The existence of random fixed points for nonexpansive and pseudocontractive random multivalued operators defined on unbounded subsets of a Banach space is proved. A random coincidence point theorem for a pair of compa...
详细信息
The behavior of interacting electrons in a perfect crystal under macroscopic external electric and magnetic fields is studied. Effective Maxwell equations for the macroscopic electric and magnetic fields are derived s...
详细信息
The behavior of interacting electrons in a perfect crystal under macroscopic external electric and magnetic fields is studied. Effective Maxwell equations for the macroscopic electric and magnetic fields are derived starting from time-dependent density functional theory. Effective permittivity and permeability coefficients are obtained.
In this paper we establish an asymptotic expansion near the boundary for solutions to the Dirichlet problem of elliptic equations with singularities near the *** expansion formula shows the singularity profile of solu...
详细信息
In this paper we establish an asymptotic expansion near the boundary for solutions to the Dirichlet problem of elliptic equations with singularities near the *** expansion formula shows the singularity profile of solutions at the *** deal with both linear and nonlinear elliptic equations,including fully nonlinear elliptic equations and equations of Monge-Ampère type.
Cell packs a lot of genetic and regulatory information through a structure known as chromatin,*** is wrapped around histone proteins and is tightly packed in a remarkable *** express a gene in a specific coding region...
详细信息
Cell packs a lot of genetic and regulatory information through a structure known as chromatin,*** is wrapped around histone proteins and is tightly packed in a remarkable *** express a gene in a specific coding region,the chromatin would open up and DNA loop may be formed by interacting enhancers and ***,the mediator and cohesion complexes,sequence-specific transcription factors,and RNA polymerase Ⅱ are recruited and work together to elaborately regulate the expression *** is in pressing need to understand how the information,about when,where,and to what degree genes should be expressed,is embedded into chromatin structure and gene regulatory *** to large consortia such as Encyclopedia of DNA Elements(ENCODE) and Roadmap Epigenomic projects,extensive data on chromatin accessibility and transcript abundance are available across many tissues and cell *** rich data offer an exciting opportunity to model the causal regulatory ***,we will review the current experimental approaches,foundational data,computational problems,interpretive frameworks,and integrative models that will enable the accurate interpretation of regulatory ***,we will discuss the efforts to organize,analyze,model,and integrate the DNA accessibility data,transcriptional data,and functional genomic regions *** believe that these efforts will eventually help us understand the information flow within the cell and will influence research directions across many fields.
We present a new formulation of the incompressible Navier-Stokes equation in terms of an auxiliary field that differs from the velocity by a gauge transformation. The gauge freedom allows us to assign simple and speci...
In recent years, Session Initiation Protocol (SIP) is more and more popular. However, there are many security problems in the Session Initiation Protocol. In 2005, Yang et al. [9] proposed a secure authentication sche...
详细信息
In recent years, Session Initiation Protocol (SIP) is more and more popular. However, there are many security problems in the Session Initiation Protocol. In 2005, Yang et al. [9] proposed a secure authentication scheme for Session Initiation Protocol. This authentication scheme is based on Diffie-Hellman [2] concept, so the computation cost of this authentication scheme is very high. In order to improve this shortcoming, Durlanik et al. [3] also proposed an authentication Scheme using ECDH in 2005. However, the computation cost of this authentication scheme is still very high. In this paper, we propose an efficient nonce-based authentication scheme. The computation cost of this authentication scheme is lower than Yang et al.s authentication scheme and Durlanik et al.s authentication scheme, and it is very suitable for low computation power equipment.
In this paper, we pose an optimal design problem involving a feedback control system. The location of the actuator is the design parameter of interest. Since feedback control problems need to be solved efficiently whe...
详细信息
Nitrate contamination in water sources is a growing environmental concern, threatening both human health and ecosystems. However, its combination with sodium forms NaNO3, a compound essential for various industrial ap...
详细信息
We introduce a numerical approach to perform the effective (coarse-scale) bifurcation analysis of solutions of dissipative evolution equations with spatially varying coefficients. The advantage of this approach is tha...
We introduce a numerical approach to perform the effective (coarse-scale) bifurcation analysis of solutions of dissipative evolution equations with spatially varying coefficients. The advantage of this approach is that the `coarse model' (the averaged, effective equation) need not be explicitly constructed. The method only uses a time-integrator code for the detailed problem and judicious choices of initial data and integration times; the bifurcation computations are based on the so-called recursive projection method (Shroff and Keller 1993 SIAM J. Numer. Anal. 30 1099-120).
暂无评论