首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   95篇
  免费   1篇
  国内免费   4篇
力学   1篇
数学   98篇
物理学   1篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   6篇
  2018年   2篇
  2017年   2篇
  2016年   2篇
  2014年   1篇
  2013年   9篇
  2012年   5篇
  2011年   8篇
  2010年   5篇
  2009年   8篇
  2008年   5篇
  2007年   7篇
  2006年   4篇
  2005年   2篇
  2004年   5篇
  2003年   6篇
  2002年   3篇
  2001年   5篇
  2000年   1篇
  1998年   2篇
  1997年   2篇
  1996年   4篇
  1994年   1篇
  1985年   1篇
排序方式: 共有100条查询结果,搜索用时 281 毫秒
1.
2.
SomePropertiesofQuasi┐keep┐rangeOperatorsandTheirApplicationsLaiChunhui(赖春晖)(DepartmentofMathematics,ZhangzhouTeachersColege,...  相似文献   
3.
In this paper, we prove the Hyers-Ulam-Rassias stability of homomorphisms in quasi-Banach algebras associated to the Pexiderized Cauchy functional equation. This is applied to investigate homomorphisms between quasi-Banach algebras. The concept of Hyers-Ulam-Rassias stability originated from Th.M. Rassias' stability theorem that appeared in his paper [Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978) 297-300].  相似文献   
4.
TL—子环上的TL—子模的格   总被引:2,自引:0,他引:2  
研究TL-子环上TL-子模形成的格及其子格的性质,给出这些格之间的同态与同构定理。  相似文献   
5.
Application of homomorphism to secure image sharing   总被引:1,自引:0,他引:1  
In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images (l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.  相似文献   
6.
Let X and Y be superreflexive complex Banach spaces and let B(X) and B(Y) be the Banach algebras of all bounded linear operators on X and Y, respectively. If a bijective linear map Φ:B(X)→B(Y) almost preserves the spectra, then it is almost multiplicative or anti-multiplicative. Furthermore, in the case where X=Y is a separable complex Hilbert space, such a map is a small perturbation of an automorphism or an anti-automorphism.  相似文献   
7.
Group isomorphism and homomorphism are topics central to abstract algebra, yet research on instructors’ views of these concepts is limited. Based on interviews from two instructors as well as classroom video from eight class periods, this paper examines the language used to discuss isomorphism and homomorphism. Language used by instructors in interviews and classroom settings are identified and classified into four main categories: formal definition, mapping, sameness, and combinations of sameness and mapping language. How the two instructors drew on language classified into those four categories in the interview and instruction settings are examined for isomorphism and homomorphism. Similarities and differences between the interview and instruction contexts reveal the wide variety of ways of understanding isomorphism and homomorphism as well as a research need to examine mathematicians’ content knowledge in more than one context.  相似文献   
8.
9.
Wensong Lin 《Discrete Mathematics》2008,308(16):3565-3573
The generalized Mycielskians of graphs (also known as cones over graphs) are the natural generalization of the Mycielskians of graphs (which were first introduced by Mycielski in 1955). Given a graph G and any integer p?0, one can transform G into a new graph μp(G), the p-Mycielskian of G. In this paper, we study the kth chromatic numbers χk of Mycielskians and generalized Mycielskians of graphs. We show that χk(G)+1?χk(μ(G))?χk(G)+k, where both upper and lower bounds are attainable. We then investigate the kth chromatic number of Mycielskians of cycles and determine the kth chromatic number of p-Mycielskian of a complete graph Kn for any integers k?1, p?0 and n?2. Finally, we prove that if a graph G is a/b-colorable then the p-Mycielskian of G, μp(G), is (at+bp+1)/bt-colorable, where . And thus obtain graphs G with m(G) grows exponentially with the order of G, where m(G) is the minimal denominator of a a/b-coloring of G with χf(G)=a/b.  相似文献   
10.
Algebras of fuzzy sets   总被引:2,自引:0,他引:2  
In this paper we investigate two kinds of algebras of fuzzy sets, which are obtained by using Zadeh's extension principle. We give conditions under which a homomorphism between two algebras induces a homomorphism between corresponding algebras of fuzzy sets. We prove that if the structure of truth values is a complete residuated lattice, the induced algebra of a subalgebra of an algebra can be embedded into the induced algebra of fuzzy sets of . For direct products we give conditions under which the direct product of algebras of fuzzy sets could be embedded into the algebra of fuzzy sets of the direct product. In the case of homomorphisms and direct products, the two kinds of algebras of fuzzy sets behave in different ways.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号