To prove (5.8), we refer to [17, (2.10)]. For (5.9), the case ν=0 is already included in (5.8) with μ=0. Thus it remains to show ν=2. Let {λj,h}Nhj=1 be the positive eigenvalues of Ah with corresponding orthonormal eigenvectors {ej,h}Nhj=1⊂˙Vh. By u…

In two recent publications [Kov{\'a}cs, Larsson, and Mesforush, SIAM J. Numer. Anal. 49(6), 2407-2429, 2011] and [Furihata, et al., SIAM J. Numer. An…

Due to the rapid development of mobile Internet techniques, cloud computation and popularity of online social networking and location-based services,…

Existing joint optic disc and cup segmentation approaches are developed either in Cartesian or polar coordinate system. However, due to the subtle op…

Let $p(\cdot)$ be a measurable function (a variable exponent) defined on a probability space $(\Omega,\mathcal F, \mathbb P;(\mathcal F_n)_{n\geq0})$…

In this paper, we consider two regularized transformation-optics cloaking schemes for electromagnetic (EM) waves. Both schemes are based on the blowu…

To the best of our knowledge, this is the first work to study the problem of top-k continuous temporal spatial keyword queries over streaming temporal spatial keyword microblogs, which has a wide spectrum of application. To tackle with this problem,…

Massive amount of data that are geo-tagged and associated with text information are being generated at an unprecedented scale in many emerging applic…

Precision mapping of landslide inventory is crucial for hazard mitigation. Most landslides generally co-exist with other confusing geological feature…

Due to the advances in mobile computing and multimedia techniques, there are vast amount of multimedia data with geographical information collected i…

With the proliferation of online social networking services and mobile smart devices equipped with mobile communications module and position sensor m…

We investigate the composable security of unidimensional contin- uous variable quantum key distribution (UCVQKD), which is based on the Gaussian modu…

This paper studies the equilibrium behavior of customers in the Geo/Geo/1 queueing system with multiple working vacations. The arriving customers dec…

In this paper, we consider a semi-linear stochastic strongly damped wave equation driven by additive Gaussian noise. Following a semigroup framework,…

Convolutional neural networks (CNNs) are easily spoofed by adversarial examples which lead to wrong classification result. Most of the one-way defens…

Renewable-energy-based grids development needs new methods to maintain the balance between the load and generation using the efficient energy storage…

Human Activity Recognition (HAR) using deep neural network has become a hot topic in human-computer interaction. Machine can effectively identify hum…

Evolutionary many-objective optimization has been gaining increasing attention from the evolutionary computation research community. Much effort has …

We propose a long-distance continuous-variable quantum key distribution (CVQKD) with four-state protocol using non-Gaussian state-discrimination dete…

The three-dimensional (3D) Fick's diffusion equation and fractional diffusion equation are solved for different reflecting boundaries. We use the con…

With the rapid growth of multimedia data (e.g., image, audio and video etc.) on the web, learning-based hashing techniques such as Deep Supervised Ha…

With the wide application of remote sensing technology in various fields, the accuracy and security requirements for remote sensing images (RSIs) rec…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account