Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Global existence of 3D rotating magnetohydrodynamic equations arising from Earth's fluid core

  • The paper is concerned with the three-dimensional magnetohydrodynamic equations in the rotational framework concerning with fluid flow of Earth's core and the variation of the Earth's magnetic field. By establishing new balances between the regularizing effects arising from viscosity dissipation and magnetic diffusion with the dispersive effects caused by the rotation of the Earth, we obtain the global existence and uniqueness of solutions of the Cauchy problem of the three-dimensional rotating magnetohydrodynamic equations in Besov spaces. Moreover, the spatial analyticity of solutions is verified by means of the Gevrey class approach.

    Citation: Jinyi Sun, Weining Wang, Dandan Zhao. Global existence of 3D rotating magnetohydrodynamic equations arising from Earth's fluid core[J]. Networks and Heterogeneous Media, 2025, 20(1): 35-51. doi: 10.3934/nhm.2025003

    Related Papers:

    [1] Robert Stephen Cantrell, Chris Cosner, William F. Fagan . Edge-linked dynamics and the scale-dependence of competitive. Mathematical Biosciences and Engineering, 2005, 2(4): 833-868. doi: 10.3934/mbe.2005.2.833
    [2] Jessica L. Hite, André M. de Roos . Pathogens stabilize or destabilize depending on host stage structure. Mathematical Biosciences and Engineering, 2023, 20(12): 20378-20404. doi: 10.3934/mbe.2023901
    [3] Tyler Cassidy, Morgan Craig, Antony R. Humphries . Equivalences between age structured models and state dependent distributed delay differential equations. Mathematical Biosciences and Engineering, 2019, 16(5): 5419-5450. doi: 10.3934/mbe.2019270
    [4] Nancy Azer, P. van den Driessche . Competition and Dispersal Delays in Patchy Environments. Mathematical Biosciences and Engineering, 2006, 3(2): 283-296. doi: 10.3934/mbe.2006.3.283
    [5] Gonzalo Robledo . Feedback stabilization for a chemostat with delayed output. Mathematical Biosciences and Engineering, 2009, 6(3): 629-647. doi: 10.3934/mbe.2009.6.629
    [6] Lizhong Qiang, Ren-Hu Wang, Ruofan An, Zhi-Cheng Wang . A stage-structured SEIR model with time-dependent delays in an almost periodic environment. Mathematical Biosciences and Engineering, 2020, 17(6): 7732-7750. doi: 10.3934/mbe.2020393
    [7] Nahla Abdellatif, Radhouane Fekih-Salem, Tewfik Sari . Competition for a single resource and coexistence of several species in the chemostat. Mathematical Biosciences and Engineering, 2016, 13(4): 631-652. doi: 10.3934/mbe.2016012
    [8] Paolo Fergola, Marianna Cerasuolo, Edoardo Beretta . An allelopathic competition model with quorum sensing and delayed toxicant production. Mathematical Biosciences and Engineering, 2006, 3(1): 37-50. doi: 10.3934/mbe.2006.3.37
    [9] Jacques A. L. Silva, Flávia T. Giordani . Density-dependent dispersal in multiple species metapopulations. Mathematical Biosciences and Engineering, 2008, 5(4): 843-857. doi: 10.3934/mbe.2008.5.843
    [10] Qingwen Hu . A model of regulatory dynamics with threshold-type state-dependent delay. Mathematical Biosciences and Engineering, 2018, 15(4): 863-882. doi: 10.3934/mbe.2018039
  • The paper is concerned with the three-dimensional magnetohydrodynamic equations in the rotational framework concerning with fluid flow of Earth's core and the variation of the Earth's magnetic field. By establishing new balances between the regularizing effects arising from viscosity dissipation and magnetic diffusion with the dispersive effects caused by the rotation of the Earth, we obtain the global existence and uniqueness of solutions of the Cauchy problem of the three-dimensional rotating magnetohydrodynamic equations in Besov spaces. Moreover, the spatial analyticity of solutions is verified by means of the Gevrey class approach.



    The Internet of Things (IoT) has enormous potential in a wide range of fields, including smart grids, earth observation, environmental monitoring, agriculture, resource management, public health, public security, transport, and the military. However, over the past few years, remote sensing has emerged as an attractive new source of data for environmental applications. These applications have acquired considerable momentum in terms of spatial, radiometric, and spectral resolution. Remote sensing and monitoring systems are responsible for acquiring, storing, and using collected data to make decisions and analyze complex problems. Recent studies have evaluated the collateral operation of IoT and remote sensing systems and how IoT constitutes an integral part of remote sensing [1,2]. In particular, the studies considered the technological relationship between IoT and remote sensing edge components, that is, the global positioning system (GPS) and geographical information system (GIS).

    Recently, smart homes have garnered considerable interest [3] because they help enable smart cities and complete the smart grid, as shown in Figure 1(a); smart farming and e-healthcare, as shown in Figure 1(b); water quality; and other smart systems [4,5,6,7,8]. These advancements ensure an efficient lifestyle and safety for people through 24/7 monitoring. Most smart homes are equipped with passive infrared sensors to detect motion and report binary data for visualization. The IoT provides a wide range of personalized treatment possibilities when utilized in conjunction with traditional healthcare. Furthermore, multimedia IoT (MIoT) monitoring system for smart homes have been developed for several possible applications and their integration has been suggested with the existing smart house testbeds for further research [9]. MIoT provides enhanced device, system, and service connectivity in the context of smart homes beyond machine-to-machine communication. The purpose of creating a smart home ontology, as explained in previous studies [4,7], is to provide semantics for the data shared by the systems and devices and establish semantic interoperability in smart homes. From a technological perspective, cloud computing and IoT/MIoT are combined to provide pervasive sensing services and robust processing of the collected data that go beyond what individual "things" can do, leading to advancements in both domains. Another approach employs several machine learning techniques as well as data management and analysis approaches. However, the major challenges in differentiating cases located in the same space include allowing the interoperability of different technologies and guaranteeing data security and privacy [4,10,11].

    Figure 1.  (a) Smart Grid communication network architecture, and (b) an ehealth care monitoring system.

    Corporal sensors face the same challenges as general wireless sensor networks (WSNs). Indeed, the major concern is how to extend the lifetime of wireless sensor nodes and provide security with an appropriate Quality of Service (QoS) for each type of event. Energy efficiency is another principal criterion [12] that should be considered in the design of remote monitoring systems [13]. Many of these criteria have been addressed by various WSN Media access control (MAC) protocols that focus only on energy conservation without a major concentration on urgent data transmissions, remote monitoring, security, and privacy [14].

    Current monitoring systems suffer from several problems such as alarm settings, convoluted wires, complex artifacts, excessive information, adaptability of many hardware devices made by different manufacturers, in-person monitoring, and challenges resulting from human performance. To overcome these problems, we aimed to establish a smart and secure home based on IoT for real-time remote monitoring of smart home architectures. The initial research has been reported in our previous study [15]. Our primary objectives of the present study were as follows:

    ● To develop an intelligent end-to-end secure IoT-based health monitoring system for smart homes. This system uses current monitoring mechanisms and employs the most recent ambient sensing devices and wireless technologies in addition to cloud services. It also includes security and privacy mechanisms that allow reliable end-to-end transfer of information through secure channels.

    ● To define the entire architecture and set up suitable processes and interconnectivity to help automate the complete operation of the system (monitor and secure) with a preventive solution for critical situations. This contribution includes both software development and communication establishment in addition to a heterogeneous hardware environment.

    ● To develop techniques for enhancing the performance of remote monitoring systems. This contribution involves alleviating the complexity of the mechanisms to make them adequate for hardware platform resources. Therefore, the process involves enhancing communication processes, cryptographic algorithms, data collection, aggregation, analysis, and visualization.

    ● To implement a real testbed to perform the experiments and generate results for conducting comparisons in terms of power consumption. This phase allows for building and running an entire heterogeneous platform, including several ambient sensors, communication protocols, hypertext transfer protocol secure (HTTPS), and API Key mechanisms for security, analysis, and remote visualization.

    Based on these contributions, the research conducted in this study can be employed in various monitoring applications in smart cities, which include event sensing, data communication, information security, analysis, and visualization. The remainder of this paper is organized as follows: In Section 2, we introduce the background, including the major directions of this study in terms of IoT-based security, confidentiality, and remote monitoring approaches. In Section 3, we performed a literature review and conducted a comparative study of related works. In Section 4, we describe the methodology of the proposed method, and, in Section 5, we outline the experimental results. Finally, in Section 6, we present our conclusions and discuss the future scope of this research.

    Swift progress in electronics and wireless communication technologies has allowed the evolution of IoT, which provides practical solutions for several applications such as smart grids, home security, military, target tracking, and pollution level monitoring [4]. In particular, researchers in the field of computing, networking, and software are working together to implement this promising technology, which provides high-quality services to people even in their homes, primarily for older individuals, children, and those with persistent maladies. WSNs are located on the human body or implemented on the premises to form clusters. The WSN allows for the collection of sensed data, aggregating them in a coordinator and sending them to a central database to be used by the administration [7]. At the IoT level, three challenges must be considered: sensor limitations, network performance and security, and confidentiality support.

    With rapid advancements in information and communication technology, the advent of multimedia and innovation in systems using IoT and WSNs has become increasingly significant. In a previous study [9], the researchers presented a comprehensive review of distinct frameworks, real-time applications, data compression, sensory data, challenges, limitations, and open research issues related to the MIoT in industrial production systems. The integration of multimedia and IoT leads to exciting possibilities across various domains, including healthcare, smart cities, and precision agriculture. Khan et al. [9] explored different frameworks that combine multimedia and IoT. These frameworks enable seamless communication, data exchange, and intelligent decision-making. Real-time multimedia applications benefit from IoT systems, and examples of this include video streaming, serious games, rehabilitative exercises, and e-healthcare. The integration of multimedia and cloud services has enhanced these applications. Efficient data compression techniques are crucial for MIoT systems; however, balancing data quality and resource constraints is challenging. IoT sensors capture sensory data from the environment, and integrating these data with multimedia content allows for context-aware applications.

    Sensor limitations: Corporal sensors share the same challenges as general WSNs. Energy efficiency is the principal requirement for designing low-level capacity node protocols [12]. Indeed, the challenge lies in extending the lifetime of the body sensor nodes. Sensor capabilities in terms of processing rate and buffer size also constitute an additional major sensor limitation.

    Network performance: QoS metrics, such as the coverage rate, reliability, end-to-end delay, throughput, and error rates for delivery or sensing, are network performance measures that should satisfy an acceptable level [13]. A large proportion of this problem has been addressed using various WSN protocols. Most studies have focused only on energy conservation, and only a few studies have concentrated on urgent data transmission [14]. The timely and reliable delivery of life-crucial medical data must be assured; that is, a patient who requires the most instantaneous service should be given major priority, and the patient's vital signs should be transferred with higher reliability and shorter delay. Furthermore, IoT-based e-health systems assist diverse services with various characteristics, such as different quantities of energy, different-sized data, and various transmission rates. Therefore, it has become important to arrange a service-differentiated scheme to allow multilevel QoS support, as most approaches process all packets in an identical manner [4].

    Challenges in security and confidence: Owing to the multiplicity of devices and the dynamic nature of networks, healthcare IoT systems face many security and privacy challenges because they are frequently vulnerable to threats and attacks that can compromise the system. To address these challenges, security and privacy issues must first be identified. Second, a physically unclonable functional authentication approach is needed, considering both sensor limitations and network capacity. Prominent companies are incorporating artificial intelligence into printed circuit board (PCB) designs [16], producing embedded programs that are tailored to the specifications of the circuit. In electronics, PCBs have revolutionized the creation of circuits. Although many designs exist worldwide, PCB designs are becoming increasingly valued owing to their automation. Several companies have concentrated on PCB designs that improve the user experience by integrating artificial intelligence into the system.

    Technological development in the areas of telecommunications and electronics has led to rapid advances in IoT, which is a promising technology for several applications such as healthcare. Because wireless body area networks (WBANs) are used in healthcare to monitor the vital signs of patients, any delayed or missing data can threaten the patient's life. Urgent data are immediately transmitted to supply a QoS guarantee to the WBAN. Recent advances in smartphones and remote healthcare monitoring based on IoT provide multidimensional and intelligent services. With continuous monitoring and improved interventions, the development of IoT-based wearable sensor devices has prevented millions of deaths worldwide. The SIM7600E GSM and GNSS HAT Module enable on-demand positioning of the patient as well as remote monitoring of body temperature (DS18B20), oxygen saturation (SPO2; MAX30100), and heart rate [17]. Information from sensors is sent across the network and stored in the cloud. The proposed method in the present study uses the most recent IoT microcontroller and device versions, which have a substantial impact on the overall accuracy and speed of the system.

    Information security encounters serious challenges while sending data. In addition, predicting diseases using gathered data is a complex task. To address these problems, Alandjani [18] suggested a new deep learning method called convolutional neural network–based disease prediction. The Rives-Shamir-Adleman cryptographic technique can be used to ensure the security of data stored in the cloud. We compared the performance of the method proposed in the present with that of methods proposed in previous studies. A comparative analysis demonstrated that the proposed approach provides improved prediction accuracy and better security.

    QoS is a key factor of the WBAN. Assigning various priority levels for sensed data allows traffic differentiation and provides a suitable QoS level based on event, anomaly, and emergency cases. QoS support considers both the IoT device capability and network response/performance. The major metrics used to evaluate the QoS support are latency, throughput, link quality, and loss rate.

    Alharbi et al. [19] introduced a novel approach called label augmentation. It assigns a joint label to each generated image by considering both the label and data augmentation. Furthermore, they addressed the challenge posed by augmented samples, which increases the intraclass diversity in the training set. To enhance the classification accuracy, the method employs the Kullback–Leibler divergence to constrain the output distribution of two training samples with the same scene category. Extensive experiments on widely used datasets (UCM, AID and NWPU) demonstrated that the method proposed in the present study outperforms other state-of-the-art approaches in terms of classification accuracy.

    The same idea was applied by Puustjärvi and Puustjärvi [7], wherein the goal of the scheme was to classify and prioritize sensed data to improve real-time delivery using differentiated services, traffic scheduling, and multipath transmission. Sensor nodes sense the data and begin an anomaly detection process based on a predefined threshold. The coordinator node has a criticality table used to classify patients based on data from the source nodes. The sensed data are sent to the packet classification mechanism through the path selector using the path state information. The received signal strength indicator between the nodes, residual energy, and path delay is used to estimate the path states by indicating link quality information.

    Other protocols for real-time applications exploit the decoding and forwarding mechanisms for cooperation [20]. Thus, decoding each packet at the relay nodes causes these networks to experience security and privacy attacks. Almost all the current network coding (NC)–based studies on WBSNs use linear combinations or the Exclusively-OR (XoR) process for coding. Almost all current NC-based error recovery methods are not QoS-aware for medical applications. However, NC-based error recovery techniques have a substantial capacity to be appropriate for network channel conditions. Based on this, Razzaque et al. [20] employed Marinkovic and Popovici's XoR coding–based method for WBSNs. In this study, we enhanced the NC-based approach to make it suitable for network channel conditions and user QoS requirements. Two QoS mechanisms are involved in this approach: adaptive service differentiation and adaptive error recovery.

    Suganthi et al. [21] employed a mobile healthcare technology to enhance the quality of patient monitoring. This objective was achieved by employing sensor nodes affixed to the patient's body to monitor physiological data and vital signs. To protect patient privacy and security while balancing security and performance, they proposed an end-to-end mutual authentication system. The proposed authentication method also uses a smartphone or personal digital assistant (PDA) as a gateway node, allowing for ongoing patient monitoring even outside the clinical setting. The approach also includes emergency protocol measures necessary to maintain the standard of patient care in dire circumstances.

    Saleem et al. [15] addressed the need for secure monitoring in smart environments. By leveraging the cellular IoT technology, the proposed system ensures robust communication and data exchange and provides features that include real-time monitoring, security, and scalability. The system integrates various sensors (such as temperature, humidity, and motion sensors) to monitor the environment. Cellular connectivity allows seamless communication even in remote or challenging locations. This system can be applied to diverse scenarios, including home automation, industrial settings, and agriculture. Security measures include the transmission and authentication of encrypted data. The researchers provided a comprehensive overview of the network's architecture, implementation, and performance evaluation.

    Manikandan et al. [22] introduced a novel system designed to promptly detect fires while pinpointing the affected area. Raspberry Pi 3 was employed as a control; this compact yet powerful device integrates several sensors and cameras. A validation mechanism was employed to prevent false alerts, and the system validated the fire suspicions. Upon detecting a fire, the system not only captures an image of the afflicted area but also sends an automated message. If the administration confirms a fire, an alert is promptly raised and a message is sent to the local fire department. By leveraging IoT and Raspberry Pi, this approach enhances safety, minimizes false alarms, and facilitates rapid responses in critical situations.

    Meddeb et al. [23] introduced a Raspberry Pi 3 Model B-based robot that can be seamlessly integrated into any household. Furthermore, equipped with a webcam, the robot monitors the area and sends notifications upon detecting trespassing or obtrusion. The camera also features a face recognition algorithm, enabling it to identify the person responsible for triggering the motion. If an individual is authorized, an onboard voice assistant engages in conversation. Notifications are dispatched only to authorized personnel, accompanied by pictures of the trespasser and live streaming of the webcam feed. Pi's live streaming capability allows for the remote analysis of the camera feed via the Internet. Such a system provides users with enhanced security and peace of mind when they are away from home or when they leave vulnerable family members alone. In the case of authorization, the system does not notify the owner, which is a vulnerability that may cause harmful situations.

    Upadrista et al. [10] addressed healthcare data security and privacy challenges, where health information is critical and requires fail-safe methods against unauthorized access, leakage, and manipulation. They proposed a remote health monitoring (RHM) solution using blockchain technology that allows immutability, decentralization, and transparency to address data security and privacy challenges. In summary, they provided a comprehensive review of related works on blockchain for RHM, focusing on privacy, security, reliability, and latency.

    Shreya et al. [24] made use of the Internet of Medical Things and cloud computing to replace the old medical system, making healthcare easier, customized, and more efficient. They employed medical sensors to capture the health information transmitted to a remote server via a cloud-based solution for processing or diagnostic purposes. They outlined different types of threats that affect the integrity, confidentiality, and privacy of health data. Consequently, the data are shared between stakeholders in an encrypted format, resulting in a reduction in the consumed energy (79.19%), communication costs (15.62%), and execution time (80.03%) compared with the existing methods.

    Sangeethalakshmi et al. [25] proposed an IoT-based real-time health monitoring system to overcome the limitations of traditional medical treatments. A mobile application and GSM were combined in the proposed system to provide hospitalized or at-home patients with a dependable patient management system. They used sensors to regularly collect vital parameters (temperature, heartbeat rate, echocardiogram [ECG] readings, blood pressure, and SPO2), which are sent to the cloud via a WiFi module. The system consists of sensors, a data acquisition unit, a microcontroller (ESP32), and software and provides real-time online health information monitoring. They assigned a threshold to each parameter once a message was sent to the doctor.

    Kekre and Gawre [5] provided a solution for monitoring and maintaining solar photovoltaics. As the cost of renewable energy equipment has decreased, the number of solar photovoltaic installations has increased significantly. Many of these installations serve as auxiliary power sources and are in diverse and, at times, inaccessible areas ranging from rooftops to remote desert locations. To address the need for efficient monitoring, they proposed an inexpensive IoT-based embedded solar photovoltaic monitoring system. The system utilizes a general packet radio service (GPRS) module and an affordable microcontroller to collect data from the production end and transmit them over the Internet. This real-time information can be accessed globally, aiding maintenance, fault detection, and data recording at regular intervals.

    Xie et al. [26] discussed the challenges related to scalability, interoperability, and privacy. They also highlighted the potential benefits of integrating edge computing into systems. Consequently, they introduced a conceptual architecture that combined IoT principles with smart grid functionalities. This framework aims to predict and prevent potential threats to the grid. The system employs an electronic fence mechanism to detect unauthorized access or abnormal behavior within the grid. Real-time video monitoring enhances situational awareness and helps identify security breaches. Ultrawideband technology contributes to precise location tracking and rapid response during emergencies. By leveraging IoT, the system anticipates and mitigates malicious activities and safeguards critical infrastructure.

    Albataineh et al. [27] proposed a hybrid solution that leveraged both cloud and edge computing for data processing. Edge computing processes smart grid information at the edge of the IoT network, where microgrids are located. The authors introduced a machine learning engine that employs decision trees to facilitate communication among the edge layer, failure mechanisms, and cloud layer. By combining edge and cloud computing, this novel smart home control system aims to enhance efficiency, reliability, and overall performance. The authors addressed the challenges of existing power grids facing outages, unpredictable power disturbances, inflexible energy rates, and customer fraud. These issues have contributed to the rising fossil fuel demand and service costs. This approach minimizes latency and storage compared with centralizing all processing in the cloud.

    Sreenivasu et al. [8] proposed an innovative cloud-based electric vehicle (EV) temperature monitoring system by leveraging the power of artificial intelligence (AI) and IoT. The sensors were integrated into the system interfaces by embedding them in the EV battery. These sensors continuously collect data on critical parameters, such as voltage, current, and temperature. The collected data are transmitted to the cloud via the IoT network. This real-time flow of information enables remote monitoring and analysis. Users can access the performance data of the battery through a mobile application connected to the cloud. This interface provides insights into the state of charge and overall health of the battery. The cloud-based system employs AI algorithms to analyze historical data, predict potential issues, and recommend preventive measures. This proactive approach enhances battery management and reduces the risk of unexpected failures.

    Nasraoui et al. [28] investigated authenticated key agreements as a crucial part of providing end-to-end security solutions for WSNs using LoRa connectivity. As the applications of WSNs and IoT continue to expand, ensuring security has become paramount. However, owing to the limited resources of the connected nodes, new challenges arise. The researchers provided a primer that covers the general security aspects of WSNs and IoT at different levels. This foundational understanding sets the stage for the proposed lightweight key exchange method. We focused on implementing lightweight key agreement methods based on a standardized Internet Key Exchange protocol. These methods aim to establish secure communication channels while minimizing the computational overhead. The method was experimentally evaluated, and communication costs in terms of power consumption and memory usage were considered in the assessment. Realistic scenarios were used to demonstrate the practical implications of these lightweight approaches.

    Sangeethalakshmi et al. [29] investigated the security aspects of WSNs in the context of environmental monitoring systems. They emphasized that any security mechanism within a WSN becomes ineffective if an attacker gains access to the firmware of the sensor device. This study revealed that the bootstrap loader (BSL) password for the MSP430 microcontroller unit (MCU) is insecure. The attacker successfully obtains WSN cryptographic keys by reversing the firmware. In a few days, the BSL password can be cracked. The researchers introduced a two-factor authentication using the capabilities of the MSP430 MCU by adding an additional layer of security. A solution was proposed to enhance the security of the firmware of MSP430 processors. The Secure-BSL application generates random BSL passwords to ensure robustness against brute-force attacks.

    Nguyen-Tan et al. [30] proposed an autonomous irrigation solution that combines historical soil moisture data stored in a database with real-time weather forecasts. Two deep-learning models based on the transformer architecture were employed to predict weather conditions and soil moisture levels. Surprisingly, despite having fewer training variables than the long short-term memory model, the transformer model achieved comparable accuracy (91.41% for weather forecasts and 82.06% for soil moisture forecasts). However, being an IoT system, security concerns in smart agricultural solutions must be addressed. To safeguard against eavesdropping, control command spoofing, and poisoned machine learning models, the researchers have proposed end-to-end encryption and authentication approaches. This solution employs AES 256-bit encryption, HMAC, and the CRYSTALS-Kyber key exchange technique, even in the quantum age. The evaluation results demonstrated that the proposed security measures can be effectively deployed in IoT devices such as Arduino, STM32, and Raspberry Pi 4. We contribute to sustainable and efficient agricultural practices by combining intelligent irrigation and robust security.

    An end device is a wireless device responsible for detecting events in its environment and transmitting them to the sink node. The end device receives the data from the sensors, processes it, and sends it to the sink node when there is a danger. To perform these tasks efficiently, the end device should be equipped with a microcontroller with specific features [31]. In this context, a low-power and fast microcontroller is required to execute complex computational instructions without ignoring the power constraints, as shown in Figure 2.

    Figure 2.  Schematic of the platform's processes, including event sensing, data communication, and remote monitoring.

    Many types of microcontrollers with different features and capabilities have been proposed. In the proposed platform, we used ATmega328P, which was integrated into the Arduino Uno board. For the data communication protocol, the ZigBee XBee module was chosen, which includes the XBee-S2C gateway, as shown in Figure 2.

    The XBee USB Adapter Board is sold as a partially assembled kit and provides a cost-effective solution to interfacing a PC or microcontroller to any XBee or XBee Pro module. A PC connection can be used to configure the XBee module using Digi's X-CTU software. This module works with XBee Series 1, 2, and Pro modules.

    Using this adapter board, an easy interface can be provided to the XBee or XBee Pro modules. The adapter board also provides a means of connecting pluggable wires, solder connections, and mounting holes, as shown in Figure 3.

    Figure 3.  Interfaces and interconnectivity of Arduino Uno and the XBee module using the XBee adapter.

    ● Advantages:

    o Provides easy pluggable wire or solder connections

    o Provides an easy interface for configuring XBee modules using Digi's X-CTU software.

    o No shield is required (decreases the cost).

    ● Disadvantages:

    o To set up GPIOs, a serial software library must be downloaded.

    o Requires coding expertise.

    From the two previously suggested approaches (XBee shield and XBee adapter), we used the XBee adapter to configure (XBee s2c) and establish communication between the two XBees. The XBee shield used to configure the (XBee s2c) on top of the Arduino is shown in Figure 4, and the real experimental testbed is shown in Figure 5.

    Figure 4.  Schematic of the experimental testbed developed for event sensing and communication.
    Figure 5.  Real testbed implementation for practical experiments.

    Arduino is an open-source electronic platform based on easy-to-use hardware and software. Arduino boards can read inputs—light on a sensor and a finger on a button—and convert them into an output. To program it, the Arduino integrated development environment (IDE) or Arduino software must be used, which contains a text editor for writing a code, a message area, a text console, a toolbar with buttons for common functions, and a series of menus. It connects to the Arduino hardware to upload and communicate with programs.

    Initially, we visited (https://www.arduino.cc/en/software) and downloaded the most recent version of the Arduino IDE. Subsequently, the driver was downloaded. However, if the driver is not downloaded for some reason, it must be manually downloaded to post the code onto the platform.

    Libraries for XBee, Software Serial, DHT, and MQ2 sensors were downloaded. The IDE's Sketch > Include Library > Manage Libraries menu will allow the individuals to download the software.

    The XBee module was configured using the XCTU software. It was developed by DIGI and is available at (https://www.digi.com/products/embedded-systems/digi-xbee/digi-xbee-tools/xctu). The first step consisted of starting the XCTU software and connecting the XBee module using a USB adapter, as shown in Figure 6. Once XBee is connected to the PC, the command (Ctrl + Shift + D) allows the module to be located at the XCTU graphical interface, as shown in Figure 7. Once detected, the XBee module is set up to enable effective communication. The XBee module is configured at least once. The IDs of the source and destination should be reversed. As discussed earlier, the XBee module was disconnected from the USB adapter and connected to the XBee shield on top of the Arduino Uno. Next, the two XBee modules were configured, as shown in Figure 8.

    Figure 6.  XBee configuration using XCTU and attached with the USB adapter.
    Figure 7.  Discovering the XBee module using XCTU software through the USB adapter.
    Figure 8.  XCTU graphical interface for XBee connectivity and configuration.

    Our primary objective of this study was to create a sensor-based monitoring system for smart homes. We constructed a WSN using the ZigBee protocol. Additionally, we used the Global System for Mobile Communication (GSM) to enable Arduino to send an SMS message to the phone. The user should be able to receive specific data from the WSN through the GSM when it detects an incident. The sensors controlled by the Arduino first read the data. The processed data that detect an event send a message through the XBee module via the ZigBee protocol. The sink node then receives the data and automatically sends them to the user through the GSM.

    Power consumption is a crucial consideration when working with IoT-based hardware platforms, which include various types of sensing devices. Various board components, including processors, sensors, and communication modules, consume power. Identifying the factors that affect the power consumption of IoT devices, as well as the Arduino Uno platform, can help make adequate decisions regarding hardware and software configurations. By utilizing low-power sensors and efficient coding practices, energy usage can be minimized, potentially extending the battery life. To investigate strategies for reducing power consumption and demonstrate how to measure the power usage of Arduino Uno, it is necessary to explore various components of Arduino Uno and the sensors that consume power.

    The test results of power usage were measured using two variables: 1) variation in the sensing duty cycle (i.e., the time interval between two consecutive sensors) and 2) variation in the number of operating sensors. Arduino Uno was used to collect information regarding the amount of electric energy consumed according to the configuration of the hardware platform for several experiments. Specifically, the ACS612 sensor was powered by a 9-V battery as a unique source of energy. Using N sensors, first, the power usage PN was measured based on the current and voltage levels using Eq (1). Notably, the voltage was considered constant during the experiment. The energy dissipated by these sensors considers the sensing duty cycle and is calculated using Eq (2).

    P=V×I (1)
    E=P×t (2)

    In this experiment, only one sensor was involved in event sensing, with a sensing time cycle of 2 s. Figure 9 shows a small reduction in the remaining energy in the battery because only one sensing device was in operation. The red curve represents the average variation in the remaining energy. Table 1 lists certain consecutive values of power, voltage, and consumed energy collected from the hardware platform within the experimental period. In this experiment, measurements were performed every 2 s.

    Figure 9.  Battery's remaining energy for one operating sensor with a sensing cycle of 2 s.
    Table 1.  Collected values of power, voltage level, and consumed energy in experiment 1.
    Sec Power V CH1 Energy Time
    2 1.44 9 0.16 2.88 22:00:12.16
    2 1, 44 9 0.16 2.88 22:00:09.69
    2 1.53 9 0.17 3.06 22:00:07.22
    2 1.53 9 0.17 3.06 22:00:04.75
    2 1.53 9 0.17 3.06 22:00:02.28
    2 1.53 9 0.17 3.06 21:59:59.81
    2 1.53 9 0.17 3.06 21:59:57.33
    2 1.53 9 0.17 3.06 21:59:54.86
    2 1.44 9 0.16 2.88 21:59:52.40
    2 1.53 9 0.17 3.06 21:59:49.92
    2 1.53 9 0.17 3.06 21:59:47.45
    2 1.53 9 0.17 3.06 21:59:44.99
    2 1.44 9 0.16 2.88 21:59:42.52

     | Show Table
    DownLoad: CSV

    In this experiment, the number of sensors was increased to three, and the sensing time cycle was maintained at 2 s. The range of energy dissipated during this experiment was estimated to be twice that in experiment 1. Figure 10 shows the energy variations in experiment 2 and are presented in Table 2. For experiment 2, the same process as described in experiment 1 was followed.

    Figure 10.  Battery's remaining energy for three operating sensors with a sensing cycle of 2 s.
    Table 2.  Collected values of power, voltage level, and consumed energy in experiment 2.
    Sec V CH1 Power Energy Time
    2 9 0.17 1.53 3.06 19:05:33.62
    2 9 0.17 1.53 3.06 19:05:31.16
    2 9 0.17 1.53 3.06 19:05:28.70
    2 9 0.18 1.62 3.24 19:05:26.23
    2 9 0.18 1.62 3.24 19:05:23.76
    2 9 0.17 1.53 3.06 19:05:21.28
    2 9 0.18 1.62 3.24 19:05:18.81
    2 9 0.18 1.62 3.24 19:05:16.33
    2 9 0.18 1.62 3.24 19:05:13.86
    2 9 0.18 1.62 3.24 19:05:11.39
    2 9 0.18 1.62 3.24 19:05:08.93
    2 9 0.18 1.62 3.24 19:05:06.46
    2 9 0.18 1.62 3.24 19:05:03.99

     | Show Table
    DownLoad: CSV

    Three other experiments were performed to obtain more descriptive results regarding energy consumption. In experiment 3, six sensors were operated with a sensing time cycle of 2 s, as shown in Figure 11; the exact values are listed in Table 3. Experiment 4 included six sensors configured for sensing every 30 s, as shown in Figure 12; the exact values are listed in Table 4. Finally, in experiment 5, six sensors were operated with a sensing time cycle of 60 s, as shown in Figure 13; the exact values are listed in Table 5. In these experiments, the sensing time cycle was increased to optimize energy consumption without ignoring the events occurring in the smart home. At this level, a major compromise was observed between energy optimization and event detection. In other words, it is useful to increase the time cycle without exceeding a certain threshold to avoid the non-detection of events or delayed detection.

    Figure 11.  Battery's remaining energy for six operating sensors with a sensing cycle of 2 s.
    Table 3.  Collected values of power, voltage level, and consumed energy in experiment 3.
    Sec Power V CH1 Energy Time
    2 1.44 9 0.16 2.88 22:00:12.16
    2 1.44 9 0.16 2.88 22:00:09.69
    2 1.53 9 0.17 3.06 22:00:07.22
    2 1.53 9 0.17 3.06 22:00:04.75
    2 1.53 9 0.17 3.06 22:00:02.28
    2 1.53 9 0.17 3.06 21:59:59.81
    2 1.53 9 0.17 3.06 21:59:57.33
    2 1.53 9 0.17 3.06 21:59:54.86
    2 1.44 9 0.16 2.88 21:59:52.40
    2 1.53 9 0.17 3.06 21:59:49.92
    2 1.53 9 0.17 3.06 21:59:47.45
    2 1.53 9 0.17 3.06 21:59:44.99
    2 1.44 9 0.16 2.88 21:59:42.52

     | Show Table
    DownLoad: CSV
    Figure 12.  Battery's remaining energy for six operating sensors with a sensing cycle of 30 s.
    Table 4.  Collected values of power, voltage level, and consumed energy in experiment 4.
    Sec Power V CH1 Energy Time
    30 2.52 9 0.28 75.6 20:09:13.73
    30 2.52 9 0.28 75.6 20:08:43.25
    30 2.52 9 0.28 75.6 20:08:12.78
    30 2.52 9 0.28 75.6 20:07:42.31
    30 2.61 9 0.29 78.3 20:07:11.83
    30 2.52 9 0.28 75.6 20:06:41.35
    30 2.61 9 0.29 78.3 20:06:10.86
    30 2.61 9 0.29 78.3 20:05:40.40
    30 2.61 9 0.29 78.3 20:05:09.91
    30 2.7 9 0.3 81 20:04:39.45
    30 2.61 9 0.29 78.3 20:04:08.97
    30 2.79 9 0.31 83.7 20:03:38.50
    30 2.88 9 0.32 86.4 20:03:08.02

     | Show Table
    DownLoad: CSV
    Figure 13.  Battery's remaining energy for six operating sensors with a sensing cycle of 60 s.
    Table 5.  Collected values of power, voltage level, and consumed energy in experiment 5.
    Sec Power V CH1 Energy Time
    60 0.72 9 0.08 43.2 22:30:36.30
    60 0.81 9 0.09 48.6 22:29:35.83
    60 0.99 9 0.11 59.4 22:28:35.36
    60 0.99 9 0.11 59.4 22:27:34.88
    60 1.08 9 0.12 64.8 22:26:34.41
    60 1.26 9 0.14 75.6 22:24:33.47
    60 1.26 9 0.14 75.6 22:23:32.98
    60 1.35 9 0.15 81 22:22:32.52
    60 1.35 9 0.15 81 22:21:32.05
    60 1.35 9 0.15 81 22:20:31.57
    60 1.44 9 0.16 86.4 22:19:31.10

     | Show Table
    DownLoad: CSV

    An average power consumption chart was used to visualize the amount of power consumed by the device over a specific period. By plotting the power consumption data in a chart, it becomes easier to identify patterns and trends in energy usage that can influence the design and optimization of devices. This can be particularly useful when working with battery-powered devices, where power consumption is a critical factor. Understanding the power consumption of a device over time also helps identify components that use more power than necessary, potentially leading to more efficient and sustainable designs.

    Furthermore, measuring and monitoring power consumption can provide valuable insights into the performance of the device and help make informed decisions regarding future design choices. With these considerations, Figure 14 shows that energy consumption is inversely proportional to the sensing time cycle. Because the time cycle is long, the energy consumed is reduced. The reduction in energy did not obey a linear function; experiment 5 involved considerable optimization than experiment 4, with experiment 3 as a reference. Therefore, to develop energy-efficient and sustainable projects, the sensing time cycle can be increased to an optimal point where the consumed energy is minimal and almost all the events are detected.

    Figure 14.  Power consumption in the sensing platform in different scenarios (Nb sensors; sensing cycle).

    The sensor readings were obtained and whether the code had been successfully uploaded to the platform was determined. In this simple demonstration, we employed only DHT and MQ2 sensors. Although the MQ2 sensor was responsible for determining the liquefied petroleum gas (LPG), smoke, and methane gas, the DHT sensor was used to determine the temperature and humidity. The humidity unit was expressed as a percentage, with 100% denoting the highest possible humidity. The temperature was displayed in Celsius, as shown in Figure 15. The DHT and MQ2 readings were viewed on a serial monitor in Arduino IDE; these readings include the room temperature (T), humidity (H), LPG, and smoke. The sensor readings were sent to the sink node using the XBee module.

    Figure 15.  Humidity, temperature, and light intensity readings displayed on the Arduino IDE serial monitor.

    The Zigbee protocol is a wireless networking protocol widely used in IoT because of its low power consumption, robustness, and simplicity. With ZigBee, devices can communicate wirelessly, thereby providing a flexible and scalable solution for various IoT applications. In this section, we tested the wireless communication link between two Arduinos using the Zigbee protocol. Specifically, we used the Xbee module to enable wireless connectivity between the devices, as shown in Figure 16.

    Figure 16.  Arduino IDE interface for network establishment.

    The sensor readings were sent to the IP gateway using the XBee module over a secure channel. Communication with the gateway can be established manually or automatically using a secure HTTP protocol. The manual configuration uses MAC addresses for IP communication because the XBee module does not integrate the IP layer. Communication considers the creation of a frame using XCTU software. To achieve this, the XBee module must be connected to the IP gateway, which is considered as the coordinator in the "network working mode." Switching to the console mode was then achieved using (Ctrl + C) in XCTU (Figure 17). Next, a connection was opened and a frame (frame_0) was created. The three major attributes of the manual configuration are: Frame type, destination, and content. "Transmit Request" represents the type of the frame. The IP-gateway MAC address was provided through a 64-bit destination identifier. The message content to be transmitted was indicated by the "RF data" using ASCII or HEX formats. Because the data were received at base 64, a decoding step was required to make the received message readable by humans. The manual configuration was used only for debugging purposes.

    Figure 17.  Creating a frame in XCTU.

    In this study, we proposed a method to provide remote monitoring services using an Internet server that allows the supervision of smart home events from any location in the world and at any time. This solution results in continuously showing sensor readings using an application-based end system. This result allows establishing a comparison with the input readings and a system efficiency analysis. Any sensing metric provides the user with three levels: green as normal with no reaction, yellow as the average level requiring a follow-up, and red as the highest level requiring a serious action.

    Servers constitute an important component in accessing and managing IoT events in remote locations. The server-finding process should consider certain characteristics that are suitable for wireless sensor networks. To begin, we surveyed the features of many types of servers such as Amazon Web Services, Google Cloud, and Microsoft Azure. A comparative study of these services, as well as their capabilities, was conducted. Furthermore, a comparison with the local cloud servers of Saudi Arabia, such as STC Cloud and Sahara Net, was also conducted. Unfortunately, cloud services are unavailable to individuals in Saudi Arabia. Therefore, ThingSpeak was selected for use in the comparative study for several reasons: ThingSpeak is a free cloud platform used to monitor and visualize live data provided in both values and graphs, and it supports the MATLAB programming language, which simplifies graph analysis. In addition to ThingSpeak, the Blynk application was used as a server in the GSM device. Blynk supports both iOS and Android devices.

    After signing up with ThingSpeak, a certain number of channels must be created according to the list of metrics collected from the IoT sensors. In its free version, ThingSpeak offers up to eight fields for monitoring sensing events from the smart home. Therefore, the most significant environmental and other vital sign metrics were considered to create the channels (Figure 18).

    Figure 18.  ThingSpeak channel fields displaying the sensor data.

    Blynk allows readings collected from various home sensors to be monitored. It supports GSM, Wi-Fi, USB, and several other connection methods. In addition, Blynk operates on many microcontrollers and microcomputer platforms, such as Arduino, Raspberry Pi, and NodeMCU. In this study, Arduino constituted the first connectivity method, whereas GSM constituted the second way of connectivity. To communicate the readings to the server, the "API Key" and "Channel ID" represent the main parameters that successfully set up the secure connection [28,30]. The Arduino Uno was then configured with these parameters.

    Blynk supports three types of pins: Analog, digital, and virtual. In other words, the first type allows direct connection with the analog pin of the platform, whereas the second type enables a similar feature from the digital pin of the platform; however, the virtual type is needed for any variable metric in the code. As a result, the work requires the use of virtual pins, as Blynk provides more than 1000 virtual pins with no limitation on the GPIO pins of the platform.

    In this study, several concepts related to the IoT, remote monitoring, and their applications were studied, and the most recent approaches for remote monitoring were reviewed. We proposed a flexible architecture that includes real electronic components used for event detection, data communication, and information visualization and analysis. The major steps for building an IoT-based monitoring system (i.e., configuring the XBee module, IP gateway, GSM transmitter, and Arduino platform, including various sensors) were outlined. In addition, remote monitoring was incorporated through the inclusion of a server and its application to the entire architecture. Finally, we described the establishment of heterogeneous hardware and software connections to achieve the main objectives of remote monitoring. The 2-level secure channel was enabled based on the HTTPS and built-in API Key features of the Cloud. In conclusion, the obtained results justify the usefulness of the proposed method for various monitoring applications in smart cities, which include event sensing, secure data communication, information security, analysis, and visualization. Based on the collected values, the results demonstrate the efficiency of the proposed system in terms of power consumption and delivery ratio.

    In the future, the system is expected to be enhanced with an AI algorithm that detects sensed data anomalies at an advanced stage and manages them automatically in critical situations. In other words, the system will sense danger, apply AI to determine its type, and communicate with the competent government agencies to address the situation. In this manner, the confidentiality of the sensed information is ensured, and security risks can be addressed using sophisticated end-to-end security and privacy mechanisms supported during communication between individual partitions of the system.

    The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors extend their appreciation to the Deputyship for Research & Innovation, "Ministry of Education" in Saudi Arabia for funding this research work through the project number (IFKSUDR_D104).

    The authors declare that there are no conflicts of interest.



    [1] W. M. Elsässer, Induction effects in terrestrial magnetism part Ⅰ. Theory, Phys. Rev., 69 (1946), 106–116. https://doi.org/10.1103/PhysRev.69.106 doi: 10.1103/PhysRev.69.106
    [2] W. M. Elsässer, Induction effects in terrestrial magnetism part Ⅱ. The secular variation, Phys. Rev., 70 (1946), 202–212. https://doi.org/10.1103/PhysRev.70.202 doi: 10.1103/PhysRev.70.202
    [3] R. T. Merrill, M. W. McElhinny, P. L. McFadden, The Magnetic Field of the Earth: Paleomagnetism, the Core, and the Deep Mantle, Academic Press, 1998.
    [4] J. Y. Chemin, B. Desjardins, I. Gallagher, E. Grenier, Mathematical Geophysics: An Introduction to Rotating Fluids and the Navier-Stokes Equations, The Clarendon Press Oxford University Press, Oxford, 2006.
    [5] G. Duvaut, J. L. Lions, Inéquations en thermoélasticité et magnétohydrodynamique, Arch. Ration. Mech. Anal., 46 (1972), 241–279. https://doi.org/10.1007/BF00250512 doi: 10.1007/BF00250512
    [6] X. Zhai, Y. Li, W. Yan, Global well-posedness for the 3-D incompressible MHD equations in the critical Besov spaces, Commun. Pure Appl. Anal., 14 (2015), 1865–1884. https://doi.org/10.3934/cpaa.2015.14.1865 doi: 10.3934/cpaa.2015.14.1865
    [7] J. Chemin, D. McCormick, J. Robinson, J. Rodrigo, Local existence for the nonresistive MHD equations in Besov spaces, Adv. Math., 286 (2016), 1–31. https://doi.org/10.1016/j.aim.2015.09.004 doi: 10.1016/j.aim.2015.09.004
    [8] C. Fefferman, D. McCormick, J. Robinson, J. Rodrigo, Higher order commutator estimates and local existence for the non-resistive MHD equations and related models, J. Funct. Anal., 267 (2014), 1035–1056. https://doi.org/10.1016/j.jfa.2014.03.021 doi: 10.1016/j.jfa.2014.03.021
    [9] Q. Liu, J. Zhao, Global well-posedness for the generalized magneto-hydrodynamic equations in the critical Fourier-Herz spaces, J. Math. Anal. Appl., 420 (2014), 1301–1315. https://doi.org/10.1016/j.jmaa.2014.06.031 doi: 10.1016/j.jmaa.2014.06.031
    [10] X. Zhai, Stability for the 2D incompressible MHD equations with only magnetic diffusion, J. Differ. Equations, 374 (2023), 267–278. https://doi.org/https://doi.org/10.1016/j.jde.2023.07.033 doi: 10.1016/j.jde.2023.07.033
    [11] J. Y. Chemin, B. Desjardin, I. Gallagher, E. Grenier, Anisotropy and dispersion in rotating fluids, Stud. Math. Appl., 31 (2002), 171–192. https://doi.org/10.1016/S0168-2024(02)80010-8 doi: 10.1016/S0168-2024(02)80010-8
    [12] T. Iwabuchi, R. Takada, Global solutions for the Navier-Stokes equations in the rotational framework, Math. Ann., 357 (2013), 727–741. https://doi.org/10.1007/s00208-013-0923-4 doi: 10.1007/s00208-013-0923-4
    [13] Y. Koh, S. Lee, R. Takada, Dispersive estimates for the Navier-Stokes equations in the rotational framework, Adv. Differ. Equations, 19 (2014), 857–878. https://doi.org/10.57262/ade/1404230126 doi: 10.57262/ade/1404230126
    [14] J. Sun, M. Yang, S. Cui, Existence and analyticity of mild solutions for the 3D rotating Navier-Stokes equations, Ann. Mat. Pura Appl., 196 (2017), 1203–1229. https://doi.org/10.1007/s10231-016-0613-4 doi: 10.1007/s10231-016-0613-4
    [15] Y. Giga, K. Inui, A. Mahalov, J. Saal, Uniform global solvability of the rotating Navier-Stokes equations for nondecaying initial data, Indiana Univ. Math. J., 57 (2008), 2775–2791. https://doi.org/10.1512/iumj.2008.57.3795 doi: 10.1512/iumj.2008.57.3795
    [16] M. Hieber, Y. Shibata, The Fujita-Kato approach to the Navier-Stokes equations in the rotational framework, Math. Z., 265 (2010), 481–491. https://doi.org/10.1007/s00209-009-0525-8 doi: 10.1007/s00209-009-0525-8
    [17] T. Iwabuchi, R. Takada, Global well-posedness and ill-posedness for the Navier-Stokes equations with the Coriolis force in function spaces of Besov type, J. Funct. Anal., 267 (2014), 1321–1337. https://doi.org/10.1016/j.jfa.2014.05.022 doi: 10.1016/j.jfa.2014.05.022
    [18] P. Konieczny, T. Yoneda, On dispersive effect of the Coriolis force for the stationary Navier-Stokes equations, J. Differ. Equations, 250 (2011), 3859–3873. https://doi.org/10.1016/j.jde.2011.01.003 doi: 10.1016/j.jde.2011.01.003
    [19] F. Charve, Global well-posedness and asymptotics for a geophysical fluid system, Commun. Partial Differ. Equations, 29 (2004), 1919–1940. https://doi.org/10.1081/PDE-200043510 doi: 10.1081/PDE-200043510
    [20] J. Sun, S. Cui, Sharp well-posedness and ill-posedness of the three-dimensional primitive equations of geophysics in Fourier-Besov spaces, Nonlinear Anal. Real World Appl., 48 (2019), 445–465. https://doi.org/10.1016/j.nonrwa.2019.02.003 doi: 10.1016/j.nonrwa.2019.02.003
    [21] J. Sun, C. Liu, M. Yang, Global solutions to 3D rotating Boussinesq equations in Besov spaces, J. Dyn. Differ. Equations, 32 (2020), 589–603. https://doi.org/10.1007/s10884-019-09747-0 doi: 10.1007/s10884-019-09747-0
    [22] J. Sun, C. Liu, M. Yang, Global existence for three-dimensional time-fractional Boussinesq-Coriolis equations, Fract. Calc. Appl. Anal., 27 (2024), 1759–1778. https://doi.org/10.1007/s13540-024-00272-6 doi: 10.1007/s13540-024-00272-6
    [23] J. Sun, M. Yang, Global well-posedness for the viscous primitive equations of geophysics, Boundary Value Probl., 21 (2016), 16. https://doi.org/10.1186/s13661-016-0526-6 doi: 10.1186/s13661-016-0526-6
    [24] V. S. Ngo, A global existence result for the anisotropic rotating magnetohydrodynamical systems, Acta Appl. Math., 150 (2017), 1–42. https://doi.org/10.1007/s10440-016-0092-z doi: 10.1007/s10440-016-0092-z
    [25] J. Ahn, J. Kim, J. Lee, Global solutions to 3D incompressible rotational MHD system, J. Evol. Equations, 21 (2021), 235–246. https://doi.org/10.1007/s00028-020-00576-z doi: 10.1007/s00028-020-00576-z
    [26] J. Kim, Rotational effect on the asymptotic stability of the MHD system, J. Differ. Equations, 319 (2022), 288–311. https://doi.org/10.1016/j.jde.2022.02.033 doi: 10.1016/j.jde.2022.02.033
    [27] C. Foias, R. Temam, Gevrey class regularity for the solutions of the Navier-Stokes equations, J. Funct. Anal., 87 (1989), 359–369. https://doi.org/10.1016/0022-1236(89)90015-3 doi: 10.1016/0022-1236(89)90015-3
    [28] H. Bae, A. Biswas, E. Tadmor, Analyticity and decay estimates of the Navier-Stokes equations in critical Besov spaces, Arch. Ration. Mech. Anal., 205 (2012), 963–991. https://doi.org/10.1007/s00205-012-0532-5 doi: 10.1007/s00205-012-0532-5
    [29] M. Oliver, E. S. Titi, Remark on the rate of decay of higher order derivatives for solutions to the Navier-Stokes equations in Rn, J. Funct. Anal., 172 (2000), 1–18. https://doi.org/10.1006/jfan.1999.3550 doi: 10.1006/jfan.1999.3550
    [30] J. Y. Chemin, N. Lerner, Flow of non-Lipschitz vector fields and Navier-Stokes equations(French), J. Differ. Equations, 121 (1995), 314–328. https://doi.org/10.1006/jdeq.1995.1131 doi: 10.1006/jdeq.1995.1131
    [31] H. Bahouri, J. Y. Chemin, R. Danchin, Fourier Analysis and Nonlinear Partial Differential Equations, Springer-Verlag, Berlin, Heidelberg, 2011. https://doi.org/10.1007/978-3-642-16830-7
    [32] H. Abidi, M. Paicu, Existence globale pour un fluide inhomogéne (French), Ann. Inst. Fourier, 57 (2007), 883–917. https://doi.org/10.5802/aif.2280 doi: 10.5802/aif.2280
    [33] H. Kozono, T. Ogawa, Y. Taniuchi, Navier-Stokes equations in the Besov space near L1 and BMO, Kyushu J. Math., 57 (2003), 303–324. https://doi.org/10.2206/kyushujm.57.303 doi: 10.2206/kyushujm.57.303
    [34] R. Strichartz, Restriction of Fourier transform to quadratic surfaces and decay of solutions to the wave equation, Duke Math. J., 44 (1977), 705–714. https://doi.org/10.1215/S0012-7094-77-04430-1 doi: 10.1215/S0012-7094-77-04430-1
    [35] P. A Tomas, A restriction theorem for the Fourier transform, Bull. Am. Math. Soc., 81 (1975), 477–478. https://doi.org/10.1090/S0002-9904-1975-13790-6 doi: 10.1090/S0002-9904-1975-13790-6
  • This article has been cited by:

    1. Eduardo Hernandez, Shashank Pandey, Dwijendra N. Pandey, Abstract integro‐differential equations with state‐dependent integration intervals: Existence, uniqueness, and local well‐posedness, 2024, 0025-584X, 10.1002/mana.202400126
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(557) PDF downloads(44) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog