Let Tn be the algebra of all n × n complex upper triangular matrices. We give the concrete forms of linear injective maps on Tn which preserve the nonzero idempotency of either products of two matrices or triple ...Let Tn be the algebra of all n × n complex upper triangular matrices. We give the concrete forms of linear injective maps on Tn which preserve the nonzero idempotency of either products of two matrices or triple Jordan products of two matrices.展开更多
This note considers the solution to the generalized Sylvester matrix equation AV + BW = VF with F being an arbitrary matrix, where V and W are the matrices to be determined. With the help of the Kronecker map, an exp...This note considers the solution to the generalized Sylvester matrix equation AV + BW = VF with F being an arbitrary matrix, where V and W are the matrices to be determined. With the help of the Kronecker map, an explicit parametric solution to this matrix equation is established. The proposed solution possesses a very simple and neat form, and allows the matrix F to be undetermined.展开更多
Let G be a generalized matrix algebra over a commutative ring R and Z(G) be the center of G. Suppose that F, T :G→G are two co-commuting R-linear mappings, i.e., F(x)x = xT(x) for all x ∈ G. In this note, we ...Let G be a generalized matrix algebra over a commutative ring R and Z(G) be the center of G. Suppose that F, T :G→G are two co-commuting R-linear mappings, i.e., F(x)x = xT(x) for all x ∈ G. In this note, we study the question of when co-commuting mappings on G are proper.展开更多
As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged ...As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged over the network, a hybrid cryptographic mechanism which includes both symmetric and asymmetric cryptographic functions is used. The public key cryptographic ECC security implementation in this paper performs a matrix mapping of data’s at the points on the elliptical curve, which are further encoded using the private symmetric cipher cryptographic algorithm. This security enhancement with the hybrid mechanism of ECC and symmetric cipher cryptographic scheme achieves efficiency in energy conservation of about 7% and 4% compared to the asymmetric and symmetric cipher security implementations in WSN.展开更多
The hot deformation characteristics of TiC particles reinforced titanium matrix composite were studied in the temperature range from 900 ℃ to 1 150 ℃ and in the strain rate range of 10-3-10 s-1 by compression tests ...The hot deformation characteristics of TiC particles reinforced titanium matrix composite were studied in the temperature range from 900 ℃ to 1 150 ℃ and in the strain rate range of 10-3-10 s-1 by compression tests with Gleeble1500 simulator system. The flow behavior was described by the hyperbolic sine constitutive equation,and an average activation energy of 436.72 kJ/mol was calculated. The processing maps were calculated and analyzed according to the dynamic materials model. The maps show domains in some combinations of temperatures and strain rates and these domains are correlated with specific microstructural processes occurring during hot deformation by metallographic investigations and kinetic analysis. At the low strain rate domain occurs in the temperature range of 900-960 ℃ and strain rate range of 0.001-0.03 s-1 superplasticity and dynamic recrystallization were observed. At a high strain rate domain occurs in the temperature range of 980-1 120 ℃ and strain rate range of 0.1-10 s-1 the β phase undergoes dynamic recrystallization. Also,at a strain rate range of 0.1-10 s-1 and the temperature range of 900-930 ℃,the material exhibits flow localization.展开更多
目的探讨距骨骨软骨损伤(osteochondral lesions of the talus,OLT)软骨基质金属蛋白酶-1(matrix metalloproteinase-1,MMP-1)的表达与磁共振T2值之间的关系及其在距骨骨软骨损伤的机制。材料与方法收集30例踝关节距骨骨软骨损伤行微创...目的探讨距骨骨软骨损伤(osteochondral lesions of the talus,OLT)软骨基质金属蛋白酶-1(matrix metalloproteinase-1,MMP-1)的表达与磁共振T2值之间的关系及其在距骨骨软骨损伤的机制。材料与方法收集30例踝关节距骨骨软骨损伤行微创治疗术患者及30名健康志愿者,均行3.0 T常规踝关节磁共振成像(magnetic resonance imaging,MRI)及T2-mapping功能成像,测量距骨软骨T2值。术后离体距骨骨软骨行苏木精-伊红染色(hematoxylin-eosin staining,HE)和Western Blot法分析距骨骨软骨MMP-1的表达,统计学分析距骨骨软骨T2值与MMP-1蛋白表达的相关性。结果距骨骨软骨损伤以内中侧最为多见(磁共振6分区法),距骨骨软骨T2值随软骨损伤Mankin分级明显增大(P<0.05)。软骨MMP-1蛋白表达高级别与低级别差异明显(P<0.05)。软骨T2值与软骨MMP-1表达呈线性相关趋势,Pearson分析距骨骨软骨损伤T2值增加与MMP-1蛋白表达增加呈直线性正相关(r=0.821,P<0.0001)。结论距骨骨软骨损伤以内中侧最为多见,距骨骨软骨磁共振T2值随软骨损伤分级逐级递增;距骨骨软骨损伤磁共振T2值与MMP-1蛋白表达呈正相关,距骨骨软骨磁共振T2-mapping功能成像T2值定量分析可在体、无创性预测不同级别软骨损伤MMP-1蛋白的表达含量,为临床治疗OLT提供影像学定量依据。展开更多
基金The NSF (10571114) of Chinathe Natural Science Basic Research Plan (2005A1) of Shaanxi Province of China
文摘Let Tn be the algebra of all n × n complex upper triangular matrices. We give the concrete forms of linear injective maps on Tn which preserve the nonzero idempotency of either products of two matrices or triple Jordan products of two matrices.
基金the National Natural Science Foundation of China (No.60374024)the Program for Changjiang Scholars and Innovative Research Team in University
文摘This note considers the solution to the generalized Sylvester matrix equation AV + BW = VF with F being an arbitrary matrix, where V and W are the matrices to be determined. With the help of the Kronecker map, an explicit parametric solution to this matrix equation is established. The proposed solution possesses a very simple and neat form, and allows the matrix F to be undetermined.
文摘Let G be a generalized matrix algebra over a commutative ring R and Z(G) be the center of G. Suppose that F, T :G→G are two co-commuting R-linear mappings, i.e., F(x)x = xT(x) for all x ∈ G. In this note, we study the question of when co-commuting mappings on G are proper.
文摘As the wireless sensor networks are easily deployable, the volume of sensor applications has been increased widely in various fields of military and commercial areas. In order to attain security on the data exchanged over the network, a hybrid cryptographic mechanism which includes both symmetric and asymmetric cryptographic functions is used. The public key cryptographic ECC security implementation in this paper performs a matrix mapping of data’s at the points on the elliptical curve, which are further encoded using the private symmetric cipher cryptographic algorithm. This security enhancement with the hybrid mechanism of ECC and symmetric cipher cryptographic scheme achieves efficiency in energy conservation of about 7% and 4% compared to the asymmetric and symmetric cipher security implementations in WSN.
基金Projects(50434030) supported by the National Natural Science Foundation of China
文摘The hot deformation characteristics of TiC particles reinforced titanium matrix composite were studied in the temperature range from 900 ℃ to 1 150 ℃ and in the strain rate range of 10-3-10 s-1 by compression tests with Gleeble1500 simulator system. The flow behavior was described by the hyperbolic sine constitutive equation,and an average activation energy of 436.72 kJ/mol was calculated. The processing maps were calculated and analyzed according to the dynamic materials model. The maps show domains in some combinations of temperatures and strain rates and these domains are correlated with specific microstructural processes occurring during hot deformation by metallographic investigations and kinetic analysis. At the low strain rate domain occurs in the temperature range of 900-960 ℃ and strain rate range of 0.001-0.03 s-1 superplasticity and dynamic recrystallization were observed. At a high strain rate domain occurs in the temperature range of 980-1 120 ℃ and strain rate range of 0.1-10 s-1 the β phase undergoes dynamic recrystallization. Also,at a strain rate range of 0.1-10 s-1 and the temperature range of 900-930 ℃,the material exhibits flow localization.