-
Applications of Tao General Difference in Discrete Domain
Authors:
Linmi Tao,
Ruiyang Liu,
Donglai Tao,
Wu Xia,
Feilong Ma,
Yu Cheng,
**gmao Cui
Abstract:
Numerical difference computation is one of the cores and indispensable in the modern digital era. Tao general difference (TGD) is a novel theory and approach to difference computation for discrete sequences and arrays in multidimensional space. Built on the solid theoretical foundation of the general difference in a finite interval, the TGD operators demonstrate exceptional signal processing capab…
▽ More
Numerical difference computation is one of the cores and indispensable in the modern digital era. Tao general difference (TGD) is a novel theory and approach to difference computation for discrete sequences and arrays in multidimensional space. Built on the solid theoretical foundation of the general difference in a finite interval, the TGD operators demonstrate exceptional signal processing capabilities in real-world applications. A novel smoothness property of a sequence is defined on the first- and second TGD. This property is used to denoise one-dimensional signals, where the noise is the non-smooth points in the sequence. Meanwhile, the center of the gradient in a finite interval can be accurately location via TGD calculation. This solves a traditional challenge in computer vision, which is the precise localization of image edges with noise robustness. Furthermore, the power of TGD operators extends to spatio-temporal edge detection in three-dimensional arrays, enabling the identification of kinetic edges in video data. These diverse applications highlight the properties of TGD in discrete domain and the significant promise of TGD for the computation across signal processing, image analysis, and video analytic.
△ Less
Submitted 26 January, 2024;
originally announced January 2024.
-
Type-II Apollonian Model
Authors:
Fei Ma,
**zhi Ouyang,
** Wang,
Haobin Shi,
Wei Pan
Abstract:
The family of planar graphs is a particularly important family and models many real-world networks. In this paper, we propose a principled framework based on the widely-known Apollonian packing process to generate new planar network, i.e., Type-II Apollonian network $\mathcal{A}_{t}$. The manipulation is different from that of the typical Apollonian network, and is proceeded in terms of the iterat…
▽ More
The family of planar graphs is a particularly important family and models many real-world networks. In this paper, we propose a principled framework based on the widely-known Apollonian packing process to generate new planar network, i.e., Type-II Apollonian network $\mathcal{A}_{t}$. The manipulation is different from that of the typical Apollonian network, and is proceeded in terms of the iterative addition of triangle instead of vertex. As a consequence, network $\mathcal{A}_{t}$ turns out to be hamiltonian and eulerian, however, the typical Apollonian network is not. Then, we in-depth study some fundamental structural properties on network $\mathcal{A}_{t}$, and verify that network $\mathcal{A}_{t}$ is sparse like most real-world networks, has scale-free feature and small-world property, and exhibits disassortative mixing structure. Next, we design an effective algorithm for solving the problem of how to enumerate spanning trees on network $\mathcal{A}_{t}$, and derive the asymptotic solution of the spanning tree entropy, which suggests that Type-II Apollonian network is more reliable to a random removal of edges than the typical Apollonian network. Additionally, we study trap** problem on network $\mathcal{A}_{t}$, and use average trap** time as metric to show that Type-II Apollonian network $\mathcal{A}_{t}$ has better structure for fast information diffusion than the typical Apollonian network.
△ Less
Submitted 23 December, 2023;
originally announced December 2023.
-
Fundamentals of thermoelasticity for curved beams
Authors:
Marcio A. Jorge Silva,
To Fu Ma
Abstract:
The purpose of this paper is twofold. Firstly, we conduct an in-depth analysis of mathematical modeling concerning thermal-mechanical curved beams, by taking into consideration three primary forces widely accepted in the literature: axial load, shear force, and bending moment. Additionally, we examine their appropriate thermal couplings, shedding light on the intricate interplay between stress-str…
▽ More
The purpose of this paper is twofold. Firstly, we conduct an in-depth analysis of mathematical modeling concerning thermal-mechanical curved beams, by taking into consideration three primary forces widely accepted in the literature: axial load, shear force, and bending moment. Additionally, we examine their appropriate thermal couplings, shedding light on the intricate interplay between stress-strain relationships and temperature variations. This analysis is situated within the well-recognized context of the Bresse governing model for arched beams. Secondly, drawing upon distinguished constitutive laws for heat flux of conduction, we compile a comprehensive list of thermoelastic curved beam systems in various scenarios. We introduce new categories of problems that exhibit specific features from the thermal point of view.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
A Theory of General Difference in Continuous and Discrete Domain
Authors:
Linmi Tao,
Ruiyang Liu,
Donglai Tao,
Wu Xia,
Feilong Ma,
Yu Cheng,
**gmao Cui
Abstract:
Though a core element of the digital age, numerical difference algorithms struggle with noise susceptibility. This stems from a key disconnect between the infinitesimal quantities in continuous differentiation and the finite intervals in its discrete counterpart. This disconnect violates the fundamental definition of differentiation (Leibniz and Cauchy). To bridge this gap, we build a novel genera…
▽ More
Though a core element of the digital age, numerical difference algorithms struggle with noise susceptibility. This stems from a key disconnect between the infinitesimal quantities in continuous differentiation and the finite intervals in its discrete counterpart. This disconnect violates the fundamental definition of differentiation (Leibniz and Cauchy). To bridge this gap, we build a novel general difference (Tao General Difference, TGD). Departing from derivative-by-integration, TGD generalizes differentiation to finite intervals in continuous domains through three key constraints. This allows us to calculate the general difference of a sequence in discrete domain via the continuous step function constructed from the sequence. Two construction methods, the rotational construction and the orthogonal construction, are proposed to construct the operators of TGD. The construction TGD operators take same convolution mode in calculation for continuous functions, discrete sequences, and arrays across any dimension. Our analysis with example operations showcases TGD's capability in both continuous and discrete domains, paving the way for accurate and noise-resistant differentiation in the digital era.
△ Less
Submitted 25 January, 2024; v1 submitted 14 May, 2023;
originally announced May 2023.
-
The Contour integral method for Feynman-Kac equation with two internal states
Authors:
Fugui Ma,
Li**g Zhao,
Yejuan Wang,
Weihua Deng
Abstract:
We develop the contour integral method for numerically solving the Feynman-Kac equation with two internal states [P. B. Xu and W. H. Deng, Math. Model. Nat. Phenom., 13 (2018), 10], describing the functional distribution of particle's internal states. The striking benefits are obtained, including spectral accuracy, low computational complexity, small memory requirement, etc. We perform the error e…
▽ More
We develop the contour integral method for numerically solving the Feynman-Kac equation with two internal states [P. B. Xu and W. H. Deng, Math. Model. Nat. Phenom., 13 (2018), 10], describing the functional distribution of particle's internal states. The striking benefits are obtained, including spectral accuracy, low computational complexity, small memory requirement, etc. We perform the error estimates and stability analyses, which are confirmed by numerical experiments.
△ Less
Submitted 19 September, 2023; v1 submitted 16 April, 2023;
originally announced April 2023.
-
Analyses of the contour integral method for time fractional subdiffusion-normal transport equation
Authors:
Fugui Ma,
Li**g Zhao,
Weihua Deng,
Yejuan Wang
Abstract:
In this work, we theoretically and numerically discuss the time fractional subdiffusion-normal transport equation, which depicts a crossover from sub-diffusion (as $t\rightarrow 0$) to normal diffusion (as $t\rightarrow \infty$). Firstly, the well-posedness and regularities of the model are studied by using the bivariate Mittag-Leffler function. Theoretical results show that after introducing the…
▽ More
In this work, we theoretically and numerically discuss the time fractional subdiffusion-normal transport equation, which depicts a crossover from sub-diffusion (as $t\rightarrow 0$) to normal diffusion (as $t\rightarrow \infty$). Firstly, the well-posedness and regularities of the model are studied by using the bivariate Mittag-Leffler function. Theoretical results show that after introducing the first-order derivative operator, the regularity of the solution can be improved in substance. Then, a numerical scheme with high-precision is developed no matter the initial value is smooth or non-smooth. More specifically, we use the contour integral method (CIM) with parameterized hyperbolic contour to approximate the temporal local and non-local operators, and employ the standard Galerkin finite element method for spacial discretization. Rigorous error estimates show that the proposed numerical scheme has spectral accuracy in time and optimal convergence order in space. Besides, we further improve the algorithm and reduce the computational cost by using the barycentric Lagrange interpolation. Finally, the obtained theoretical results as well as the acceleration algorithm are verified by several 1-D and 2-D numerical experiments, which also show that the numerical scheme developed in this paper is effective and robust.
△ Less
Submitted 19 September, 2023; v1 submitted 18 October, 2022;
originally announced October 2022.
-
A Note on Additive Complements
Authors:
Fang-Yu Ma
Abstract:
Two infinite sequences A and B of non-negative integers are called additive complements, if their sum contains all sufficiently large integers. Let $A(x)$ and $B(x)$ be the counting functions of A and B. In this paper, we extend the results of Liu and Fang in 2016 and obtain some results on additive complements. For example, we prove that there exist additive complements $A$ and $B$ such that…
▽ More
Two infinite sequences A and B of non-negative integers are called additive complements, if their sum contains all sufficiently large integers. Let $A(x)$ and $B(x)$ be the counting functions of A and B. In this paper, we extend the results of Liu and Fang in 2016 and obtain some results on additive complements. For example, we prove that there exist additive complements $A$ and $B$ such that $\limsup_{x\to+\infty} A(x)B(x)/x= 2$ and $A(x)B(x) - x = 1$ for infinitely positive integers $x$.
△ Less
Submitted 9 May, 2022;
originally announced May 2022.
-
A rank-two relaxed parallel splitting version of the augmented Lagrangian method with step size in (0,2) for separable convex programming
Authors:
Bingsheng He,
Feng Ma,
Shengjie Xu,
Xiaoming Yuan
Abstract:
The augmented Lagrangian method (ALM) is classic for canonical convex programming problems with linear constraints, and it finds many applications in various scientific computing areas. A major advantage of the ALM is that the step for updating the dual variable can be further relaxed with a step size in $(0,2)$, and this advantage can easily lead to numerical acceleration for the ALM. When a sepa…
▽ More
The augmented Lagrangian method (ALM) is classic for canonical convex programming problems with linear constraints, and it finds many applications in various scientific computing areas. A major advantage of the ALM is that the step for updating the dual variable can be further relaxed with a step size in $(0,2)$, and this advantage can easily lead to numerical acceleration for the ALM. When a separable convex programming problem is discussed and a corresponding splitting version of the classic ALM is considered, convergence may not be guaranteed and thus it is seemingly impossible that a step size in $(0,2)$ can be carried on to the relaxation step for updating the dual variable. We show that for a parallel splitting version of the ALM, a step size in $(0,2)$ can be maintained for further relaxing both the primal and dual variables if the relaxation step is simply corrected by a rank-two matrix. Hence, a rank-two relaxed parallel splitting version of the ALM with a step size in $(0,2)$ is proposed for separable convex programming problems. We validate that the new algorithm can numerically outperform existing algorithms of the same kind significantly by testing some applications.
△ Less
Submitted 30 November, 2022; v1 submitted 5 May, 2022;
originally announced May 2022.
-
The minimum number of clique-saturating edges
Authors:
Jialin He,
Fuhong Ma,
Jie Ma,
Xinyang Ye
Abstract:
Let $G$ be a $K_p$-free graph. We say $e$ is a $K_p$-saturating edge of $G$ if $e\notin E(G)$ and $G+e$ contains a copy of $K_p$. Denote by $f_p(n, e)$ the minimum number of $K_p$-saturating edges that an $n$-vertex $K_p$-free graph with $e$ edges can have. Erdős and Tuza conjectured that $f_4(n,\lfloor n^2/4\rfloor+1)=\left(1 + o(1)\right)\frac{n^2}{16}.$ Balogh and Liu disproved this by showing…
▽ More
Let $G$ be a $K_p$-free graph. We say $e$ is a $K_p$-saturating edge of $G$ if $e\notin E(G)$ and $G+e$ contains a copy of $K_p$. Denote by $f_p(n, e)$ the minimum number of $K_p$-saturating edges that an $n$-vertex $K_p$-free graph with $e$ edges can have. Erdős and Tuza conjectured that $f_4(n,\lfloor n^2/4\rfloor+1)=\left(1 + o(1)\right)\frac{n^2}{16}.$ Balogh and Liu disproved this by showing $f_4(n,\lfloor n^2/4\rfloor+1)=(1+o(1))\frac{2n^2}{33}$. They believed that a natural generalization of their construction for $K_p$-free graph should also be optimal and made a conjecture that $f_{p+1}(n,ex(n,K_p)+1)=\left(\frac{2(p-2)^2}{p(4p^2-11p+8)}+o(1)\right)n^2$ for all integers $p\ge 3$. The main result of this paper is to confirm the above conjecture of Balogh and Liu.
△ Less
Submitted 12 January, 2022; v1 submitted 11 January, 2022;
originally announced January 2022.
-
Mean Hitting Time on Recursive Growth Tree Network
Authors:
Fei Ma,
** Wang
Abstract:
In this paper, we are concerned with mean hitting time $\langle\mathcal{H}\rangle$ for random walks on recursive growth tree networks that are built based on an arbitrary tree as the seed via implementing various primitive graphic operations, and propose a series of combinatorial techniques that are called Map** Transformation to exactly determine the associated $\langle\mathcal{H}\rangle-$polyn…
▽ More
In this paper, we are concerned with mean hitting time $\langle\mathcal{H}\rangle$ for random walks on recursive growth tree networks that are built based on an arbitrary tree as the seed via implementing various primitive graphic operations, and propose a series of combinatorial techniques that are called Map** Transformation to exactly determine the associated $\langle\mathcal{H}\rangle-$polynomial. Our formulas can be able to completely cover the previously published results in some well-studied and specific cases where a single edge or a star is often chose to serve as seed for creating recursive growth models. The techniques proposed are more convenient than the commonly-used spectral methods mainly because of getting around the operations of matrix inversion and multiplication. Accordingly, our results can be extended for both many other stochastic models including BA-scale-free tree and random uniform tree as well as graphs of great interest consisting of line graph of tree and Vicsek fractal network to derive numerical solutions of related structural parameters. And then, the closed-form solutions of two extensions of Wiener index with respect to multiplicative and additive degrees on an arbitrary tree are conveniently obtained as well. In addition, we discuss some extremal problems of random walks on tree networks and outline the related research directions in the next step.
△ Less
Submitted 9 December, 2021;
originally announced December 2021.
-
A generalized primal-dual algorithm with improved convergence condition for saddle point problems
Authors:
Bingsheng He,
Feng Ma,
Shengjie Xu,
Xiaoming Yuan
Abstract:
We generalize the well-known primal-dual algorithm proposed by Chambolle and Pock for saddle point problems, and improve the condition for ensuring its convergence. The improved convergence-guaranteeing condition is effective for the generic setting, and it is shown to be optimal. It also allows us to discern larger step sizes for the resulting subproblems, and thus provides a simple and universal…
▽ More
We generalize the well-known primal-dual algorithm proposed by Chambolle and Pock for saddle point problems, and improve the condition for ensuring its convergence. The improved convergence-guaranteeing condition is effective for the generic setting, and it is shown to be optimal. It also allows us to discern larger step sizes for the resulting subproblems, and thus provides a simple and universal way to improve numerical performance of the original primal-dual algorithm. In addition, we present a structure-exploring heuristic to further relax the convergence-guaranteeing condition for some specific saddle point problems, which could yield much larger step sizes and hence significantly better performance. Effectiveness of this heuristic is numerically illustrated by the classic assignment problem.
△ Less
Submitted 30 November, 2021;
originally announced December 2021.
-
Inverse obstacle scattering for elastic waves in the time domain
Authors:
Lu Zhao,
He** Dong,
Fuming Ma
Abstract:
This paper concerns an inverse elastic scattering problem which is to determine a rigid obstacle from time domain scattered field data for a single incident plane wave. By using Helmholtz decomposition, we reduce the initial-boundary value problem of the time domain Navier equation to a coupled initial-boundary value problem of wave equations, and prove the uniqueness of the solution for the coupl…
▽ More
This paper concerns an inverse elastic scattering problem which is to determine a rigid obstacle from time domain scattered field data for a single incident plane wave. By using Helmholtz decomposition, we reduce the initial-boundary value problem of the time domain Navier equation to a coupled initial-boundary value problem of wave equations, and prove the uniqueness of the solution for the coupled problem by employing energy method. The retarded single layer potential is introduced to establish the coupled boundary integral equations, and the uniqueness is discussed for the solution of the coupled boundary integral equations. Based on the convolution quadrature method for time discretization, the coupled boundary integral equations are reformulated into a system of boundary integral equations in s-domain, and then a convolution quadrature based nonlinear integral equation method is proposed for the inverse problem. Numerical experiments are presented to show the feasibility and effectiveness of the proposed method.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Stochastic Performance Modeling for Practical Byzantine Fault Tolerance Consensus in Blockchain
Authors:
Fan-Qi Ma,
Quan-Lin Li,
Yi-Han Liu,
Yan-Xia Chang
Abstract:
The practical Byzantine fault tolerant (PBFT) consensus mechanism is one of the most basic consensus algorithms (or protocols) in blockchain technologies, thus its performance evaluation is an interesting and challenging topic due to a higher complexity of its consensus work in the peer-to-peer network. This paper describes a simple stochastic performance model of the PBFT consensus mechanism, whi…
▽ More
The practical Byzantine fault tolerant (PBFT) consensus mechanism is one of the most basic consensus algorithms (or protocols) in blockchain technologies, thus its performance evaluation is an interesting and challenging topic due to a higher complexity of its consensus work in the peer-to-peer network. This paper describes a simple stochastic performance model of the PBFT consensus mechanism, which is refined as not only a queueing system with complicated service times but also a level-independent quasi-birth-and-death (QBD) process. From the level-independent QBD process, we apply the matrix-geometric solution to obtain a necessary and sufficient condition under which the PBFT consensus system is stable, and to be able to numerically compute the stationary probability vector of the QBD process. Thus we provide four useful performance measures of the PBFT consensus mechanism, and can numerically calculate the four performance measures. Finally, we use some numerical examples to verify the validity of our theoretical results, and show how the four performance measures are influenced by some key parameters of the PBFT consensus. By means of the theory of multi-dimensional Markov processes, we are optimistic that the methodology and results given in this paper are applicable in a wide range research of PBFT consensus mechanism and even other types of consensus mechanisms.
△ Less
Submitted 30 June, 2021;
originally announced July 2021.
-
Computation of transmission eigenvalues by the regularized Schur complement for the boundary integral operators
Authors:
Yunyun Ma,
Fuming Ma,
Yukun Guo,
**gzhi Li
Abstract:
This paper is devoted to the computation of transmission eigenvalues in the inverse acoustic scattering theory. This problem is first reformulated as a two by two boundary system of boundary integral equations. Next, utilizing the Schur complement technique, we develop a Schur complement operator with regularization to obtain a reduced system of boundary integral equations. The Nyström discretizat…
▽ More
This paper is devoted to the computation of transmission eigenvalues in the inverse acoustic scattering theory. This problem is first reformulated as a two by two boundary system of boundary integral equations. Next, utilizing the Schur complement technique, we develop a Schur complement operator with regularization to obtain a reduced system of boundary integral equations. The Nyström discretization is then used to obtain an eigenvalue problem for a matrix. We employ the recursive integral method for the numerical computation of the matrix eigenvalue. Numerical results show that the proposed method is efficient and reduces computational costs.
△ Less
Submitted 28 February, 2021;
originally announced March 2021.
-
Attractors for locally damped Bresse systems and a unique continuation property
Authors:
To Fu Ma,
Rodrigo N. Monteiro,
Paulo N. Seminario-Huertas
Abstract:
This paper is devoted to Bresse systems, a robust model for circular beams, given by a set of three coupled wave equations. The main objective is to establish the existence of global attractors for dynamics of semilinear problems with localized dam**. In order to deal with localized dam** a unique continuation property (UCP) is needed. Therefore we also provide a suitable UCP for Bresse system…
▽ More
This paper is devoted to Bresse systems, a robust model for circular beams, given by a set of three coupled wave equations. The main objective is to establish the existence of global attractors for dynamics of semilinear problems with localized dam**. In order to deal with localized dam** a unique continuation property (UCP) is needed. Therefore we also provide a suitable UCP for Bresse systems. Our strategy is to set the problem in a Riemannian geometry framework and see the system as a single equation with different Riemann metrics. Then we perform Carleman-type estimates to get our result.
△ Less
Submitted 23 February, 2021;
originally announced February 2021.
-
Scale-free tree network with an ultra-large diameter
Authors:
Fei Ma,
** Wang
Abstract:
Scale-free networks are prevalently observed in a great variety of complex systems, which triggers various researches relevant to networked models of such type. In this work, we propose a family of growth tree networks $\mathcal{T}_{t}$, which turn out to be scale-free, in an iterative manner. As opposed to most of published tree models with scale-free feature, our tree networks have the power-law…
▽ More
Scale-free networks are prevalently observed in a great variety of complex systems, which triggers various researches relevant to networked models of such type. In this work, we propose a family of growth tree networks $\mathcal{T}_{t}$, which turn out to be scale-free, in an iterative manner. As opposed to most of published tree models with scale-free feature, our tree networks have the power-law exponent $γ=1+\ln5/\ln2$ that is obviously larger than $3$. At the same time, "small-world" property can not be found particularly because models $\mathcal{T}_{t}$ have an ultra-large diameter $D_{t}$ (i.e., $D_{t}\sim|\mathcal{T}_{t}|^{\ln3/\ln5}$) and a greater average shortest path length $\langle\mathcal{W}_{t}\rangle$ (namely, $\langle\mathcal{W}_{t}\rangle\sim|\mathcal{T}_{t}|^{\ln3/\ln5}$) where $|\mathcal{T}_{t}|$ represents vertex number. Next, we determine Pearson correlation coefficient and verify that networks $\mathcal{T}_{t}$ display disassortative mixing structure. In addition, we study random walks on tree networks $\mathcal{T}_{t}$ and derive exact solution to mean hitting time $\langle\mathcal{H}_{t}\rangle$. The results suggest that the analytic formula for quantity $\langle\mathcal{H}_{t}\rangle$ as a function of vertex number $|\mathcal{T}_{t}|$ shows a power-law form, i.e., $\langle\mathcal{H}_{t}\rangle\sim|\mathcal{T}_{t}|^{1+\ln3/\ln5}$. Accordingly, we execute extensive experimental simulations, and demonstrate that empirical analysis is in strong agreement with theoretical results. Lastly, we provide a guide to extend the proposed iterative manner in order to generate more general scale-free tree networks with large diameter.
△ Less
Submitted 7 November, 2023; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Random walks on stochastic uniform growth trees: Analytical formula for mean first-passage time
Authors:
Fei Ma,
** Wang
Abstract:
As known, the commonly-utilized ways to determine mean first-passage time $\overline{\mathcal{F}}$ for random walk on networks are mainly based on Laplacian spectra. However, methods of this type can become prohibitively complicated and even fail to work when the Laplacian matrix of network under consideration is difficult to describe in the first place. In this paper, we propose an effective appr…
▽ More
As known, the commonly-utilized ways to determine mean first-passage time $\overline{\mathcal{F}}$ for random walk on networks are mainly based on Laplacian spectra. However, methods of this type can become prohibitively complicated and even fail to work when the Laplacian matrix of network under consideration is difficult to describe in the first place. In this paper, we propose an effective approach to determining quantity $\overline{\mathcal{F}}$ on some widely-studied tree networks. To this end, we first build up a general formula between Wiener index $\mathcal{W}$ and $\overline{\mathcal{F}}$ on a tree. This enables us to convert issues to answer into calculation of $\mathcal{W}$ on networks in question. As opposed to most of previous work focusing on deterministic growth trees, our goal is to consider stochastic case. Towards this end, we establish a principled framework where randomness is introduced into the process of growing trees. As an immediate consequence, the previously published results upon deterministic cases are thoroughly covered by formulas established in this paper. Additionally, it is also straightforward to obtain Kirchhoff index on our tree networks using the proposed approach. Most importantly, our approach is more manageable than many other methods including spectral technique in situations considered herein.
△ Less
Submitted 17 November, 2021; v1 submitted 28 October, 2020;
originally announced October 2020.
-
Exact mean first-passage time on generalized Vicsek fractal
Authors:
Fei Ma,
Xiaomin Wang,
** Wang,
Xudong Luo
Abstract:
Fractal phenomena may be widely observed in a great number of complex systems. In this paper, we revisit the well-known Vicsek fractal, and study some of its structural properties for purpose of understanding how the underlying topology influences its dynamic behaviors. For instance, we analytically determine the exact solution to mean first-passage time for random walks on Vicsek fractal in a mor…
▽ More
Fractal phenomena may be widely observed in a great number of complex systems. In this paper, we revisit the well-known Vicsek fractal, and study some of its structural properties for purpose of understanding how the underlying topology influences its dynamic behaviors. For instance, we analytically determine the exact solution to mean first-passage time for random walks on Vicsek fractal in a more light map**-based manner than previous other methods, including typical spectral technique. More importantly, our method can be quite efficient to precisely calculate the solutions to mean first-passage time on all generalized versions of Vicsek fractal generated based on an arbitrary allowed seed, while other previous methods suitable for typical Vicsek fractal will become prohibitively complicated and even fail. Lastly, this analytic results suggest that the scaling relation between mean first-passage time and vertex number in generalized versions of Vicsek fractal keeps unchanged in the large graph size limit no matter what seed is selected.
△ Less
Submitted 9 November, 2020; v1 submitted 26 August, 2020;
originally announced August 2020.
-
A Revisit of Chen-Teboulle's Proximal-based Decomposition Method
Authors:
Feng Ma
Abstract:
In this paper, we show that Chen-Teboulle's proximal-based decomposition method can be interpreted as a proximal augmented Lagrangian method. More precisely, it coincides with a linearized augmented Lagrangian method. We then proposed three generalized methods based on this interpretation. By invoking recent work (He et al., IMA J. Numer. Anal., 32 (2020), pp. 227--245), we show that the step size…
▽ More
In this paper, we show that Chen-Teboulle's proximal-based decomposition method can be interpreted as a proximal augmented Lagrangian method. More precisely, it coincides with a linearized augmented Lagrangian method. We then proposed three generalized methods based on this interpretation. By invoking recent work (He et al., IMA J. Numer. Anal., 32 (2020), pp. 227--245), we show that the step size condition of Chen-Teboulle's method can be relaxed without adding any further assumptions. Our analysis offers a new insight into this proximal-based decomposition method.
△ Less
Submitted 18 June, 2020;
originally announced June 2020.
-
Defective DP-colorings of sparse simple graphs
Authors:
Yifan **g,
Alexandr Kostochka,
Fuhong Ma,
**gwei Xu
Abstract:
DP-coloring (also known as correspondence coloring) is a generalization of list coloring developed recently by Dvořák and Postle. We introduce and study $(i,j)$-defective DP-colorings of simple graphs. Let $g_{DP}(i,j,n)$ be the minimum number of edges in an $n$-vertex DP-$(i,j)$-critical graph. In this paper we determine sharp bound on $g_{DP}(i,j,n)$ for each $i\geq3$ and $j\geq 2i+1$ for infini…
▽ More
DP-coloring (also known as correspondence coloring) is a generalization of list coloring developed recently by Dvořák and Postle. We introduce and study $(i,j)$-defective DP-colorings of simple graphs. Let $g_{DP}(i,j,n)$ be the minimum number of edges in an $n$-vertex DP-$(i,j)$-critical graph. In this paper we determine sharp bound on $g_{DP}(i,j,n)$ for each $i\geq3$ and $j\geq 2i+1$ for infinitely many $n$.
△ Less
Submitted 17 June, 2020;
originally announced June 2020.
-
Ice-Flower Systems And Star-graphic Lattices
Authors:
Bing Yao,
Hongyu Wang,
Xia Liu,
Xiaomin Wang,
Fei Ma,
**g Su,
Hui Sun
Abstract:
Lattice theory has been believed to resist classical computers and quantum computers. Since there are connections between traditional lattices and graphic lattices, it is meaningful to research graphic lattices. We define the so-called ice-flower systems by our uncolored or colored leaf-splitting and leaf-coinciding operations. These ice-flower systems enable us to construct several star-graphic l…
▽ More
Lattice theory has been believed to resist classical computers and quantum computers. Since there are connections between traditional lattices and graphic lattices, it is meaningful to research graphic lattices. We define the so-called ice-flower systems by our uncolored or colored leaf-splitting and leaf-coinciding operations. These ice-flower systems enable us to construct several star-graphic lattices. We use our star-graphic lattices to express some well-known results of graph theory and compute the number of elements of a particular star-graphic lattice. For more researching ice-flower systems and star-graphic lattices we propose Decomposition Number String Problem, finding strongly colored uniform ice-flower systems and connecting our star-graphic lattices with traditional lattices.
△ Less
Submitted 6 May, 2020;
originally announced May 2020.
-
Flexibility of Planar Graphs -- Sharpening the Tools to Get Lists of Size Four
Authors:
Ilkyoo Choi,
Felix Christian Clemen,
Michael Ferrara,
Paul Horn,
Fuhong Ma,
Tomáš Masařík
Abstract:
A graph where each vertex $v$ has a list $L(v)$ of available colors is $L$-colorable if there is a proper coloring such that the color of $v$ is in $L(v)$ for each $v$. A graph is $k$-choosable if every assignment $L$ of at least $k$ colors to each vertex guarantees an $L$-coloring. Given a list assignment $L$, an $L$-request for a vertex $v$ is a color $c\in L(v)$. In this paper, we look at a var…
▽ More
A graph where each vertex $v$ has a list $L(v)$ of available colors is $L$-colorable if there is a proper coloring such that the color of $v$ is in $L(v)$ for each $v$. A graph is $k$-choosable if every assignment $L$ of at least $k$ colors to each vertex guarantees an $L$-coloring. Given a list assignment $L$, an $L$-request for a vertex $v$ is a color $c\in L(v)$. In this paper, we look at a variant of the widely studied class of precoloring extension problems from [Z. Dvořák, S. Norin, and L. Postle: List coloring with requests. J. Graph Theory 2019], wherein one must satisfy "enough", as opposed to all, of the requested set of precolors. A graph $G$ is $\varepsilon$-flexible for list size $k$ if for any $k$-list assignment $L$, and any set $S$ of $L$-requests, there is an $L$-coloring of $G$ satisfying an $\varepsilon$-fraction of the requests in $S$. It is conjectured that planar graphs are $\varepsilon$-flexible for list size $5$, yet it is proved only for list size $6$ and for certain subclasses of planar graphs. We give a stronger version of the main tool used in the proofs of the aforementioned results. By doing so, we improve upon a result by Masařík and show that planar graphs without $K_4^-$ are $\varepsilon$-flexible for list size $5$. We also prove that planar graphs without $4$-cycles and $3$-cycle distance at least 2 are $\varepsilon$-flexible for list size $4$. Finally, we introduce a new (slightly weaker) form of $\varepsilon$-flexibility where each vertex has exactly one request. In that setting, we provide a stronger tool and we demonstrate its usefulness to further extend the class of graphs that are $\varepsilon$-flexible for list size $5$.
△ Less
Submitted 7 July, 2020; v1 submitted 22 April, 2020;
originally announced April 2020.
-
Longtime dynamics of a semilinear Lamé system
Authors:
Lito E. Bocanegra-Rodríguez,
To Fu Ma,
Paulo N. Seminario-Huertas,
Marcio Antonio Jorge Silva
Abstract:
This paper is concerned with longtime dynamics of semilinear Lamé systems $$ \partial^2_t u - μΔu - (λ+ μ) \nabla {\rm div} u + α\partial_t u + f(u) = 0, $$ defined in bounded domains of $\mathbb{R}^3$ with Dirichlet boundary condition. Firstly, we establish the existence of finite dimensional global attractors subjected to critical forcings $f(u)$. Writing $λ+ μ$ as a positive parameter…
▽ More
This paper is concerned with longtime dynamics of semilinear Lamé systems $$ \partial^2_t u - μΔu - (λ+ μ) \nabla {\rm div} u + α\partial_t u + f(u) = 0, $$ defined in bounded domains of $\mathbb{R}^3$ with Dirichlet boundary condition. Firstly, we establish the existence of finite dimensional global attractors subjected to critical forcings $f(u)$. Writing $λ+ μ$ as a positive parameter $\varepsilon$, we discuss some physical aspects of the limit case $\varepsilon \to 0$. Then, we show the upper-semicontinuity of attractors with respect to the parameter when $\varepsilon \to 0$. To our best knowledge, the analysis of attractors for dynamics of Lamé systems has not been studied before.
△ Less
Submitted 14 May, 2020; v1 submitted 7 March, 2020;
originally announced March 2020.
-
An Efficient Gradient Projection Method for Structural Topology Optimization
Authors:
Zhi Zeng,
Fulei Ma
Abstract:
This paper presents an efficient gradient projection-based method for structural topological optimization problems characterized by a nonlinear objective function which is minimized over a feasible region defined by bilateral bounds and a single linear equality constraint. The specialty of the constraints type, as well as heuristic engineering experiences are exploited to improve the scaling schem…
▽ More
This paper presents an efficient gradient projection-based method for structural topological optimization problems characterized by a nonlinear objective function which is minimized over a feasible region defined by bilateral bounds and a single linear equality constraint. The specialty of the constraints type, as well as heuristic engineering experiences are exploited to improve the scaling scheme, projection, and searching step. In detail, gradient clip** and a modified projection of searching direction under certain condition are utilized to facilitate the efficiency of the proposed method. Besides, an analytical solution is proposed to approximate this projection with negligible computation and memory costs. Furthermore, the calculation of searching steps is largely simplified. Benchmark problems, including the MBB, the force inverter mechanism, and the 3D cantilever beam are used to validate the effectiveness of the method. The proposed method is implemented in MATLAB which is open-sourced for educational usage.
△ Less
Submitted 14 June, 2020; v1 submitted 7 January, 2020;
originally announced January 2020.
-
Defective DP-colorings of sparse multigraphs
Authors:
Yifan **g,
Alexandr Kostochka,
Fuhong Ma,
Pongpat Sittitrai,
**gwei Xu
Abstract:
DP-coloring (also known as correspondence coloring) is a generalization of list coloring developed recently by Dvorak and Postle. We introduce and study $(i,j)$-defective DP-colorings of multigraphs. We concentrate on sparse multigraphs and consider $f_{DP}(i,j,n)$ --- the minimum number of edges that may have an $n$-vertex $(i,j)$-critical multigraph, that is, a multigraph $G$ that has no…
▽ More
DP-coloring (also known as correspondence coloring) is a generalization of list coloring developed recently by Dvorak and Postle. We introduce and study $(i,j)$-defective DP-colorings of multigraphs. We concentrate on sparse multigraphs and consider $f_{DP}(i,j,n)$ --- the minimum number of edges that may have an $n$-vertex $(i,j)$-critical multigraph, that is, a multigraph $G$ that has no $(i,j)$-defective DP-coloring but whose every proper subgraph has such a coloring. For every $i$ and $j$, we find linear lower bounds on $f_{DP}(i,j,n)$ that are exact for infinitely many $n$.
△ Less
Submitted 6 December, 2019;
originally announced December 2019.
-
An extremal problem: How small scale-free graph can be
Authors:
Fei Ma,
** Wang,
Bing Yao
Abstract:
The bloom of complex network study, in particular, with respect to scale-free ones, is considerably triggering the research of scale-free graph itself. Therefore, a great number of interesting results have been reported in the past, including bounds of diameter. In this paper, we focus mainly on a problem of how to analytically estimate the lower bound of diameter of scale-free graph, i.e., how sm…
▽ More
The bloom of complex network study, in particular, with respect to scale-free ones, is considerably triggering the research of scale-free graph itself. Therefore, a great number of interesting results have been reported in the past, including bounds of diameter. In this paper, we focus mainly on a problem of how to analytically estimate the lower bound of diameter of scale-free graph, i.e., how small scale-free graph can be. Unlike some pre-existing methods for determining the lower bound of diameter, we make use of a constructive manner in which one candidate model $\mathcal{G^*} (\mathcal{V^*}, \mathcal{E^*})$ with ultra-small diameter can be generated. In addition, with a rigorous proof, we certainly demonstrate that the diameter of graph $\mathcal{G^{*}}(\mathcal{V^{*}},\mathcal{E^{*}})$ must be the smallest in comparison with that of any scale-free graph. This should be regarded as the tight lower bound.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
Determining Geodesic Distance on Arbitrary-order Subdivision of Tree with Applications
Authors:
Fei Ma,
Xiaomin Wang,
** Wang
Abstract:
The problem of how to estimate diffusion on a graph effectively is of importance both theoretically and practically. In this paper, we make use of two widely studied indices, geodesic distance and mean first-passage time ($MFPT$) for random walk, to consider such a problem on some treelike models of interest. To this end, we first introduce several types of operations, for instance, $m$th-order su…
▽ More
The problem of how to estimate diffusion on a graph effectively is of importance both theoretically and practically. In this paper, we make use of two widely studied indices, geodesic distance and mean first-passage time ($MFPT$) for random walk, to consider such a problem on some treelike models of interest. To this end, we first introduce several types of operations, for instance, $m$th-order subdivision and ($1,m$)-star-fractal operation, to generate the potential candidate models. And then, we develop a class of novel techniques based on map** for calculating the exact formulas of the both quantities above on our models. Compared to those previous tools including matrix-based methods for addressing the issue of this type, the techniques proposed here are more general mainly because we generalize the initial condition for creating these models. Meantime, in order to show applications of our techniques to many other treelike models, the two popularly discussed models, Cayley tree $C(t,n)$ and Exponential tree $\mathcal{T}(t;m)$, are chosen to serve as representatives. While their correspondence solutions have been reported, our techniques are more convenient to implement than those pre-existing ones and thus this certifies our statements strongly. Final, we distinguish the difference among results and attempt to make some heuristic explanations to the reasons why the phenomena appear.
△ Less
Submitted 15 October, 2019;
originally announced October 2019.
-
A Method for Geodesic Distance on Subdivision of Trees with Arbitrary Orders and Their Applications
Authors:
Fei Ma,
** Wang,
Xudong Luo
Abstract:
Geodesic distance, sometimes called shortest path length, has proven useful in a great variety of applications, such as information retrieval on networks including treelike networked models. Here, our goal is to analytically determine the exact solutions to geodesic distances on two different families of growth trees which are recursively created upon an arbitrary tree $\mathcal{T}$ using two type…
▽ More
Geodesic distance, sometimes called shortest path length, has proven useful in a great variety of applications, such as information retrieval on networks including treelike networked models. Here, our goal is to analytically determine the exact solutions to geodesic distances on two different families of growth trees which are recursively created upon an arbitrary tree $\mathcal{T}$ using two types of well-known operations, first-order subdivision and ($1,m$)-star-fractal operation. Different from commonly-used methods, for instance, spectral techniques, for addressing such a problem on growth trees using a single edge as seed in the literature, we propose a novel method for deriving closed-form solutions on the presented trees completely. Meanwhile, our technique is more general and convenient to implement compared to those previous methods mainly because there are not complicated calculations needed. In addition, the closed-form expression of mean first-passage time ($MFPT$) for random walk on each member in tree families is also readily obtained according to connection of our obtained results to effective resistance of corresponding electric networks. The results suggest that the two topological operations above are sharply different from each other due to $MFPT$ for random walks, and, however, have likely to show the similar performance, at least, on geodesic distance.
△ Less
Submitted 28 October, 2020; v1 submitted 29 September, 2019;
originally announced September 2019.
-
Exact solutions for geodesic distance on treelike models with some constraints
Authors:
Xudong Luo,
Fei Ma,
Wentao Xu
Abstract:
Geodesic distance, commonly called shortest path length, has proved useful in a great variety of disciplines. It has been playing a significant role in search engine at present and so attracted considerable attention at the last few decades, particularly, almost all data structures and corresponding algorithms suitable to searching information generated based on treelike models. Hence, we, in this…
▽ More
Geodesic distance, commonly called shortest path length, has proved useful in a great variety of disciplines. It has been playing a significant role in search engine at present and so attracted considerable attention at the last few decades, particularly, almost all data structures and corresponding algorithms suitable to searching information generated based on treelike models. Hence, we, in this paper, study in detail geodesic distance on some treelike models which can be generated by three different types of operations, including first-order subdivision, ($1,m$)-star-fractal operation and $m$-vertex-operation. Compared to the most best used approaches for calculating geodesic distance on graphs, for instance, enumeration method and matrix multiplication, we take useful advantage of a novel method consisting in spirit of the concept of vertex cover in the language of graph theory and map**. For each kind of treelike model addressed here, we certainly obtain an exact solution for its geodesic distance using our method. With the help of computer simulations, we confirm that the analytical results are in perfect agreement with simulations. In addition, we also report some intriguing structure properties on treelike models of two types among them. The one obeys exponential degree distribution seen in many complex networks, by contrast, the other possesses all but leaf vertices with identical degree and shows more homogeneous topological structure than the former. Besides that, the both have, in some sense, self-similar feature but instead the latter exhibits fractal property.
△ Less
Submitted 16 September, 2019;
originally announced September 2019.
-
Dynamics of Riemann waves with sharp measure-controlled dam**
Authors:
M. M. Cavalcanti,
T. F. Ma,
P. Marín-Rubio,
P. N. Seminario-Huertas
Abstract:
This paper is concerned with locally damped semilinear wave equations defined on compact Riemannian manifolds with boundary. We present a construction of measure-controlled dam** regions which are sharp in the sense that their summed interior and boundary measures are arbitrarily small. The construction of this class of open sets is purely geometric and allows us to prove a new observability ine…
▽ More
This paper is concerned with locally damped semilinear wave equations defined on compact Riemannian manifolds with boundary. We present a construction of measure-controlled dam** regions which are sharp in the sense that their summed interior and boundary measures are arbitrarily small. The construction of this class of open sets is purely geometric and allows us to prove a new observability inequality in terms of potential energy rather than the usual one with kinetic energy. A unique continuation property is also proved. Then, in three-dimension spaces, we establish the existence of finite dimensional smooth global attractors for a class of wave equations with nonlinear dam** and forces with critical Sobolev growth. In addition, by means of an obstacle control condition, we show that our class of measure-controlled regions satisfies the well-known geometric control condition (GCC). Therefore, many of known results for the stabilization of wave equations hold true in the present context.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
Using Chinese Characters To Generate Text-Based Passwords For Information Security
Authors:
Bing Yao,
Yarong Mu,
Yirong Sun,
Hui Sun,
Xiaohui Zhang,
Hongyu Wang,
**g Su,
Mingjun Zhang,
Sihua Yang,
Meimei Zhao,
Xiaomin Wang,
Fei Ma,
Ming Yao,
Chao Yang,
Jianming Xie
Abstract:
Graphical passwords (GPWs) are in many areas of the current world. Topological graphic passwords (Topsnut-gpws) are a new type of cryptography, and they differ from the existing GPWs. A Topsnut-gpw consists of two parts: one is a topological structure (graph), and one is a set of discrete elements (a graph labelling, or coloring), the topological structure connects these discrete elements together…
▽ More
Graphical passwords (GPWs) are in many areas of the current world. Topological graphic passwords (Topsnut-gpws) are a new type of cryptography, and they differ from the existing GPWs. A Topsnut-gpw consists of two parts: one is a topological structure (graph), and one is a set of discrete elements (a graph labelling, or coloring), the topological structure connects these discrete elements together to form an interesting "story". Our idea is to transform Chinese characters into computer and electronic equipments with touch screen by speaking, writing and keyboard for forming Hanzi-graphs and Hanzi-gpws. We will use Hanzigpws to produce text-based passwords (TB-paws). We will introduce flawed graph labellings on disconnected Hanzi-graphs.
△ Less
Submitted 11 July, 2019;
originally announced July 2019.
-
Numerical schemes to reconstruct three dimensional time-dependent point sources of acoustic waves
Authors:
Bo Chen,
Yukun Guo,
Fuming Ma,
Yao Sun
Abstract:
This paper is concerned with the numerical simulation of three dimensional time-dependent inverse source problems of acoustic waves. The reconstructions of both multiple stationary point sources and a moving point source are considered. The modified method of fundamental solutions (MMFS), which expands the solution utilizing the time convolution of the Green's function and the signal function, is…
▽ More
This paper is concerned with the numerical simulation of three dimensional time-dependent inverse source problems of acoustic waves. The reconstructions of both multiple stationary point sources and a moving point source are considered. The modified method of fundamental solutions (MMFS), which expands the solution utilizing the time convolution of the Green's function and the signal function, is proposed to solve the problem. For the reconstruction of a moving point source, moreover, the MMFS is simplified as a simple sampling method at each time step. Numerical experiments are provided to show the effectiveness of the proposed methods.
△ Less
Submitted 18 April, 2020; v1 submitted 22 June, 2019;
originally announced June 2019.
-
Attractors for semilinear wave equations with localized dam** and external forces
Authors:
To Fu Ma,
Paulo N. Seminario-Huertas
Abstract:
This paper is concerned with long-time dynamics of semilinear wave equations defined on bounded domains of $\mathbb{R}^3$ with cubic nonlinear terms and locally distributed dam**. The existence of regular finite-dimensional global attractors established by Chueshov, Lasiecka and Toundykov (2008) reflects a good deal of the current state of the art on this matter. Our contribution is threefold. F…
▽ More
This paper is concerned with long-time dynamics of semilinear wave equations defined on bounded domains of $\mathbb{R}^3$ with cubic nonlinear terms and locally distributed dam**. The existence of regular finite-dimensional global attractors established by Chueshov, Lasiecka and Toundykov (2008) reflects a good deal of the current state of the art on this matter. Our contribution is threefold. First, we prove uniform boundedness of attractors with respect to a forcing parameter. Then, we study the continuity of attractors with respect to the parameter in a residual dense set. Finally, we show the existence of generalized exponential attractors. These aspects were not previously considered for wave equations with localized dam**.
△ Less
Submitted 8 May, 2019;
originally announced May 2019.
-
Analysis of the time domain acoustic scattering from open cavities
Authors:
Bo Chen,
Fuming Ma,
Yukun Guo
Abstract:
This paper is concerned with the analysis of the time domain acoustic scattering from two-dimensional open cavities. A transparent boundary condition is developed to reformulate the scattering problem into an equivalent initial boundary value problem in the interior domain of the open cavity. The well-posedness, that is, the existence, uniqueness and stability of the solution to the reduced proble…
▽ More
This paper is concerned with the analysis of the time domain acoustic scattering from two-dimensional open cavities. A transparent boundary condition is developed to reformulate the scattering problem into an equivalent initial boundary value problem in the interior domain of the open cavity. The well-posedness, that is, the existence, uniqueness and stability of the solution to the reduced problem are studied via a "Laplace domain" to time domain analysis. Moreover, time domain boundary integral equations for the reduced problem are established.
△ Less
Submitted 15 September, 2018;
originally announced September 2018.
-
Text-based Passwords Generated From Topological Graphic Passwords
Authors:
Bing Yao,
Xiaohui Zhang,
Hui Sun,
Yarong Mu,
Yirong Sun,
Xiaomin Wang,
Hongyu Wang,
Fei Ma,
**g Su,
Chao Yang,
Sihua Yang,
Mingjun Zhang
Abstract:
Topological graphic passwords (Topsnut-gpws) are one of graph-type passwords, but differ from the existing graphical passwords, since Topsnut-gpws are saved in computer by algebraic matrices. We focus on the transformation between text-based passwords (TB-paws) and Topsnut-gpws in this article. Several methods for generating TB-paws from Topsnut-gpws are introduced; these methods are based on topo…
▽ More
Topological graphic passwords (Topsnut-gpws) are one of graph-type passwords, but differ from the existing graphical passwords, since Topsnut-gpws are saved in computer by algebraic matrices. We focus on the transformation between text-based passwords (TB-paws) and Topsnut-gpws in this article. Several methods for generating TB-paws from Topsnut-gpws are introduced; these methods are based on topological structures and graph coloring/labellings, such that authentications must have two steps: one is topological structure authentication, and another is text-based authentication. Four basic topological structure authentications are introduced and many text-based authentications follow Topsnut-gpws. Our methods are based on algebraic, number theory and graph theory, many of them can be transformed into polynomial algorithms. A new type of matrices for describing Topsnut-gpws is created here, and such matrices can produce TB-paws in complex forms and longer bytes. Estimating the space of TB-paws made by Topsnut-gpws is very important for application. We propose to encrypt dynamic networks and try to face: (1) thousands of nodes and links of dynamic networks; (2) large numbers of Topsnut-gpws generated by machines rather than human's hands. As a try, we apply spanning trees of dynamic networks and graphic groups (Topsnut-groups) to approximate the solutions of these two problems. We present some unknown problems in the end of the article for further research.
△ Less
Submitted 12 September, 2018;
originally announced September 2018.
-
A Stochastic Model for File Lifetime and Security in Data Center Networks
Authors:
Quan-Lin Li,
Fan-Qi Ma,
**g-Yu Ma
Abstract:
Data center networks are an important infrastructure in various applications of modern information technologies. Note that each data center always has a finite lifetime, thus once a data center fails, then it will lose all its storage files and useful information. For this, it is necessary to replicate and copy each important file into other data centers such that this file can increase its lifeti…
▽ More
Data center networks are an important infrastructure in various applications of modern information technologies. Note that each data center always has a finite lifetime, thus once a data center fails, then it will lose all its storage files and useful information. For this, it is necessary to replicate and copy each important file into other data centers such that this file can increase its lifetime of staying in a data center network. In this paper, we describe a large-scale data center network with a file d-threshold policy, which is to replicate each important file into at most d-1 other data centers such that this file can maintain in the data center network under a given level of data security in the long-term. To this end, we develop three relevant Markov processes to propose two effective methods for assessing the file lifetime and data security. By using the RG-factorizations, we show that the two methods are used to be able to more effectively evaluate the file lifetime of large-scale data center networks. We hope the methodology and results given in this paper are applicable in the file lifetime study of more general data center networks with replication mechanism.
△ Less
Submitted 3 August, 2018;
originally announced August 2018.
-
Pullback dynamics of a 3D Navier-Stokes equation with nonlinear viscosity
Authors:
Xin-Guang Yang,
Baowei Feng,
Shubin Wang,
To Fu Ma,
Yong** Lu
Abstract:
This paper is concerned with pullback dynamics of 3D Navier-Stokes equations with variable viscosity and subject to time-dependent external forces. Our main result establishes the existence of finite-dimensional pullback attractors in a general setting involving tempered universes. We also present a sufficient condition on the viscosity coefficients that guarantees the attractors are nontrivial. W…
▽ More
This paper is concerned with pullback dynamics of 3D Navier-Stokes equations with variable viscosity and subject to time-dependent external forces. Our main result establishes the existence of finite-dimensional pullback attractors in a general setting involving tempered universes. We also present a sufficient condition on the viscosity coefficients that guarantees the attractors are nontrivial. We end the paper by showing the upper semi-continuity of pullback attractors as the non-autonomous perturbation vanishes.
△ Less
Submitted 21 January, 2019; v1 submitted 20 May, 2018;
originally announced May 2018.
-
Pullback dynamics of 2D incompressible non-autonomous Navier-Stokes equation on Lipschitz-like domain
Authors:
Xin-Guang Yang,
Yuming Qin,
To Fu Ma,
Yong** Lu
Abstract:
This paper concerns the tempered pullback dynamics of 2D incompressible non-autonomous Navier-Stokes equation with non-homogeneous boundary condition on Lipschitz-like domain. With the presence of a time-dependent external force f(t) which only needs to be pullback translation bounded, we establish the existence of a minimal pullback attractor with respect to a universe of tempered sets for the co…
▽ More
This paper concerns the tempered pullback dynamics of 2D incompressible non-autonomous Navier-Stokes equation with non-homogeneous boundary condition on Lipschitz-like domain. With the presence of a time-dependent external force f(t) which only needs to be pullback translation bounded, we establish the existence of a minimal pullback attractor with respect to a universe of tempered sets for the corresponding non-autonomous dynamical system. We then give estimate on the finite fractal dimension of the attractor based on trace formula. Under the additional assumption that the external force is the sum of a stationary force and a non-autonomous perturbation, we also prove the upper semi-continuity of the attractors as the non-autonomous perturbation vanishes. Lastly, we also investigate the regularity of these attractors when smoother initial data is given. Our results are new even in the case of smooth domains.
△ Less
Submitted 21 April, 2018;
originally announced April 2018.
-
Solving the multi-frequency electromagnetic inverse source problem by the Fourier method
Authors:
Guan Wang,
Fuming Ma,
Yukun Guo,
**gzhi Li
Abstract:
This work is concerned with an inverse problem of identifying the current source distribution of the time-harmonic Maxwell's equations from multi-frequency measurements. Motivated by the Fourier method for the scalar Helmholtz equation and the polarization vector decomposition, we propose a novel method for determining the source function in the full vector Maxwell's system. Rigorous mathematical…
▽ More
This work is concerned with an inverse problem of identifying the current source distribution of the time-harmonic Maxwell's equations from multi-frequency measurements. Motivated by the Fourier method for the scalar Helmholtz equation and the polarization vector decomposition, we propose a novel method for determining the source function in the full vector Maxwell's system. Rigorous mathematical justifications of the method are given and numerical examples are provided to demonstrate the feasibility and effectiveness of the method.
△ Less
Submitted 2 August, 2017;
originally announced August 2017.
-
The confirmation of a conjecture on disjoint cycles in a graph
Authors:
Fuhong Ma,
** Yan
Abstract:
In this paper, we prove the following conjecture proposed by Gould, Hirohata and Keller [Discrete Math. submitted]: Let $G$ be a graph of sufficiently large order. If $σ_t(G) \geq 2kt - t + 1$ for any two integers $k \geq 2$ and $t \geq 5$, then $G$ contains $k$ disjoint cycles.
In this paper, we prove the following conjecture proposed by Gould, Hirohata and Keller [Discrete Math. submitted]: Let $G$ be a graph of sufficiently large order. If $σ_t(G) \geq 2kt - t + 1$ for any two integers $k \geq 2$ and $t \geq 5$, then $G$ contains $k$ disjoint cycles.
△ Less
Submitted 7 July, 2017;
originally announced July 2017.
-
Lichiardopol's conjecture on disjoint cycles in tournaments
Authors:
Fuhong Ma,
Douglas B. West,
** Yan
Abstract:
In 2010, N. Lichiardopol conjectured for $q \geq 3$ and $k \geq 1$ that any tournament with minimum out-degree at least $(q-1)k-1$ contains $k$ disjoint cycles of length $q$. We prove this conjecture for $q \geq 5$. Since it is already known to hold for $q\le4$, this completes the proof of the conjecture.
In 2010, N. Lichiardopol conjectured for $q \geq 3$ and $k \geq 1$ that any tournament with minimum out-degree at least $(q-1)k-1$ contains $k$ disjoint cycles of length $q$. We prove this conjecture for $q \geq 5$. Since it is already known to hold for $q\le4$, this completes the proof of the conjecture.
△ Less
Submitted 29 October, 2019; v1 submitted 7 July, 2017;
originally announced July 2017.
-
Singular limit and long-time dynamics of Bresse systems
Authors:
To Fu Ma,
Rodrigo Nunes Monteiro
Abstract:
The Bresse system is a valid model for arched beams which reduces to the classical Timoshenko system when the arch curvature $\ell=0$. Our first result shows the Timoshenko system as a singular limit of the Bresse system as $\ell \to 0$. The remaining results are concerned with the long-time dynamics of Bresse systems. In a general framework, allowing nonlinear dam** and forcing terms, we prove…
▽ More
The Bresse system is a valid model for arched beams which reduces to the classical Timoshenko system when the arch curvature $\ell=0$. Our first result shows the Timoshenko system as a singular limit of the Bresse system as $\ell \to 0$. The remaining results are concerned with the long-time dynamics of Bresse systems. In a general framework, allowing nonlinear dam** and forcing terms, we prove the existence of a smooth global attractor with finite fractal dimension and exponential attractors as well. We also compare the Bresse system with the Timoshenko system, in the sense of upper semicontinuity of their attractors as $\ell \to 0$.
△ Less
Submitted 23 March, 2017; v1 submitted 20 November, 2015;
originally announced November 2015.
-
Four transformations on the Catalan triangle
Authors:
Yidong Sun,
Fei Ma
Abstract:
In this paper, we define four transformations on the classical Catalan triangle $\mathcal{C}=(C_{n,k})_{n\geq k\geq 0}$ with $C_{n,k}=\frac{k+1}{n+1}\binom{2n-k}{n}$. The first three ones are based on the determinant and the forth is utilizing the permanent of a square matrix. It not only produces many known and new identities involving Catalan numbers, but also provides a new viewpoint on combina…
▽ More
In this paper, we define four transformations on the classical Catalan triangle $\mathcal{C}=(C_{n,k})_{n\geq k\geq 0}$ with $C_{n,k}=\frac{k+1}{n+1}\binom{2n-k}{n}$. The first three ones are based on the determinant and the forth is utilizing the permanent of a square matrix. It not only produces many known and new identities involving Catalan numbers, but also provides a new viewpoint on combinatorial triangles.
△ Less
Submitted 9 May, 2013;
originally announced May 2013.