Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Analysis of a fourth-order compact θ-method for delay parabolic equations

  • The upper bounds for the powers of the iteration matrix derived via a numerical method are intimately related to the stability analysis of numerical processes. In this paper, we establish upper bounds for the norm of the nth power of the iteration matrix derived via a fourth-order compact θ-method to obtain the numerical solutions of delay parabolic equations, and thus present conclusions about the stability properties. We prove that, under certain conditions, the numerical process behaves in a stable manner within its stability region. Finally, we illustrate the theoretical results through the use of several numerical experiments.

    Citation: Lili Li, Boya Zhou, Huiqin Wei, Fengyan Wu. Analysis of a fourth-order compact θ-method for delay parabolic equations[J]. Electronic Research Archive, 2024, 32(4): 2805-2823. doi: 10.3934/era.2024127

    Related Papers:

    [1] Tongmeng Jiang, Pan Jin, Guoxiu Huang, Shi-Cheng Li . The function of guanylate binding protein 3 (GBP3) in human cancers by pan-cancer bioinformatics. Mathematical Biosciences and Engineering, 2023, 20(5): 9511-9529. doi: 10.3934/mbe.2023418
    [2] S. Dinesh Krishnan, Danilo Pelusi, A. Daniel, V. Suresh, Balamurugan Balusamy . Improved graph neural network-based green anaconda optimization for segmenting and classifying the lung cancer. Mathematical Biosciences and Engineering, 2023, 20(9): 17138-17157. doi: 10.3934/mbe.2023764
    [3] Dijian Shen, Youhua Jiang, Kaiyi Tao . Expression and clinical significance of p75NTR in esophageal squamous cell carcinoma. Mathematical Biosciences and Engineering, 2019, 16(6): 8060-8068. doi: 10.3934/mbe.2019405
    [4] Xin Yu, Jun Liu, Ruiwen Xie, Mengling Chang, Bichun Xu, Yangqing Zhu, Yuancai Xie, Shengli Yang . Construction of a prognostic model for lung squamous cell carcinoma based on seven N6-methylandenosine-related autophagy genes. Mathematical Biosciences and Engineering, 2021, 18(5): 6709-6723. doi: 10.3934/mbe.2021333
    [5] Meng Chen, Dacheng Jin, Bing Wang, Yunjiu Gou, Xinchun Dong . Identification of miRNAs as prognostic factors for esophageal squamous cell carcinoma. Mathematical Biosciences and Engineering, 2020, 17(3): 2302-2309. doi: 10.3934/mbe.2020122
    [6] Xiaoli Zhang, Ziying Yu . Pathological analysis of hesperetin-derived small cell lung cancer by artificial intelligence technology under fiberoptic bronchoscopy. Mathematical Biosciences and Engineering, 2021, 18(6): 8538-8558. doi: 10.3934/mbe.2021423
    [7] Zu-Xuan Chen, Guo-Sheng Li, Li-Hua Yang, He-Chuan Liu, Guang-Mei Qin, Lang Shen, Wei-Ying He, Ting-Qing Gan, Jian-Jun Li . Upregulation of BIRC5 plays essential role in esophageal squamous cell carcinoma. Mathematical Biosciences and Engineering, 2021, 18(5): 6941-6960. doi: 10.3934/mbe.2021345
    [8] Jiahua Xing, Muzi Chen, Yan Han . Multiple datasets to explore the tumor microenvironment of cutaneous squamous cell carcinoma. Mathematical Biosciences and Engineering, 2022, 19(6): 5905-5924. doi: 10.3934/mbe.2022276
    [9] Changxiang Huan, Jiaxin Gao . A novel cuproptosis-related lncRNA prognostic signature for predicting treatment and immune environment of head and neck squamous cell carcinoma. Mathematical Biosciences and Engineering, 2022, 19(12): 12127-12145. doi: 10.3934/mbe.2022564
    [10] Yunxiang Meng, Qihong Duan, Kai Jiao, Jiang Xue . A screened predictive model for esophageal squamous cell carcinoma based on salivary flora data. Mathematical Biosciences and Engineering, 2023, 20(10): 18368-18385. doi: 10.3934/mbe.2023816
  • The upper bounds for the powers of the iteration matrix derived via a numerical method are intimately related to the stability analysis of numerical processes. In this paper, we establish upper bounds for the norm of the nth power of the iteration matrix derived via a fourth-order compact θ-method to obtain the numerical solutions of delay parabolic equations, and thus present conclusions about the stability properties. We prove that, under certain conditions, the numerical process behaves in a stable manner within its stability region. Finally, we illustrate the theoretical results through the use of several numerical experiments.



    Camera devices are typical pieces of Internet of Things (IoT) equipment ubiquitously deployed in cyberspace and play an important role in maintaining safety in daily life and industrial operations. However, camera devices are usually technically heterogeneous and geographically dispersed, and it is time-consuming for devices owners to test which cameras are online and whether they are functioning normally. Camera devices are becoming attractive targets of cyber-attacks lack of security management. In 2016, up to 1.5 million webcams were attacked by the Mirai malware. The compromised webcams launched a large-scale distributed denial-of-service (DDoS) attack against some high-profile network infrastructure, causing paralysis of half of the U.S. internet. Therefore, accurately identifying the fine-grained type of device is of great significance for asset management. Conducting cyberspace resource surveying and mapping [1], assessing the impact of equipment vulnerabilities [2], and improving the effectiveness of network device governance [3] also requires understanding the type of devices.

    Precise identification of camera devices is helpful for asset management, vulnerability assessment, and patch upgrading and thus is the groundwork for security management. Concurrently, there are two main kinds of methods for device identification, traffic-based, and web search-based methods—described as follows.

    Traffic-based identification approaches can be classified into two main areas: active probing and passive monitoring.

    Active Traffic Probing. A server sends a request message to a remote host using a specific application protocol (such as HTTP, FTP, POP3, etc.) via an IP address and extracts features from the response. Features match with a pre-established device fingerprint to establish the identification of the device. Shodan [4] is the world's first search engine for networked devices based on this technology. It uses Nmap [5] to periodically perform port scans on approximately 600 million devices around the world and returns banner information through processing to identify specific devices. Scholars at the University of Michigan used the self-developed Zmap [6] scanning tool to build the Censys [7] system to search for devices. In addition, ZoomEye, FoFa, and Oshadan are examples of the implementation of active probing [8], which has strong scalability. For new device types, a fingerprint is added to the fingerprint database to establish identification.

    This method can customize the request packet to obtain a specific response message text, feature data are easy to obtain. However, with the enhancement of security protection strategies, more and more devices no longer respond to request messages. In this case, the response data is not obtained and the device identification is invalid.

    Passive Traffic Monitoring. This technique monitors network traffic without sending any messages. First, it extracts various characteristics such as protocol parameters, packet fingerprints, or communication patterns from the traffic. Second, it establishes an appropriate identification model leveraging machine learning theory is established. Finally, it identifies the device types using the identification model.

    Y. Meidan et al. [9] took a quadruple composed of a source IP, destination IP, port number, and flag bits (SYN, FIN, ACK, etc.) in the TCP session data as characteristics. They used several machine learning approaches to classify and identify IoT devices.

    Miettinen M et al. [10] extracted a total of 23 features (e.g., the protocol types of each layer of the packet, source, and destination port number) from network traffic. They built the SENTINEL system by using the random forest method to classify IoT devices.

    Arunan Sivanathan et al. [11] extracted features such as flow duration, port number, domain name, and cipher suite. They built a multistage classification model based on naive Bayes and random forest methods.

    Cheng et al. [12] took the differences among the device file headers in traffic as features and used classification algorithms such as a backpropagation neural network [13], support vector machine [14], and k-nearest neighbors [15] to identify device types.

    Yang et al. [16] took advantage of the characteristics of device network protocols at different open systems interconnection layers and neural network algorithms to generate the fingerprints of IoT devices for device identification.

    Arunan et al. [17] used traffic characteristics obtained at the network level for IoT device classification. They presented insights into the underlying network traffic characteristics using statistical attributes such as activity cycles, port numbers, signaling patterns, and cipher suites. The work developed a multistage machine learning-based classification algorithm to identify specific IoT devices.

    Sakthi et al. [18] proposed GTID, a wireless device identification technique based on traffic measurement metrics using the Ping and iPerf tools. They collect the interarrival time (IAT) of messages from the switch as features to create a unique and reproducible device signature and use artificial neural networks (ANNs) for classification.

    This type of method circumvents the problem of non-responsive messages due to security policies, but it also limits the acquisition of high-value features and reduces the accuracy of device classification and identification.

    Web-search-based. Web-search-based device identification method acquires knowledge of IoT devices—i.e., IoT devices and related vendors, products, and models—to build a device information repository or establish annotation rules.

    Zou et al. [19] proposed an IoT device recognition framework based on web searches, which identified the brand and model of IoT devices by matching their protocol banners with a product attributes database established by crawling specific electronic business websites.

    Feng [20] proposed an ARE engine that extracts relevant terms from the response data as search query crawl websites. They used an association algorithm to generate rules for IoT device annotations based on vendors, products, and models.

    Agarwal et al. [21] developed a tool named WID that captures the web pages of IoT devices and performs device type classification by analyzing the source code of the web pages.

    This type of approach does not need manual construction of fingerprints or training data to identify device types, but the accuracy relies on the reliability of Internet resources and requires the design of very complex rules for matching attribute information, which limits the accuracy and recall of the algorithm.

    In addition, there is a device type identification method based on clock deviation [22,23,24,25,26,27]. This type of method uses the deviation that still exists after each device is calibrated by the network time protocol (NTP) to classify IoT devices. However, the clock deviation of a device is very difficult to measure, and it is difficult to distinguish the difference in the clock deviation among devices from the same manufacturer. This method of identifying the specific type of device can cause large errors.

    The above methods have high accuracy in identifying coarse-grained device types. However, it is a challenge to accurately identify fine-grained types of devices. We propose a fine-grained camera device identification method based on the inherent features of devices. Inherent features represent characteristics of the device itself, such as device-specific parameters, geometric shapes, physical properties, and technical parameters. There are few research studies based on inherent features for classifying and identifying devices.

    We believe that inherent features can be used to effectively identify the fine-grained device. When distinguishing a device, our method determines the weight of each feature based on the coverage and differences of the inherent features. We develop a feature similarity calculation strategy (FSCS) based on the manifestation of an inherent feature value. Based on each weight and the FSCS, we build a device identification model to establish the fine-grained identification of a device type. The detailed contribution of work is given below:

    1) We propose a new feature weight determination strategy. The method proposed in this paper selects features based on the coverage of inherent attributes. The greater the feature differences among different types are, the better the distinction of the features. For the inherent selection characteristics, we calculate a feature entropy value based on the feature differences, use the feature entropy value to determine a feature weight, and provide a feature weight determination strategy based on a theoretical foundation.

    2) We design a more reasonable feature similarity calculation rule. The inherent characteristics are classified into "phrase type", "numerical value", "interval type", and "collection type" according to the expression form. Similarity calculation rules are developed for each type of inherent characteristic. Compared with a strategy that uses a single calculation rule to calculate all types of similarity, the classification similarity calculation rule is more concise, and the calculation cost is lower.

    3) We construct a fine-grained camera equipment type identification model based on inherent characteristics. Based on the feature weights and similarity calculation rules, we design a device type identification model using the idea of weighted average. This model can recognize fine-grained types of target devices with high accuracy even when some inherent feature values are missing, and it has good applicability in a real environment.

    The rest of the paper is as follows: Section 2 introduces the detailed methodology and steps of the method. The rationality and reliability analysis of the method is given in Section 3. Section 4 presents the experimental results and analysis. In the end, Section 5 concludes our paper and discusses future work.

    In this section, we explain our proposed method in detail. We first present the basic framework, and we explain the notations of our algorithm. Then, we analyze the FSCS. Finally, we build the device identification model. Our proposed basic framework is shown in Figure 1, which includes three phases described as follows.

    Figure 1.  Framework of fine-grained device identification based on inherent features.

    Extracting the inherent features. For data about the inherent attributes (e.g., size, weight, parameter, etc.) of a device fi,n in various types of equipment, we select the inherent attributes with large differences and wide coverage as the inherent features.

    Building the identification model. First, we design the calculation rules of feature similarity using the manifestation of the inherent features. Then, the feature weights are determined from the information entropy of the features in the dataset. Finally, we construct the identification model according to the calculation rules of feature similarity and the weights of the features.

    Identifying the device type. Based on the inherent features of the target device, the similarity between the target device and known devices is calculated to identify the type of the target device, and the device model with the largest similarity value is considered as the model of the target device.

    The notations used to describe our proposed approach and the means of evaluating them are summarized below.

    f: An inherent feature of the device. fi,n is the nth feature of the ith device.

    F: A collection of all inherent features of the device, and the inherent features of the ith device are Fi={fi,1,fi,2,,fi,n}

    Ti: The type of device I. Tno indicates the unknown device type; that is, if the type of device i is unknown, then Ti=Tno.

    devi: A two-tuple composed of the inherent features and type of device i, devi=<Fi,Ti>.

    Dbase: A knowledge set defined as the collection of all known types of devices, Dbase={<Fbase,1,Tbase,1>,<Fbase,2,Tbase,2>,,<Fbase,n,Tbase,n>}, Fbase, n is the feature set of the nth device in the Dbase database and Tbase, n is the type of the nth device in the Dbase database. Tbase,iTno(1in).

    Dtarget: The target set is defined as the set consisting of all types of devices to be identified, Dtarget={<Ftarget,1,Tno>,<Ftarget,2,Tno>,,<Ftarget,s,Tno>}.

    Similarity(fi,k,fj,k): The similarity of the k-th inherent feature between Fj and Fi. At this time, fi,k is called the benchmark feature, and fj,k is the target feature (note: Similarity(fi,k,fj,k) is not necessarily equal to Similarity(fj,k,fi,k)).

    Similarity(Fi,Fj): The similarity of the feature set Fi andFj. At this time, Fi is called the benchmark feature set, and Fj is the target feature set (note: Similarity(Fi,Fj) is not necessarily equal to Similarity(Fj,Fi)).

    Different inherent features are usually expressed in different forms. For example, the size of a device is usually "length × width × height" or "bottom radius × height", and the shape of a device is usually "square", "cylindrical" or "spherical". Therefore, it is necessary to design different feature similarity calculation rules for the features of different expressions. Analyzing the manifestation of the inherent features of the camera devices resulted in the division of the manifestation of the inherent features into four types: "phrase type", "numerical value", "interval type" and "collection type". We design similarity calculation rules for these four manifestations.

    For "phrase type", when the feature phrases are the same, the feature similarity is 1; otherwise, it is 0. Considering the k-th feature of the inherent feature vectors Fbase and Fi as a "phrase type" feature, the similarity calculation strategy between the target feature fi,k and the benchmark feature fbase,k is shown in Eq (1).

    Similarity(fbase,k,fi,k)={1, if fbase,k=fi,k0, if fbase,kfi,k (1)

    For the "numerical type", the size of the feature value and the measurement error ε of the feature value are comprehensively considered. If the kth feature of the inherent feature vectors Fbase and Fi is a "numerical type" feature, we can obtain the similarity calculation strategy between the target feature fi,k and the benchmark feature fbase,k described as Eq (2).

    Similarity(fbase,k,fi,k)={1|fbase,k(fi,k+ε)|max(fbase,k,fi,k), if fbase,k>fi,k 1, if fbase,k=fi,k1|fbase,k(fi,kε)|max(fbase,k,fi,k), if fbase,k<fi,k (2)

    For "interval type", the calculation strategy is designed based on an interval inclusion relationship. If the kth feature of the inherent feature vectors Fbase and Fi is an "interval type" feature, then the similarity calculation strategy between the target feature fi,k and the benchmark feature fbase,k is constructed as Eq (3).

    Similarity(fbase,k,fi,k)={1, if fi,kfbase,k0, if fi,kfbase,k (3)

    For "collection type", the benchmark feature is used as a reference. The target feature and the benchmark feature are vectorized, and the cosine similarity is used to measure the feature similarity. If the kth feature of the inherent feature vectors Fbase and Fi is a "collection type" feature, where fbase,k=(ebase,1,ebase,2,,ebase,n) represents the benchmark feature and fi,k=(ei,1,ei,2,,ei,m) represents the target feature, suppose the vectorization of the benchmark feature is expressed as Vbase,k=(abase,1,abase,2,,abase,n), and the vectorization of the target feature is expressed as Vi,k=(bi,1,bi,2,,bi,n). Then, the vectorization process is as follows: for Vbase,k, rZ+,  1rn, then abase,r=1; for Vi,k, rZ+,  1rn. If ebase,rfi,k, thenbi,r=1. After vectorization, the similarity calculation strategy is expressed as Eq (4).

    Similarity(fbase,k,fi,k)=fi,kr=1bi,rfbase,k×fi,kr=1b2i,r (4)

    where bi,r is the vectorization result of the r-th feature of the i-th device.

    According to the differences in the inherent features, an entropy value of a feature is calculated as the weight value. By using the FSCS combined with the inherent feature weights, the device identification model is constructed. The determination strategy of the inherent feature weight is as follows.

    Given a feature, for each distinct value v of the feature, let v be the number of occurrences of v in the knowledge set, and let f = v/N be the frequency of occurrence of v, where N is the size of the knowledge set. If we approximate f as the probability of v, we can calculate the entropy of the feature as Eq (5).

    Hk=pi·log(pi) (5)

    where pi represents the probability function of the ith value of the feature fk.

    After calculating the entropy H1,H2,,Hn of all features, the weight value w1,w2,,wn of each feature is calculated as Eq (6).

    wi=Hink=1Hk (6)

    According to the similarity calculation strategy and the weight of each feature, a feature set similarity model is constructed as Eq (7).

    Similarity(Fbase,Fi)=Fbasek=1Similarity(fbase,k,fi,k)×wk (7)

    The identification model is used to calculate the similarity between the target device and the known devices. In the process of device type identification, the device type with the largest similarity is considered the device type of the target device, so the device type identification is as Eq (8).

    Ti=Tbase,k|Similarity(Fbase,k,Fi)=max{Similarity(Fbase,j,Fi),<Fbase,j,Tbase,j>∈Dbase} (8)

    In this section, we'll analyze the effectiveness of the inherent feature based device identification and the rationality of the FSCS.

    Devices of different models are usually different in inherent features. For example, as shown in Table 1, camera devices of different models are different in some inherent features such as appearance. size, weight. and so on. So, it's sound and feasible to distinguish devices by their inherent features. We should avoid identifying devices just by one single inherent feature since the measurement process of the value of an inherent feature may introduce deviation, as many as inherent features should be used instead.

    Table 1.  Differences in some inherent attributes of camera devices.
    Camera device model Appearance Size (mm) Weight (g) Imaging component (inches) Compression rate (bps)
    Dahua DH-IPC-HDBW2230R-AS Dome φ122 × 89 406 CMOS, 1/2.7 6K-8 M
    Dahua DH-IPC-HDBW4636R-AS Dome φ122 × 89 444 CMOS, 1/2.9 73K-10 M
    Dahua DH-IPC-HDBW4833R-ZAS Dome φ122 × 88.9 494 CMOS, 1/1.8 16K-14.75 M
    Dahua DH-IPC-HFW4433F-ZAS Bullet 186 × 87 × 85 772 CMOS, 1/3.0 8K-10 M
    Hikvision DS-2CD1311D Dome φ127 × 97.5 570 CMOS, 1/3.0 32K-16 M
    Hikvision DS-2CD3345P1 Dome φ127.3 × 103.7 340 CMOS, 1/3.0 32K-16 M
    Hikvision DS-2CD3646F Barrel 191.4 × 97.9 × 93.5 1260 CMOS, 1/2.7 32K-8 M
    Hikvision DS-2CD3726F Dome 153.3 × 153.3 × 111.6 840 CMOS, 1/2.7 32K-8 M

     | Show Table
    DownLoad: CSV

    Table 1 shows that almost all devices of different types have different values of the "weight" inherent attribute, but it should be noted that in the actual classification process, the value of the "weight" inherent attribute is measured, and deviations are prone to occur during the measurement process. Using only the "weight" attribute as an inherent feature to identify devices results in large errors. It is necessary to use multiple inherent features to identify a camera device. Therefore, the use of multiple inherent features in this method can more effectively identify a device.

    There are 4 types of inherent features: "phrase", "numerical", "interval" and "collection", and each has a corresponding FSCS respectively.

    A. Phrase

    The inherent features of the "phrase" type are described by one or more words. For example, the inherent feature of the shape of a camera device may be described by words like "dome", "bullet", or "barrel". The FSCS of inherent features of the "phrase" type is determined by whether the phrases are the same, so it's reasonable to use Eq (1) to calculate the similarity of two features of the "phrase" type.

    B. Numerical

    For inherent features of the "numerical" type, the similarity depends on numerical differences, and the smaller the numerical difference between two features is, the larger the similarity. Suppose that the kth feature of the vectors Fbase and Fi are both of "numerical" type, a naive calculation strategy for the similarity between the target and benchmark feature would be expressed as Eq (9).

    Similarity(fbase,k,fi,k)={ 1, if fbase,k=fi,k1|fbase,kfi,k|, if fbase,kfi,k (9)

    Note that the impact of |fbase,kfi,k| is relevant to the absolute value of fbase,k or fi,k, so Eq (9) should be revised as Eq (10).

    Similarity(fbase,k,fi,k)=1|fbase,kfi,k|max(fbase,k,fi,k) (10)

    Practically, values of inherent features of the "numerical" type are acquired by measurement. Due to the precision of measurement tools and human errors during the measurement process, there might be a deviation between the real value and measured value of a feature. So, we introduce an error tolerance ϵinto Eq (10) and obtain Eq (2).

    C. Interval

    For inherent features of the "interval" type, the similarity is determined by the relationship between intervals. If the interval value of the benchmark feature is the same as the one of the target feature, the benchmark feature and the target feature are considered the same, and vice versa. Thus, suppose that the kth feature of the inherent feature vectors Fbase and Fi are both of "interval" type, a naive calculation strategy for the similarity between the target feature fi,k and the benchmark feature fbase,k would be described as Eq (11).

    Similarity(fbase,k,fi,k)={1, if fi,k=fbase,k0, if fi,kfbase,k (11)

    Practically, the interval of a benchmark feature is usually complete, and the interval of a target feature is often a subset of the interval of the benchmark feature, so it might be a fault to calculate similarity using Eq (11). We think it's reasonable to use Eq (3) for evaluating the similarity of features of the "interval" type. When a target feature interval is a subset of the benchmark feature interval, the two features are similar, and vice versa. Note that when an interval value is numeric (denoted by a), the numeric value a should be regarded as an interval [a, a].

    D. Collection

    Features of the "collection" type contain multiple elements, and the similarity between features can be determined by the inclusion relationship between collections, or by cosine similarity between vectors after collection vectorization.

    The calculation strategy of cosine similarity is considered to be more accurate than the strategy of inclusion relationship. Taking the "image resolution" feature as an example, suppose that the benchmark and target features are fbase={a×b,c×d}, f1={a×b} and f2={a×b,c×d}, when using calculation strategy of inclusion relationship, the similarity values of f1 vs.fbase and f2vs.fbase are both 1. however, when using calculation strategy of cosine similarity, the similarity value of f1 vs.fbase is 0.5 and value of f2vs.fbase is 1. Obviously, the calculation strategy of cosine similarity gets a smaller error and is more reasonable.

    However, "interval type" features are difficult to vectorize due to the continuous elements, so it is not suitable to use the cosine similarity to measure feature similarity. In contrast, the elements in the "collection type" feature are discrete, and the vectorization process is simple. It is undoubtedly a more reasonable choice to construct an FSCS based on the cosine similarity method with smaller errors. The above analysis shows that the inherent FSCS adopted in this method is reasonable.

    In this section, we conduct two experiments: 1) when the feature sets are complete, a device type identification experiment verifies the feasibility of the method; 2) when features are missing, a device type identification experiment verify the effectiveness of the method.

    We select 40 types of fine-grained devices each from Dahua and Hikvision camera products as the knowledge set of the experiment. The specific device types are shown in Table 2, while each device has a number for the convenience of recording and presentation.

    Table 2.  Device list.
    No. Device model No. Device model
    T01 Dahua DH-IPC-HDBW1020R T21 Hikvision DC-2CD2T45
    T02 Dahua DH-IPC-HDBW2130R-AS T22 Hikvision DS-2CD1225
    T03 Dahua DH-IPC-HDBW2230R-AS T23 Hikvision DS-2CD1311D
    T04 Dahua DH-IPC-HDBW4636R-AS T24 Hikvision DS-2CD3310F-I
    T05 Dahua DH-IPC-HDBW4833R-ZAS T25 Hikvision DS-2CD3345P1
    T06 Dahua DH-IPC-HDPW4233-PT-SA-0360B T26 Hikvision DS-2CD3410FD-IW
    T07 Dahua DH-IPC-HFW4433F-ZAS T27 Hikvision DS-2CD3646F
    T08 Dahua DH-IPC-HFW4631K-AS T28 Hikvision DS-2CD3726F
    T09 Dahua DH-IPC-HFW8841K-ZRL-DS T29 Hikvision DS-2CD3935FWD-IWS
    T10 Dahua DH-IPC-PDBW4638-B270 T30 Hikvision DS-2CD3942F-I
    T11 Dahua DH-CA-DW48 T31 Hikvision DS-2CD3A20F-IS
    T12 Dahua DH-CA-FW19M-IR8 T32 Hikvision DS-2CD3T25-I5
    T13 Dahua DH-HAC-HDW2208E T33 Hikvision DS-2CD3T56WD-I5
    T14 Dahua DH-IPC-EW4431-ASW T34 Hikvision DS-IPC-E22H-IW
    T15 Dahua DH-IPC-HDBW4243E-ZFD T35 Hikvision DS-IPC-T12-I
    T16 ACTi ACM-3001 T36 TP-LINK TL-IPC223
    T17 ACTi ACM-5001 T37 TP-LINK TL-IPC313K-W10
    T18 ACTi ACM-3511 T38 TP-LINK TL-IPC43KZ
    T19 ACTi ACM-5601 T39 TP-LINK TL-IPC546H
    T20 ACTi ACM-7411 T40 TP-LINK TL-IPC646P-A4

     | Show Table
    DownLoad: CSV

    For each device, the device shape (f1), size (f2), weight (f3), imaging component (f4), resolution (f5), minimum illumination (f6), lens parameters (f7), compression code rate (f8), electronic shutter time (f9) and ambient temperature (f10) are inherent features for device identification. The different inherent characteristic values of the different device types are shown in Table 3

    Table 3.  Different intrinsic feature values of different fine-grained device types.
    No. f1 f2
    (mm)
    f3 (g) f4 (inch) f5 f6 (Lux) f7 f8 (bps) f9 (s) f10 (℃)
    T01 Dome 122×89 400 CMOS, 1/4.0 {704×576;1280×720} 0.4;0.22; {6, F2.6, 37;3.6, F2.5, 59;2.8, F2.5, 70.5} 5K- > 5M 1/3- > 1/10-5 -30- > 60
    T02 Dome 122×89 462 CMOS, 1/3.0 {704×576;1280×960;1280×720;704×480} 0.01;0.001;0 {8, F2.5, 35.5;6, F2.1, 47;3.6, F2.0, 72.2;2.8, F2.0, 91.7} 12K- > 6M 1/3- > 1/10-5 -40- > 60
    T03 Dome 122×89 406 CMOS, 1/2.7 {704×576;1920×1080;704×480} 0.01;0.001;0 {8, F2.2, 42;6, F2.0, 55;3.6, F2.0, 90;2.8, F2.0,115} 6K- > 8M 1/3- > 1/10-5 -40- > 60
    T04 Dome 122×89 444 CMOS, 1/2.9 {2688×1520;704×576;2592×1944;1280×720;3072×2048;704×480;2560×1440} 0.002;0.0002;0 {6, F2.5, 47.34;3.6, F2.2, 70;2.8, F2.0, 99} 73K- > 10M 1/3- > 1/10-5 -30- > 60
    T05 Dome 122×88.9 494 CMOS, 1/1.8 {704×576;1920×1080;3840×2160;704×480} 0.002;0.0002;0 {12, F2.8, 45.5;3.5, F1.9,110} 16K- > 14.75M 1/3- > 1/10-5 -40- > 55
    T06 Dome 124.6×82.3 265 CMOS, 1/2.8 {704×576;1920×1080;1920×10801;704×480} 0.002;0.0002;0 {3.6, F1.6, 87} 12K- > 10M 1/3- > 1/10-5 -20- > 50
    T07 Bullet 186×87×85 772 CMOS, 1/3.0 {704×576;1280×720;704×480;2592×1520;2560×1440} 0.001;0.0001;0 {13.5, F3.13, 27.7;2.7, F1.6,104.2} 8K- > 10M 1/3- > 1/10-5 -30- > 60
    T08 Bullet 194×96×89 640 CMOS, 1/2.9 {2688×1520;704×576;2592×1944;1280×720;3072×2048;704×480;2560×1440} 0.002;0.0002;0 {6, F2.5, 47.34;3.6, F2.2, 70;2.8, F2.0, 99} 73K- > 10M 1/3- > 1/10-5 -40- > 60
    T09 Bullet 221×109×101 1080 CMOS, 1/1.8 {704×576;1920×1080;3840×2160;1704×576;704×480} 0.01;0.001;0 {2.7, F1.2,111} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T10 Dome 285.1×100.8 2600 CMOS, 1/2.8 {704×576;1920×1080;1280×720;1280×960;704×480} 0.002;0.0002;0 {12, F2.7, 44;2.7, F1.8,105} 16K- > 8M 1/3- > 1/10-5 -30- > 60
    T11 Dome 113.6×85.4 300 CCD, 1/1.3 {976×582} 0.001;;0 {2.8, F1.2, 0} 16K- > 8M 1/50- > 1/10-5 -30- > 60
    T12 Bullet 194.4×96.6×89.5 400 CMOS, 1/3.0 {1280×720} 0.01;; {3.6, F1.2, 0} 16K- > 8M 1/25- > 1/10-5 -30- > 60
    T13 Dome 110×95 440 CMOS, 1/2.8 {1920×1080;1280×720} 0.001;; {3.6, F1.2, 0} 16K- > 8M 1/1- > 1/30000 -30- > 60
    T14 Dome 126×37.7 500 CMOS, 1/3.0 {2688×1520;704×576;1920×1080;1280×720} 0.001;; {1.6, F1.4,180} 14K- > 40M 1/3- > 1/10-5 -10- > 50
    T15 Dome 159.1×117.9 925 CMOS, 1/2.8 {704×576;1920×1080;704×480} 0.002;0.0002;0 {35, F1.8, 13;13.5, F3.05, 31;7, F1.4, 36;2.7, F1.6,110} 16K- > 8M 1/3- > 1/10-5 -40- > 60
    T16 Dome 130×99 350 CMOS, 1/3.0 {320×240;160×120;640×480} ; ; {4.2, F1.8, 0} 1/5- > 1/2000 0- > 40
    T17 Bullet 67×55 400 CMOS, 1/3.0 {320×240;160×120;640×480} ; ; {4.2, F1.8, 0} 1/5- > 1/2000 0- > 50
    T18 Dome 130×99 380 CMOS, 1/3.0 {320×240;160×112;640×480;1280×1024;1280×720} ; ; {3.3, F1.6, 0} 1/5- > 1/2000 -10- > 45
    T19 Bullet 67×55×129.5 400 CMOS, 1/3.0 {640×480;1280×720;1280×1024} ; ; {4.2, F1.8, 0} 1/5- > 1/2000 0- > 50
    T20 Dome 151.69×114.9 1040 CMOS, 1/3.0 {640×480;1280×720;1280×1024} ; ; {3.3, F1.4, 0} 1/10- > 1/2000 -30- > 50
    T21 Barrel 90×85×169 550 CMOS, 1/3.0 {2560×1440} 0.1;; {1.68, F2.0,180} 32K- > 16M 1/3- > 1/10-5 -30- > 60
    T22 Bullet 100.5×88.1×157.3 600 CMOS, 1/4.0 {1280×720} 0.01;; {12, F1.2, 26;8, F1.2, 39;6, F1.2, 50;4, F1.2, 76;2.8, F1.2, 95} 32K- > 8M 1/25- > 1/10-5 -30- > 60
    T23 Dome 127×97.5 570 CMOS, 1/3.0 {1280×960} 0.01;; {16, F1.2, 18;12, F1.2, 22;8, F1.2, 33;6, F1.2, 50;4, F1.2, 69;2.8, F1.2, 90} 32K- > 16M 1/25- > 1/10-5 -30- > 60
    T24 Dome 114.6×89.4 670 CMOS, 1/3.0 {1280×960} 0.01;; {4, F2.0, 75.8} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T25 Dome 127.3×103.7 340 CMOS, 1/3.0 {2560×1440} 0.01;; {4, F1.2, 69;2.8, F1.2, 90} 32K- > 16M 1/3- > 1/10-5 -10- > 40
    T26 Bullet 66×139.1×70.6 400 CCD, 1/3.0 {1280×920} 0.02;; {4, F2.0, 75.8} 32K- > 16M 1/25- > 1/10-5 -25- > 60
    T27 Barrel 191.4×97.9×93.5 1260 CMOS, 1/2.7 {2560×1440} 0.005;; {2.8, F1.2,105} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T28 Barrel 153.3×153.3×111.6 840 CMOS, 1/2.7 {1920×1080} 0.002;; {2.7, F1.2,103} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T29 Dome 119.9×41.2 600 CMOS, 1/2.8 {1600×1200;1280×960;2048×1536} 0.005;;0 {1.16, F2.2,180} 32K- > 16M 1/3- > 1/10-5 -10- > 40
    T30 Dome 119.9×41.2 600 CMOS, 1/3.0 {2048×1536} 0.01;;0 {1.6, F1.6,186} 32K- > 8M 1/25- > 1/10-5 -10- > 40
    T31 Barrel 134×116.1×293 2000 CMOS, 1/2.8 {1920×1080} 0.01;;0 {25, F1.2, 12.4;16, F1.2, 19.2;12, F1.2, 24.6;8, F1.2, 40;6, F1.2, 52;4, F1.2, 85} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T32 Bullet 194.04×93.85×89.52 1000 CMOS, 1/2.7 {1920×1080;1280×960;1296×732;1280×720} 0.01;; {4, F1.2, 80} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T33 Bullet 93.85×93.52×194.1 690 CMOS, 1/2.7 {704×576;2560×1920;640×480;1280×720;2560×1536;1920×1280;352×288} 0.005;; {6, F1.2, 55;4, F1.2, 83} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T34 Barrel 175×89×75 340 CMOS, 1/2.7 {1920×1080} 0.01;; {8, F1.2, 43;6, F1.2, 54.4;4, F1.2, 89.1;2.8, F1.2,114.8} 32K- > 8M 1/3- > 1/10-5 -30- > 50
    T35 Dome 110×93.2 350 CMOS, 1/2.7 {1920×1080} 0.01;; {8, F1.2, 43;6, F1.2, 54.5;4, F1.2, 91;2.8, F1.2,114.8} 32K- > 8M 1/3- > 1/10-5 -30- > 60
    T36 Dome 113×113×87 268 CMOS, 1/2.7 {1920×1080} 0.1;0.1;0 {4, F2.1, 0;6, F2.1, 0} 64K- > 8M 1/25- > 1/10-5 -30- > 60
    T37 Barrel 173×83.4×84.2 390 CMOS, 1/3.0 {1280×960} 0.1;0.1;0 {2.8, F2.1, 0;4, F2.1, 0;6, F2.1, 0} 64K- > 4M 1/25- > 1/10-5 -10- > 60
    T38 Dome 120×120×129 328 CMOS, 1/2.7 {2304×1296} 0.1;;0 {3.35, F2.4, 0} 64K- > 2M 1/25- > 1/10-5 -30- > 50
    T39 Barrel 173×83.4×84.2 390 CMOS, 1/2.7 {2560×1440} 0.01;; {4, F1.6, 0;6, F1.6, 0;8, F1.6, 0;12, F1.6, 0} 256K- > 6M 1/25- > 1/10-5 -30- > 60
    T40 Ball 230×177×188 930 CMOS, 1/3.0 {2560×1440} 0.002;;0 {4, F1.6, 0} 64K- > 6M 1/25- > 1/10-5 -30- > 60

     | Show Table
    DownLoad: CSV

    In Table 3, f1 and f4 are "phrase type" inherent features; f2, f3, and f6 are "numerical value" inherent features; f8, f9 and f10 are "interval type" inherent features; and f5 and f7 are "collective type" inherent features. The elements in f6 represent the minimum illumination of the color camera, black-and-white camera, and infrared camera. For example, in the f6 value of T01, "0.4; 0.22; -" indicates that the lowest illuminance of the T01 color camera is 0.4 lux, the minimum illuminance of the black-and-white camera is 0.22 lux, and the infrared camera is not supported. Each set element of f7 includes the focal length, aperture, and horizontal field of view. For example, in the f7 value of T01, "6, F2.6, 37" indicates that the focal length is 6 mm, the aperture is F2.6, and the horizontal field of view is 37 degrees.

    From Eqs (5) and (6), we calculate the weight of each feature separately, and the results are w1=0.09089, w2=0.11481, w3=0.11294, w4=0.09217, w5=0.11061, w6=0.10381, w7=0.11596, w8=0.09915, w9=0.07682, and w10=0.08285. In Sections 4.2 and 4.3, we use the calculated feature weights.

    To verify the effectiveness of identifying device types using the inherent features, we carry out a device identification experiment with each feature set complete and calculate the similarity between any two devices.

    We use the feature weights calculated in Section 4.1, set the error tolerance ε=1 for the "numerical type" features, and calculate the difference between any two devices in {T01, T02..., T20} using Eq (7). Figure 2 shows the confusion matrix of the device similarity.

    Figure 2.  Confusion matrix of device similarities.

    In Figure 2, "True Type" represents the actual fine-grained type of the device, and "Basic Type" represents the basic type. When "True Type" is "T02" and "Basic Type" is "T01", the similarity is 0.492, which means that the similarity between T02 and T01 is 0.492 in other words, Similarity(Fbase,1,Ftarget,2)=0.492.

    By using the 10 inherent characteristics described in Section 4.1, Figure 2 shows that the similarity between any two devices is less than 0.85 (the maximum value is 0.842), which can effectively distinguish the devices, in other words, it proves the effectiveness of inherent features in distinguishing devices type. The areas with greater similarity are T1-T15, T16-T20, T21-T25, T36-T40, which indicates that the inherent features of the devices from the same manufacturer are more similar than the devices from different manufacturers.

    Our experiment simulates a situation with incomplete device features in an actual environment. We discard some features or elements of collective features with a certain probability and accomplish fine-grained device identification with incomplete features.

    The discarding probability of an inherent feature changes from 0 to 1 in increments of 0.01. At each discarding probability value, the target set with inherent missing features is generated using the knowledge set, and the similarity between each feature in the target set and the knowledge set is calculated separately, and the greatest similar device type is taken as the target device type. To ensure arbitrary discarding of probability values, the experiment is repeated 1000 times to obtain the average identification accuracy of each type of device.

    The increase of feature discard probability makes the similarity value between fine-grained device types decrease, which is because when a feature value of the target device is empty (i.e., no feature is acquired), the feature similarity between the target device and the knowledge device will be 0. When the target device has fewer non-empty feature values, the similarity value between it and the knowledge set device type will be less. Therefore, we set a similarity threshold in the experiment. When the maximum similarity is less than the threshold, device identification is considered to fail (even if the type corresponding to the maximum similarity is the correct type). When the threshold value is set to 0.5, the graph of the variation between the average recognition accuracy and the discard probability of each type of device is obtained as shown in Figure 3.

    Figure 3.  When the threshold value is 0.5, the relationship between the average identification accuracy and discarding probability.

    In Figure 3, when the discard probability is less than 0.25, the average identification accuracy of the fine-grained type of the device is greater than 90%. When the discard probability is greater than 0.2, the average identification accuracy decreases rapidly with the increase of discard probability. When the discard probability is 0.4, the average identification accuracy is approximately 60%. When the discard probability is 0.8, the average identification accuracy is close to 0.

    An increase in the discard probability inevitably leads to a decrease in the similarity value. While the similarity value of the correct device type decreases, the similarity value between other devices and the target device will also decrease. The strategy of setting the similarity threshold will directly lead to the failure of fine-grained type identification of the device when the discarding probability is large. Figure 4 shows the similarity matrix between the target set devices and the knowledge set devices during the 500th experiment when the discard probability is 0.5.

    Figure 4.  When the discarding probability is 0.5, the 500th result of the device similarity experiment between the target set and the knowledge set.

    Figure 4 shows that when the discarding probability of an inherent feature is 0.5, the maximum similarity value (i.e., T10, T19, etc.) is less than 0.5. However, the device type with the maximum similarity value is the correct device type. Therefore, when a feature is missing, a similarity threshold should not be set (or the threshold should be set to 0).

    Figure 5 shows that when there is no similarity threshold, the average identification accuracy of each device fine-grained type is still greater than 80% even if the discarding rate of inherent features is 50%. When the discard rate is 0.8, the average identification accuracy of each device is greater than 35%. This shows that the method proposed in this paper can still identify the fine-grained types of devices effectively when some inherent features are missing.

    Figure 5.  When there is no similarity threshold, the relationship between the average identification accuracy and the discarding probability.

    In this section, the experimental results based on real data show that the method proposed in this paper to identify the fine-grained type of device based on inherent features is feasible and effective. In reality, the more inherent features of the target device are obtained, the more accurate the identification of the target device will be. When the "missing rate" of inherent features is 50%, the average accuracy to identify the fine-grained type of device still exceeds 80%.

    This paper develops an inherent feature-based device identification method to solve the current deficiency in fine-grained identification of types of camera devices. The method classifies devices inherent features into 4 types according to their expressive form, establishes a similarity calculation strategy (FSCS) for each type of inherent feature, assigns a weight value derived from information entropy for each inherent feature, and constructs a fine-grained device type identification model combining the FSCS and weight value. Experiment results show that the method proposed in this paper can recognize fine-grained types of devices in the partial absence of inherent features. Especially, when the "absence rate" of inherent features is 50%, the average accuracy is still more than 80%. In future work, finding more effective inherent features and combining them with network features may be an important direction to improve the accuracy of fine-grained device type identification.

    We would like to thank the reviewers for their positive suggestions, which helped to improve the paper enormously.

    The authors declare that there is no conflict of interest.



    [1] H. Gong, C. Wang, X. Zhang, Partial regularity of suitable weak solutions of the Navier-Stokes-Planck-Nernst-Poisson equation, SIAM J. Math. Anal., 53 (2021), 3306–3337. https://doi.org/10.1137/19M1292011 doi: 10.1137/19M1292011
    [2] X. Zhai, Y. Chen, Y. Li, Large global solutions of the compressible Navier-Stokes equations in three dimensions, Discrete Contin. Dyn. Syst.: Ser. A, 43 (2023), 309–337. https://doi.org/10.3934/dcds.2022150 doi: 10.3934/dcds.2022150
    [3] Y. Chen, F. Zou, Nonlinear stability of strong traveling waves for a chemotaxis model with logarithmic sensitivity and periodic perturbations, Math. Methods Appl. Sci., 46 (2023), 15123–15146. https://doi.org/10.1002/mma.9365 doi: 10.1002/mma.9365
    [4] F. Liu, J. Yang, X. Yu, Positive solutions to multi-critical elliptic problems, Ann. Mat. Pura Appl., 202 (2023), 851–875. https://doi.org/10.1007/s10231-022-01262-2 doi: 10.1007/s10231-022-01262-2
    [5] B. Dong, J. Wu, X. Zhai, Global small solutions to a special 212-D compressible viscous non-resistive MHD system, J. Nonlinear Sci., 33 (2023). https://doi.org/10.1007/s00332-022-09881-y doi: 10.1007/s00332-022-09881-y
    [6] F. R. Lin, X. Q. Jin, S. L. Lei, Strang-type preconditioners for solving linear systems from delay differential equations, BIT Numer. Math., 43 (2003), 139–152. https://doi.org/10.1007/s100920300001 doi: 10.1007/s100920300001
    [7] Q. Q. Tian, H. X. Zhang, X. H. Yang, X. X. Jiang, An implicit difference scheme for the fourth-order nonlinear non-local PIDEs with a weakly singular kernel, Comput. Appl. Math., 41 (2022), 328. https://doi.org/10.1007/s40314-022-02040-9 doi: 10.1007/s40314-022-02040-9
    [8] Y. Shi, X. Yang, Pointwise error estimate of conservative difference scheme for supergeneralized viscous Burgers' equation, Electron. Res. Arch., 32 (2024), 1471–1497. https://doi.org/10.3934/era.2024068 doi: 10.3934/era.2024068
    [9] J. W. Wang, X. X. Jiang, H. X. Zhang, A BDF3 and new nonlinear fourth-order difference scheme for the generalized viscous Burgers' equation, Appl. Math. Lett., 151 (2024), 109002. https://doi.org/10.1016/j.aml.2024.109002 doi: 10.1016/j.aml.2024.109002
    [10] Y. Shi, X. Yang, A time two-grid difference method for nonlinear generalized viscous Burgers' equation, J. Math. Chem., (2024), 1–28.
    [11] H. X. Zhang, Y. Liu, X. H. Yang, An efficient ADI difference scheme for the nonlocal evolution problem in three-dimensional space, J. Appl. Math. Comput., 69 (2023), 651–674. https://doi.org/10.1007/s12190-022-01760-9 doi: 10.1007/s12190-022-01760-9
    [12] Z. Y. Zhou, H. X. Zhang, X. H. Yang, J. Tang, An efficient ADI difference scheme for the nonlocal evolution equation with multi-term weakly singular kernels in three dimensions, Int. J. Comput. Math., 100 (2023), 1719–1736. https://doi.org/10.1080/00207160.2023.2212307 doi: 10.1080/00207160.2023.2212307
    [13] H. X. Zhang, X. X. Jiang, F. R. Wang, X. H. Yang, The time two-grid algorithm combined with difference scheme for 2D nonlocal nonlinear wave equation, J. Appl. Math. Comput., (2024), 1–25. https://doi.org/10.1007/s12190-024-02000-y doi: 10.1007/s12190-024-02000-y
    [14] G. Yuan, D. Ding, W. Lu, F. Wu, A linearized fourth-order compact ADI method for phytoplankton-zooplankton model arising in marine ecosystem, Comput. Appl. Math., 43 (2024), 1–22. https://doi.org/10.1007/s40314-023-02570-w doi: 10.1007/s40314-023-02570-w
    [15] Y. Kuang, Differential Equations with Applications in Population Dynamics, Academic Press, Boston, 1993.
    [16] J. Kongson, S. Amornsamankul, A model of the signal transduction process under a delay, East Asian J. Appl. Math., 7 (2017), 741–751. https://doi.org/10.4208/eajam.181016.300517a doi: 10.4208/eajam.181016.300517a
    [17] W. Kang, E. Fridman, Boundary constrained control of delayed nonlinear Schrödinger equation, IEEE Trans. Autom. Control, 63 (2018), 3873–3880. https://doi.org/10.1109/TAC.2018.2800526 doi: 10.1109/TAC.2018.2800526
    [18] T. Zhang, L. Xiong, Periodic motion for impulsive fractional functional differential equations with piecewise Caputo derivative, Appl. Math. Lett., 101 (2020), 106072. https://doi.org/10.1016/j.aml.2019.106072 doi: 10.1016/j.aml.2019.106072
    [19] T. Zhang, Y. Li, Exponential Euler scheme of multi-delay Caputo-Fabrizio fractional-order differential equations, Appl. Math. Lett., 124 (2022), 107709. https://doi.org/10.1016/j.aml.2021.107709 doi: 10.1016/j.aml.2021.107709
    [20] J. Wu, Theory and Application of Partial Functional Differential Equation, in Applied Mathematical Sciences, Springer, 1996.
    [21] A. Bellen, M. Zennaro, Numerical Methods for Delay Differential Equations, Oxford University Press, Oxford, 2003.
    [22] D. Li, C. Zhang, W. Wang, Long time behavior of non-Fickian delay reaction-diffusion equations, Nonlinear Anal. Real. World Appl., 13 (2012), 1401–1415. https://doi.org/10.1016/j.nonrwa.2011.11.005 doi: 10.1016/j.nonrwa.2011.11.005
    [23] C. Tang, C. Zhang, A fully discrete θ-method for solving semi-linear reaction-diffusion equations with time-variable delay, Math. Comput. Simulat., 179 (2021), 48–56. https://doi.org/10.1016/j.matcom.2020.07.019 doi: 10.1016/j.matcom.2020.07.019
    [24] J. Xie, Z. Zhang, The high-order multistep ADI solver for two-dimensional nonlinear delayed reaction-diffusion equations with variable coefficients, Comput. Math. Appl., 75 (2018), 3558–3570. https://doi.org/10.1016/j.camwa.2018.02.017 doi: 10.1016/j.camwa.2018.02.017
    [25] J. Xie, D. Deng, H. Zheng, A compact difference scheme for one-dimensional nonlinear delay reaction-diffusion equations with variable coefficient, IAENG Int. J. Appl. Math., 47 (2017), 14–19.
    [26] T. Zhang, Y. Liu, Global mean-square exponential stability and random periodicity of discrete-time stochastic inertial neural networks with discrete spatial diffusions and Dirichlet boundary condition, Comput. Math. Appl., 141 (2023), 116–128. https://doi.org/10.1016/j.camwa.2023.04.011 doi: 10.1016/j.camwa.2023.04.011
    [27] H. Liang, Convergence and asymptotic stability of Galerkin methods for linear parabolic equations with delay, Appl. Math. Comput., 15 (2015), 160–178. https://doi.org/10.1016/j.amc.2015.04.104 doi: 10.1016/j.amc.2015.04.104
    [28] G. Zhang, A. Xiao, J. Zhou, Implicit-explicit multistep finite-element methods for nonlinear convection-diffusion-reaction equations with time delay, Int. J. Comput. Math., 95 (2018), 2496–2510. https://doi.org/10.1080/00207160.2017.1408802 doi: 10.1080/00207160.2017.1408802
    [29] W. Wang, L. Yi, A. Xiao, A posteriori error estimates for fully discrete finite element method for generalized diffusion equation with delay, J. Sci. Comput., 84 (2020), 1–27. https://doi.org/10.1007/s10915-020-01262-5 doi: 10.1007/s10915-020-01262-5
    [30] H. Han, C. Zhang, Galerkin finite element methods solving 2D initial-boundary value problems of neutral delay-reaction-diffusion equations, Comput. Math. Appl., 92 (2021), 159–171. https://doi.org/10.1016/j.camwa.2021.03.030 doi: 10.1016/j.camwa.2021.03.030
    [31] X. H. Yang, W. L. Qiu, H. F. Chen, H. X. Zhang, Second-order BDF ADI Galerkin finite element method for the evolutionary equation with a nonlocal term in three-dimensional space, Appl. Numer. Math., 172 (2022), 497–513. https://doi.org/10.1016/j.apnum.2021.11.004 doi: 10.1016/j.apnum.2021.11.004
    [32] D. Li, C. Zhang, Nonlinear stability of discontinuous Galerkin methods for delay differential equations, Appl. Math. Lett., 23 (2010), 457–461. https://doi.org/10.1016/j.aml.2009.12.003 doi: 10.1016/j.aml.2009.12.003
    [33] D. Li, C. Zhang, Superconvergence of a discontinuous Galerkin method for first-order linear delay differential equations, J. Comput. Math., (2011), 574–588. https://doi.org/10.4208/jcm.1107-m3433 doi: 10.4208/jcm.1107-m3433
    [34] D. Li, C. Zhang, L error estimates of discontinuous Galerkin methods for delay differential equations, Appl. Numer. Math., 82 (2014), 1–10. https://doi.org/10.1016/j.apnum.2014.01.008 doi: 10.1016/j.apnum.2014.01.008
    [35] G. Zhang, X. Dai, Superconvergence of discontinuous Galerkin method for neutral delay differential equations, Int. J. Comput. Math., 98 (2021), 1648–1662. https://doi.org/10.1080/00207160.2020.1846030 doi: 10.1080/00207160.2020.1846030
    [36] A. Araújo, J. R. Branco, J. A. Ferreira, On the stability of a class of splitting methods for integro-differential equations, Appl. Numer. Math., 59 (2009), 436–453. https://doi.org/10.1016/j.apnum.2008.03.005 doi: 10.1016/j.apnum.2008.03.005
    [37] X. H. Yang, Z. M. Zhang, On conservative, positivity preserving, nonlinear FV scheme on distorted meshes for the multi-term nonlocal Nagumo-type equations, Appl. Math. Lett., 150 (2024), 108972. https://doi.org/10.1016/j.aml.2023.108972 doi: 10.1016/j.aml.2023.108972
    [38] X. H. Yang, H. X. Zhang, Q. Zhang, G. Y. Yuan, Simple positivity-preserving nonlinear finite volume scheme for subdiffusion equations on general non-conforming distorted meshes, Nonlinear Dyn., 108 (2022), 3859–3886. https://doi.org/10.1007/s11071-022-07399-2 doi: 10.1007/s11071-022-07399-2
    [39] E. Ávila-Vales, Á. G. C. Pérez, Dynamics of a time-delayed SIR epidemic model with logistic growth and saturated treatment, Chaos Soliton Fract., 127 (2019), 55–69. https://doi.org/10.1016/j.chaos.2019.06.024 doi: 10.1016/j.chaos.2019.06.024
    [40] H. Akca, G. E. Chatzarakis, I. P. Stavroulakis, An oscillation criterion for delay differential equations with several non-monotone arguments, Appl. Math. Lett., 59 (2016), 101–108. https://doi.org/10.1016/j.aml.2016.03.013 doi: 10.1016/j.aml.2016.03.013
    [41] J. Zhao, Y. Li, Y. Xu, Convergence and stability analysis of exponential general linear methods for delay differential equations, Numer. Math. Theory Methods Appl., 11 (2018), 354–382. https://doi.org/10.4208/nmtma.OA-2017-0032 doi: 10.4208/nmtma.OA-2017-0032
    [42] A. S. Hendy, V. G. Pimenov, J. E. Macias-Diaz, Convergence and stability estimates in difference setting for time-fractional parabolic equations with functional delay, Numer. Methods Part. Differ. Equations, 36 (2020), 118–132. https://doi.org/10.1002/num.22421 doi: 10.1002/num.22421
    [43] L. Blanco-Cocom, E. Ávila-Vales, Convergence and stability analysis of the θ-method for delayed diffusion mathematical models, Appl. Math. Comput., 231 (2014), 16–26. https://doi.org/10.1016/j.amc.2013.12.188 doi: 10.1016/j.amc.2013.12.188
    [44] L. J. Wu, H. X. Zhang, X. H. Yang, The finite difference method for the fourth-order partial integro-differential equations with the multi-term weakly singular kernel, Math. Method Appl. Sci., 46 (2023), 2517–2537. https://doi.org/10.1002/mma.8658 doi: 10.1002/mma.8658
    [45] L. J. Wu, H. X. Zhang, X. H.Yang, F. R. Wang, A second-order finite difference method for the multi-term fourth-order integral-differential equations on graded meshes, Comput. Appl. Math., 41 (2022), 313. https://doi.org/10.1007/s40314-022-02026-7 doi: 10.1007/s40314-022-02026-7
    [46] C. Huang, S. Vandewalle, Unconditionally stable difference methods for delay partial differential equations, Numer. Math., 122 (2012), 579–601. https://doi.org/10.1007/s00211-012-0467-7 doi: 10.1007/s00211-012-0467-7
    [47] D. Li, C. Zhang, J. Wen, A note on compact finite difference method for reaction-diffusion equations with delay, Appl. Math. Model., 39 (2015), 1749–1754. https://doi.org/10.1016/j.apm.2014.09.028 doi: 10.1016/j.apm.2014.09.028
    [48] D. Green, H. W. Stech, Diffusion and Hereditary Effects in a Class of Population Models in Differential Equations and Applications in Ecology, Epidemics, and Population Problems, Academic Press, New York, 1981.
    [49] Q. Zhang, M. Chen, Y. Xu, D. Xu, Compact θ-method for the generalized delay diffusion equation, Appl. Math. Comput., 316 (2018), 357–369. https://doi.org/10.1016/j.amc.2017.08.033 doi: 10.1016/j.amc.2017.08.033
    [50] F. Wu, D. Li, J. Wen, J. Duan, Stability and convergence of compact finite difference method for parabolic problems with delay, Appl. Math. Comput., 322 (2018), 129–139. https://doi.org/10.1016/j.amc.2017.11.032 doi: 10.1016/j.amc.2017.11.032
    [51] H. Tian, Asymptotic stability analysis of the linear θ-method for linear parabolic differential equations with delay, J. Differ. Equations. Appl., 15 (2009), 473–487. https://doi.org/10.1080/10236190802128284 doi: 10.1080/10236190802128284
    [52] S. V. Parter, Stability, convergence, and pseudo-stability of finite-difference equations for an overdetermined problem, Numer. Math., 4 (1962), 277–292.
    [53] M. N. Spijker, Numerical stability, resolvent conditions and delay differential equations, Appl. Numer. Math., 24 (1997), 233–246. https://doi.org/10.1016/S0168-9274(97)00023-8 doi: 10.1016/S0168-9274(97)00023-8
    [54] J. van Dorsselaer, J. Kraaijevanger, M. N. Spijker, Linear stability analysis in the numerical solution of initial value problems, Acta Numer., (1993), 199–237.
    [55] B. Zubik-Kowal, Stability in the numerical solution of linear parabolic equations with a delay term, BIT Numer. Math., 41 (2001), 191–206. https://doi.org/10.1023/A:1021930104326 doi: 10.1023/A:1021930104326
    [56] E. G. Van den Heuvel, Using resolvent conditions to obtain new stability results for θ-methods for delay differential equations, IMA J. Numer. Anal., 1 (2001), 421–438. https://doi.org/10.1093/imanum/21.1.421 doi: 10.1093/imanum/21.1.421
    [57] S. K. Jaffer, J. Zhao, M. Liu, Stability of linear multistep methods for delay differential equations in the light of Kreiss resolvent condition, Journal of Harbin Insititute of Technology-English edition, 8 (2001), 155–158.
    [58] C. Lubich, O. Nevanlinna, On resolvent conditions and stability estimates, BIT Numer. Math., 31 (1991), 293–313. https://doi.org/10.1007/BF01931289 doi: 10.1007/BF01931289
    [59] Q. Zhang, L. Liu, C. Zhang, Compact scheme for fractional diffusion-wave equation with spatial variable coefficient and delays, Appl. Anal., 101 (2022), 1911–1932. https://doi.org/10.1080/00036811.2020.1789600 doi: 10.1080/00036811.2020.1789600
    [60] Z. Y. Zhou, H. X. Zhang, X. H. Yang, The compact difference scheme for the fourth-order nonlocal evolution equation with a weakly singular kernel, Math. Method Appl. Sci., 46 (2023), 5422–5447. https://doi.org/10.1002/mma.8842 doi: 10.1002/mma.8842
    [61] J. W. Wang, X. X. Jiang, X. H. Yang, H. X. Zhang, A nonlinear compact method based on double reduction order scheme for the nonlocal fourth-order PDEs with Burgers' type nonlinearity, J. Appl. Math. Comput., 70 (2024), 489–511. https://doi.org/10.1007/s12190-023-01975-4 doi: 10.1007/s12190-023-01975-4
    [62] X. Mao, Q. Zhang, D. Xu, Y. Xu, Double reduction order method based conservative compact schemes for the Rosenau equation, Appl. Numer. Math., 197 (2024), 15–45. https://doi.org/10.1016/j.apnum.2023.11.001 doi: 10.1016/j.apnum.2023.11.001
    [63] W. Wang, H. X. Zhang, Z. Y. Zhou, X. H. Yang, A fast compact finite difference scheme for the fourth-order diffusion-wave equation, Int. J. Comput. Math., (2024), 1–24. https://doi.org/10.1080/00207160.2024.2323985 doi: 10.1080/00207160.2024.2323985
    [64] J. W. Thomas, Numerical Partial Differential Equations: Finite Difference Methods, in Texts in Applied Mathematics, Springer, Berlin, 1995.
    [65] J. Zhao, X. Jiang, Y. Xu, Generalized Adams method for solving fractional delay differential equations, Math. Comput. Simulat., 180 (2021), 401–419. https://doi.org/10.1016/j.matcom.2020.09.006 doi: 10.1016/j.matcom.2020.09.006
    [66] F. R. Wang, X. H. Yang, H. X. Zhang, L. J. Wu, A time two-grid algorithm for the two dimensional nonlinear fractional PIDE with a weakly singular kernel, Math. Comput. Simulat., 199 (2022), 38–59. https://doi.org/10.1016/j.matcom.2022.03.004 doi: 10.1016/j.matcom.2022.03.004
    [67] X. H. Yang, H. X. Zhang, The uniform l1 long-time behavior of time discretization for time-fractional partial differential equations with nonsmooth data, Appl. Math. Lett., 124 (2022), 107644. https://doi.org/10.1016/j.aml.2021.107644 doi: 10.1016/j.aml.2021.107644
    [68] C. J. Li, H. X. Zhang, X. H. Yang, A new α-robust nonlinear numerical algorithm for the time fractional nonlinear KdV equation, Commun. Anal. Mech., 16 (2024), 147–168. https://doi.org/10.3934/cam.2024007 doi: 10.3934/cam.2024007
    [69] W. Xiao, X. H. Yang, Z. Z. Zhou, Pointwise-in-time α-robust error estimate of the ADI difference scheme for three-dimensional fractional subdiffusion equations with variable coefficients, Commun. Anal. Mech., 16 (2024), 53–70. https://doi.org/10.3934/cam.2024003 doi: 10.3934/cam.2024003
  • This article has been cited by:

    1. Yuan-jie Liu, Jie-pin Li, Mei Han, Jing-xiao Li, Qian-wen Ye, Si-tian Lin, Jin-yong Zhou, Shen-lin Liu, Xi Zou, IFIT1 + neutrophil is a causative factor of immunosuppressive features of poorly cohesive carcinoma (PCC), 2024, 22, 1479-5876, 10.1186/s12967-024-05389-z
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1369) PDF downloads(69) Cited by(0)

Figures and Tables

Figures(4)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog