In recent years, the growing pervasiveness of wearable technology has created new opportunities for medical and emergency rescue operations to protect users' health and safety, such as cost-effective medical solutions, more convenient healthcare and quick hospital treatments, which make it easier for the Internet of Medical Things (IoMT) to evolve. The study first presents an overview of the IoMT before introducing the IoMT architecture. Later, it portrays an overview of the core technologies of the IoMT, including cloud computing, big data and artificial intelligence, and it elucidates their utilization within the healthcare system. Further, several emerging challenges, such as cost-effectiveness, security, privacy, accuracy and power consumption, are discussed, and potential solutions for these challenges are also suggested.
Citation: Qinwang Niu, Haoyue Li, Yu Liu, Zhibo Qin, Li-bo Zhang, Junxin Chen, Zhihan Lyu. Toward the Internet of Medical Things: Architecture, trends and challenges[J]. Mathematical Biosciences and Engineering, 2024, 21(1): 650-678. doi: 10.3934/mbe.2024028
[1] | Shishi Wang, Yuting Ding, Hongfan Lu, Silin Gong . Stability and bifurcation analysis of SIQR for the COVID-19 epidemic model with time delay. Mathematical Biosciences and Engineering, 2021, 18(5): 5505-5524. doi: 10.3934/mbe.2021278 |
[2] | Hongfan Lu, Yuting Ding, Silin Gong, Shishi Wang . Mathematical modeling and dynamic analysis of SIQR model with delay for pandemic COVID-19. Mathematical Biosciences and Engineering, 2021, 18(4): 3197-3214. doi: 10.3934/mbe.2021159 |
[3] | Sarita Bugalia, Jai Prakash Tripathi, Hao Wang . Mathematical modeling of intervention and low medical resource availability with delays: Applications to COVID-19 outbreaks in Spain and Italy. Mathematical Biosciences and Engineering, 2021, 18(5): 5865-5920. doi: 10.3934/mbe.2021295 |
[4] | Honghua Bin, Daifeng Duan, Junjie Wei . Bifurcation analysis of a reaction-diffusion-advection predator-prey system with delay. Mathematical Biosciences and Engineering, 2023, 20(7): 12194-12210. doi: 10.3934/mbe.2023543 |
[5] | Yuting Ding, Gaoyang Liu, Yong An . Stability and bifurcation analysis of a tumor-immune system with two delays and diffusion. Mathematical Biosciences and Engineering, 2022, 19(2): 1154-1173. doi: 10.3934/mbe.2022053 |
[6] | Fang Liu, Yanfei Du . Spatiotemporal dynamics of a diffusive predator-prey model with delay and Allee effect in predator. Mathematical Biosciences and Engineering, 2023, 20(11): 19372-19400. doi: 10.3934/mbe.2023857 |
[7] | Xin-You Meng, Yu-Qian Wu . Bifurcation analysis in a singular Beddington-DeAngelis predator-prey model with two delays and nonlinear predator harvesting. Mathematical Biosciences and Engineering, 2019, 16(4): 2668-2696. doi: 10.3934/mbe.2019133 |
[8] | Jinhu Xu, Yicang Zhou . Bifurcation analysis of HIV-1 infection model with cell-to-cell transmission and immune response delay. Mathematical Biosciences and Engineering, 2016, 13(2): 343-367. doi: 10.3934/mbe.2015006 |
[9] | Xinyu Liu, Zimeng Lv, Yuting Ding . Mathematical modeling and stability analysis of the time-delayed SAIM model for COVID-19 vaccination and media coverage. Mathematical Biosciences and Engineering, 2022, 19(6): 6296-6316. doi: 10.3934/mbe.2022294 |
[10] | Zuolin Shen, Junjie Wei . Hopf bifurcation analysis in a diffusive predator-prey system with delay and surplus killing effect. Mathematical Biosciences and Engineering, 2018, 15(3): 693-715. doi: 10.3934/mbe.2018031 |
In recent years, the growing pervasiveness of wearable technology has created new opportunities for medical and emergency rescue operations to protect users' health and safety, such as cost-effective medical solutions, more convenient healthcare and quick hospital treatments, which make it easier for the Internet of Medical Things (IoMT) to evolve. The study first presents an overview of the IoMT before introducing the IoMT architecture. Later, it portrays an overview of the core technologies of the IoMT, including cloud computing, big data and artificial intelligence, and it elucidates their utilization within the healthcare system. Further, several emerging challenges, such as cost-effectiveness, security, privacy, accuracy and power consumption, are discussed, and potential solutions for these challenges are also suggested.
Consider with the following fourth-order elliptic Navier boundary problem
{Δ2u+cΔu=λa(x)|u|s−2u+f(x,u)inΩ,u=Δu=0on∂Ω, | (1.1) |
where Δ2:=Δ(Δ) denotes the biharmonic operator, Ω⊂RN(N≥4) is a smooth bounded domain, c<λ1 (λ1 is the first eigenvalue of −Δ in H10(Ω)) is a constant, 1<s<2,λ≥0 is a parameter, a∈L∞(Ω),a(x)≥0,a(x)≢0, and f∈C(ˉΩ×R,R). It is well known that some of these fourth order elliptic problems appear in different areas of applied mathematics and physics. In the pioneer paper Lazer and Mckenna [13], they modeled nonlinear oscillations for suspensions bridges. It is worth mentioning that problem (1.1) can describe static deflection of an elastic plate in a fluid, see [21,22]. The static form change of beam or the motion of rigid body can be described by the same problem. Equations of this type have received more and more attentions in recent years. For the case λ=0, we refer the reader to [3,7,11,14,16,17,20,23,27,29,34,35,36,37] and the reference therein. In these papers, existence and multiplicity of solutions have been concerned under some assumptions on the nonlinearity f. Most of them considered the case f(x,u)=b[(u+1)+−1] or f having asymptotically linear growth at infinity or f satisfying the famous Ambrosetti-Rabinowitz condition at infinity. Particularly, in the case λ≠0, that is, the combined nonlinearities for the fourth-order elliptic equations, Wei [33] obtained some existence and multiplicity by using the variational method. However, the author only considered the case that the nonlinearity f is asymptotically linear. When λ=1, Pu et al. [26] did some similar work. There are some latest works for problem (1.1), for example [10,18] and the reference therein. In this paper, we study problem (1.1) from two aspects. One is that we will obtain two multiplicity results when the nonlinearity f is superlinear at infinity and has the standard subcritical polynomial growth but not satisfy the Ambrosetti-Rabinowitz condition, the other is we can establish some existence results of multiple solutions when the nonlinearity f has the exponential growth but still not satisfy the Ambrosetti-Rabinowitz condition. In the first case, the standard methods for the verification of the compactness condition will fail, we will overcome it by using the functional analysis methods, i.e., Hahn-Banach Theorem combined the Resonance Theorem. In the last case, although the original version of the mountain pass theorem of Ambrosetti-Rabinowitz [1] is not directly applied for our purpose. Therefore, we will use a suitable version of mountain pass theorem and some new techniques to finish our goal.
When N>4, there have been substantial lots of works (such as [3,7,11,16,17,26,34,35,36,37]) to study the existence of nontrivial solutions or the existence of sign-changing for problem (1.1). Furthermore, almost all of the works involve the nonlinear term f(x,u) of a standard subcritical polynomial growth, say:
(SCP): There exist positive constants c1 and q∈(1,p∗−1) such that
|f(x,t)|≤c1(1+|t|q)for allt∈Randx∈Ω, |
where p∗=2NN−4 expresses the critical Sobolev exponent. In this case, people can deal with problem (1.1) variationally in the Sobolev space H2(Ω)∩H10(Ω) owing to the some critical point theory, such as, the method of invariant sets of descent flow, mountain pass theorem and symmetric mountain pass theorem. It is worth while to note that since Ambrosetti and Rabinowitz presented the mountain pass theorem in their pioneer paper [1], critical point theory has become one of the main tools on looking for solutions to elliptic equation with variational structure. One of the important condition used in many works is the so-called Ambrosetti-Rabinowitz condition:
(AR) There exist θ>2 and R>0 such that
0<θF(x,t)≤f(x,t)t,forx∈Ωand|t|≥R, |
where F(x,t)=∫t0f(x,s)ds. A simple computation explains that there exist c2,c3>0 such that F(x,t)≥c2|t|θ−c3 for all (x,t)∈ˉΩ×R and f is superlinear at infinity, i.e., limt→∞f(x,t)t=+∞ uniformly in x∈Ω. Thus problem (1.1) is called strict superquadratic if the nonlinearity f satisfies the (AR) condition. Notice that (AR) condition plays an important role in ensuring the boundedness of Palais-Smale sequences. However, there are many nonlinearities which are superlinear at infinity but do not satisfy above (AR) condition such as f(x,t)=tln(1+|t|2)+|sint|t.
In the recent years many authors tried to study problem (1.1) with λ=0 and the standard Laplacian problem where (AR) is not assumed. Instead, they regard the general superquadratic condition:
(WSQC) The following limit holds
lim|t|→+∞F(x,t)t2=+∞,uniformly forx∈Ω |
with additional assumptions (see [3,5,7,11,12,15,17,19,24,26,31,37] and the references therein). In the most of them, there are some kind of monotonicity restrictions on the functions F(x,t) or f(x,t)t, or some convex property for the function tf(x,t)−2F(x,t).
In the case N=4 and c=0, motivated by the Adams inequality, there are a few works devoted to study the existence of nontrivial solutions for problem (1.1) when the nonlinearity f has the exponential growth, for example [15] and the references therein.
Now, we begin to state our main results: Let μ1 be the first eigenvalue of (Δ2−cΔ,H2(Ω)∩H10(Ω)) and suppose that f(x,t) satisfies:
(H1) f(x,t)t≥0,∀(x,t)∈Ω×R;
(H2) limt→0f(x,t)t=f0 uniformly for a.e. x∈Ω, where f0∈[0,+∞);
(H3) limt→∞F(x,t)t2=+∞ uniformly for a.e. x∈Ω, where F(x,t)=∫t0f(x,s)ds.
In the case of N>4, our results are stated as follows:
Theorem 1.1. Assume that f has the standard subcritical polynomial growth on Ω (condition (SCP)) and satisfies (H1)–(H3). If f0<μ1 and a(x)≥a0 (a0 is a positive constant ), then there exists Λ∗>0 such that for λ∈(0,Λ∗), problem (1.1) has five solutions, two positive solutions, two negative solutions and one nontrivial solution.
Theorem 1.2. Assume that f has the standard subcritical polynomial growth on Ω (condition (SCP)) and satisfies (H2) and (H3). If f(x,t) is odd in t.
a) For every λ∈R, problem (1.1) has a sequence of solutions {uk} such that Iλ(uk)→∞,k→∞, definition of the functional Iλ will be seen in Section 2.
b) If f0<μ1, for every λ>0, problem (1.1) has a sequence of solutions {uk} such that Iλ(uk)<0 and Iλ(uk)→0,k→∞.
Remark. Since our the nonlinear term f(x,u) satisfies more weak condition (H3) compared with the classical condition (AR), our Theorem 1.2 completely contains Theorem 3.20 in [32].
In case of N=4, we have p∗=+∞. So it's necessary to introduce the definition of the subcritical exponential growth and critical exponential growth in this case. By the improved Adams inequality (see [28] and Lemma 2.2 in Section 2) for the fourth-order derivative, namely,
supu∈H2(Ω)∩H10(Ω),‖Δu‖2≤1∫Ωe32π2u2dx≤C|Ω|. |
So, we now define the subcritical exponential growth and critical exponential growth in this case as follows:
(SCE): f satisfies subcritical exponential growth on Ω, i.e., limt→∞|f(x,t)|exp(αt2)=0 uniformly on x∈Ω for all α>0.
(CG): f satisfies critical exponential growth on Ω, i.e., there exists α0>0 such that
limt→∞|f(x,t)|exp(αt2)=0,uniformly onx∈Ω,∀α>α0, |
and
limt→∞|f(x,t)|exp(αt2)=+∞,uniformly onx∈Ω,∀α<α0. |
When N=4 and f satisfies the subcritical exponential growth (SCE), our work is still to consider problem (1.1) where the nonlinearity f satisfies the (WSQC)-condition at infinity. As far as we know, this case is rarely studied by other people for problem (1.1) except for [24]. Hence, our results are new and our methods are technique since we successfully proved the compactness condition by using the Resonance Theorem combined Adams inequality and the truncated technique. In fact, the new idea derives from our work [25]. Our results are as follows:
Theorem 1.3. Assume that f satisfies the subcritical exponential growth on Ω (condition (SCE)) and satisfies (H1)–(H3). If f0<μ1 and a(x)≥a0 (a0 is a positive constant ), then there exists Λ∗>0 such that for λ∈(0,Λ∗), problem (1.1) has five solutions, two positive solutions, two negative solutions and one nontrivial solution.
Remark. Let F(x,t)=t2e√|t|,∀(x,t)∈Ω×R. Then it satisfies that our conditions (H1)–(H3) but not satisfy the condition (AR). It's worth noting that we do not impose any monotonicity condition on f(x,t)t or some convex property on tf(x,t)−2F(x,t). Hence, our Theorem 1.3 completely extends some results contained in [15,24] when λ=0 in problem (1.1).
Theorem 1.4. Assume that f satisfies the subcritical exponential growth on Ω (condition (SCE)) and satisfies (H2) and (H3). If f0<μ1 and f(x,t) is odd in t.
a) For λ>0 small enough, problem (1.1) has a sequence of solutions {uk} such that Iλ(uk)→∞,k→∞.
b) For every λ>0, problem (1.1) has a sequence of solutions {uk} such that Iλ(uk)<0 and Iλ(uk)→0,k→∞.
When N=4 and f satisfies the critical exponential growth (CG), the study of problem (1.1) becomes more complicated than in the case of subcritical exponential growth. Similar to the case of the critical polynomial growth in RN(N≥3) for the standard Laplacian studied by Brezis and Nirenberg in their pioneering work [4], our Euler-Lagrange functional does not satisfy the Palais-Smale condition at all level anymore. For the class standard Laplacian problem, the authors [8] used the extremal function sequences related to Moser-Trudinger inequality to complete the verification of compactness of Euler-Lagrange functional at some suitable level. Here, we still adapt the method of choosing the testing functions to study problem (1.1) without (AR) condition. Our result is as follows:
Theorem 1.5. Assume that f has the critical exponential growth on Ω (condition (CG)) and satisfies (H1)–(H3). Furthermore, assume that
(H4) limt→∞f(x,t)exp(−α0t2)t≥β>64α0r40, uniformly in (x,t), where r0 is the inner radius of Ω, i.e., r0:= radius of the largest open ball ⊂Ω. and
(H5) f is in the class (H0), i.e., for any {un} in H2(Ω)∩H10(Ω), if un⇀0 in H2(Ω)∩H10(Ω) and f(x,un)→0 in L1(Ω), then F(x,un)→0 in L1(Ω) (up to a subsequence).
If f0<μ1, then there exists Λ∗>0 such that for λ∈(0,Λ∗), problem (1.1) has at least four nontrivial solutions.
Remark. For standard biharmonic problems with Dirichlet boundary condition, Lam and Lu [15] have recently established the existence of nontrivial nonnegative solutions when the nonlinearity f has the critical exponential growth of order exp(αu2) but without satisfying the Ambrosetti- Rabinowitz condition. However, for problem (1.1) with Navier boundary condition involving critical exponential growth and the concave term, there are few works to study it. Hence our result is new and interesting.
The paper is organized as follows. In Section 2, we present some necessary preliminary knowledge and some important lemmas. In Section 3, we give the proofs for our main results. In Section 4, we give a conclusion.
We let λk (k=1,2,⋅⋅⋅) denote the eigenvalue of −Δ in H10(Ω), then 0<μ1<μ2<⋅⋅⋅<μk<⋅⋅⋅ be the eigenvalues of (Δ2−cΔ,H2(Ω)∩H10(Ω)) and φk(x) be the eigenfunction corresponding to μk. Let Xk denote the eigenspace associated to μk. In fact, μk=λk(λk−c). Throughout this paper, we denote by ‖⋅‖p the Lp(Ω) norm, c<λ1 in Δ2−cΔ and the norm of u in H2(Ω)∩H10(Ω) will be defined by the
‖u‖:=(∫Ω(|Δu|2−c|∇u|2)dx)12. |
We also denote E=H2(Ω)∩H10(Ω).
Definition 2.1. Let (E,||⋅||E) be a real Banach space with its dual space (E∗,||⋅||E∗) and I∈C1(E,R). For c∗∈R, we say that I satisfies the (PS)c∗ condition if for any sequence {xn}⊂E with
I(xn)→c∗,I′(xn)→0 in E∗, |
there is a subsequence {xnk} such that {xnk} converges strongly in E. Also, we say that I satisfy the (C)c∗ condition if for any sequence {xn}⊂E with
I(xn)→c∗, ||I′(xn)||E∗(1+||xn||E)→0, |
there exists subsequence {xnk} such that {xnk} converges strongly in E.
Definition 2.2. We say that u∈E is the solution of problem (1.1) if the identity
∫Ω(ΔuΔφ−c∇u∇φ)dx=λ∫Ωa(x)|u|s−2uφdx+∫Ωf(x,u)φdx |
holds for any φ∈E.
It is obvious that the solutions of problem (1.1) are corresponding with the critical points of the following C1 functional:
Iλ(u)=12‖u‖2−λs∫Ωa(x)|u|sdx−∫ΩF(x,u)dx,u∈E. |
Let u+=max{u,0},u−=min{u,0}.
Now, we concern the following problem
{Δ2u+cΔu=λa(x)|u+|s−2u++f+(x,u)inΩ,u=Δu=0on∂Ω, | (2.1) |
where
f+(x,t)={f(x,t)t≥0,0,t<0. |
Define the corresponding functional I+λ:E→R as follows:
I+λ(u)=12‖u‖2−λs∫Ωa(x)|u+|sdx−∫ΩF+(x,u)dx, |
where F+(x,u)=∫u0f+(x,s)ds. Obviously, the condition (SCP) or (SCE) ((CG)) ensures that I+λ∈C1(E,R). Let u be a critical point of I+λ, which means that u is a weak solution of problem (2.1). Furthermore, since the weak maximum principle (see [34]), it implies that u≥0 in Ω. Thus u is also a solution of problem (1.1) and I+λ(u)=Iλ(u).
Similarly, we define
f−(x,t)={f(x,t)t≤0,0,t>0, |
and
I−λ(u)=12‖u‖2−λs∫Ωa(x)|u−|sdx−∫ΩF−(x,u)dx, |
where F−(x,u)=∫u0f−(x,s)ds. Similarly, we also have I−λ∈C1(E,R) and if v is a critical point of I−λ then it is a solution of problem (1.1) and I−λ(v)=Iλ(v).
Prosition 2.1. ([6,30]). Let E be a real Banach space and suppose that I∈C1(E,R) satisfies the condition
max{I(0),I(u1)}≤α<β≤inf||u||=ρI(u), |
for some α<β, ρ>0 and u1∈E with ||u1||>ρ. Let c∗≥β be characterized by
c∗=infγ∈Γmax0≤t≤1I(γ(t)), |
where Γ={γ∈C([0,1],E),γ(0)=0,γ(1)=u1} is the set of continuous paths joining 0 and u1. Then, there exists a sequence {un}⊂E such that
I(un)→c∗≥β and (1+||un||)||I′(un)||E∗→0 as n→∞. |
Lemma 2.1. ([28]). Let Ω⊂R4 be a bounded domain. Then there exists a constant C>0 such that
supu∈E,‖Δu‖2≤1∫Ωe32π2u2dx<C|Ω|, |
and this inequality is sharp.
Next, we introduce the following a revision of Adams inequality:
Lemma 2.2. Let Ω⊂R4 be a bounded domain. Then there exists a constant C∗>0 such that
supu∈E,‖u‖≤1∫Ωe32π2u2dx<C∗|Ω|, |
and this inequality is also sharp.
Proof. We will give a summarize proof in two different cases. In the case of c≤0 in the definition of ‖.‖, if ‖u‖≤1, we can deduce that ‖Δu‖2≤1 and by using Lemma 2.1 combined with the Proposition 6.1 in [28], the conclusion holds.
In the case of 0<c<λ1 in the definition of ‖.‖, from Lemma 2.1, the proof and remark of Theorem 1 in [2] and the proof of Proposition 6.1 in [28], we still can establish this revised Adams inequality.
Lemma 2.3. Assume (H1) and (H3) hold. If f has the standard subcritical polynomial growth on Ω (condition (SCP)), then I+λ (I−λ) satisfies (C)c∗.
Proof. We only prove the case of I+λ. The arguments for the case of I−λ are similar. Let {un}⊂E be a (C)c∗ sequence such that
I+λ(un)=12||un||2−λs∫Ωa(x)|u+n|sdx−∫ΩF+(x,un)dx=c∗+∘(1), | (2.2) |
(1+||un||)||I+′λ(un)||E∗→0 as n→∞. | (2.3) |
Obviously, (2.3) implies that
⟨I+′λ(un),φ⟩=⟨un,φ⟩−λ∫Ωa(x)|u+n|s−2u+nφdx−∫Ωf+(x,un(x))φdx=∘(1). | (2.4) |
Step 1. We claim that {un} is bounded in E. In fact, assume that
‖un‖→∞, as n→∞. |
Define
vn=un‖un‖. |
Then, ‖vn‖=1, ∀n∈N and then, it is possible to extract a subsequence (denoted also by {vn}) converges weakly to v in E, converges strongly in Lp(Ω)(1≤p<p∗) and converges v a.e. x∈Ω.
Dividing both sides of (2.2) by ‖un‖2, we get
∫ΩF+(x,un)‖un‖2dx→12. | (2.5) |
Set
Ω+={x∈Ω:v(x)>0}. |
By (H3), we imply that
F+(x,un)u2nv2n→∞,x∈Ω+. | (2.6) |
If |Ω+| is positive, since Fatou's lemma, we get
limn→∞∫ΩF+(x,un)‖un‖2dx≥limn→∞∫Ω+F+(x,un)u2nv2ndx=+∞, |
which contradicts with (2.5). Thus, we have v≤0. In fact, we have v=0. Indeed, again using (2.3), we get
(1+‖un‖)|⟨I+′λ(un),v⟩|≤∘(1)‖v‖. |
Thus, we have
∫Ω(ΔunΔv−c∇un∇v)dx≤∫Ω(ΔunΔv−c∇u∇v)dx−λ∫Ωa(x)|u+n|s−2u+nvdx−∫Ωf+(x,un)vdx≤∘(1)‖v‖1+‖un‖, |
by noticing that since v≤0, f+(x,un)v≤0 a.e. x∈Ω, thus −∫Ωf+(x,un)vdx≥0. So we get
∫Ω(ΔvnΔv−c∇vn∇v)dx→0. |
On the other hand, from vn⇀v in E, we have
∫Ω(ΔvnΔv−c∇vn∇v)dx→‖v‖2 |
which implies v=0.
Dividing both sides of (2.4) by ‖un‖, for any φ∈E, then there exists a positive constant M(φ) such that
|∫Ωf+(x,un)‖un‖φdx|≤M(φ),∀n∈N. | (2.7) |
Set
fn(φ)=∫Ωf+(x,un)‖un‖φdx,φ∈E. |
Thus, by (SCP), we know that {fn} is a family bounded linear functionals defined on E. Combing (2.7) with the famous Resonance Theorem, we get that {|fn|} is bounded, where |fn| denotes the norm of fn. It means that
|fn|≤C∗. | (2.8) |
Since E⊂Lp∗p∗−q(Ω), using the Hahn-Banach Theorem, there exists a continuous functional ˆfn defined on Lp∗p∗−q(Ω) such that ˆfn is an extension of fn, and
ˆfn(φ)=fn(φ),φ∈E, | (2.9) |
‖ˆfn‖p∗q=|fn|, | (2.10) |
where ‖ˆfn‖p∗q denotes the norm of ˆfn(φ) in Lp∗q(Ω) which is defined on Lp∗p∗−q(Ω).
On the other hand, from the definition of the linear functional on Lp∗p∗−q(Ω), we know that there exists a function Sn(x)∈Lp∗q(Ω) such that
ˆfn(φ)=∫ΩSn(x)φ(x)dx,φ∈Lp∗p∗−q(Ω). | (2.11) |
So, from (2.9) and (2.11), we obtain
∫ΩSn(x)φ(x)dx=∫Ωf+(x,un)‖un‖φdx,φ∈E, |
which implies that
∫Ω(Sn(x)−f+(x,un)‖un‖)φdx=0,φ∈E. |
According to the basic lemma of variational, we can deduce that
Sn(x)=f+(x,un)‖un‖a.e.x∈Ω. |
Thus, by (2.8) and (2.10), we have
‖ˆfn‖p∗q=‖Sn‖p∗q=|fn|<C∗. | (2.12) |
Now, taking φ=vn−v in (2.4), we get
⟨A(vn),vn−v⟩−λ∫Ωa(x)|u+n|s−2u+nvndx−∫Ωf+(x,un)‖un‖vndx→0, | (2.13) |
where A:E→E∗ defined by
⟨A(u),φ⟩=∫ΩΔuΔφdx−c∫Ω∇u∇φdx, u,φ∈E. |
By the H¨older inequality and (2.12), we obtain
∫Ωf+(x,un)‖un‖vndx→0. |
Then from (2.13), we can conclude that
vn→vinE. |
This leads to a contradiction since ‖vn‖=1 and v=0. Thus, {un} is bounded in E.
Step 2. We show that {un} has a convergence subsequence. Without loss of generality, we can suppose that
un⇀u in E,un→u in Lγ(Ω), ∀1≤γ<p∗,un(x)→u(x) a.e. x∈Ω. |
Now, it follows from f satisfies the condition (SCP) that there exist two positive constants c4,c5>0 such that
f+(x,t)≤c4+c5|t|q, ∀(x,t)∈Ω×R, |
then
|∫Ωf+(x,un)(un−u)dx|≤c4∫Ω|un−u|dx+c5∫Ω|un−u||un|qdx≤c4∫Ω|un−u|dx+c5(∫Ω(|un|q)p∗qdx)qp∗(∫Ω|un−u|p∗p∗−qdx)p∗−qp∗. |
Similarly, since un⇀u in E, ∫Ω|un−u|dx→0 and ∫Ω|un−u|p∗p∗−qdx→0.
Thus, from (2.4) and the formula above, we obtain
⟨A(un),un−u⟩→0,asn→∞. |
So, we get ‖un‖→‖u‖. Thus we have un→u in E which implies that I+λ satisfies (C)c∗.
Lemma 2.4. Let φ1>0 be a μ1-eigenfunction with ‖φ1‖=1 and assume that (H1)–(H3) and (SCP) hold. If f0<μ1, then:
(i) For λ>0 small enough, there exist ρ,α>0 such that I±λ(u)≥α for all u∈E with ‖u‖=ρ,
(ii) I±λ(tφ1)→−∞ as t→+∞.
Proof. Since (SCP) and (H1)–(H3), for any ε>0, there exist A=A(ε), M large enough and B=B(ε) such that for all (x,s)∈Ω×R,
F±(x,s)≤12(f0+ϵ)s2+A|s|q, | (2.14) |
F±(x,s)≥M2s2−B. | (2.15) |
Choose ε>0 such that (f0+ε)<μ1. By (2.14), the Poincaré inequality and the Sobolev embedding, we obtain
I±λ(u)≥12‖u‖2−λ‖a‖∞s∫Ω|u|sdx−∫ΩF±(x,u)dx≥12‖u‖2−λ‖a‖∞s∫Ω|u|sdx−f0+ε2‖u‖22−A∫Ω|u|qdx≥12(1−f0+εμ1)‖u‖2−λK‖u‖s−C∗∗‖u‖q≥‖u‖2(12(1−f0+εμ1)−λK‖u‖s−2−C∗∗‖u‖q−2), |
where K,C∗∗ are constant.
Write
h(t)=λKts−2+C∗∗tq−2. |
We can prove that there exists t∗ such that
h(t∗)<12(1−f0+εμ1). |
In fact, letting h′(t)=0, we get
t∗=(λK(2−s)C∗∗(q−2))1q−s. |
According to the knowledge of mathematical analysis, h(t) has a minimum at t=t∗. Denote
ϑ=K(2−s)C∗∗(q−2), ˆϑ=s−2q−s, ˉϑ=q−2q−s, ν=12(1−f0+εμ1). |
Taking t∗ in h(t), we get
h(t∗)<ν,0<λ<Λ∗, |
where Λ∗=(νKϑˆϑ+C∗∗ϑˉϑ)1ˉϑ. So, part (i) holds if we take ρ=t∗.
On the other hand, from (2.15), we get
I+λ(tφ1)≤12(1−Mμ1)t2−tsλs∫Ωa(x)|φ1|sdx+B|Ω|→−∞ as t→+∞. |
Similarly, we have
I−λ(t(−φ1))→−∞, as t→+∞. |
Thus part (ii) holds.
Lemma 2.5. Let φ1>0 be a μ1-eigenfunction with ‖φ1‖=1 and assume that (H1)–(H3) and (SCE)(or (CG)) hold. If f0<μ1, then:
(i) For λ>0 small enough, there exist ρ,α>0 such that I±λ(u)≥α for all u∈E with ‖u‖=ρ,
(ii) I±λ(tφ1)→−∞ as t→+∞.
Proof. From (SCE) (or (CG)) and (H1)-(H3), for any ε>0, there exist A1=A1(ε), M1 large enough, B1=B1(ε), κ1>0 and q1>2 such that for all (x,s)∈Ω×R,
F±(x,s)≤12(f0+ϵ)s2+A1exp(κ1s2)|s|q1, | (2.16) |
F±(x,s)≥M12s2−B1. | (2.17) |
Choose ε>0 such that (f0+ε)<μ1. By (2.16), the Hölder inequality and the Adams inequality (see Lemma 2.2), we obtain
I±λ(u)≥12‖u‖2−λ‖a‖∞s∫Ω|u|sdx−∫ΩF±(x,u)dx≥12‖u‖2−λ‖a‖∞s∫Ω|u|sdx−f0+ε2‖u‖22−A1∫Ωexp(κ1u2)|u|q1dx≥12(1−f0+εμ1)‖u‖2−λK‖u‖s−A1(∫Ωexp(κ1r1‖u‖2(|u|‖u‖)2)dx)1r1(∫Ω|u|r′1qdx)1r′1≥12(1−f0+εμ1)‖u‖2−λK‖u‖s−ˆC∗∗‖u‖q1, |
where r1>1 sufficiently close to 1, ‖u‖≤σ and κ1r1σ2<32π2. Remained proof is completely similar to the proof of part (ⅰ) of Lemma 2.4, we omit it here. So, part (ⅰ) holds if we take ‖u‖=ρ>0 small enough.
On the other hand, from (2.17), we get
I+λ(tφ1)≤12(1−M1μ1)t2−tsλs∫Ωa(x)|φ1|sdx+B1|Ω|→−∞ as t→+∞. |
Similarly, we have
I−λ(t(−φ1))→−∞, as t→+∞. |
Thus part (ii) holds.
Lemma 2.6. Assume (H1) and (H3) hold. If f has the subcritical exponential growth on Ω (condition (SCE)), then I+λ (I−λ) satisfies (C)c∗.
Proof. We only prove the case of I+λ. The arguments for the case of I−λ are similar. Let {un}⊂E be a (C)c∗ sequence such that the formulas (2.2)–(2.4) in Lemma 2.3 hold.
Now, according to the previous section of Step 1 of the proof of Lemma 2.3, we also obtain that the formula (2.7) holds. Set
fn(φ)=∫Ωf+(x,un)‖un‖φdx,φ∈E. |
Then from for any u∈E, eαu2∈L1(Ω) for all α>0, we can draw a conclusion that {fn} is a family bounded linear functionals defined on E. Using (2.7) and the famous Resonance Theorem, we know that {|fn|} is bounded, where |fn| denotes the norm of fn. It means that the formula (2.8) (see the proof of Lemma 2.3) holds.
Since E⊂Lq0(Ω) for some q0>1, using the Hahn-Banach Theorem, there exists a continuous functional ˆfn defined on Lq0(Ω) such that ˆfn is an extension of fn, and
ˆfn(φ)=fn(φ),φ∈E, | (2.18) |
‖ˆfn‖q∗0=|fn|, | (2.19) |
where ‖ˆfn‖q∗0 is the norm of ˆfn(φ) in Lq∗0(Ω) which is defined on Lq0(Ω) and q∗0 is the dual number of q0.
By the definition of the linear functional on Lq0(Ω), we know that there is a function Sn(x)∈Lq∗0(Ω) such that
ˆfn(φ)=∫ΩSn(x)φ(x)dx,φ∈Lq0(Ω). | (2.20) |
Similarly to the last section of the Step 1 of the proof of Lemma 2.3, we can prove that (C)c∗ sequence {un} is bounded in E. Next, we show that {un} has a convergence subsequence. Without loss of generality, assume that
‖un‖≤β∗,un⇀u in E,un→u in Lγ(Ω), ∀γ≥1,un(x)→u(x) a.e. x∈Ω. |
Since f has the subcritical exponential growth (SCE) on Ω, we can find a constant Cβ∗>0 such that
|f+(x,t)|≤Cβ∗exp(32π2k(β∗)2t2), ∀(x,t)∈Ω×R. |
Thus, from the revised Adams inequality (see Lemma 2.2),
|∫Ωf+(x,un)(un−u)dx|≤Cβ∗(∫Ωexp(32π2(β∗)2u2n)dx)1k|un−u|k′≤C∗∗|un−u|k′→0, |
where k>1 and k′ is the dual number of k. Similar to the last proof of Lemma 2.3, we have un→u in E which means that I+λ satisfies (C)c∗.
Lemma 2.7. Assume (H3) holds. If f has the standard subcritical polynomial growth on Ω (condition (SCP)), then Iλ satisfies (PS)c∗.
Proof. Let {un}⊂E be a (PS)c∗ sequence such that
‖un‖22−λs∫Ωa(x)|un|sdx−∫ΩF(x,un)dx→c∗, | (2.21) |
∫ΩΔunΔφdx−c∫Ω∇un∇φdx−λ∫Ωa(x)|un|s−2unφdx−∫Ωf(x,un)φdx=∘(1)‖φ‖, φ∈E. | (2.22) |
Step 1. To prove that {un} has a convergence subsequence, we first need to prove that it is a bounded sequence. To do this, argue by contradiction assuming that for a subsequence, which is still denoted by {un}, we have
‖un‖→∞. |
Without loss of generality, assume that ‖un‖≥1 for all n∈N and let
vn=un‖un‖. |
Clearly, ‖vn‖=1, ∀n∈N and then, it is possible to extract a subsequence (denoted also by {vn}) converges weakly to v in E, converges strongly in Lp(Ω)(1≤p<p∗) and converges v a.e. x∈Ω.
Dividing both sides of (2.21) by ‖un‖2, we obtain
∫ΩF(x,un)‖un‖2dx→12. | (2.23) |
Set
Ω0={x∈Ω:v(x)≠0}. |
By (H3), we get that
F(x,un)u2nv2n→∞,x∈Ω0. | (2.24) |
If |Ω0| is positive, from Fatou's lemma, we obtain
limn→∞∫ΩF(x,un)‖un‖2dx≥limn→∞∫Ω0F(x,un)u2nv2ndx=+∞, |
which contradicts with (2.23).
Dividing both sides of (2.22) by ‖un‖, for any φ∈E, then there exists a positive constant M(φ) such that
|∫Ωf(x,un)‖un‖φdx|≤M(φ),∀n∈N. | (2.25) |
Set
fn(φ)=∫Ωf(x,un)‖un‖φdx,φ∈E. |
Thus, by (SCP), we know that {fn} is a family bounded linear functionals defined on E. By (2.25) and the famous Resonance Theorem, we get that {|fn|} is bounded, where |fn| denotes the norm of fn. It means that
|fn|≤˜C∗. | (2.26) |
Since E⊂Lp∗p∗−q(Ω), using the Hahn-Banach Theorem, there exists a continuous functional ˆfn defined on Lp∗p∗−q(Ω) such that ˆfn is an extension of fn, and
ˆfn(φ)=fn(φ),φ∈E, | (2.27) |
‖ˆfn‖p∗q=|fn|, | (2.28) |
where ‖ˆfn‖p∗q denotes the norm of ˆfn(φ) in Lp∗q(Ω) which is defined on Lp∗p∗−q(Ω).
Remained proof is completely similar to the last proof of Lemma 2.3, we omit it here.
Lemma 2.8. Assume (H3) holds. If f has the subcritical exponential growth on Ω (condition (SCE)), then Iλ satisfies (PS)c∗.
Proof. Combining the previous section of the proof of Lemma 2.7 with slightly modifying the last section of the proof of Lemma 2.6, we can prove it. So we omit it here.
To prove the next Lemma, we firstly introduce a sequence of nonnegative functions as follows. Let Φ(t)∈C∞[0,1] such that
Φ(0)=Φ′(0)=0, |
Φ(1)=Φ′(1)=0. |
We let
H(t)={1nΦ(nt),ift≤1n,t,if1n<t<1−1n,1−1nΦ(n(1−t)),if1−1n≤t≤1,1,if1≤t, |
and ψn(r)=H((lnn)−1ln1r). Notice that ψn(x)∈E, B the unit ball in RN, ψn(x)=1 for |x|≤1n and, as it was proved in [2],
‖Δψn‖2=2√2π(lnn)−12An=‖ψn‖+∘(1),asn→∞. |
where 0≤limn→∞An≤1. Thus, we take x0∈Ω and r0>0 such that B(x0,r)⊂Ω, denote
Ψn(x)={ψn(|x−x0|)‖ψn‖,ifx∈B(x0,r0),0,ifx∈Ω∖B(x0,r0). |
Lemma 2.9. Assume (H1) and (H4) hold. If f has the critical exponential growth on Ω (condition (CG)), then there exists n such that
max{I±λ(±tΨn):t≥0}<16π2α0. |
Proof. We only prove the case of I+λ. The arguments for the case of I−λ are similar. Assume by contradiction that this is not the case. So, for all n, this maximum is larger or equal to 16π2α0. Let tn>0 be such that
I+λ(tnΨn)≥16π2α0. | (2.29) |
From (H1) and (2.29), we conclude that
t2n≥32π2α0. | (2.30) |
Also at t=tn, we have
tn−ts−1nλ∫Ωa(x)|Ψn|sdx−∫Ωf(x,tnΨn)Ψndx=0, |
which implies that
t2n≥tsnλ∫Ωa(x)|Ψn|sdx+∫B(x0,r0)f(x,tnΨn)tnΨndx. | (2.31) |
Since (H4), for given ϵ>0 there exists Rϵ>0 such that
tf(x,t)≥(β−ϵ)exp(α0t2), t≥Rϵ. |
So by (2.31), we deduce that, for large n
t2n≥tsnλ∫Ωa(x)|Ψn|sdx+(β−ϵ)π22r40exp[((tnAn)2α032π2−1)4lnn]. | (2.32) |
By (2.30), the inequality above is true if, and only if
limn→∞An=1 and tn→(32π2α0)12. | (2.33) |
Set
A∗n={x∈B(x0,r0):tnΨn(x)≥Rϵ},Bn=B(x0,r0)∖A∗n, |
and break the integral in (2.31) into a sum of integrals over A∗n and Bn. By simple computation, we have
[32π2α0]≥(β−ϵ)limn→∞∫B(x0,r0)exp[α0t2n|Ψn(x)|2]dx−(β−ϵ)r40π22. | (2.34) |
The last integral in (2.34), denote In is evaluated as follows:
In≥(β−ϵ)r40π2. |
Thus, finally from (2.34) we get
[32π2α0]≥(β−ϵ)r40π22, |
which means β≤64α0r40. This results in a contradiction with (H4).
To conclude this section we state the Fountain Theorem of Bartsch [32].
Define
Yk=⊕kj=1Xj, Zk=¯⊕j≥kXj. | (2.35) |
Lemma 2.10. (Dual Fountain Theorem). Assume that Iλ∈C1(E,R) satisfies the (PS)∗c condition (see [32]), Iλ(−u)=Iλ(u). If for almost every k∈N, there exist ρk>rk>0 such that
(i) ak:=infu∈Zk,‖u‖=ρkIλ(u)≥0,
(ii) bk:=maxu∈Yk,‖u‖=rkIλ(u)<0,
(iii) bk=infu∈Zk,‖u‖=ρkIλ(u)→0, as k→∞,
then Iλ has a sequence of negative critical values converging 0.
Proof of Theorem 1.1. For I±λ, we first demonstrate that the existence of local minimum v± with I±λ(v±)<0. We only prove the case of I+λ. The arguments for the case of I−λ are similar.
For ρ determined in Lemma 2.4, we write
ˉB(ρ)={u∈E, ‖u‖≤ρ}, ∂B(ρ)={u∈E, ‖u‖=ρ}. |
Then ˉB(ρ) is a complete metric space with the distance
dist(u,v)=‖u−v‖,∀u,v∈ˉB(ρ). |
From Lemma 2.4, we have for 0<λ<Λ∗,
I+λ(u)|∂B(ρ)≥α>0. |
Furthermore, we know that I+λ∈C1(ˉB(ρ),R), hence I+λ is lower semi-continuous and bounded from below on ˉB(ρ). Set
c∗1=inf{I+λ(u),u∈ˉB(ρ)}. |
Taking ˜ϕ∈C∞0(Ω) with ˜ϕ>0, and for t>0, we get
I+λ(t˜ϕ)=t22‖˜ϕ‖2−λtss∫Ωa(x)|˜ϕ|sdx−∫ΩF+(x,t˜ϕ)dx≤t22‖˜ϕ‖2−λtss∫Ωa(x)|˜ϕ|sdx<0, |
for all t>0 small enough. Hence, c∗1<0.
Since Ekeland's variational principle and Lemma 2.4, for any m>1, there exists um with ‖um‖<ρ such that
I+λ(um)→c∗1,I+′λ(um)→0. |
Hence, there exists a subsequence still denoted by {um} such that
um→v+,I+′λ(v+)=0. |
Thus v+ is a weak solution of problem (1.1) and I+λ(v+)<0. In addition, from the maximum principle, we know v+>0. By a similar way, we obtain a negative solution v− with I−λ(v−)<0.
On the other hand, from Lemmas 2.3 and 2.4, the functional I+λ has a mountain pass-type critical point u+ with I+λ(u+)>0. Again using the maximum principle, we have u+>0. Hence, u+ is a positive weak solution of problem (1.1). Similarly, we also obtain a negative mountain pass-type critical point u− for the functional I−λ. Thus, we have proved that problem (1.1) has four different nontrivial solutions. Next, our method to obtain the fifth solution follows the idea developed in [33] for problem (1.1). We can assume that v+ and v− are isolated local minima of Iλ. Let us denote by bλ the mountain pass critical level of Iλ with base points v+,v−:
bλ=infγ∈Γmax0≤t≤1Iλ(γ(t)), |
where Γ={γ∈C([0,1],E),γ(0)=v+,γ(1)=v−}. We will show that bλ<0 if λ is small enough. To this end, we regard
Iλ(tv±)=t22‖v±‖2−λtss∫Ωa(x)|v±|sdx−∫ΩF(x,tv±)dx. |
We claim that there exists δ>0 such that
Iλ(tv±)<0, ∀t∈(0,1), ∀λ∈(0,δ). | (3.1) |
If not, we have t0∈(0,1) such that Iλ(t0v±)≥0 for λ small enough. Similarly, we also have Iλ(tv±)<0 for t>0 small enough. Let ρ0=t0‖v±‖ and ˇc±∗=inf{I±λ(u),u∈ˉB(ρ0)}. Since previous arguments, we obtain a solution v∗± such that Iλ(v∗±)<0, a contradiction. Hence, (3.1) holds.
Now, let us consider the 2-dimensional plane Π2 containing the straightlines tv− and tv+, and take v∈Π2 with ‖v‖=ϵ. Note that for such v one has ‖v‖s=csϵ. Then we get
Iλ(v)≤ϵ22−λscssh0ϵs. |
Thus, for small ϵ,
Iλ(v)<0. | (3.2) |
Consider the path ˉγ obtained gluing together the segments {tv−:ϵ‖v−‖−1≤t≤1},{tv+:ϵ‖v+‖−1≤t≤1} and the arc {v∈Π2:‖v‖=ϵ}. by (3.1)and (3.2), we get
bλ≤maxv∈ˉγIλ(v)<0, |
which verifies the claim. Since the (PS) condition holds because of Lemma 2.3, the level{Iλ(v)=bλ} carries a critical point v3 of Iλ, and v3 is different from v±.
Proof of Theorem 1.2. We first use the symmetric mountain pass theorem to prove the case of a). It follows from our assumptions that the functional Iλ is even. Since the condition (SCP), we know that (I′1) of Theorem 9.12 in [30] holds. Furthermore, by condition (H3), we easily verify that (I′2) of Theorem 9.12 also holds. Hence, by Lemma 2.7, our theorem is proved.
Next we use the dual fountain theorem (Lemma 2.10) to prove the case of b). Since Lemma 2.7, we know that the functional Iλ satisfies (PS)∗c condition. Next, we just need to prove the conditions (ⅰ)-(ⅲ) of Lemma 2.10.
First, we verify (ⅰ) of Lemma 2.10. Define
βk:=supu∈Zk,‖u‖=1‖u‖s. |
From the conditions (SCP) and (H2), we get, for u∈Zk,‖u‖≤R,
Iλ(u)≥‖u‖22−λβsk‖u‖ss−f0+ϵ2‖u‖22−c6‖u‖q≥14(1−f0+ϵμ1)‖u‖2−λβsk‖u‖ss. | (3.3) |
Here, R is a positive constant and ϵ>0 small enough. We take ρk=(4μ1λβsk/[(μ1−f0−ϵ)s])12−s. Since βk→0,k→∞, it follows that ρk→0,k→∞. There exists k0 such that ρk≤R when k≥k0. Thus, for k≥k0,u∈Zk and ‖u‖=ρk, we have Iλ(u)≥0 and (ⅰ) holds. The verification of (ⅱ) and (ⅲ) is standard, we omit it here.
Proof of Theorem 1.3. According to our assumptions, similar to previous section of the proof of Theorem 1.1, we obtain that the existence of local minimum v± with I±λ(v±)<0. In addition, by Lemmas 2.5 and 2.6, for I±λ, we obtain two mountain pass type critical points u+ and u− with positive energy. Similar to the last section of the proof of Theorem 1.1, we can also get another solution u3, which is different from v± and u±. Thus, this proof is completed.
Proof of Theorem 1.4. We first use the symmetric mountain pass theorem to prove the case of a). It follows from our assumptions that the functional Iλ is even. Since the condition (SCE), we know that (I′1) of Theorem 9.12 in [30] holds. In fact, similar to the proof of (ⅰ) of Lemma 2.5, we can conclude it. Furthermore, by condition (H3), we easily verify that (I′2) of Theorem 9.12 also holds. Hence, by Lemma 2.8, our theorem is proved.
Next we use the dual fountain theorem (Lemma 2.10) to prove the case of b). Since Lemma 2.8, we know that the functional Iλ satisfies (PS)∗c condition. Next, we just need to prove the conditions (ⅰ)-(ⅲ) of Lemma 2.10.
First, we verify (ⅰ) of Lemma 2.10. Define
βk:=supu∈Zk,‖u‖=1‖u‖s. |
From the conditions (SCE), (H2) and Lemma 2.2, we get, for u∈Zk,‖u‖≤R,
Iλ(u)≥‖u‖22−λβsk‖u‖ss−f0+ϵ2‖u‖22−c7‖u‖q≥14(1−f0+ϵμ1)‖u‖2−λβsk‖u‖ss. | (3.4) |
Here, R is a positive constant small enough and ϵ>0 small enough. We take ρk=(4μ1λβsk/[(μ1−f0−ϵ)s])12−s. Since βk→0,k→∞, it follows that ρk→0,k→∞. There exists k0 such that ρk≤R when k≥k0. Thus, for k≥k0,u∈Zk and ‖u‖=ρk, we have Iλ(u)≥0 and (ⅰ) holds. The verification of (ⅱ) and (ⅲ) is standard, we omit it here.
Proof of Theorem 1.5. According to our assumptions, similar to previous section of the proof of Theorem 1.1, we obtain that the existence of local minimum v± with I±λ(v±)<0. Now, we show that I+λ has a positive mountain pass type critical point. Since Lemmas 2.5 and 2.9, then there exists a (C)cM sequence {un} at the level 0<cM≤16π2α0. Similar to previous section of the proof of Lemma 2.6, we can prove that (C)cM sequence {un} is bounded in E. Without loss of generality, we can suppose that
un⇀u+inE. |
Following the proof of Lemma 4 in [9], we can imply that u+ is weak of problem (1.1). So the theorem is proved if u+ is not trivial. However, we can get this due to our technical assumption (H5). Indeed, assume u+=0, similarly as in [9], we obtain f+(x,un)→0 in L1(Ω). Since (H5), F+(x,un)→0 in L1(Ω) and we get
limn→∞‖un‖2=2cM<32π2α0, |
and again following the proof in [9], we get a contradiction.
We claim that v+ and u+ are distinct. Since the previous proof, we know that there exist sequence {un} and {vn} in E such that
un→v+, I+λ(un)→c+∗<0, ⟨I+′λ(un),un⟩→0, | (3.5) |
and
vn⇀u+, I+λ(vn)→cM>0, ⟨I+′λ(vn),vn⟩→0. | (3.6) |
Now, argue by contradiction that v+=u+. Since we also have vn⇀v+ in E, up to subsequence, limn→∞‖vn‖≥‖v+‖>0. Setting
wn=vn‖vn‖, w0=v+limn→∞‖vn‖, |
we know that ‖wn‖=1 and wn⇀w0 in E.
Now, we consider two possibilities:
(i) ‖w0‖=1,(ii) ‖w0‖<1. |
If (ⅰ) happens, we have vn→v+ in E, so that I+λ(vn)→I+λ(v+)=c+∗. This is a contradiction with (3.5) and (3.6).
Now, suppose that (ⅱ) happens. We claim that there exists δ>0 such that
hα0‖vn‖2≤32π21−‖w0‖2−δ | (3.7) |
for n large enough. In fact, by the proof of v+ and Lemma 2.9, we get
0<cM<c+∗+16π2α0. | (3.8) |
Thus, we can choose h>1 sufficiently close to 1 and δ>0 such that
hα0‖vn‖2≤16π2cM−I+λ(v+)‖vn‖2−δ. |
Since vn⇀v+, by condition (H5), up to a subsequence, we conclude that
12‖vn‖2=cM+λs∫Ωa(x)vs+dx+∫ΩF+(x,v+)dx+∘(1). | (3.9) |
Thus, for n sufficiently large we get
hα0‖vn‖2≤32π2cM+λs∫Ωa(x)vs+dx+∫ΩF+(x,v+)dx+∘(1)cM−I+λ(v+)−δ. | (3.10) |
Thus, from (3.9) and the definition of w0, (3.10) implies (3.7) for n large enough.
Now, taking ˜h=(h+ϵ)α0‖vn‖2, it follows from (3.7) and a revised Adams inequality (see [28]), we have
∫Ωexp((h+ϵ)α0‖vn‖2|wn|2dx≤C | (3.11) |
for ϵ>0 small enough. Thus, from our assumptions and the Hölder inequality we get vn→v+ and this is absurd.
Similarly, we can find a negative mountain pass type critical point u− which is different that v−. Thus, the proof is completed.
In this research, we mainly studied the existence and multiplicity of nontrivial solutions for the fourth-order elliptic Navier boundary problems with exponential growth. Our method is based on the variational methods, Resonance Theorem together with a revised Adams inequality.
The authors would like to thank the referees for valuable comments and suggestions in improving this article. This research is supported by the NSFC (Nos. 11661070, 11764035 and 12161077), the NSF of Gansu Province (No. 22JR11RE193) and the Nonlinear mathematical physics Equation Innovation Team (No. TDJ2022-03).
There is no conflict of interest.
[1] |
W. Hou, Z. Ning, L. Guo, X. Zhang, Temporal, functional and spatial big data computing framework for large-scale smart grid, IEEE Trans. Emerging Top. Comput., 7 (2019), 369–379. https://doi.org/10.1109/TETC.2017.2681113 doi: 10.1109/TETC.2017.2681113
![]() |
[2] | B. V. Vishakh, M. K. Khwaja, Wearable device for hearing impaired individuals using ZigBee protocol, in 2015 9th Asia Modelling Symposium (AMS), (2015), 181–184. https://doi.org/10.1109/AMS.2015.37 |
[3] | A. I. Hussein, Wearable computing: Challenges of implementation and itsfuture, in 2015 12th Learning and Technology Conference, (2015), 14–19. https://doi.org/10.1109/LT.2015.7587224 |
[4] | L. M. Koonin, B. Hoots, C. A. Tsang, Z. Leroy, K. Farris, B. T. Jolly, et al., Trends in the use of telehealth during the emergence of the COVID-19 pandemic-United States, January–March 2020, Morb. Mortal. Wkly. Rep., 69 (2020), 1595–1599. https://doi.org/10.15585%2Fmmwr.mm6943a3 |
[5] |
Y. Mehmood, F. Ahmad, I. Yaqoob, A. Adnane, M. Imran, S. Guizani, Internet-of-things-based smart cities: Recent advances and challenges, IEEE Commun. Mag., 55 (2017), 16–24. https://doi.org/10.1109/MCOM.2017.1600514 doi: 10.1109/MCOM.2017.1600514
![]() |
[6] |
O. AlShorman, B. AlShorman, M. Al-khassaweneh, F. Alkahtani, A review of internet of medical things (iomt)-based remote health monitoring through wearable sensors: a case study for diabetic patients, Indones. J. Electr. Eng. Comput. Sci., 20 (2020), 414–422. https://doi.org/10.11591/IJEECS.V20.I1.PP414-422 doi: 10.11591/IJEECS.V20.I1.PP414-422
![]() |
[7] |
M. A. U. Khalid, S. H. Chang, Flexible strain sensors for wearable applications fabricated using novel functional nanocomposites: A review, Compos. Struct., 284 (2022), 115214. https://doi.org/10.1016/j.compstruct.2022.115214 doi: 10.1016/j.compstruct.2022.115214
![]() |
[8] |
F. J. Tovar-Lopez, Recent progress in micro-and nanotechnology-enabled sensors for biomedical and environmental challenges, Sensors, 23 (2023), 5406. https://doi.org/10.3390/s23125406 doi: 10.3390/s23125406
![]() |
[9] |
F. Ju, Y. Wang, B. Yin, M. Zhao, Y. Zhang, Y. Gong, et al., Microfluidic wearable devices for sports applications, Micromachines, 14 (2023), 1792. https://doi.org/10.3390/mi14091792 doi: 10.3390/mi14091792
![]() |
[10] | W. Wang, Fusion application of cloud computing technology in the field of artificial intelligence, in 2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture, (2021), 289–292. https://doi.org/10.1145/3495018.3495067 |
[11] | K. Ahmed, M. Gregory, Integrating wireless sensor networks with cloud computing, in 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks, (2011), 364–366. https://doi.org/10.1109/MSN.2011.86 |
[12] |
M. Kumar, An incorporation of artificial intelligence capabilities in cloud computing, Int. J. Eng. Comput. Sci., 5 (2016), 19070–19073. https://doi.org/10.18535/ijecs/v5i11.63 doi: 10.18535/ijecs/v5i11.63
![]() |
[13] |
S. Razdan, S. Sharma, Internet of medical things (IoMT): Overview, emerging technologies, and case studies, IETE Tech. Rev., 39 (2022), 775-788. https://doi.org/10.1080/02564602.2021.1927863 doi: 10.1080/02564602.2021.1927863
![]() |
[14] |
X. Jin, B. W. Wah, X. Cheng, Y. Wang, Significance and challenges of big data research, Big Data Res., 2 (2015), 59–64. https://doi.org/10.1016/j.bdr.2015.01.006 doi: 10.1016/j.bdr.2015.01.006
![]() |
[15] | A. Katal, M. Wazid, R. H. Goudar, Big data: issues, challenges, tools and good practices, in 2013 Sixth International Conference on Contemporary Computing (IC3), (2013), 404–409. https://doi.org/10.1109/IC3.2013.6612229 |
[16] | W. Hu, Big Data Management, Technologies, and Applications, IGI Global, Pennsylvania, 2013. |
[17] |
N. Shakhovska, N. Boyko, Y. Zasoba, E. Benova, Big data processing technologies in distributed information systems, Proc. Comput. Sci., 160 (2019), 561–566. https://doi.org/10.1016/j.procs.2019.11.047 doi: 10.1016/j.procs.2019.11.047
![]() |
[18] |
V. Storey, I. Song, Big data technologies and management: What conceptual modeling can do, Data Knowl. Eng., 108 (2017), 50–67. https://doi.org/10.1016/j.datak.2017.01.001 doi: 10.1016/j.datak.2017.01.001
![]() |
[19] |
C. Yang, Q. Huang, Z. Li, K. Liu, F. Hu, Big data and cloud computing: Innovation opportunities and challenges, Int. J. Digital Earth, 10 (2017), 13–53. https://doi.org/10.1080/17538947.2016.1239771 doi: 10.1080/17538947.2016.1239771
![]() |
[20] |
M. Hajibaba, S. Gorgin, A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing, J. Comput. Inf. Technol., 22 (2014), 69–84. https://doi.org/10.2498/cit.1002381 doi: 10.2498/cit.1002381
![]() |
[21] |
S. Goyal, Public vs private vs hybrid vs community-cloud computing: a critical review, Int. J. Comput. Network Inf. Secur., 6 (2014), 20–29. https://doi.org/10.5815/ijcnis.2014.03.03 doi: 10.5815/ijcnis.2014.03.03
![]() |
[22] |
X. He, G. Qi, Z. Zhu, Y. Li, B. Cong, L. Bai, Medical image segmentation method based on multi-feature interaction and fusion over cloud computing, Simul. Modell. Pract. Theory, 126 (2023), 102769. https://doi.org/10.1016/j.simpat.2023.102769 doi: 10.1016/j.simpat.2023.102769
![]() |
[23] |
M. N. O. Sadiku, S. M. Musa, O. D. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials, 33 (2014), 34–36. https://doi.org/10.1109/MPOT.2013.2279684 doi: 10.1109/MPOT.2013.2279684
![]() |
[24] |
S. Zhang, H. Yan, X. Chen, Research on key technologies of cloud computing, Phys. Proc., 33 (2012), 1791–1797. https://doi.org/10.1016/j.phpro.2012.05.286 doi: 10.1016/j.phpro.2012.05.286
![]() |
[25] | P. Kalagiakos, P. Karampelas, Cloud computing learning, in 2011 5th International Conference on Application of Information and Communication Technologies (AICT), (2011), 1–4. https://doi.org/10.1109/ICAICT.2011.6110925 |
[26] |
T. Hu, H. Chen, L. Huang, X. Zhu, A survey of mass data mining based on cloud-computing, Anti-counterfeiting Secur. Identif., (2012), 1–4. https://doi.org/10.1109/ICASID.2012.6325353 doi: 10.1109/ICASID.2012.6325353
![]() |
[27] |
H. Nashaat, N. Ashry, R. Rizk, Smart elastic scheduling algorithm for virtual machine migration in cloud computing, J. Supercomput., 75 (2019), 3842–3865. https://doi.org/10.1007/s11227-019-02748-2 doi: 10.1007/s11227-019-02748-2
![]() |
[28] | Statista, Amazon Maintains Lead in the Cloud Market, 2023. Available from: https://www.statista.com/chart/18819/worldwide-market-share-of-leading-cloud-infrastructure-service-providers/. |
[29] |
R. Hammad, M. Barhoush, B. H. Abed-Alguni, A semantic-based approach for managing healthcare big data: A survey, J. Healthcare Eng., 2020 (2020), 8865808. https://doi.org/10.1155/2020/8865808 doi: 10.1155/2020/8865808
![]() |
[30] |
R. Lin, Z. Ye, H. Wang, B. Wu, Chronic diseases and health monitoring big data: A survey, IEEE Rev. Biomed. Eng., 11 (2018), 275–288. https://doi.org/10.1109/RBME.2018.2829704 doi: 10.1109/RBME.2018.2829704
![]() |
[31] |
L. Sun, X. Jiang, H. Ren, Y. Guo, Edge-cloud computing and artificial intelligence in internet of medical things: architecture, technology and application, IEEE Access, 8 (2020), 101079–101092. https://doi.org/10.1109/ACCESS.2020.2997831 doi: 10.1109/ACCESS.2020.2997831
![]() |
[32] |
H. V. Jagadish, J. Gehrke, A. Labrinidis, Y. Papakonstantinou, J. M. Patel, R. Ramakrishnan, et al., Big data and its technical challenges, Commun. ACM, 57 (2014), 86–94. https://doi.org/10.1145/2611567 doi: 10.1145/2611567
![]() |
[33] |
C. H. Lee, H. Yoon, Medical big data: promise and challenges, Kidney Res. Clin. Pract., 36 (2017), 3–11. https://doi.org/10.23876/j.krcp.2017.36.1.3 doi: 10.23876/j.krcp.2017.36.1.3
![]() |
[34] | P. Langkafel, Big Data in Medical Science and Healthcare Management: Diagnosis, Therapy, Side Effects, De Gruyter, Boston, 2016. https://doi.org/10.1515/9783110445749 |
[35] |
X. Xu, C. Li, X. Lan, X. Fan, X. Lv, X. Ye, et al., A lightweight and robust framework for circulating genetically abnormal cells (CACs) identification using 4-color fluorescence in situ hybridization (FISH) image and deep refined learning, J. Digit. Imaging, 36 (2023), 1687–1700. https://doi.org/10.1007/s10278-023-00843-8 doi: 10.1007/s10278-023-00843-8
![]() |
[36] |
X. Xu, C. Li, X. Fan, X. Lan, X. Lu, X. Ye, et al., Attention mask r-cnn with edge refinement algorithm for identifying circulating genetically abnormal cells, Cytom. Part A, 103 (2023), 227–239. https://doi.org/10.1002/cyto.a.24682 doi: 10.1002/cyto.a.24682
![]() |
[37] |
W. Wang, J. Chen, J. Wang, J. Chen, Z. Gong, Geography-aware inductive matrix completion for personalized point of interest recommendation in smart cities, IEEE Internet Things J., 7 (2020), 4361–4370. https://doi.org/10.1109/JIOT.2019.2950418 doi: 10.1109/JIOT.2019.2950418
![]() |
[38] |
W. Wang, J. Chen, J. Wang, J. Chen, J. Liu, Z. Gong, Trust-enhanced collaborative filtering for personalized point of interests recommendation, IEEE Trans. Ind. Inf., 16 (2020), 6124–6132. https://doi.org/10.1109/TII.2019.2958696 doi: 10.1109/TII.2019.2958696
![]() |
[39] |
W. Wang, N. Kumar, J. Chen, Z. Gong, X. Kong, W. Wei, et al., Realizing the potential of the internet of things for smart tourism with 5G and AI, IEEE Network, 34 (2020), 295–301. https://doi.org/10.1109/MNET.011.2000250 doi: 10.1109/MNET.011.2000250
![]() |
[40] |
W. Wang, X. Yu, B. Fang, Y. Zhao, Y. Chen, W. Wei, et al., Cross-modality LGE-CMR segmentation using image-to-image translation based data augmentation, IEEE/ACM Trans. Comput. Biol. Bioinf., 20 (2023), 2367–2375. https://doi.org/10.1109/TCBB.2022.3140306 doi: 10.1109/TCBB.2022.3140306
![]() |
[41] |
J. Chen, Z. Guo, X. Xu, L. Zhang, Y. Teng, Y. Chen, et al., A robust deep learning framework based on spectrograms for heart sound classification, IEEE/ACM Trans. Comput. Biol. Bioinf., (2023), 1–12. https://doi.org/10.1109/TCBB.2023.3247433 doi: 10.1109/TCBB.2023.3247433
![]() |
[42] |
P. Manickam, S. A. Mariappan, S. M. Murugesan, S. Hansda, A. Kaushik, R. Shinde, et al., Artificial intelligence (AI) and internet of medical things (IoMT) assisted biomedical systems for intelligent healthcare, Biosensors, 12 (2022), 562. https://doi.org/10.3390/bios12080562 doi: 10.3390/bios12080562
![]() |
[43] |
Z. Ning, P. Dong, X. Wang, J. J. Rodrigues, F. Xia, Deep reinforcement learning for vehicular edge computing: An intelligent offloading system, ACM Trans. Intell. Syst. Technol., 10 (2019), 1–24. https://doi.org/10.1145/3317572 doi: 10.1145/3317572
![]() |
[44] |
Z. Ning, P. Dong, X. Wang, M. S. Obaidat, X. Hu, L. Guo, et al., When deep reinforcement learning meets 5G-enabled vehicular networks: A distributed offloading framework for traffic big data, IEEE Trans. Ind. Inf., 16 (2020), 1352–1361. https://doi.org/10.1109/TII.2019.2937079 doi: 10.1109/TII.2019.2937079
![]() |
[45] |
M. N. Hossen, V. Panneerselvam, D. Koundal, K. Ahmed, F. M. Bui, S. M. Ibrahim, Federated machine learning for detection of skin diseases and enhancement of internet of medical things (IoMT) security, IEEE J. Biomed. Health. Inf., 27 (2022), 835–841. https://doi.org/10.1109/JBHI.2022.3149288 doi: 10.1109/JBHI.2022.3149288
![]() |
[46] |
A. Cuevas-Chávez, Y. Hernández, J. Ortiz-Hernandez, E. Sánchez-Jiménez, G. Ochoa-Ruiz, J. Pérez, et al., A systematic review of machine learning and IoT applied to the prediction and monitoring of cardiovascular diseases, Healthcare, 11 (2023), 2240. https://doi.org/10.3390/healthcare11162240 doi: 10.3390/healthcare11162240
![]() |
[47] | A. E. Hassanien, A. Khamparia, D. Gupta, K. Shankar, A. Slowik, Cognitive Internet of Medical Things for Smart Healthcare, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-55833-8_9 |
[48] |
A. L. N. Al-Hajjar, A. K. M. Al-Qurabat, An overview of machine learning methods in enabling iomt-based epileptic seizure detection, J. Supercomput., 79 (2023), 16017–16064. https://doi.org/10.1007/s11227-023-05299-9 doi: 10.1007/s11227-023-05299-9
![]() |
[49] |
W. Zhao, Y. Wang, X. Sun, S. Zhang, X. Li, IoMT-based seizure detection system leveraging edge machine learning, IEEE Sens. J., 23 (2023), 21474–21483. https://doi.org/10.1109/JSEN.2023.3300743 doi: 10.1109/JSEN.2023.3300743
![]() |
[50] | T. M. Ghazal, S. Abbas, M. Ahmad, S. Aftab, An IoMT based ensemble classification framework to predict treatment response in hepatitis C patients, in 2022 International Conference on Business Analytics for Technology and Security (ICBATS), (2022), 1–4. https://doi.org/10.1109/ICBATS54253.2022.9759059 |
[51] |
A. S. Rajawat, S. Goyal, P. Bedi, T. Jan, M. Whaiduzzaman, M. Prasad, Quantum machine learning for security assessment in the internet of medical things (IoMT), Future Internet, 15 (2023), 271. https://doi.org/10.3390/fi15080271 doi: 10.3390/fi15080271
![]() |
[52] |
A. Si-Ahmed, M. A. Al-Garadi, N. Boustia, Survey of machine learning based intrusion detection methods for internet of medical things, Appl. Soft Comput., 140 (2023), 110227. https://doi.org/10.1016/j.asoc.2023.110227 doi: 10.1016/j.asoc.2023.110227
![]() |
[53] |
V. Chang, J. Bailey, Q. A. Xu, Z. Sun, Pima indians diabetes mellitus classification based on machine learning (ML) algorithms, Neural Comput. Appl., 35 (2023), 16157–16173. https://doi.org/10.1007/s00521-022-07049-z doi: 10.1007/s00521-022-07049-z
![]() |
[54] |
C. Iwendi, S. Khan, J. H. Anajemba, A. K. Bashir, F. Noor, Realizing an efficient iomt-assisted patient diet recommendation system through machine learning model, IEEE Access, 8 (2020), 28462–28474. https://doi.org/10.1109/ACCESS.2020.2968537 doi: 10.1109/ACCESS.2020.2968537
![]() |
[55] |
T. Mishra, M. Wang, A. A. Metwally, G. K. Bogu, A. W. Brooks, A. Bahmani, et al., Pre-symptomatic detection of COVID-19 from smartwatch data, Nat. Biomed. Eng., 4 (2020), 1208–1220. https://doi.org/10.1038/s41551-020-00640-6 doi: 10.1038/s41551-020-00640-6
![]() |
[56] |
F. Li, M. Valero, H. Shahriar, R. A. Khan, S. I. Ahamed, Wi-COVID: A COVID-19 symptom detection and patient monitoring framework using WiFi, Smart Health, 19 (2021), 100147. https://doi.org/10.1016/j.smhl.2020.100147 doi: 10.1016/j.smhl.2020.100147
![]() |
[57] |
M. Otoom, N. Otoum, M. A. Alzubaidi, Y. Etoom, R. Banihani, An IoT-based framework for early identification and monitoring of COVID-19 cases, Biomed. Signal Process. Control, 62 (2020), 102149. https://doi.org/10.1016/j.bspc.2020.102149 doi: 10.1016/j.bspc.2020.102149
![]() |
[58] |
S. Venkatasubramanian, Ambulatory monitoring of maternal and fetal using deep convolution generative adversarial network for smart health care IoT system, Int. J. Adv. Comput. Sci. Appl., 13 (2022), 214–222. https://doi.org/10.14569/IJACSA.2022.0130126 doi: 10.14569/IJACSA.2022.0130126
![]() |
[59] |
P. K. Vemuri, A. Kunta, R. Challagulla, S. Bodiga, S. Veeravilli, V. L. Bodiga, et al., Artificial intelligence and internet of medical things based health-care system for real-time maternal stress-strategies to reduce maternal mortality rate, Drug Invent. Today, 13 (2020), 1126–1129. http://dx.doi.org/10.6084/m9.figshare.13213631 doi: 10.6084/m9.figshare.13213631
![]() |
[60] |
X. Li, Y. Lu, X. Fu, Y. Qi, Building the Internet of Things platform for smart maternal healthcare services with wearable devices and cloud computing, Future Gener. Comput. Syst., 118 (2021), 282–296. https://doi.org/10.1016/j.future.2021.01.016 doi: 10.1016/j.future.2021.01.016
![]() |
[61] |
Y. Hao, R. Foster, Wireless body sensor networks for health-monitoring applications, Physiol. Meas., 29 (2008), 27. https://doi.org/10.1088/0967-3334/29/11/R01 doi: 10.1088/0967-3334/29/11/R01
![]() |
[62] |
S. Li, B. Zhang, P. Fei, P. M. Shakeel, R. D. J. Samuel, WITHDRAWN: Computational efficient wearable sensor network health monitoring system for sports athletics using IoT, Aggress Violent Behav., (2020), 101541. https://doi.org/10.1016/j.avb.2020.101541 doi: 10.1016/j.avb.2020.101541
![]() |
[63] |
X. Shi, Z. Huang, Wearable device monitoring exercise energy consumption based on Internet of things, Complexity, 2021 (2021), 8836723. https://doi.org/10.1155/2021/8836723 doi: 10.1155/2021/8836723
![]() |
[64] |
J. Chen, S. Sun, L. Zhang, B. Yang, W. Wang, Compressed sensing framework for heart sound acquisition in internet of medical things, IEEE Trans. Ind. Inf., 18 (2022), 2000–2009. https://doi.org/10.1109/TII.2021.3088465 doi: 10.1109/TII.2021.3088465
![]() |
[65] |
Y. Yao, H. Wu, L. Shu, C. Lu, Developing a multifunctional heating pad based on fuzzy-edge computations and IoMT approach, J. Internet Technol., 23 (2022), 1519–1525. https://doi.org/10.53106/160792642022122307007 doi: 10.53106/160792642022122307007
![]() |
[66] | A. N. Trunov, I. M. Dronyuk, V. S. Martynenko, S. I. Maltsev, I. V. Skopenko, M. Y. Skoroid, Formation of a recurrent neural network for the description of IoMT processes in restorative medicine for post-stroke patients, in AI Models for Blockchain-Based Intelligent Networks in IoT Systems, 6 (2023), 185–202. https://doi.org/10.1007/978-3-031-31952-5_9 |
[67] | S. Shaji, R. Sankaran, R. Guntha, R. K. Pathinarupothi, A real-time IoMT enabled remote cardiac rehabilitation framework, in 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS), (2023), 153–158. https://doi.org/10.1109/COMSNETS56262.2023.10041272 |
[68] | A. Buzachis, G. M. Bernava, M. Busa, G. Pioggia, M. Villari, Towards the basic principles of osmotic computing: a closed-loop gamified cognitive rehabilitation flow model, in 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), (2018), 446–452. https://doi.org/10.1109/CIC.2018.00067 |
[69] | N. Yadav, F. Keshtkar, C. Schweikert, G. Crocetti, Cradle: An IoMT psychophysiological analytics platform, in Proceedings of the Workshop on Human-Habitat for Health (H3): Human-Habitat Multimodal Interaction for Promoting Health and Well-Being in the Internet of Things Era, (2018), 1–7. https://doi.org/10.1145/3279963.3279970 |
[70] | N. Yadav, Y. Jin, L. J. Stevano, AR-IoMT mental health rehabilitation applications for smart cities, in 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), (2019), 166–170. https://doi.org/10.1109/HONET.2019.8907997 |
[71] |
J. Chen, L. Chen, Y. Zhou, Cryptanalysis of a dna-based image encryption scheme, Inf. Sci., 520 (2020), 130–141. https://doi.org/10.1016/j.ins.2020.02.024 doi: 10.1016/j.ins.2020.02.024
![]() |
[72] |
J. Chen, Z. Zhu, L. Zhang, Y. Zhang, B. Yang, Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption, Signal Process., 142 (2018), 340–353. https://doi.org/10.1016/j.sigpro.2017.07.034 doi: 10.1016/j.sigpro.2017.07.034
![]() |
[73] | L. Liu, B. Xu, Research on information security technology based on blockchain, in 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), (2018), 380–384. https://doi.org/10.1109/ICCCBDA.2018.8386546 |
[74] | C. Zhang, C. Wu, X. Wang, Overview of blockchain consensus mechanism, in Proceedings of the 2020 2nd International Conference on Big Data Engineering, (2020), 7–12. https://doi.org/10.1145/3404512.3404522 |
[75] |
S. Kaur, S. Chaturvedi, A. Sharma, J. Kar, A research survey on applications of consensus protocols in blockchain, Secur. Commun. Networks, 2021 (2021), 6693731. https://doi.org/10.1155/2021/6693731 doi: 10.1155/2021/6693731
![]() |
[76] |
P. Chinnasamy, P. Deepalakshmi, V. Praveena, K. Rajakumari, P. Hamsagayathri, Blockchain technology: A step towards sustainable development, Int. J. Innovative Technol. Explor. Eng., 9 (2019), 1034–1040. https://doi.org/10.35940/ijitee.b1109.1292s219 doi: 10.35940/ijitee.b1109.1292s219
![]() |
[77] | Y. Cui, B. Pan, Y. Sun, A survey of privacy-preserving techniques for blockchain, in International Conference on Artificial Intelligence and Security, 11635 (2019), 225–234. https://doi.org/10.1007/978-3-030-24268-8_21 |
[78] |
A. Ghosh, S. Gupta, A. Dua, N. Kumar, Security of cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects, J. Network Comput. Appl., 163 (2020), 102635. https://doi.org/10.1016/j.jnca.2020.102635 doi: 10.1016/j.jnca.2020.102635
![]() |
[79] | B. A. Tama, B. J. Kweka, Y. Park, K. Rhee, A critical review of blockchain and its current applications, in 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), (2017), 109–113. https://doi.org/10.1109/ICECOS.2017.8167115 |
[80] |
P. Ratta, A. Kaur, S. Sharma, M. Shabaz, G. Dhiman, Application of blockchain and internet of things in healthcare and medical sector: Applications, challenges, and future perspectives, J. Food Qual., 2021 (2021), 7608296. https://doi.org/10.1155/2021/7608296 doi: 10.1155/2021/7608296
![]() |
[81] |
I. Yaqoob, K. Salah, R. Jayaraman, Y. Al-Hammadi, Blockchain for healthcare data management: Opportunities, challenges, and future recommendations, Neural Comput. Appl., 34 (2022), 11475–11490. https://doi.org/10.1007/s00521-020-05519-w doi: 10.1007/s00521-020-05519-w
![]() |
[82] | Z. Zhang, L. Zhao, A design of digital rights management mechanism based on blockchain technology, in International Conference on Blockchain, 10974 (2018), 32–46. https://doi.org/10.1007/978-3-319-94478-4_3 |
[83] |
W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, A. Ahmed, Edge computing: A survey, Future Gener. Comput. Syst., 97 (2019), 219–235. https://doi.org/10.1016/j.future.2019.02.050 doi: 10.1016/j.future.2019.02.050
![]() |
[84] |
W. Shi, J. Cao, Q. Zhang, Y. Li, L. Xu, Edge computing: Vision and challenges, IEEE Internet Things J., 3 (2016), 637–646. https://doi.org/10.1109/JIOT.2016.2579198 doi: 10.1109/JIOT.2016.2579198
![]() |
[85] |
S. Wang, Edge computing: Applications, state-of-the-art and challenges, Adv. Networks, 7 (2019), 8–15. https://doi.org/10.11648/j.net.20190701.12 doi: 10.11648/j.net.20190701.12
![]() |
[86] |
W. Shi, S. Dustdar, The promise of edge computing, Computer, 49 (2016), 78–81. https://doi.org/10.1109/MC.2016.145 doi: 10.1109/MC.2016.145
![]() |
[87] |
A. A. Abdellatif, A. Mohamed, C. F. Chiasserini, M. Tlili, A. Erbad, Edge computing for smart health: Context-aware approaches, opportunities, and challenges, IEEE Networks, 33 (2019), 196–203. https://doi.org/10.1109/MNET.2019.1800083 doi: 10.1109/MNET.2019.1800083
![]() |
[88] |
P. P. Ray, D. Dash, D. De, Edge computing for internet of things: A survey, e-healthcare case study and future direction, J. Network Comput. Appl., 140 (2019), 1–22. https://doi.org/10.1016/j.jnca.2019.05.005 doi: 10.1016/j.jnca.2019.05.005
![]() |
[89] | S. M. Kumar, D. Majumder, Healthcare solution based on machine learning applications in IoT and edge computing, Int. J. Pure Appl. Math., 119 (2018), 1473–1484. |
[90] |
K. Subramanian, Digital twin for drug discovery and development-The virtual liver, J. Indian Inst. Sci., 100 (2020), 653–662. https://doi.org/10.1007/s41745-020-00185-2 doi: 10.1007/s41745-020-00185-2
![]() |
[91] |
B. Björnsson, C. Borrebaeck, N. Elander, T. Gasslander, D. R. Gawel, M. Gustafsson, et al., Digital twins to personalize medicine, Genome Med., 12 (2020). https://doi.org/10.1186/s13073-019-0701-3 doi: 10.1186/s13073-019-0701-3
![]() |
[92] |
Y. Tai, L. Zhang, Q. Li, C. Zhu, V. Chang, J. J. P. C. Rodrigues, et al., Digital-twin-enabled IoMT system for surgical simulation using rAC-GAN, IEEE Internet Things J., 9 (2022), 20918–20931. https://doi.org/10.1109/JIOT.2022.3176300 doi: 10.1109/JIOT.2022.3176300
![]() |
[93] | Q. Qu, H. Sun, Y. Chen, Light-weight real-time senior safety monitoring using digital twins, in Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, (2023), 450–451. https://doi.org/10.1145/3576842.3589163 |
[94] |
O. Moztarzadeh, M. Jamshidi, S. Sargolzaei, A. Jamshidi, N. Baghalipour, M. M. Moghani, et al., Metaverse and healthcare: Machine learning-enabled digital twins of cancer, Bioengineering, 10 (2023), 455. https://doi.org/10.3390/bioengineering10040455 doi: 10.3390/bioengineering10040455
![]() |
[95] |
Z. Qu, Y. Li, B. Liu, D. Gupta, P. Tiwari, Dtqfl: A digital twin-assisted quantum federated learning algorithm for intelligent diagnosis in 5G mobile network, IEEE J. Biomed. Health Inf., (2023), 1–10. https://doi.org/10.1109/JBHI.2023.3303401 doi: 10.1109/JBHI.2023.3303401
![]() |
[96] |
Y. Liu, L. Zhang, Y. Yang, L. Zhou, L. Ren, F. Wang, et al., A novel cloud-based framework for the elderly healthcare services using digital twin, IEEE Access, 7 (2019), 49088–49101. https://doi.org/10.1109/ACCESS.2019.2909828 doi: 10.1109/ACCESS.2019.2909828
![]() |
[97] |
Z. Lou, L. Wang, K. Jiang, Z. Wei, G. Shen, Reviews of wearable healthcare systems: Materials, devices and system integration, Mater. Sci. Eng. R Rep., 140 (2020), 100523. https://doi.org/10.1016/j.mser.2019.100523 doi: 10.1016/j.mser.2019.100523
![]() |
[98] |
G. Medic, M. Wille, M. E. Hemels, Short-and long-term health consequences of sleep disruption, Nat. Sci. Sleep, 9 (2017), 151–161. https://doi.org/10.2147/NSS.S134864 doi: 10.2147/NSS.S134864
![]() |
[99] |
V. P. Tran, A. A. Al-Jumaily, S. M. S. Islam, Doppler radar-based non-contact health monitoring for obstructive sleep apnea diagnosis: A comprehensive review, Big Data Cognit. Comput., 3 (2019), 3. https://doi.org/10.3390/bdcc3010003 doi: 10.3390/bdcc3010003
![]() |
[100] |
L. Ismail, R. Buyya, Artificial intelligence applications and self-learning 6G networks for smart cities digital ecosystems: Taxonomy, challenges, and future directions, Sensors, 22 (2022), 5750. https://doi.org/10.3390/s22155750 doi: 10.3390/s22155750
![]() |
[101] |
X. Lin, J. Wu, A. K. Bashir, W. Yang, A. Singh, A. A. AlZubi, Fairhealth: Long-term proportional fairness-driven 5G edge healthcare in internet of medical things, IEEE Trans. Ind. Inf., 18 (2022), 8905–8915. https://doi.org/10.1109/TII.2022.3183000 doi: 10.1109/TII.2022.3183000
![]() |
[102] |
L. Kouhalvandi, L. Matekovits, I. Peter, Magic of 5G technology and optimization methods applied to biomedical devices: A survey, Appl. Sci., 12 (2022), 7096. https://doi.org/10.3390/app12147096 doi: 10.3390/app12147096
![]() |
[103] | M. Malik, S. K. Garg, Towards 6G: Network evolution beyond 5G & indian scenario, in 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), (2022), 123–127. https://doi.org/10.1109/ICIPTM54933.2022.9753847 |
[104] |
S. T. Ahmed, V. V. Kumar, K. K. Singh, A. Singh, V. Muthukumaran, D. Gupta, 6G enabled federated learning for secure IoMT resource recommendation and propagation analysis, Comput. Electr. Eng., 102 (2022), 108210. https://doi.org/10.1016/j.compeleceng.2022.108210 doi: 10.1016/j.compeleceng.2022.108210
![]() |
[105] |
P. N. Srinivasu, M. F. Ijaz, J. Shafi, M.Woźniak, R. Sujatha, 6G driven fast computational networking framework for healthcare applications, IEEE Access, 10 (2022), 94235–94248. https://doi.org/10.1109/ACCESS.2022.3203061 doi: 10.1109/ACCESS.2022.3203061
![]() |
[106] |
A. Koren, R. Prasad, IoT health data in electronic health records (EHR): Security and privacy issues in era of 6G, J. ICT Stand., 10 (2022), 63–84. https://doi.org/10.13052/jicts2245-800X.1014 doi: 10.13052/jicts2245-800X.1014
![]() |
[107] |
I. U. Din, M. Guizani, S. Hassan, B. Kim, M. K. Khan, M. Atiquzzaman, et al., The Internet of Things: A review of enabled technologies and future challenges, IEEE Access, 7 (2018), 7606–7640. https://doi.org/10.1109/ACCESS.2018.2886601 doi: 10.1109/ACCESS.2018.2886601
![]() |
[108] |
S. Nasiri, F. Sadoughi, M. H. Tadayon, A. Dehnad, Security requirements of internet of things-based healthcare system: A survey study, Acta Inf. Med., 27 (2019), 253–258. https://doi.org/10.5455/aim.2019.27.253-258 doi: 10.5455/aim.2019.27.253-258
![]() |
[109] |
J. Granjal, E. Monteiro, J. S. Silva, Security for the internet of things: A survey of existing protocols and open research issues, IEEE Commun. Surv. Tutorials, 17 (2015), 1294–1312. https://doi.org/10.1109/COMST.2015.2388550 doi: 10.1109/COMST.2015.2388550
![]() |
[110] | S. Alasmari, M. Anwar, Security & privacy challenges in IoT-based health cloud, in 2016 International Conference on Computational Science and Computational Intelligence (CSCI), (2016), 198–201. https://doi.org/10.1109/CSCI.2016.0044 |
[111] | S. Agrawal, K. Sharma, Software defined millimeter wave 5th generation communications system, Appl. Theory Comput. Technol., 2 (2017), 46–56. |
[112] |
T. Lin, C. Hsu, T. Le, C. Lu, B. Huang, A smartcard-based user-controlled single sign-on for privacy preservation in 5G-IoT telemedicine systems, Sensors, 21 (2021), 2880. https://doi.org/10.3390/s21082880 doi: 10.3390/s21082880
![]() |
[113] |
S. H. Alsamhi, B. Lee, Blockchain-empowered multi-robot collaboration to fight COVID-19 and future pandemics, IEEE Access, 9 (2020), 44173–44197. https://doi.org/10.1109/ACCESS.2020.3032450 doi: 10.1109/ACCESS.2020.3032450
![]() |
[114] |
T. Zhang, J. Zhao, L. An, D. Liu, Energy efficiency of base station deployment in ultra dense HetNets: A stochastic geometry analysis, IEEE Wireless Commun. Lett., 5 (2016), 184–187. https://doi.org/10.1109/LWC.2016.2516010 doi: 10.1109/LWC.2016.2516010
![]() |
[115] |
A. P. C. Da Silva, M. Meo, M. A. Marsan, Energy-performance trade-off in dense WLANs: A queuing study, Comput. Networks, 56 (2012), 2522–2537. https://doi.org/10.1016/j.comnet.2012.03.017 doi: 10.1016/j.comnet.2012.03.017
![]() |
[116] |
P. K. Sadhu, V. P. Yanambaka, A. Abdelgawad, Physical unclonable function and machine learning based group authentication and data masking for in-hospital segments, Electronics, 11 (2022), 4155. https://doi.org/10.3390/electronics11244155 doi: 10.3390/electronics11244155
![]() |
[117] | P. K. Sadhu, A. Baul, V. P. Yanambaka, A. Abdelgawad, Machine learning and puf based authentication framework for internet of medical things, in 2022 International Conference on Microelectronics (ICM), (2022), 160–163. https://doi.org/10.1109/ICM56065.2022.10005380 |
[118] |
A. Darwish, A. E. Hassanien, M. Elhoseny, A. K. Sangaiah, K. Muhammad, The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems, J. Ambient Intell. Human. Comput., 10 (2019), 4151–4166. https://doi.org/10.1007/s12652-017-0659-1 doi: 10.1007/s12652-017-0659-1
![]() |
1. | Yongxiang Li, Yanyan Wang, The Existence and Uniqueness of Radial Solutions for Biharmonic Elliptic Equations in an Annulus, 2024, 13, 2075-1680, 383, 10.3390/axioms13060383 | |
2. | Danni Zhang, Ziheng Zhang, Sign-changing Solutions for Fourth Order Elliptic Equation with Concave-convex Nonlinearities, 2024, 11, 2409-5761, 1, 10.15377/2409-5761.2024.11.1 |