supported by NSFC(Grant Nos.61976050,61972384);the Jilin Province Science and Technology Department project(Nos.20240101378JC,20240602005RC,YDZJ202201ZYTS415);Jilin Education Department Project(No.JJKH20231319KJ)。
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its li...
supported by the NSFC(12071437);the National Key R&D Program of China(2022YFA1005700).
Combining TT* argument and bilinear interpolation,this paper obtains the Strichartz and smoothing estimates of dispersive semigroup e^(-itP(D)) in weighted L^(2) spaces.Among other things,we recover the results in[1]....
Programs for Science and Technology Development of Henan Province,grant number 242102210152;The Fundamental Research Funds for the Universities of Henan Province,grant number NSFRF240620;Key Scientific Research Project of Henan Higher Education Institutions,grant number 24A520015;Henan Key Laboratory of Network Cryptography Technology,grant number LNCT2022-A11.
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu...
supported by National Natural Science Foundation of China(Grant No.11971101)。
Let B^(a,b)be a weighted-fractional Brownian motion with Hurst indices a and b such that a>-1 and 0≤b<1∧(1+a).In this paper,we consider the linear self-attracting diffusion dX_(t)^(a,b)=dB_(t)^(a,b)−θ(∫t 0(X_(t)^(...
supported by National Natural Science Foundation of China(Grant No.12326602);the special foundation for Guangxi Ba Gui Scholars and Junwu Scholars。
The positive energy theorem for weighted asymptotically flat spin manifolds was proved by Baldauf and Ozuch(2022)and for the non-spin case by Chu and Zhu(2024).In this paper,we generalize the positive energy theorem f...
supported by the National Key R&D Program of China“Technology and application of wind power/photovoltaic power prediction for promoting renewable energy consumption”(2018YFB0904200).
High availability of wind power data is the basis for wind power research, but there are a large number of abnormal data in actual collected data, which seriously affects analysis of wind power law and reduces predict...
supported by FAPESQ/Brazil(Grant No.3031/2021);supported by CNPq/Brazil(Grant No.309.692/2020-2)and FAPESQ/Brazil(Grant No.3031/2021).
In this paper we investigate the existence of solution for the following nonlocal problem with Stein-Weiss convolution term-△Φu+V(x)Φ(|u|)u=1/|x|α(∫R^(N)K(y)F(u(y))/|x-y|Y(λ)|y|^(α)dy)K(x)f(u(x)),x∈R^(N),wher...
supported by the National Natural Science Foundation of China (No.52205548)。
To address the issues of unknown target size,blurred edges,background interference and low contrast in infrared small target detection,this paper proposes a method based on density peaks searching and weighted multi-f...
Supported by Ningxia Key Research and Development Program,No.2023BEG02015;Talent Development Projects of Young Qihuang of National Administration of Traditional Chinese Medicine(2020).
BACKGROUND Lotus plumule and its active components have demonstrated inhibitory effects on gastric cancer(GC).However,the molecular mechanism of lotus plumule against GC remains unclear and requires further investigat...
supported in part by the National Natural Science Foundation of China under Grant 61872409,Grant 61872152 and Grant 62272174;in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2020A1515010751;in part by the Guangdong Major Project of Basic and Applied Basic Research under Grant 2019B030302008;in part by the Science and Technology Program of Guangzhou under Grant 201902010081;in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2023A1515011194.
The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers.Attribute-based encryption(ABE)scheme is considered a powerful encr...