期刊文献+
共找到2,894篇文章
< 1 2 145 >
每页显示 20 50 100
Research on θ -Intuitionistic Fuzzy Homomorphism Theory
1
作者 Yue Wang Yan Yan Xinru Shang 《Journal of Applied Mathematics and Physics》 2024年第10期3579-3589,共11页
Fuzzy homomorphism is an important research content of fuzzy group theory, different fuzzy mappings will produce different fuzzy homomorphisms. In this paper, the fuzzy homomorphism of groups is generalized. Firstly, ... Fuzzy homomorphism is an important research content of fuzzy group theory, different fuzzy mappings will produce different fuzzy homomorphisms. In this paper, the fuzzy homomorphism of groups is generalized. Firstly, the θ-intuitionistic fuzzy mapping is defined, and the θ-intuitionistic fuzzy homomorphism of groups is obtained. The properties of intuitionistic fuzzy subgroups and intuitionistic fuzzy normal subgroups are studied under the θ-intuitionistic fuzzy homomorphism of groups, and the fundamental theorem of θ-intuitionistic fuzzy homomorphism is proved. 展开更多
关键词 -Intuitionistic Fuzzy homomorphism Intuitionistic Fuzzy Subgroup Intuitionistic Fuzzy Normal Subgroup
下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
2
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY PROTECTION SLICE TECHNOLOGY PRIVACY homomorphism collection tree protocol
下载PDF
The Homomorphism and Isomorphism on Hypergroup 被引量:4
3
作者 钟育彬 《Chinese Quarterly Journal of Mathematics》 CSCD 1997年第3期7-14, ,共8页
Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true... Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true.(2) It proved that the isomorphous relationship of the bottomgroups which guid to the hypergroup can still keep such relationship.(3) It proved that the basic isomorphous Theorem and the homogenous Theorem of the bottomgroup which raise to the hypergroup are still true.(4) It point out that when the isomorphous bottomgroups have been raised to the hypergroup,the conditions which form the isomorphism should be lessened. 展开更多
关键词 HYPERGROUP homomorphism ISOMORPHISM regular hypergroup uniform hypergroup
下载PDF
Exact Sequence and Commutative Diagrams of Semimodule Homomorphism 被引量:1
4
作者 肖泽昌 《Chinese Quarterly Journal of Mathematics》 CSCD 1997年第2期108-110, ,共3页
Throught the introduction of the concept * exact sequence,we set up several satisfied results of commutative diagrams of semimodule homomorphism.
关键词 SEMIMODULE homomorphism * exact sequence commutative diagrams
下载PDF
ON INDUCED GROUP HOMOMORPHISMS
5
作者 武同锁 《Journal of Shanghai Jiaotong university(Science)》 EI 1999年第1期67-69,共3页
In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a sem... In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a semigroup isomorphism; characterizations are given for the semilocal rings being semiperfect. 展开更多
关键词 INDUCED GROUP homomorphism semiperfect ring ISOMORPHISM LIFTING
下载PDF
HOMOMORPHISMS BETWEEN MULTIPLICATIVE SEMIGROUPS OF MATRICES OVER FIELDS
6
作者 张显 曹重光 《Acta Mathematica Scientia》 SCIE CSCD 2008年第2期301-306,共6页
Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p... Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p at most. Assume that F and R are subsemigroups of Mn(F) such that F M^Pn(F). A map f : F→R is called a homomorphism if f(AB) = f(A)f(B) for any A, B ∈F. In particular, f is called an endomorphism if F = R. The structure of all homomorphisms from F to R (respectively, all endomorphisms of Mn(F)) is described. 展开更多
关键词 homomorphism ENDOMORPHISM multiplicative semigroup of matrices
下载PDF
ALMOST HOMOMORPHISMS BETWEEN UNITAL C^*-ALGEBRAS: A FIXED POINT APPROACH 被引量:1
7
作者 M.Eshaghi Gordji S.Kaboli Gharetapeh +2 位作者 M.Bidkham T.Karimi M.Aghaei 《Analysis in Theory and Applications》 2011年第4期320-331,共12页
Let A, B be two unital C^*-algebras. By using fixed pint methods, we prove that every almost unital almost linear mapping h : A →B which satisfies h(2^nuy) = h(2^nu)h(y) for all u ∈ U(A), all y ∈ A, and a... Let A, B be two unital C^*-algebras. By using fixed pint methods, we prove that every almost unital almost linear mapping h : A →B which satisfies h(2^nuy) = h(2^nu)h(y) for all u ∈ U(A), all y ∈ A, and all n = 0,1,2,..., is a homomorphism. Also, we establish the generalized Hyers-Ulam-Rassias stability of ,-homomorphisms on unital C^*-algebras. 展开更多
关键词 alternative fixed point Jordan -homomorphism
下载PDF
On Homomorphism of Valuation Algebras
8
作者 GUAN XUE-CHONG LI YONG-MING 《Communications in Mathematical Research》 CSCD 2011年第1期69-80,共12页
In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism ba... In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism based on different domains is defined, and the corresponding homomorphism theorem of valuation algebra is proved. 展开更多
关键词 homomorphism valuation algebra SEMIRING
下载PDF
Homomorphism Key Agreement Based on RSA
9
作者 XIANG Guangli ZHU Ping +1 位作者 ZHANG Junhong MA Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1609-1612,共4页
This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the ... This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the integer ring. The homomorphism key agreement based on RSA is presented. Compared with Diffie-Hellman protocol, its operation speed is more quickly; Compared with key agreement protocol based on password, it has better security. The protocol can use the public key of RSA to create the contributory, forward secrecy the session key. Finally, the security of the protocol is proved by BAN logic. 展开更多
关键词 homomorphic encryption key agreement BAN logic
下载PDF
STABILITY AND SUPERSTABILITY OF JORDAN HOMOMORPHISMS AND JORDAN DERIVATIONS ON BANACH ALGEBRAS AND C~*-ALGEBRAS: A FIXED POINT APPROACH
10
作者 M. Eshaghi Gordji A. Najati A. Ebadian 《Acta Mathematica Scientia》 SCIE CSCD 2011年第5期1911-1922,共12页
Using fixed point methods, we prove the Hyers–Ulam–Rassias stability and superstability of Jordan homomorphisms (Jordan *-homomorphisms), and Jordan derivations (Jordan *-derivations) on Banach algebras (C*-... Using fixed point methods, we prove the Hyers–Ulam–Rassias stability and superstability of Jordan homomorphisms (Jordan *-homomorphisms), and Jordan derivations (Jordan *-derivations) on Banach algebras (C*-algebras) for the generalized Jensen–type functional equationwhere r is a fixed positive real number in (1, ∞). 展开更多
关键词 alternative fixed point Hyers–Ulam–Rassias stability Jordan homomorphism Jordan derivation
下载PDF
A Local Characterization of Lie Homomorphisms of Nest Algebras
11
作者 YANG Miao-xia ZHANG Jian-hua 《Chinese Quarterly Journal of Mathematics》 CSCD 2014年第1期125-128,共4页
In this paper,linear maps preserving Lie products at zero points on nest algebras are studied.It is proved that every linear map preserving Lie products at zero points on any finite nest algebra is a Lie homomorphism.... In this paper,linear maps preserving Lie products at zero points on nest algebras are studied.It is proved that every linear map preserving Lie products at zero points on any finite nest algebra is a Lie homomorphism.As an application,the form of a linear bijection preserving Lie products at zero points between two finite nest algebras is obtained. 展开更多
关键词 nest algebra Lie product Lie homomorphism
下载PDF
A HYBRID FIXED POINT RESULT FOR LIPSCHITZ HOMOMORPHISMS ON QUASI-BANACH ALGEBRAS
12
作者 Sh. Rezapour M. Derafshpour 《Analysis in Theory and Applications》 2011年第2期109-116,共8页
We shall generalize the results of [9] about characterization of isomorphisms on quasi-Banach algebras by providing integral type conditions. Also, we shall give some new results in this way and finally, give a result... We shall generalize the results of [9] about characterization of isomorphisms on quasi-Banach algebras by providing integral type conditions. Also, we shall give some new results in this way and finally, give a result about hybrid fixed point of two homomorphisms on quasi-Banach algebras. 展开更多
关键词 homomorphism hybrid fixed point integral-type condition p-norm quasi- Banach algebra
下载PDF
The Maximum Size of an Edge Cut and Graph Homomorphisms
13
作者 Suohai Fan Hongjian Lai Ju Zhou 《Applied Mathematics》 2011年第10期1263-1269,共7页
For a graph G, let b(G)=max﹛|D|: Dis an edge cut of G﹜ . For graphs G and H, a map Ψ: V(G)→V(H) is a graph homomorphism if for each e=uv∈E(G), Ψ(u)Ψ(v)∈E(H). In 1979, Erd?s proved by probabilistic methods that... For a graph G, let b(G)=max﹛|D|: Dis an edge cut of G﹜ . For graphs G and H, a map Ψ: V(G)→V(H) is a graph homomorphism if for each e=uv∈E(G), Ψ(u)Ψ(v)∈E(H). In 1979, Erd?s proved by probabilistic methods that for p ≥ 2 with if there is a graph homomorphism from G onto Kp then b(G)≥f(p)|E(G)| In this paper, we obtained the best possible lower bounds of b(G) for graphs G with a graph homomorphism onto a Kneser graph or a circulant graph and we characterized the graphs G reaching the lower bounds when G is an edge maximal graph with a graph homomorphism onto a complete graph, or onto an odd cycle. 展开更多
关键词 MAXIMUM EDGE CUTS GRAPH homomorphismS
下载PDF
Applications of Homomorphism on the Structure of Semigroups
14
作者 Huishu Yuan Xiangzhi Kong 《Advances in Pure Mathematics》 2014年第2期62-70,共9页
By utilizing homomorphisms and -strong semilattice of semigroups, we show that the Green (*,~)-relation H*,~ is a regular band congruence on a r-ample semigroup if and only if it is a G-strong semilattice of completel... By utilizing homomorphisms and -strong semilattice of semigroups, we show that the Green (*,~)-relation H*,~ is a regular band congruence on a r-ample semigroup if and only if it is a G-strong semilattice of completely J*,^-simple semigroups. The result generalizes Petrich’s result on completely regular semigroups with Green’s relation H a normal band congruence or a regular band congruence from the round of regular semigroups to the round of r-ample semigroups. 展开更多
关键词 homomorphism Natural PARTIAL Order Green’s (* ~) -Relation SEMILATTICE DECOMPOSITION
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption 被引量:1
15
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain IOT integration of IoT and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
Complexity of Injective Homomorphisms to Small Tournaments, and of Injective Oriented Colourings
16
作者 Russell J. Campbell Nancy E. Clarke Gary MacGillivray 《Open Journal of Discrete Mathematics》 2023年第1期1-15,共15页
Several possible definitions of local injectivity for a homomorphism of an oriented graph G to an oriented graph H are considered. In each case, we determine the complexity of deciding whether there exists such a homo... Several possible definitions of local injectivity for a homomorphism of an oriented graph G to an oriented graph H are considered. In each case, we determine the complexity of deciding whether there exists such a homomorphism when G is given and H is a fixed tournament on three or fewer vertices. Each possible definition leads to a locally-injective oriented colouring problem. A dichotomy theorem is proved in each case. 展开更多
关键词 Injective Graph homomorphism Oriented Colouring COMPLEXITY
下载PDF
FL-EASGD:Federated Learning Privacy Security Method Based on Homomorphic Encryption
17
作者 Hao Sun Xiubo Chen Kaiguo Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第5期2361-2373,共13页
Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data.However,there is still a potential risk of privacy leakage,for example,attackers can obta... Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data.However,there is still a potential risk of privacy leakage,for example,attackers can obtain the original data through model inference attacks.Therefore,safeguarding the privacy of model parameters becomes crucial.One proposed solution involves incorporating homomorphic encryption algorithms into the federated learning process.However,the existing federated learning privacy protection scheme based on homomorphic encryption will greatly reduce the efficiency and robustness when there are performance differences between parties or abnormal nodes.To solve the above problems,this paper proposes a privacy protection scheme named Federated Learning-Elastic Averaging Stochastic Gradient Descent(FL-EASGD)based on a fully homomorphic encryption algorithm.First,this paper introduces the homomorphic encryption algorithm into the FL-EASGD scheme to preventmodel plaintext leakage and realize privacy security in the process ofmodel aggregation.Second,this paper designs a robust model aggregation algorithm by adding time variables and constraint coefficients,which ensures the accuracy of model prediction while solving performance differences such as computation speed and node anomalies such as downtime of each participant.In addition,the scheme in this paper preserves the independent exploration of the local model by the nodes of each party,making the model more applicable to the local data distribution.Finally,experimental analysis shows that when there are abnormalities in the participants,the efficiency and accuracy of the whole protocol are not significantly affected. 展开更多
关键词 Federated learning homomorphic encryption privacy security stochastic gradient descent
下载PDF
白冠覆盖率自动提取算法改进及参数化
18
作者 姬昊 姜文正 +3 位作者 王胜利 马洪余 刘展池 杨光 《海洋科学进展》 北大核心 2025年第1期133-143,共11页
白冠是一种常见的海洋自然现象,海面白冠的精确识别和提取对海气相互作用、海洋遥感等研究和应用有重要的科学意义和实用价值。基于数字图像处理的白冠自动提取技术具有处理效率高、准确性好、成本低等特点,但在实际海况下拍摄的图像受... 白冠是一种常见的海洋自然现象,海面白冠的精确识别和提取对海气相互作用、海洋遥感等研究和应用有重要的科学意义和实用价值。基于数字图像处理的白冠自动提取技术具有处理效率高、准确性好、成本低等特点,但在实际海况下拍摄的图像受太阳光照的影响会存在光照不均现象,容易造成白冠误提取,使得准确提取白冠覆盖率(WC)的难度大大增加,并对后期白冠覆盖率参数化研究产生不可忽视的影响。为了解决这一难题,本文在传统自适应阈值分割算法基础上,针对光照不均的海浪图像提出了应用同态滤波和图像增强的光照校正改进算法,以消除光照不均对白冠识别提取的影响。使用立体摄影测量系统拍摄的海浪图像进行了提取实验,并与传统白冠提取算法的结果进行了对比。结果表明改进算法大幅提高了光照不均情况下白冠提取的精度,验证了该算法的可靠性,有效提高了白冠覆盖率的计算正确率,进而提高了白冠覆盖率与海面10 m风速拟合关系式的准确度和可靠性。 展开更多
关键词 白冠覆盖率 阈值分割 同态滤波 光照校正 风速
下载PDF
面向分布式数据安全共享的高速公路路网拥堵监测
19
作者 李林锋 陈羽中 +1 位作者 姚毅楠 邵伟杰 《福建师范大学学报(自然科学版)》 北大核心 2025年第1期11-20,共10页
应用人工智能技术对高速公路路网道路状态进行监测已成为热点,然而,数据孤岛及隐私保护是高速路网智能决策面临的挑战。为实现分布式数据安全共享及智能决策,以拥堵问题为例,提出基于联邦学习的高速路网道路拥堵状态监测策略。利用摄像... 应用人工智能技术对高速公路路网道路状态进行监测已成为热点,然而,数据孤岛及隐私保护是高速路网智能决策面临的挑战。为实现分布式数据安全共享及智能决策,以拥堵问题为例,提出基于联邦学习的高速路网道路拥堵状态监测策略。利用摄像头实时数据,在密态可计算的同态加密联邦学习智能决策架构下,建立基于道路区间优化的拥堵状态监测模型。结果表明,在确保分布式数据安全共享的前提下,能够有效实现高速路网道路拥堵状态监测。 展开更多
关键词 高速公路路网 道路拥堵状态 数据安全共享 智能决策 联邦学习 同态加密
下载PDF
工控入侵检测系统安全增强方案
20
作者 李方晓 侯会文 石乐义 《计算机工程与设计》 北大核心 2025年第1期124-130,共7页
针对基于联邦学习工控入侵检测模型训练时存在中心化、易受攻击的问题,提出一种去中心安全增强方案。在联邦学习训练中,通过模型参数确定参数聚合临时服务器并引入跳变机制,可以有效抵御拒绝服务攻击;利用系统流量数据中时间戳等信息,... 针对基于联邦学习工控入侵检测模型训练时存在中心化、易受攻击的问题,提出一种去中心安全增强方案。在联邦学习训练中,通过模型参数确定参数聚合临时服务器并引入跳变机制,可以有效抵御拒绝服务攻击;利用系统流量数据中时间戳等信息,减缓重放攻击的影响;提出一种基于同态加密的流量加密方案。实验结果表明,所提方案可以抵抗每秒10000数据包的拒绝服务攻击,提高了联邦学习的安全性。 展开更多
关键词 工业控制网络 入侵检测 端信息跳变 分布式拒绝服务攻击 重放攻击 同态加密 主动防御 联邦学习
下载PDF
上一页 1 2 145 下一页 到第
使用帮助 返回顶部