In this paper,we discuss the structure of intuitionistic fuzzy(IF)homomorphisms,exact sequences and some other concepts in category of IF modules.We study on IF exact sequences and IF Hom functors in IFR-Mod and obtai...In this paper,we discuss the structure of intuitionistic fuzzy(IF)homomorphisms,exact sequences and some other concepts in category of IF modules.We study on IF exact sequences and IF Hom functors in IFR-Mod and obtain some results about them.If R is a commutative ring and 0→A~f→B~g→C is an exact sequence in IFR-Mod,where f is IF split homomorphism,then we show that Hom_(IF-R)(D,-)preserves the sequence for every D∈IFR-Mod.Also IF projective modules will be introduced and investigated in this paper.Finally we define product and coproduct of IF modules and show that if M is an R-module,A=(μ_(A),ν_(A))≤_(IF)M and e_(i)∈E(R)for any i∈I,then Hom(Пi2I 0IF Rei;A)=Πi2I Hom(0IF Rei;A).展开更多
This paper,combined algebraical structure with analytical system,has studied the part of theory of C~*-modules over A by using the homolgical methods, where A is a commutative C~*-algebra over complex number field C. ...This paper,combined algebraical structure with analytical system,has studied the part of theory of C~*-modules over A by using the homolgical methods, where A is a commutative C~*-algebra over complex number field C. That is to say we have not only defined some relevant new concept,but also obtained some results about them.展开更多
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn...Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.展开更多
A module is called a co-*∞-module if it is co-selfsmall and ∞-quasi-injective. The properties and characterizations are investigated. When a module U is a co-*∞-module, the functor Hom RU(-,U)is exact in Copre...A module is called a co-*∞-module if it is co-selfsmall and ∞-quasi-injective. The properties and characterizations are investigated. When a module U is a co-*∞-module, the functor Hom RU(-,U)is exact in Copres∞(U). A module U is a co-*∞-module if and only if U is co-selfsmall and for any exact sequence 0→M→UI→N→0 with M∈Copres∞(U) and I is a set, N∈Copres∞(U) is equivalent to Ext1R(N,U)→Ext1R(UI,U) is a monomorphism if and only if U is co-selfsmall and for any exact sequence 0→L→M→N→0 with L, N∈Copres∞(U), N∈Copres∞(U) is equivalent to the induced sequence 0→Δ(N)→Δ(M)→Δ(L)→0 which is exact if and only if U induces a duality ΔUS:⊥USCopres∞(U):ΔRU. Moreover, U is a co-*n-module if and only if U is a co-*∞-module and Copres∞(U)=Copresn(U).展开更多
Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true...Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true.(2) It proved that the isomorphous relationship of the bottomgroups which guid to the hypergroup can still keep such relationship.(3) It proved that the basic isomorphous Theorem and the homogenous Theorem of the bottomgroup which raise to the hypergroup are still true.(4) It point out that when the isomorphous bottomgroups have been raised to the hypergroup,the conditions which form the isomorphism should be lessened.展开更多
Schuster introduced the notion of Blaschke-Minkowski homomorphisms and first considered Busemann-Petty type problems. In this paper, we study the Busemann-Petty type problems for the geominimal surface area with respe...Schuster introduced the notion of Blaschke-Minkowski homomorphisms and first considered Busemann-Petty type problems. In this paper, we study the Busemann-Petty type problems for the geominimal surface area with respect to Blaschke-Minkowski homomorphisms.展开更多
In this article, we introduce the notion of generalized derivations on Hilbert C*-modules. We use a fixed-point method to prove the generalized Hyers-Ulam-Rassias stability associated to the Pexiderized Cauchy-Jensen...In this article, we introduce the notion of generalized derivations on Hilbert C*-modules. We use a fixed-point method to prove the generalized Hyers-Ulam-Rassias stability associated to the Pexiderized Cauchy-Jensen type functional equationrf(x+y/r)+sg(x-y/s)=2h(x)for r, s ∈ R / {0} on Hilbert C*-modules, where f, g, and h are mappings from a Hilbert C*-module M to M.展开更多
The Blaschke-Minkowski homomorphisms was defined by Schuster.Recently,Wang extended its concept to Lp version.In this paper,we obtain affirmative and negative forms of the Shephard type problems for Lp geominimal surf...The Blaschke-Minkowski homomorphisms was defined by Schuster.Recently,Wang extended its concept to Lp version.In this paper,we obtain affirmative and negative forms of the Shephard type problems for Lp geominimal surface areas with respect to the Lp Blaschke-Minkowski homomorphisms.展开更多
In this note, we establish a new characterization on g-frames in Hilbert C;-modules from the operator-theoretic point of view, with which we provide a correction to one result recently obtained by Yao(Yao X Y. Some pr...In this note, we establish a new characterization on g-frames in Hilbert C;-modules from the operator-theoretic point of view, with which we provide a correction to one result recently obtained by Yao(Yao X Y. Some properties of g-frames in Hilbert C;-modules(in Chinese). Acta Math. Sinica, 2011, 54(1): 1–8.).展开更多
In this paper we define and study chain conditions for Hilbert C*-modules through their C*-algebras of compact operators and discuss their perseverance under Morita equivalence and tensor products. We show that thes...In this paper we define and study chain conditions for Hilbert C*-modules through their C*-algebras of compact operators and discuss their perseverance under Morita equivalence and tensor products. We show that these chain conditions are passed from the C*-algebra to its Hilbert module under certain conditions. We also study chain conditions for Hilbert modules coming from inclusion of C*-algebra with a faithful conditional expectation.展开更多
In this paper,we focus on combining the theories of fuzzy soft sets with Γ-modules,and establishing a new framework for fuzzy soft Γ-submodules.The main contributions of the paper are 3-fold.First,we present the con...In this paper,we focus on combining the theories of fuzzy soft sets with Γ-modules,and establishing a new framework for fuzzy soft Γ-submodules.The main contributions of the paper are 3-fold.First,we present the concepts of(R,S)-bi-Γ-submodules,quasi-Γ-submodules and regular Γ-modules.Meanwhile,some illustrative examples are given to show the rationality of the definitions introduced in this paper.Second,several new kinds of generalized fuzzy soft Γ-submodules are proposed,and related properties and mutual relationships are also investigated.Third,we discover some intrinsic connections between the generalized fuzzy soft Γ-submodules presented in this paper and crisp Γ-submodules,and describe the relationships between regular Γ-modules and the generalized fuzzy soft Γ-submodules presented in this paper.展开更多
In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a sem...In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a semigroup isomorphism; characterizations are given for the semilocal rings being semiperfect.展开更多
Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p...Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p at most. Assume that F and R are subsemigroups of Mn(F) such that F M^Pn(F). A map f : F→R is called a homomorphism if f(AB) = f(A)f(B) for any A, B ∈F. In particular, f is called an endomorphism if F = R. The structure of all homomorphisms from F to R (respectively, all endomorphisms of Mn(F)) is described.展开更多
Let A, B be two unital C^*-algebras. By using fixed pint methods, we prove that every almost unital almost linear mapping h : A →B which satisfies h(2^nuy) = h(2^nu)h(y) for all u ∈ U(A), all y ∈ A, and a...Let A, B be two unital C^*-algebras. By using fixed pint methods, we prove that every almost unital almost linear mapping h : A →B which satisfies h(2^nuy) = h(2^nu)h(y) for all u ∈ U(A), all y ∈ A, and all n = 0,1,2,..., is a homomorphism. Also, we establish the generalized Hyers-Ulam-Rassias stability of ,-homomorphisms on unital C^*-algebras.展开更多
In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism ba...In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism based on different domains is defined, and the corresponding homomorphism theorem of valuation algebra is proved.展开更多
This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the ...This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the integer ring. The homomorphism key agreement based on RSA is presented. Compared with Diffie-Hellman protocol, its operation speed is more quickly; Compared with key agreement protocol based on password, it has better security. The protocol can use the public key of RSA to create the contributory, forward secrecy the session key. Finally, the security of the protocol is proved by BAN logic.展开更多
The notion of radial Blaschke-Minkowski homomorphism was introduced by Schuster. In this paper, we study the radial Blaschke and radial Minkowski linear combinations, respectively, and give several inequalities under ...The notion of radial Blaschke-Minkowski homomorphism was introduced by Schuster. In this paper, we study the radial Blaschke and radial Minkowski linear combinations, respectively, and give several inequalities under the notion of radial Blaschke Minkowski homomorphism in forms of star dual.展开更多
Using fixed point methods, we prove the Hyers–Ulam–Rassias stability and superstability of Jordan homomorphisms (Jordan *-homomorphisms), and Jordan derivations (Jordan *-derivations) on Banach algebras (C*-...Using fixed point methods, we prove the Hyers–Ulam–Rassias stability and superstability of Jordan homomorphisms (Jordan *-homomorphisms), and Jordan derivations (Jordan *-derivations) on Banach algebras (C*-algebras) for the generalized Jensen–type functional equationwhere r is a fixed positive real number in (1, ∞).展开更多
In this paper,linear maps preserving Lie products at zero points on nest algebras are studied.It is proved that every linear map preserving Lie products at zero points on any finite nest algebra is a Lie homomorphism....In this paper,linear maps preserving Lie products at zero points on nest algebras are studied.It is proved that every linear map preserving Lie products at zero points on any finite nest algebra is a Lie homomorphism.As an application,the form of a linear bijection preserving Lie products at zero points between two finite nest algebras is obtained.展开更多
文摘In this paper,we discuss the structure of intuitionistic fuzzy(IF)homomorphisms,exact sequences and some other concepts in category of IF modules.We study on IF exact sequences and IF Hom functors in IFR-Mod and obtain some results about them.If R is a commutative ring and 0→A~f→B~g→C is an exact sequence in IFR-Mod,where f is IF split homomorphism,then we show that Hom_(IF-R)(D,-)preserves the sequence for every D∈IFR-Mod.Also IF projective modules will be introduced and investigated in this paper.Finally we define product and coproduct of IF modules and show that if M is an R-module,A=(μ_(A),ν_(A))≤_(IF)M and e_(i)∈E(R)for any i∈I,then Hom(Пi2I 0IF Rei;A)=Πi2I Hom(0IF Rei;A).
文摘This paper,combined algebraical structure with analytical system,has studied the part of theory of C~*-modules over A by using the homolgical methods, where A is a commutative C~*-algebra over complex number field C. That is to say we have not only defined some relevant new concept,but also obtained some results about them.
基金sponsored by the National Key R&D Program of China(No.2018YFB1003201)the National Natural Science Foundation of China(No.61672296,No.61602261)Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008)
文摘Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
基金The National Natural Science Foundation of China (No.10971024)Specialized Research Fund for the Doctoral Program of Higher Education (No.200802860024)
文摘A module is called a co-*∞-module if it is co-selfsmall and ∞-quasi-injective. The properties and characterizations are investigated. When a module U is a co-*∞-module, the functor Hom RU(-,U)is exact in Copres∞(U). A module U is a co-*∞-module if and only if U is co-selfsmall and for any exact sequence 0→M→UI→N→0 with M∈Copres∞(U) and I is a set, N∈Copres∞(U) is equivalent to Ext1R(N,U)→Ext1R(UI,U) is a monomorphism if and only if U is co-selfsmall and for any exact sequence 0→L→M→N→0 with L, N∈Copres∞(U), N∈Copres∞(U) is equivalent to the induced sequence 0→Δ(N)→Δ(M)→Δ(L)→0 which is exact if and only if U induces a duality ΔUS:⊥USCopres∞(U):ΔRU. Moreover, U is a co-*n-module if and only if U is a co-*∞-module and Copres∞(U)=Copresn(U).
文摘Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true.(2) It proved that the isomorphous relationship of the bottomgroups which guid to the hypergroup can still keep such relationship.(3) It proved that the basic isomorphous Theorem and the homogenous Theorem of the bottomgroup which raise to the hypergroup are still true.(4) It point out that when the isomorphous bottomgroups have been raised to the hypergroup,the conditions which form the isomorphism should be lessened.
基金Supported by the National Natural Science Foundation of China(11371224)Innovation Foundation of Graduate Student of China Three Gorges University(2018SSPY136)
文摘Schuster introduced the notion of Blaschke-Minkowski homomorphisms and first considered Busemann-Petty type problems. In this paper, we study the Busemann-Petty type problems for the geominimal surface area with respect to Blaschke-Minkowski homomorphisms.
文摘In this article, we introduce the notion of generalized derivations on Hilbert C*-modules. We use a fixed-point method to prove the generalized Hyers-Ulam-Rassias stability associated to the Pexiderized Cauchy-Jensen type functional equationrf(x+y/r)+sg(x-y/s)=2h(x)for r, s ∈ R / {0} on Hilbert C*-modules, where f, g, and h are mappings from a Hilbert C*-module M to M.
基金Supported by the National Natural Science Foundation of China(11371224)Innovation Foundation of Graduate Student of China Three Gorges University(2019SSPY144)。
文摘The Blaschke-Minkowski homomorphisms was defined by Schuster.Recently,Wang extended its concept to Lp version.In this paper,we obtain affirmative and negative forms of the Shephard type problems for Lp geominimal surface areas with respect to the Lp Blaschke-Minkowski homomorphisms.
基金The NSF(11271148,11561057)of Chinathe NSF(20151BAB201007)of Jiangxi Provincethe Science and Technology Project(GJJ151061)of Jiangxi Education Department
文摘In this note, we establish a new characterization on g-frames in Hilbert C;-modules from the operator-theoretic point of view, with which we provide a correction to one result recently obtained by Yao(Yao X Y. Some properties of g-frames in Hilbert C;-modules(in Chinese). Acta Math. Sinica, 2011, 54(1): 1–8.).
文摘In this paper we define and study chain conditions for Hilbert C*-modules through their C*-algebras of compact operators and discuss their perseverance under Morita equivalence and tensor products. We show that these chain conditions are passed from the C*-algebra to its Hilbert module under certain conditions. We also study chain conditions for Hilbert modules coming from inclusion of C*-algebra with a faithful conditional expectation.
基金Supported by the National Natural Science Foundation of China (61175055)the Innovation Term of Higher Education of Hubei Province,China (T201109)+1 种基金the Natural Science Foundation of Hubei Province (2012FFB01101)the Natural Science Foundation of Education Committee of Hubei Province (D20131903)
文摘In this paper,we focus on combining the theories of fuzzy soft sets with Γ-modules,and establishing a new framework for fuzzy soft Γ-submodules.The main contributions of the paper are 3-fold.First,we present the concepts of(R,S)-bi-Γ-submodules,quasi-Γ-submodules and regular Γ-modules.Meanwhile,some illustrative examples are given to show the rationality of the definitions introduced in this paper.Second,several new kinds of generalized fuzzy soft Γ-submodules are proposed,and related properties and mutual relationships are also investigated.Third,we discover some intrinsic connections between the generalized fuzzy soft Γ-submodules presented in this paper and crisp Γ-submodules,and describe the relationships between regular Γ-modules and the generalized fuzzy soft Γ-submodules presented in this paper.
文摘In this paper, the induced group homomorphism was studied. It is proved that for any ideal I of a ring R contained in J(R), K 0(π):K 0(R)→K 0(R/I) is isomorphic if and only if K 0(π) + is a semigroup isomorphism; characterizations are given for the semilocal rings being semiperfect.
基金the Chinese NSF under Grant No.10271021the Younth Fund of Heilongjiang Provincethe Fund of Heilongjiang Education Committee for Oversea Scholars under Grant No.1054HQ004
文摘Suppose F is a field, and n, p are integers with 1 ≤ p 〈 n. Let Mn(F) be the multiplicative semigroup of all n × n matrices over F, and let M^Pn(F) be its subsemigroup consisting of all matrices with rank p at most. Assume that F and R are subsemigroups of Mn(F) such that F M^Pn(F). A map f : F→R is called a homomorphism if f(AB) = f(A)f(B) for any A, B ∈F. In particular, f is called an endomorphism if F = R. The structure of all homomorphisms from F to R (respectively, all endomorphisms of Mn(F)) is described.
文摘Let A, B be two unital C^*-algebras. By using fixed pint methods, we prove that every almost unital almost linear mapping h : A →B which satisfies h(2^nuy) = h(2^nu)h(y) for all u ∈ U(A), all y ∈ A, and all n = 0,1,2,..., is a homomorphism. Also, we establish the generalized Hyers-Ulam-Rassias stability of ,-homomorphisms on unital C^*-algebras.
基金The NSF(60873119)of Chinathe Higher School Doctoral Subject Foundation (200807180005)of Ministry of Education of China
文摘In this paper, firstly, a necessary condition and a sufficient condition for an isomorphism between two semiring-induced valuation algebras to exist are presented respectively. Then a general valuation homomorphism based on different domains is defined, and the corresponding homomorphism theorem of valuation algebra is proved.
基金Supported by the National Natural Science Foun-dation of China(90104005) .
文摘This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public key cryptosystems in detail and homomorphie encryption scheme in the integer ring. The homomorphism key agreement based on RSA is presented. Compared with Diffie-Hellman protocol, its operation speed is more quickly; Compared with key agreement protocol based on password, it has better security. The protocol can use the public key of RSA to create the contributory, forward secrecy the session key. Finally, the security of the protocol is proved by BAN logic.
基金Supported by the National Natural Science Foundation of China(11371224)
文摘The notion of radial Blaschke-Minkowski homomorphism was introduced by Schuster. In this paper, we study the radial Blaschke and radial Minkowski linear combinations, respectively, and give several inequalities under the notion of radial Blaschke Minkowski homomorphism in forms of star dual.
文摘Using fixed point methods, we prove the Hyers–Ulam–Rassias stability and superstability of Jordan homomorphisms (Jordan *-homomorphisms), and Jordan derivations (Jordan *-derivations) on Banach algebras (C*-algebras) for the generalized Jensen–type functional equationwhere r is a fixed positive real number in (1, ∞).
基金Supported by the Specialized Research Foundation for the Doctoral Program of Universities and Colleges of China(20110202110002)
文摘In this paper,linear maps preserving Lie products at zero points on nest algebras are studied.It is proved that every linear map preserving Lie products at zero points on any finite nest algebra is a Lie homomorphism.As an application,the form of a linear bijection preserving Lie products at zero points between two finite nest algebras is obtained.