期刊文献+
共找到160篇文章
< 1 2 8 >
每页显示 20 50 100
Complexity of Injective Homomorphisms to Small Tournaments, and of Injective Oriented Colourings
1
作者 Russell J. Campbell Nancy E. Clarke Gary MacGillivray 《Open Journal of Discrete Mathematics》 2023年第1期1-15,共15页
Several possible definitions of local injectivity for a homomorphism of an oriented graph G to an oriented graph H are considered. In each case, we determine the complexity of deciding whether there exists such a homo... Several possible definitions of local injectivity for a homomorphism of an oriented graph G to an oriented graph H are considered. In each case, we determine the complexity of deciding whether there exists such a homomorphism when G is given and H is a fixed tournament on three or fewer vertices. Each possible definition leads to a locally-injective oriented colouring problem. A dichotomy theorem is proved in each case. 展开更多
关键词 Injective Graph homomorphism Oriented Colouring COMPLEXITY
下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
2
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY PROTECTION SLICE TECHNOLOGY PRIVACY homomorphism collection tree protocol
下载PDF
ON INDUCED GROUP HOMOMORPHISMS
3
作者 武同锁 《Journal of Shanghai Jiaotong university(Science)》 EI 1999年第1期67-69,共3页
Alringsinthispaperareassociativewithiden-tity,andalmodulesleftunital.Recalthatgiv-enanyringhomomorphismf∶R→S... Alringsinthispaperareassociativewithiden-tity,andalmodulesleftunital.Recalthatgiv-enanyringhomomorphismf∶R→S,thereisaninduced... 展开更多
关键词 INDUCED GROUP homomorphism semiperfect ring ISOMORPHISM LIFTING
下载PDF
STABILITY AND SUPERSTABILITY OF JORDAN HOMOMORPHISMS AND JORDAN DERIVATIONS ON BANACH ALGEBRAS AND C~*-ALGEBRAS: A FIXED POINT APPROACH
4
作者 M. Eshaghi Gordji A. Najati A. Ebadian 《Acta Mathematica Scientia》 SCIE CSCD 2011年第5期1911-1922,共12页
Using fixed point methods, we prove the Hyers–Ulam–Rassias stability and superstability of Jordan homomorphisms (Jordan *-homomorphisms), and Jordan derivations (Jordan *-derivations) on Banach algebras (C*-... Using fixed point methods, we prove the Hyers–Ulam–Rassias stability and superstability of Jordan homomorphisms (Jordan *-homomorphisms), and Jordan derivations (Jordan *-derivations) on Banach algebras (C*-algebras) for the generalized Jensen–type functional equationwhere r is a fixed positive real number in (1, ∞). 展开更多
关键词 alternative fixed point Hyers–Ulam–Rassias stability Jordan homomorphism Jordan derivation
下载PDF
A HYBRID FIXED POINT RESULT FOR LIPSCHITZ HOMOMORPHISMS ON QUASI-BANACH ALGEBRAS
5
作者 Sh. Rezapour M. Derafshpour 《Analysis in Theory and Applications》 2011年第2期109-116,共8页
We shall generalize the results of [9] about characterization of isomorphisms on quasi-Banach algebras by providing integral type conditions. Also, we shall give some new results in this way and finally, give a result... We shall generalize the results of [9] about characterization of isomorphisms on quasi-Banach algebras by providing integral type conditions. Also, we shall give some new results in this way and finally, give a result about hybrid fixed point of two homomorphisms on quasi-Banach algebras. 展开更多
关键词 homomorphism hybrid fixed point integral-type condition p-norm quasi- Banach algebra
下载PDF
HOMOMORPHISMS BETWEEN MULTIPLICATIVE SEMIGROUPS OF MATRICES OVER FIELDS
6
作者 张显 曹重光 《Acta Mathematica Scientia》 SCIE CSCD 2008年第2期301-306,共6页
Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p... Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p at most. Assume that F and R are subsemigroups of Mn(F) such that F M^Pn(F). A map f : F→R is called a homomorphism if f(AB) = f(A)f(B) for any A, B ∈F. In particular, f is called an endomorphism if F = R. The structure of all homomorphisms from F to R (respectively, all endomorphisms of Mn(F)) is described. 展开更多
关键词 homomorphism ENDOMORPHISM multiplicative semigroup of matrices
下载PDF
On Homomorphism of Valuation Algebras
7
作者 GUAN XUE-CHONG LI YONG-MING 《Communications in Mathematical Research》 CSCD 2011年第1期69-80,共12页
In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism ba... In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism based on different domains is defined, and the corresponding homomorphism theorem of valuation algebra is proved. 展开更多
关键词 homomorphism valuation algebra SEMIRING
下载PDF
Applications of Homomorphism on the Structure of Semigroups
8
作者 Huishu Yuan Xiangzhi Kong 《Advances in Pure Mathematics》 2014年第2期62-70,共9页
By utilizing homomorphisms and -strong semilattice of semigroups, we show that the Green (*,~)-relation H*,~ is a regular band congruence on a r-ample semigroup if and only if it is a G-strong semilattice of completel... By utilizing homomorphisms and -strong semilattice of semigroups, we show that the Green (*,~)-relation H*,~ is a regular band congruence on a r-ample semigroup if and only if it is a G-strong semilattice of completely J*,^-simple semigroups. The result generalizes Petrich’s result on completely regular semigroups with Green’s relation H a normal band congruence or a regular band congruence from the round of regular semigroups to the round of r-ample semigroups. 展开更多
关键词 homomorphism Natural PARTIAL Order Green’s (* ~) -Relation SEMILATTICE DECOMPOSITION
下载PDF
A Local Characterization of Lie Homomorphisms of Nest Algebras
9
作者 YANG Miao-xia ZHANG Jian-hua 《Chinese Quarterly Journal of Mathematics》 CSCD 2014年第1期125-128,共4页
In this paper,linear maps preserving Lie products at zero points on nest algebras are studied.It is proved that every linear map preserving Lie products at zero points on any finite nest algebra is a Lie homomorphism.... In this paper,linear maps preserving Lie products at zero points on nest algebras are studied.It is proved that every linear map preserving Lie products at zero points on any finite nest algebra is a Lie homomorphism.As an application,the form of a linear bijection preserving Lie products at zero points between two finite nest algebras is obtained. 展开更多
关键词 nest algebra Lie product Lie homomorphism
下载PDF
The Maximum Size of an Edge Cut and Graph Homomorphisms
10
作者 Suohai Fan Hongjian Lai Ju Zhou 《Applied Mathematics》 2011年第10期1263-1269,共7页
For a graph G, let b(G)=max﹛|D|: Dis an edge cut of G﹜ . For graphs G and H, a map Ψ: V(G)→V(H) is a graph homomorphism if for each e=uv∈E(G), Ψ(u)Ψ(v)∈E(H). In 1979, Erd?s proved by probabilistic methods that... For a graph G, let b(G)=max﹛|D|: Dis an edge cut of G﹜ . For graphs G and H, a map Ψ: V(G)→V(H) is a graph homomorphism if for each e=uv∈E(G), Ψ(u)Ψ(v)∈E(H). In 1979, Erd?s proved by probabilistic methods that for p ≥ 2 with if there is a graph homomorphism from G onto Kp then b(G)≥f(p)|E(G)| In this paper, we obtained the best possible lower bounds of b(G) for graphs G with a graph homomorphism onto a Kneser graph or a circulant graph and we characterized the graphs G reaching the lower bounds when G is an edge maximal graph with a graph homomorphism onto a complete graph, or onto an odd cycle. 展开更多
关键词 MAXIMUM EDGE CUTS GRAPH homomorphismS
下载PDF
Homomorphism Key Agreement Based on RSA
11
作者 XIANG Guangli ZHU Ping +1 位作者 ZHANG Junhong MA Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1609-1612,共4页
This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the ... This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the integer ring. The homomorphism key agreement based on RSA is presented. Compared with Diffie-Hellman protocol, its operation speed is more quickly; Compared with key agreement protocol based on password, it has better security. The protocol can use the public key of RSA to create the contributory, forward secrecy the session key. Finally, the security of the protocol is proved by BAN logic. 展开更多
关键词 homomorphic encryption key agreement BAN logic
下载PDF
Conformal Triple Derivations and Triple Homomorphisms of Lie Conformal Algebras
12
作者 Sania Asif Lipeng Luo +1 位作者 Yanyong Hong Zhixiang Wu 《Algebra Colloquium》 SCIE CSCD 2023年第2期263-280,共18页
Let R be a finite Lie conformal algebra.We investigate the conformal deriva-tion algebra CDer(R),conformal triple derivation algebra CTDer(R)and generalized con-formal triple derivation algebra GCTDer(R),focusing main... Let R be a finite Lie conformal algebra.We investigate the conformal deriva-tion algebra CDer(R),conformal triple derivation algebra CTDer(R)and generalized con-formal triple derivation algebra GCTDer(R),focusing mainly on the connections among these derivation algebras.We also give a complete classification of(generalized)con-formal triple derivation algebras on all finite simple Lie conformal algebras.In partic-ular,CTDer(R)=CDer(R),where R is a finite simple Lie conformal algebra.But for GCDer(R),we obtain a conclusion that is closely related to CDer(R).Finally,we introduce the definition of a triple homomorphism of Lie conformal algebras.Triple homomorphisms of all finite simple Lie conformal algebras are also characterized. 展开更多
关键词 triple derivation triple homomorphism conformal algebra
原文传递
A Characterization of Homomorphisms Between Banach Algebras 被引量:4
13
作者 JianLianCUI JinChuanHOU 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2004年第4期761-768,共8页
We show that every unital invertibility preserving linear map from a von Neumann algebra onto a semi-simple Banach algebra is a Jordan homomorphism;this gives an affirmative answer to a problem of Kaplansky for all vo... We show that every unital invertibility preserving linear map from a von Neumann algebra onto a semi-simple Banach algebra is a Jordan homomorphism;this gives an affirmative answer to a problem of Kaplansky for all von Neumann algebras.For a unital linear map Φ from a semi-simple complex Banach algebra onto another,we also show that the following statements are equivalent:(1) Φ is an homomorphism;(2)Φ is completely invertibility preserving;(3)Φ is 2-invertibility preserving. 展开更多
关键词 Banach algebras homomorphismS Jordan homomorphisms
原文传递
Derivations as Homomorphisms or Anti-homomorphisms on Lie Ideals 被引量:1
14
作者 Yu WANG Hong YOU 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2007年第6期1149-1152,共4页
Let R be a 2-torsion free prime ring, Z the center of R, and U a nonzero Lie ideal of R. If d is a derivation of R which acts as a homomorphism or an anti-homomorphism on U, then either d = 0 or U lohtein in Z. This r... Let R be a 2-torsion free prime ring, Z the center of R, and U a nonzero Lie ideal of R. If d is a derivation of R which acts as a homomorphism or an anti-homomorphism on U, then either d = 0 or U lohtein in Z. This result improves a theorem of Asma, Rehman, and Shakir. 展开更多
关键词 prime ring lie ideal DERIVATION homomorphism ANTI-homomorphism
原文传递
Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution 被引量:1
15
作者 Tao Yin Changgen Peng +2 位作者 Weijie Tan Dequan Xu Hanlin Tang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期827-843,共17页
In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie distribution.The traditional approach to obtaining ... In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie distribution.The traditional approach to obtaining the Tweedie regression model involves training on a centralized dataset,when the data is provided by multiple parties,training a privacy-preserving Tweedie regression model without exchanging raw data becomes a challenge.To address this issue,this study introduces a novel vertical federated learning-based Tweedie regression algorithm for multi-party auto insurance rate setting in data silos.The algorithm can keep sensitive data locally and uses privacy-preserving techniques to achieve intersection operations between the two parties holding the data.After determining which entities are shared,the participants train the model locally using the shared entity data to obtain the local generalized linear model intermediate parameters.The homomorphic encryption algorithms are introduced to interact with and update the model intermediate parameters to collaboratively complete the joint training of the car insurance rate-setting model.Performance tests on two publicly available datasets show that the proposed federated Tweedie regression algorithm can effectively generate Tweedie regression models that leverage the value of data fromboth partieswithout exchanging data.The assessment results of the scheme approach those of the Tweedie regressionmodel learned fromcentralized data,and outperformthe Tweedie regressionmodel learned independently by a single party. 展开更多
关键词 Rate setting Tweedie distribution generalized linear models federated learning homomorphic encryption
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption 被引量:1
16
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain IOT integration of IoT and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
A Characterization of Continuous Module Homomorphisms on Random Semi—Normed Modules and Its Applications 被引量:12
17
作者 TieXinGUO 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2003年第1期201-208,共8页
In this paper, a characterization of continuous module homomorphisms on random semi-normed modules is first given; then the characterization is further used to show that the Hahn-Banach type of extension theorem is st... In this paper, a characterization of continuous module homomorphisms on random semi-normed modules is first given; then the characterization is further used to show that the Hahn-Banach type of extension theorem is still true for continuous module homomorphisms on random semi-normed modules. 展开更多
关键词 Random semi normed modules Continuous module homomorphisms Extension theorems
原文传递
Secure Two-Party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks 被引量:6
18
作者 Haiping Huang Tianhe Gong +2 位作者 Ping Chen Reza Malekian Tao Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第4期385-396,共12页
Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation ... Numerous privacy-preserving issues have emerged along with the fast development of the Internet of Things. In addressing privacy protection problems in Wireless Sensor Networks (WSN), secure multi-party computation is considered vital, where obtaining the Euclidian distance between two nodes with no disclosure of either side's secrets has become the focus of location-privacy-related applications. This paper proposes a novel Privacy-Preserving Scalar Product Protocol (PPSPP) for wireless sensor networks. Based on PPSPP, we then propose a Homomorphic-Encryption-based Euclidean Distance Protocol (HEEDP) without third parties. This protocol can achieve secure distance computation between two sensor nodes. Correctness proofs of PPSPP and HEEDP are provided, followed by security validation and analysis. Performance evaluations via comparisons among similar protocols demonstrate that HEEDP is superior; it is most efficient in terms of both communication and computation on a wide range of data types, especially in wireless sensor networks. 展开更多
关键词 secure two-party computation PRIVACY-PRESERVING wireless sensor networks scalar product distancecalculation privacy homomorphism
原文传递
Homomorphisms in Quasi-Banach Algebras Associated with a Pexiderized Cauchy-Jensen Functional Equation 被引量:5
19
作者 Abbas NAJATI 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2009年第9期1529-1542,共14页
In this paper, we prove the generalized Hyers-Ulam stability of homomorphisms in quasi- Banach algebras associated with the following Pexiderized Jensen functional equation f(x+y/2+z)-g(x-y/2+z)=h(y).This is... In this paper, we prove the generalized Hyers-Ulam stability of homomorphisms in quasi- Banach algebras associated with the following Pexiderized Jensen functional equation f(x+y/2+z)-g(x-y/2+z)=h(y).This is applied to investigating homomorphisms between quasi-Banach algebras. The concept of the generalized Hyers-Ulam stability originated from Rassias' stability theorem that appeared in his paper: On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc., 72, 297-300 (1978). 展开更多
关键词 Cauchy additive mapping Jensen additive mapping homomorphisms in quasi-Banach algebras generalized Hyers-Ulam stability p-Banach algebra
原文传递
A Type of Shephard Problems for Lp Blaschke-Minkowski Homomorphisms 被引量:2
20
作者 ZHAO Xia WANG Weidong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第2期93-99,共7页
The Blaschke-Minkowski homomorphisms was defined by Schuster.Recently,Wang extended its concept to Lp version.In this paper,we obtain affirmative and negative forms of the Shephard type problems for Lp geominimal surf... The Blaschke-Minkowski homomorphisms was defined by Schuster.Recently,Wang extended its concept to Lp version.In this paper,we obtain affirmative and negative forms of the Shephard type problems for Lp geominimal surface areas with respect to the Lp Blaschke-Minkowski homomorphisms. 展开更多
关键词 Lp Blaschke-Minkowski homomorphism Shephard problem Lp geominimal surface area
原文传递
上一页 1 2 8 下一页 到第
使用帮助 返回顶部