Let Tn be the algebra of all n × n complex upper triangular matrices. We give the concrete forms of linear injective maps on Tn which preserve the nonzero idempotency of either products of two matrices or triple ...Let Tn be the algebra of all n × n complex upper triangular matrices. We give the concrete forms of linear injective maps on Tn which preserve the nonzero idempotency of either products of two matrices or triple Jordan products of two matrices.展开更多
This note considers the solution to the generalized Sylvester matrix equation AV + BW = VF with F being an arbitrary matrix, where V and W are the matrices to be determined. With the help of the Kronecker map, an exp...This note considers the solution to the generalized Sylvester matrix equation AV + BW = VF with F being an arbitrary matrix, where V and W are the matrices to be determined. With the help of the Kronecker map, an explicit parametric solution to this matrix equation is established. The proposed solution possesses a very simple and neat form, and allows the matrix F to be undetermined.展开更多
Let G be a generalized matrix algebra over a commutative ring R and Z(G) be the center of G. Suppose that F, T :G→G are two co-commuting R-linear mappings, i.e., F(x)x = xT(x) for all x ∈ G. In this note, we ...Let G be a generalized matrix algebra over a commutative ring R and Z(G) be the center of G. Suppose that F, T :G→G are two co-commuting R-linear mappings, i.e., F(x)x = xT(x) for all x ∈ G. In this note, we study the question of when co-commuting mappings on G are proper.展开更多
As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged ...As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged over the network, a hybrid cryptographic mechanism which includes both symmetric and asymmetric cryptographic functions is used. The public key cryptographic ECC security implementation in this paper performs a matrix mapping of data’s at the points on the elliptical curve, which are further encoded using the private symmetric cipher cryptographic algorithm. This security enhancement with the hybrid mechanism of ECC and symmetric cipher cryptographic scheme achieves efficiency in energy conservation of about 7% and 4% compared to the asymmetric and symmetric cipher security implementations in WSN.展开更多
The hot deformation characteristics of TiC particles reinforced titanium matrix composite were studied in the temperature range from 900 ℃ to 1 150 ℃ and in the strain rate range of 10-3-10 s-1 by compression tests ...The hot deformation characteristics of TiC particles reinforced titanium matrix composite were studied in the temperature range from 900 ℃ to 1 150 ℃ and in the strain rate range of 10-3-10 s-1 by compression tests with Gleeble1500 simulator system. The flow behavior was described by the hyperbolic sine constitutive equation,and an average activation energy of 436.72 kJ/mol was calculated. The processing maps were calculated and analyzed according to the dynamic materials model. The maps show domains in some combinations of temperatures and strain rates and these domains are correlated with specific microstructural processes occurring during hot deformation by metallographic investigations and kinetic analysis. At the low strain rate domain occurs in the temperature range of 900-960 ℃ and strain rate range of 0.001-0.03 s-1 superplasticity and dynamic recrystallization were observed. At a high strain rate domain occurs in the temperature range of 980-1 120 ℃ and strain rate range of 0.1-10 s-1 the β phase undergoes dynamic recrystallization. Also,at a strain rate range of 0.1-10 s-1 and the temperature range of 900-930 ℃,the material exhibits flow localization.展开更多
目的探讨距骨骨软骨损伤(osteochondral lesions of the talus,OLT)软骨基质金属蛋白酶-1(matrix metalloproteinase-1,MMP-1)的表达与磁共振T2值之间的关系及其在距骨骨软骨损伤的机制。材料与方法收集30例踝关节距骨骨软骨损伤行微创...目的探讨距骨骨软骨损伤(osteochondral lesions of the talus,OLT)软骨基质金属蛋白酶-1(matrix metalloproteinase-1,MMP-1)的表达与磁共振T2值之间的关系及其在距骨骨软骨损伤的机制。材料与方法收集30例踝关节距骨骨软骨损伤行微创治疗术患者及30名健康志愿者,均行3.0 T常规踝关节磁共振成像(magnetic resonance imaging,MRI)及T2-mapping功能成像,测量距骨软骨T2值。术后离体距骨骨软骨行苏木精-伊红染色(hematoxylin-eosin staining,HE)和Western Blot法分析距骨骨软骨MMP-1的表达,统计学分析距骨骨软骨T2值与MMP-1蛋白表达的相关性。结果距骨骨软骨损伤以内中侧最为多见(磁共振6分区法),距骨骨软骨T2值随软骨损伤Mankin分级明显增大(P<0.05)。软骨MMP-1蛋白表达高级别与低级别差异明显(P<0.05)。软骨T2值与软骨MMP-1表达呈线性相关趋势,Pearson分析距骨骨软骨损伤T2值增加与MMP-1蛋白表达增加呈直线性正相关(r=0.821,P<0.0001)。结论距骨骨软骨损伤以内中侧最为多见,距骨骨软骨磁共振T2值随软骨损伤分级逐级递增;距骨骨软骨损伤磁共振T2值与MMP-1蛋白表达呈正相关,距骨骨软骨磁共振T2-mapping功能成像T2值定量分析可在体、无创性预测不同级别软骨损伤MMP-1蛋白的表达含量,为临床治疗OLT提供影像学定量依据。展开更多
To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different bloc...To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks.展开更多
In addition to the known method given in [1], authors provide other three methods to the enumeration of one-vertex maps with face partition on the plane. Correspondingly, there are four functional equations in the enu...In addition to the known method given in [1], authors provide other three methods to the enumeration of one-vertex maps with face partition on the plane. Correspondingly, there are four functional equations in the enufuntion. It is shown that the four equations are equivalent. Moreover, an explicit expression of the solution is found by expanding the powers of the matrix of infinite order directly. This is a new complement of what appeared in [1].展开更多
In this paper we discuss neural network-based matrix effect correction in energy dispersive X-ray fluorescence (EDXRF) analysis,with detailed algorithm to classify the samples.The method can correct the matrix effect ...In this paper we discuss neural network-based matrix effect correction in energy dispersive X-ray fluorescence (EDXRF) analysis,with detailed algorithm to classify the samples.The method can correct the matrix effect effectively through classifying the samples automatically,and influence of X-ray absorption and enhancement by major elements of the samples is reduced.Experiments for the complex matrix effect correction in EDXRF analysis of samples in Pangang showed improved accuracy of the elemental analysis result.展开更多
A self-adaptive parallel encryption algorithm based on discrete 2D-Logistic map is developed according to the position scrambling and diffusion of multi-direction in variable space of spatial chaos. The binary sequenc...A self-adaptive parallel encryption algorithm based on discrete 2D-Logistic map is developed according to the position scrambling and diffusion of multi-direction in variable space of spatial chaos. The binary sequences b1b2b3···bn are obtained according to the user key, in which the binary sequence 0 and 1 denote distribution mode of processors and the number of binary sequence n denotes cycle number. Then the pseudorandom 2D matrix is generated by 2D-Logistic map, and adaptive segmentation is applied in image matrix and pseudorandom matrix according to the value and the number of binary sequence. The parallel operation is used among blocks to improve efficiency and meet real-time demand in transmission processes. However, the pixel permutation is applied in partitioned matrix through ergodic matrix generated by pseudo-random matrix-block to decrease the correlation of adjacent pixels. Then the pixel substitution is used for fully diffusing through cipher block chaining mode until n cycles. The proposed algorithm can meet the three requirements of parallel operation in image encryption and the real-time requirement in transmission processes. The security is proved by theoretical analysis and simulation results.展开更多
A property(C) for permutation pairs is introduced. It is shown that if a pair{π_1, π_2} of permutations of(1,2,…,n) has property(C),then the D-type map Φ_(π_1,π_2) on n× n complex matrices constructed from ...A property(C) for permutation pairs is introduced. It is shown that if a pair{π_1, π_2} of permutations of(1,2,…,n) has property(C),then the D-type map Φ_(π_1,π_2) on n× n complex matrices constructed from {π_1,π_2} is positive. A necessary and sufficient condition is obtained for a pair {π_1,π_2} to have property(C),and an easily checked necessary and sufficient condition for the pairs of the form {π~p,π~q} to have property(C) is given, whereπ is the permutation defined by π(i) = i + 1 mod n and 1≤ p < q≤ n.展开更多
In response to the problem of inter-carrier interference(ICI)and inter-subband interference(IBI)in the received signals of universal filtered multi-carrier(UFMC)systems,a novel interfer-ence suppression design scheme ...In response to the problem of inter-carrier interference(ICI)and inter-subband interference(IBI)in the received signals of universal filtered multi-carrier(UFMC)systems,a novel interfer-ence suppression design scheme applying the method of complex weighted matrix inter-leaving map-ping(CWMIM)is proposed on the basis of the existing suppression scheme of conjugate weighted butterfly interleaving mapping(CWBIM).The proposed scheme performs matrix interleaving map-ping on the transmitted signal,which not only improves the carrier interference ratio(CIR)of the received signal by combining the original IBI and ICI terms,but also further inhibits the probability of burst error in the received signal.Meanwhile,the scheme can further decrease the impact of phase rotation errors in the received signal by increasing the number of rotation factors.Theoretical analysis and simulation results demonstrate that compared with CWBIM-UFMC,the proposed CWMIM-UFMC can obtain more effective ICI and IBI suppression and better system bit error rate(BER)performance with only a little bit increase in computational complexity.展开更多
基金The NSF (10571114) of Chinathe Natural Science Basic Research Plan (2005A1) of Shaanxi Province of China
文摘Let Tn be the algebra of all n × n complex upper triangular matrices. We give the concrete forms of linear injective maps on Tn which preserve the nonzero idempotency of either products of two matrices or triple Jordan products of two matrices.
基金the National Natural Science Foundation of China (No.60374024)the Program for Changjiang Scholars and Innovative Research Team in University
文摘This note considers the solution to the generalized Sylvester matrix equation AV + BW = VF with F being an arbitrary matrix, where V and W are the matrices to be determined. With the help of the Kronecker map, an explicit parametric solution to this matrix equation is established. The proposed solution possesses a very simple and neat form, and allows the matrix F to be undetermined.
文摘Let G be a generalized matrix algebra over a commutative ring R and Z(G) be the center of G. Suppose that F, T :G→G are two co-commuting R-linear mappings, i.e., F(x)x = xT(x) for all x ∈ G. In this note, we study the question of when co-commuting mappings on G are proper.
文摘As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged over the network, a hybrid cryptographic mechanism which includes both symmetric and asymmetric cryptographic functions is used. The public key cryptographic ECC security implementation in this paper performs a matrix mapping of data’s at the points on the elliptical curve, which are further encoded using the private symmetric cipher cryptographic algorithm. This security enhancement with the hybrid mechanism of ECC and symmetric cipher cryptographic scheme achieves efficiency in energy conservation of about 7% and 4% compared to the asymmetric and symmetric cipher security implementations in WSN.
基金Projects(50434030) supported by the National Natural Science Foundation of China
文摘The hot deformation characteristics of TiC particles reinforced titanium matrix composite were studied in the temperature range from 900 ℃ to 1 150 ℃ and in the strain rate range of 10-3-10 s-1 by compression tests with Gleeble1500 simulator system. The flow behavior was described by the hyperbolic sine constitutive equation,and an average activation energy of 436.72 kJ/mol was calculated. The processing maps were calculated and analyzed according to the dynamic materials model. The maps show domains in some combinations of temperatures and strain rates and these domains are correlated with specific microstructural processes occurring during hot deformation by metallographic investigations and kinetic analysis. At the low strain rate domain occurs in the temperature range of 900-960 ℃ and strain rate range of 0.001-0.03 s-1 superplasticity and dynamic recrystallization were observed. At a high strain rate domain occurs in the temperature range of 980-1 120 ℃ and strain rate range of 0.1-10 s-1 the β phase undergoes dynamic recrystallization. Also,at a strain rate range of 0.1-10 s-1 and the temperature range of 900-930 ℃,the material exhibits flow localization.
基金supported by the National Natural Science Foundation of China(Grant Nos.U0735004 and 60972133)the Natural Science Foundation of Guangdong Province,China(Grant No.05006593)+2 种基金the Project Team for Natural Science Foundation of Guangdong Province,China(Grant No.9351064101000003)Energy Technology Key Laboratory Project of Guangdong Province,China(Grant No.2008A060301002)the Fundamental Research Funds for the Central Universities,China(Grant No.X2dXD2116370)
文摘To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks.
文摘In addition to the known method given in [1], authors provide other three methods to the enumeration of one-vertex maps with face partition on the plane. Correspondingly, there are four functional equations in the enufuntion. It is shown that the four equations are equivalent. Moreover, an explicit expression of the solution is found by expanding the powers of the matrix of infinite order directly. This is a new complement of what appeared in [1].
基金supported by the National Natural Science Foundation of China (No.40574059)the Ministry of Education (No.NCET-04-0904)
文摘In this paper we discuss neural network-based matrix effect correction in energy dispersive X-ray fluorescence (EDXRF) analysis,with detailed algorithm to classify the samples.The method can correct the matrix effect effectively through classifying the samples automatically,and influence of X-ray absorption and enhancement by major elements of the samples is reduced.Experiments for the complex matrix effect correction in EDXRF analysis of samples in Pangang showed improved accuracy of the elemental analysis result.
文摘A self-adaptive parallel encryption algorithm based on discrete 2D-Logistic map is developed according to the position scrambling and diffusion of multi-direction in variable space of spatial chaos. The binary sequences b1b2b3···bn are obtained according to the user key, in which the binary sequence 0 and 1 denote distribution mode of processors and the number of binary sequence n denotes cycle number. Then the pseudorandom 2D matrix is generated by 2D-Logistic map, and adaptive segmentation is applied in image matrix and pseudorandom matrix according to the value and the number of binary sequence. The parallel operation is used among blocks to improve efficiency and meet real-time demand in transmission processes. However, the pixel permutation is applied in partitioned matrix through ergodic matrix generated by pseudo-random matrix-block to decrease the correlation of adjacent pixels. Then the pixel substitution is used for fully diffusing through cipher block chaining mode until n cycles. The proposed algorithm can meet the three requirements of parallel operation in image encryption and the real-time requirement in transmission processes. The security is proved by theoretical analysis and simulation results.
基金partially supported by National Natural Science Foundation of China(11671294)
文摘A property(C) for permutation pairs is introduced. It is shown that if a pair{π_1, π_2} of permutations of(1,2,…,n) has property(C),then the D-type map Φ_(π_1,π_2) on n× n complex matrices constructed from {π_1,π_2} is positive. A necessary and sufficient condition is obtained for a pair {π_1,π_2} to have property(C),and an easily checked necessary and sufficient condition for the pairs of the form {π~p,π~q} to have property(C) is given, whereπ is the permutation defined by π(i) = i + 1 mod n and 1≤ p < q≤ n.
基金Supported by the National Natural Science Foundation of China(No.61601296,61201244)the Science and Technology Innovation Action Plan Project of Shanghai Science and Technology Commission(No.20511103500)the Talent Program of Shanghai University of Engineer-ing Science(No.2018RC43).
文摘In response to the problem of inter-carrier interference(ICI)and inter-subband interference(IBI)in the received signals of universal filtered multi-carrier(UFMC)systems,a novel interfer-ence suppression design scheme applying the method of complex weighted matrix inter-leaving map-ping(CWMIM)is proposed on the basis of the existing suppression scheme of conjugate weighted butterfly interleaving mapping(CWBIM).The proposed scheme performs matrix interleaving map-ping on the transmitted signal,which not only improves the carrier interference ratio(CIR)of the received signal by combining the original IBI and ICI terms,but also further inhibits the probability of burst error in the received signal.Meanwhile,the scheme can further decrease the impact of phase rotation errors in the received signal by increasing the number of rotation factors.Theoretical analysis and simulation results demonstrate that compared with CWBIM-UFMC,the proposed CWMIM-UFMC can obtain more effective ICI and IBI suppression and better system bit error rate(BER)performance with only a little bit increase in computational complexity.