known polynomial complexity for these types of problems.Furthermore,numerical results are presented to show the efficiency of the proposed algorithm.
基金supported by the National Natural Science Foundation of China(12171373)Chen's work also supported by the Fundamental Research Funds for the Central Universities of China(GK202207018).
文摘In this paper,we study composition operators on weighted Bergman spaces of Dirichlet series.We first establish some Littlewood-type inequalities for generalized mean counting functions.Then we give sufficient conditions for a composition operator with zero characteristic to be bounded or compact on weighted Bergman spaces of Dirichlet series.The corresponding sufficient condition for compactness in the case of positive characteristics is also obtained.
基金Philosophy and Social Sciences Research Project of Hubei Provincial Department of Education(22D057).
文摘Cultural landscape zoning research of traditional villages is the basic premise for carrying out overall protection and regional development.Through the clustering algorithm,cultural area zoning research of traditional villages can provide objective basis for its overall protection and development.Based on the field research,drawing on the theory of cultural landscape,southwest Hubei is taken as the research object,and the index system of cultural landscape type division of traditional villages is constructed from three levels of culture,geography and village carrier.Adopting the multi-attribute weighted k-modes clustering algorithm,92 traditional villages in southwest Hubei are divided into three major types,which are the western Tujia cultural characteristic area,the southern Tujia-Miao cultural penetration area,and the northern multi-ethnic cultural mixed area,and the characteristics of each area are summarized.The regional characteristics of traditional villages in southwest Hubei at the cultural landscape level are analysed from a macro point of view,which provides a reference for more objective cognition of the distribution law of traditional villages in southwest Hubei,and carrying out the contiguous protection of traditional villages.