期刊文献+
共找到3,085篇文章
< 1 2 155 >
每页显示 20 50 100
Characterizations of Lie Triple Derivations on the Algebra of Operators in Hilbert C^(*)-Modules
1
作者 Guangyu AN Jun SHENG Jun HE 《Journal of Mathematical Research with Applications》 CSCD 2024年第3期387-396,共10页
Let A be a commutative unital C^(*)-algebra with the unit element e and M be a full Hilbert A-module.Denote by End_(A)(M)the algebra of all bounded A-linear mappings on M and by M′the set of all bounded A-linear mapp... Let A be a commutative unital C^(*)-algebra with the unit element e and M be a full Hilbert A-module.Denote by End_(A)(M)the algebra of all bounded A-linear mappings on M and by M′the set of all bounded A-linear mappings from M into A.In this paper,we prove that if there exists x_(0) in M and f_(0) in M′such that f_(0)(x_(0))=e,then every A-linear Lie triple derivation on End_(A)(M)is standard. 展开更多
关键词 Lie triple derivation standard DERIVATION Hilbert C^(*)-module
原文传递
Research on θ -Intuitionistic Fuzzy Homomorphism Theory
2
作者 Yue Wang Yan Yan Xinru Shang 《Journal of Applied Mathematics and Physics》 2024年第10期3579-3589,共11页
Fuzzy homomorphism is an important research content of fuzzy group theory, different fuzzy mappings will produce different fuzzy homomorphisms. In this paper, the fuzzy homomorphism of groups is generalized. Firstly, ... Fuzzy homomorphism is an important research content of fuzzy group theory, different fuzzy mappings will produce different fuzzy homomorphisms. In this paper, the fuzzy homomorphism of groups is generalized. Firstly, the θ-intuitionistic fuzzy mapping is defined, and the θ-intuitionistic fuzzy homomorphism of groups is obtained. The properties of intuitionistic fuzzy subgroups and intuitionistic fuzzy normal subgroups are studied under the θ-intuitionistic fuzzy homomorphism of groups, and the fundamental theorem of θ-intuitionistic fuzzy homomorphism is proved. 展开更多
关键词 -Intuitionistic Fuzzy homomorphism Intuitionistic Fuzzy Subgroup Intuitionistic Fuzzy Normal Subgroup
在线阅读 下载PDF
Homomorphic Integrity and Confidentiality Protection for Data Aggregation in the Digital Twin Environment with High Efficiency
3
作者 Yan Xincheng Wan Changsheng +3 位作者 Bao Zhenjie Li Pei Hou Kangxin Chen Haitao 《China Communications》 2025年第10期101-117,共17页
Digital twin is a novel technology that has achieved significant progress in industrial manufactur-ing systems in recent years.In the digital twin envi-ronment,entities in the virtual space collect data from devices i... Digital twin is a novel technology that has achieved significant progress in industrial manufactur-ing systems in recent years.In the digital twin envi-ronment,entities in the virtual space collect data from devices in the physical space to analyze their states.However,since a lot of devices exist in the physical space,the digital twin system needs to aggregate data from multiple devices at the edge gateway.Homomor-phic integrity and confidentiality protections are two important requirements for this data aggregation pro-cess.Unfortunately,existing homomorphic encryp-tion algorithms do not support integrity protection,and existing homomorphic signing algorithms require all signers to use the same signing key,which is not feasible in the digital twin environment.Moreover,for both integrity and confidentiality protections,the homomorphic signing algorithm must be compatible with the aggregation manner of the homomorphic en-cryption algorithm.To address these issues,this paper designs a novel homomorphic aggregation scheme,which allows multiple devices in the physical space to sign different data using different keys and support in-tegrity and confidentiality protections.Finally,the security of the newly designed scheme is analyzed,and its efficiency is evaluated.Experimental results show that our scheme is feasible for real world applications. 展开更多
关键词 data aggregation digital twin homomorphic encryption homomorphic integrity protection
在线阅读 下载PDF
Approximate Homomorphic Encryption for MLaaS by CKKS with Operation-Error-Bound
4
作者 Ray-I Chang Chia-Hui Wang +1 位作者 Yen-Ting Chang Lien-Chen Wei 《Computers, Materials & Continua》 2025年第10期503-518,共16页
As data analysis often incurs significant communication and computational costs,these tasks are increasingly outsourced to cloud computing platforms.However,this introduces privacy concerns,as sensitive data must be t... As data analysis often incurs significant communication and computational costs,these tasks are increasingly outsourced to cloud computing platforms.However,this introduces privacy concerns,as sensitive data must be transmitted to and processed by untrusted parties.To address this,fully homomorphic encryption(FHE)has emerged as a promising solution for privacy-preserving Machine-Learning-as-a-Service(MLaaS),enabling computation on encrypted data without revealing the plaintext.Nevertheless,FHE remains computationally expensive.As a result,approximate homomorphic encryption(AHE)schemes,such as CKKS,have attracted attention due to their efficiency.In our previous work,we proposed RP-OKC,a CKKS-based clustering scheme implemented via TenSEAL.However,errors inherent to CKKS operations—termed CKKS-errors—can affect the accuracy of the result after decryption.Since these errors can be mitigated through post-decryption rounding,we propose a data pre-scaling technique to increase the number of significant digits and reduce CKKS-errors.Furthermore,we introduce an Operation-Error-Estimation(OEE)table that quantifies upper-bound error estimates for various CKKS operations.This table enables error-aware decryption correction,ensuring alignment between encrypted and plaintext results.We validate our method on K-means clustering using the Kaggle Customer Segmentation dataset.Experimental results confirm that the proposed scheme enhances the accuracy and reliability of privacy-preserving data analysis in cloud environments. 展开更多
关键词 Privacy protection K-means clustering cloud computing approximate homomorphic encryption fully homomorphic encryption
在线阅读 下载PDF
Homomorphic Encryption for Machine Learning Applications with CKKS Algorithms:A Survey of Developments and Applications
5
作者 Lingling Wu Xu An Wang +7 位作者 Jiasen Liu Yunxuan Su Zheng Tu Wenhao Liu Haibo Lei Dianhua Tang Yunfei Cao Jianping Zhang 《Computers, Materials & Continua》 2025年第10期89-119,共31页
Due to the rapid advancement of information technology,data has emerged as the core resource driving decision-making and innovation across all industries.As the foundation of artificial intelligence,machine learning(M... Due to the rapid advancement of information technology,data has emerged as the core resource driving decision-making and innovation across all industries.As the foundation of artificial intelligence,machine learning(ML)has expanded its applications into intelligent recommendation systems,autonomous driving,medical diagnosis,and financial risk assessment.However,it relies on massive datasets,which contain sensitive personal information.Consequently,Privacy-Preserving Machine Learning(PPML)has become a critical research direction.To address the challenges of efficiency and accuracy in encrypted data computation within PPML,Homomorphic Encryption(HE)technology is a crucial solution,owing to its capability to facilitate computations on encrypted data.However,the integration of machine learning and homomorphic encryption technologies faces multiple challenges.Against this backdrop,this paper reviews homomorphic encryption technologies,with a focus on the advantages of the Cheon-Kim-Kim-Song(CKKS)algorithm in supporting approximate floating-point computations.This paper reviews the development of three machine learning techniques:K-nearest neighbors(KNN),K-means clustering,and face recognition-in integration with homomorphic encryption.It proposes feasible schemes for typical scenarios,summarizes limitations and future optimization directions.Additionally,it presents a systematic exploration of the integration of homomorphic encryption and machine learning from the essence of the technology,application implementation,performance trade-offs,technological convergence and future pathways to advance technological development. 展开更多
关键词 homomorphic encryption machine learning CKKS PPML
在线阅读 下载PDF
A Fully Homomorphic Encryption Scheme Suitable for Ciphertext Retrieval
6
作者 Ronglei Hu ChuceHe +3 位作者 Sihui Liu Dong Yao Xiuying Li Xiaoyi Duan 《Computers, Materials & Continua》 2025年第7期937-956,共20页
Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To ... Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To address these problems,this paper proposes an enhanced Fully Homomorphic Encryption(FHE)algorithm based on an improved DGHV algorithm,coupled with an optimized ciphertext retrieval scheme.Our specific contributions are outlined as follows:First,we employ an authorization code to verify the user’s retrieval authority and perform hierarchical access control on cloud storage data.Second,a triple-key encryption mechanism,which separates the data encryption key,retrieval authorization key,and retrieval key,is designed.Different keys are provided to different entities to run corresponding system functions.The key separation architecture proves particularly advantageous in multi-verifier coexistence scenarios,environments involving untrusted third-party retrieval services.Finally,the enhanced DGHV-based retrieval mechanism extends conventional functionality by enabling multi-keyword queries with similarity-ranked results,thereby significantly improving both the functionality and usability of the FHE system. 展开更多
关键词 Cloud storage homomorphic encryption ciphertext retrieval identity authentication
在线阅读 下载PDF
HEaaN-ID3: Fully Homomorphic Privacy-Preserving ID3-Decision Trees Using CKKS
7
作者 Dain Lee Hojune Shin +1 位作者 Jihyeon Choi Younho Lee 《Computers, Materials & Continua》 2025年第8期3673-3705,共33页
In this study,we investigated privacy-preserving ID3 Decision Tree(PPID3)training and inference based on fully homomorphic encryption(FHE),which has not been actively explored due to the high computational cost associ... In this study,we investigated privacy-preserving ID3 Decision Tree(PPID3)training and inference based on fully homomorphic encryption(FHE),which has not been actively explored due to the high computational cost associated with managing numerous child nodes in an ID3 tree.We propose HEaaN-ID3,a novel approach to realize PPID3 using the Cheon-Kim-Kim-Song(CKKS)scheme.HEaaN-ID3 is the first FHE-based ID3 framework that completes both training and inference without any intermediate decryption,which is especially valuable when decryption keys are inaccessible or a single-cloud security domain is assumed.To enhance computational efficiency,we adopt a modified Gini impurity(MGI)score instead of entropy to evaluate information gain,thereby avoiding costly inverse operations.In addition,we fully leverage the Single Instruction Multiple Data(SIMD)property of CKKS to parallelize computations at multiple tree nodes.Unlike previous approaches that require decryption at each node or rely on two-party secure computation,our method enables a fully non-interactive training and inference pipeline in the encrypted domain.We validated the proposed scheme using UCI datasets with both numerical and nominal features,demonstrating inference accuracy comparable to plaintext implementations in Scikit-Learn.Moreover,experiments show that HEaaN-ID3 significantly reduces training and inference time per node relative to earlier FHE-based approaches. 展开更多
关键词 homomorphic encryption privacy preserving machine learning applied cryptography information security
在线阅读 下载PDF
A Privacy Protection Scheme for Verifiable Data Element Circulation Based on Fully Homomorphic Encryption
8
作者 Song Jiyuan Gao Hongmin +3 位作者 Ye Keke Shen Yushi Ma Zhaofeng Feng Chengzhi 《China Communications》 2025年第4期223-235,共13页
With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in p... With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in privacy protection and data verification,especially for sensitive data.Existing schemes often suffer from inefficiency and high overhead.We propose a privacy protection scheme using BGV homomorphic encryption and Pedersen Secret Sharing.This scheme enables secure computation on encrypted data,with Pedersen sharding and verifying the private key,ensuring data consistency and immutability.The blockchain framework manages key shards,verifies secrets,and aids security auditing.This approach allows for trusted computation without revealing the underlying data.Preliminary results demonstrate the scheme's feasibility in ensuring data privacy and security,making data available but not visible.This study provides an effective solution for data sharing and privacy protection in blockchain applications. 展开更多
关键词 blockchain technology data element cir-culation data privacy homomorphic encryption se-cret sharing trusted computation
在线阅读 下载PDF
NH_(4)^(+)-Modulated Cathodic Interfacial Spatial Charge Redistribution for High-Performance Dual-Ion Capacitors
9
作者 Yumin Chen Ziyang Song +2 位作者 Yaokang Lv Lihua Gan Mingxian Liu 《Nano-Micro Letters》 2025年第5期391-406,共16页
Compared with Zn^(2+),the current mainly reported charge carrier for zinc hybrid capacitors,small-hydrated-sized and light-weight NH_(4)^(+)is expected as a better one to mediate cathodic interfacial electrochemical b... Compared with Zn^(2+),the current mainly reported charge carrier for zinc hybrid capacitors,small-hydrated-sized and light-weight NH_(4)^(+)is expected as a better one to mediate cathodic interfacial electrochemical behaviors,yet has not been unraveled.Here we propose an NH_(4)^(+)-modulated cationic solvation strategy to optimize cathodic spatial charge distribution and achieve dynamic Zn^(2+)/NH_(4)^(+)co-storage for boosting Zinc hybrid capacitors.Owing to the hierarchical cationic solvated structure in hybrid Zn(CF_(3)SO_(3))_(2)–NH_4CF_(3)SO_(3)electrolyte,high-reactive Zn^(2+)and small-hydrate-sized NH_4(H_(2)O))(4)^(+)induce cathodic interfacial Helmholtz plane reconfiguration,thus effectively enhancing the spatial charge density to activate 20%capacity enhancement.Furthermore,cathodic interfacial adsorbed hydrated NH_(4)^(+)ions afford high-kinetics and ultrastable C···H(NH_(4)^(+))charge storage process due to a much lower desolvation energy barrier compared with heavy and rigid Zn(H_(2)O)_6^(2+)(5.81 vs.14.90 eV).Consequently,physical uptake and multielectron redox of Zn^(2+)/NH_(4)^(+)in carbon cathode enable the zinc capacitor to deliver high capacity(240 mAh g^(-1)at 0.5 A g^(-1)),large-current tolerance(130 mAh g^(-1)at 50 A g^(-1))and ultralong lifespan(400,000cycles).This study gives new insights into the design of cathode–electrolyte interfaces toward advanced zinc-based energy storage. 展开更多
关键词 NH_(4)^(+)-modulated cathodic interface Spatial charge redistribution Zn^(2+)/NH_(4)^(+) co-storage Dual-ion capacitor
在线阅读 下载PDF
An Introduction to the Theory of C~*-modules
10
作者 邓宏钧 刘德权 《Chinese Quarterly Journal of Mathematics》 CSCD 1992年第2期72-77,共6页
This paper,combined algebraical structure with analytical system,has studied the part of theory of C~*-modules over A by using the homolgical methods, where A is a commutative C~*-algebra over complex number field C. ... This paper,combined algebraical structure with analytical system,has studied the part of theory of C~*-modules over A by using the homolgical methods, where A is a commutative C~*-algebra over complex number field C. That is to say we have not only defined some relevant new concept,but also obtained some results about them. 展开更多
关键词 commutative C~*-algebra C~*-module C~*-homomorphism
在线阅读 下载PDF
Research on Data Privacy Protection Algorithm with Homomorphism Mechanism Based on Redundant Slice Technology in Wireless Sensor Networks 被引量:6
11
作者 Peng Li Chao Xu +2 位作者 He Xu Lu Dong Ruchuan Wang 《China Communications》 SCIE CSCD 2019年第5期158-170,共13页
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn... Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy. 展开更多
关键词 wireless sensor network PRIVACY PROTECTION SLICE TECHNOLOGY PRIVACY homomorphism collection tree protocol
在线阅读 下载PDF
A generalization of co-*~n-modules
12
作者 姚玲玲 陈建龙 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期505-508,共4页
A module is called a co-*∞-module if it is co-selfsmall and ∞-quasi-injective. The properties and characterizations are investigated. When a module U is a co-*∞-module, the functor Hom RU(-,U)is exact in Copre... A module is called a co-*∞-module if it is co-selfsmall and ∞-quasi-injective. The properties and characterizations are investigated. When a module U is a co-*∞-module, the functor Hom RU(-,U)is exact in Copres∞(U). A module U is a co-*∞-module if and only if U is co-selfsmall and for any exact sequence 0→M→UI→N→0 with M∈Copres∞(U) and I is a set, N∈Copres∞(U) is equivalent to Ext1R(N,U)→Ext1R(UI,U) is a monomorphism if and only if U is co-selfsmall and for any exact sequence 0→L→M→N→0 with L, N∈Copres∞(U), N∈Copres∞(U) is equivalent to the induced sequence 0→Δ(N)→Δ(M)→Δ(L)→0 which is exact if and only if U induces a duality ΔUS:⊥USCopres∞(U):ΔRU. Moreover, U is a co-*n-module if and only if U is a co-*∞-module and Copres∞(U)=Copresn(U). 展开更多
关键词 co-*∞-module ∞-quasi-injective co-selfsmall co-*n-module
在线阅读 下载PDF
The Homomorphism and Isomorphism on Hypergroup 被引量:4
13
作者 钟育彬 《Chinese Quarterly Journal of Mathematics》 CSCD 1997年第3期7-14, ,共8页
Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true... Basing on the papers from [1] to [4], this paper gives some further research,mainly solves the following problems:(1) It proved that several theorems of subgroup which have been raised to the hypergroup are still true.(2) It proved that the isomorphous relationship of the bottomgroups which guid to the hypergroup can still keep such relationship.(3) It proved that the basic isomorphous Theorem and the homogenous Theorem of the bottomgroup which raise to the hypergroup are still true.(4) It point out that when the isomorphous bottomgroups have been raised to the hypergroup,the conditions which form the isomorphism should be lessened. 展开更多
关键词 HYPERGROUP homomorphism ISOMORPHISM regular hypergroup uniform hypergroup
在线阅读 下载PDF
A Type of Busemann-Petty Problems for Blaschke-Minkowski Homomorphisms 被引量:1
14
作者 CHEN Bin WANG Weidong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第4期289-294,共6页
Schuster introduced the notion of Blaschke-Minkowski homomorphisms and first considered Busemann-Petty type problems. In this paper, we study the Busemann-Petty type problems for the geominimal surface area with respe... Schuster introduced the notion of Blaschke-Minkowski homomorphisms and first considered Busemann-Petty type problems. In this paper, we study the Busemann-Petty type problems for the geominimal surface area with respect to Blaschke-Minkowski homomorphisms. 展开更多
关键词 Blaschke-Minkowski homomorphism Busemann-Petty problem geominimal surface area
原文传递
STABILITY OF GENERALIZED DERIVATIONS ON HILBERT C*-MODULES ASSOCIATED WITH A PEXIDERIZED CAUCHY-JENSEN TYPE FUNCTIONAL EQUATION 被引量:2
15
作者 Ali Ebadian Ismail Nikoufar +1 位作者 Themistocles M.Rassias Norouz Ghobadipour 《Acta Mathematica Scientia》 SCIE CSCD 2012年第3期1226-1238,共13页
In this article, we introduce the notion of generalized derivations on Hilbert C*-modules. We use a fixed-point method to prove the generalized Hyers-Ulam-Rassias stability associated to the Pexiderized Cauchy-Jensen... In this article, we introduce the notion of generalized derivations on Hilbert C*-modules. We use a fixed-point method to prove the generalized Hyers-Ulam-Rassias stability associated to the Pexiderized Cauchy-Jensen type functional equationrf(x+y/r)+sg(x-y/s)=2h(x)for r, s ∈ R / {0} on Hilbert C*-modules, where f, g, and h are mappings from a Hilbert C*-module M to M. 展开更多
关键词 Hyers-Ulam-Rassias stability Hilbert C*-module generalized derivation fixed point
在线阅读 下载PDF
A Type of Shephard Problems for Lp Blaschke-Minkowski Homomorphisms 被引量:2
16
作者 ZHAO Xia WANG Weidong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第2期93-99,共7页
The Blaschke-Minkowski homomorphisms was defined by Schuster.Recently,Wang extended its concept to Lp version.In this paper,we obtain affirmative and negative forms of the Shephard type problems for Lp geominimal surf... The Blaschke-Minkowski homomorphisms was defined by Schuster.Recently,Wang extended its concept to Lp version.In this paper,we obtain affirmative and negative forms of the Shephard type problems for Lp geominimal surface areas with respect to the Lp Blaschke-Minkowski homomorphisms. 展开更多
关键词 Lp Blaschke-Minkowski homomorphism Shephard problem Lp geominimal surface area
原文传递
A New Characterization on g-frames in Hilbert C^*-Modules 被引量:1
17
作者 Xiang Zhong-qi 《Communications in Mathematical Research》 CSCD 2017年第2期129-134,共6页
In this note, we establish a new characterization on g-frames in Hilbert C;-modules from the operator-theoretic point of view, with which we provide a correction to one result recently obtained by Yao(Yao X Y. Some pr... In this note, we establish a new characterization on g-frames in Hilbert C;-modules from the operator-theoretic point of view, with which we provide a correction to one result recently obtained by Yao(Yao X Y. Some properties of g-frames in Hilbert C;-modules(in Chinese). Acta Math. Sinica, 2011, 54(1): 1–8.). 展开更多
关键词 Hilbert C*-module G-FRAME characterization
在线阅读 下载PDF
CHAIN CONDITIONS FOR C*-ALGEBRAS COMING FROM HILBERT C*-MODULES 被引量:2
18
作者 Mahmood POURGHOLAMHOSSEIN Mohammad ROUZBEHANI Massoud AMINI 《Acta Mathematica Scientia》 SCIE CSCD 2018年第4期1163-1173,共11页
In this paper we define and study chain conditions for Hilbert C*-modules through their C*-algebras of compact operators and discuss their perseverance under Morita equivalence and tensor products. We show that thes... In this paper we define and study chain conditions for Hilbert C*-modules through their C*-algebras of compact operators and discuss their perseverance under Morita equivalence and tensor products. We show that these chain conditions are passed from the C*-algebra to its Hilbert module under certain conditions. We also study chain conditions for Hilbert modules coming from inclusion of C*-algebra with a faithful conditional expectation. 展开更多
关键词 Hilbert C*-module Noetherian and Artinian C*-algebras purely infinite C*-algebras Morita equivalence
在线阅读 下载PDF
Exact Sequence and Commutative Diagrams of Semimodule Homomorphism 被引量:1
19
作者 肖泽昌 《Chinese Quarterly Journal of Mathematics》 CSCD 1997年第2期108-110, ,共3页
Throught the introduction of the concept * exact sequence,we set up several satisfied results of commutative diagrams of semimodule homomorphism.
关键词 SEMIMODULE homomorphism * exact sequence commutative diagrams
在线阅读 下载PDF
The characterization of Γ-modules in terms of fuzzy soft Γ-submodules 被引量:1
20
作者 ZHOU Min XIANG Da-jing ZHAN Jian-ming 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2013年第2期217-239,共23页
In this paper,we focus on combining the theories of fuzzy soft sets with Γ-modules,and establishing a new framework for fuzzy soft Γ-submodules.The main contributions of the paper are 3-fold.First,we present the con... In this paper,we focus on combining the theories of fuzzy soft sets with Γ-modules,and establishing a new framework for fuzzy soft Γ-submodules.The main contributions of the paper are 3-fold.First,we present the concepts of(R,S)-bi-Γ-submodules,quasi-Γ-submodules and regular Γ-modules.Meanwhile,some illustrative examples are given to show the rationality of the definitions introduced in this paper.Second,several new kinds of generalized fuzzy soft Γ-submodules are proposed,and related properties and mutual relationships are also investigated.Third,we discover some intrinsic connections between the generalized fuzzy soft Γ-submodules presented in this paper and crisp Γ-submodules,and describe the relationships between regular Γ-modules and the generalized fuzzy soft Γ-submodules presented in this paper. 展开更多
关键词 Fuzzy soft set Γ-module (∈ γ γ q δ)(resp. (■ γ γ δ))-fuzzy soft left R-Γ-submodule(right R-Γ-submodules (R S)-bi-Γ-submodule quasi-Γ-submodule) regular Γ-module
在线阅读 下载PDF
上一页 1 2 155 下一页 到第
使用帮助 返回顶部