首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 194 毫秒
1.
The characterization ofA 5 is obtained through the method of calculation. The main result is described as the following:
1)  The order ofA 5 is one, two, three or five.
2)  The element ofA 5 is divided into five conjugate classes.
3)  There are fifty and nine subgroup inA 5 and we can obtain one produce element in every subgroup.
4)  There are nine conjugate classes in the subgroup ofA 5.
Supported by the Natural Science Foundation of Hubei Province Huang Benwen: born in Oct. 1948, Associate professor  相似文献   

2.
The characterigation ofA 6 is obtained through the method of calculation: The elements ofA 6 is divided into seven conjugate classes. Supported by the Natural Science Foundation of Hubei Province Huang Benwen: born in 1948, Associate professor  相似文献   

3.
0 IntroductionThetechnologyofthermalanalysishasbeenwidelyusedinthestudyofthermalbehaviorandthermalcharacterofsolidstatereaction ,theprimaryintentionofthermalanalysiskineticsistoestablishseparatevaluesofapparentactivationenergyE ,themostprobablemechanism g(α)andthepre exponentialfactorA ,meanwhilethedeterminationofg(α)hasgraduallybeenthefocusofthisfield .Inthisfield ,therearemostlygeneralkineticsmethodsused presently ,suchasCoats Redfern’s[1 ] integralmethod ,Achar’s[2 \〗differentialmet…  相似文献   

4.
Orientational domains at room temperature in orthorhombic perovskite La0.33Ca0.67MnO3 were studied by group-theory and observed systematically using transmission electron microscopy. There are six orientational variants (A, A′, B, B′, C andC′) in orthorhombic perovskite La0.33Ca0.67MnO3. Their orthorhombicb o directions are parallel to thea p,b p andc p directions of the cubic prototypic perovskite, respectively. In each case there are two orientational variants (e.g.,A andA′) with theira o andc o axes interchanged. Among the possible 15 boundaries between these 6 variants there are only two types of domain boundaries: (1) m<100>boundariesC′/C, A′/A, andB′/B. (2) m<110>boundaryiesC′/A, C′/A′, C′/B, C′/B′, C/A, C/A′, C/B, C/B′, B′/A, B′/A′, B/A, andB/A′. Foundation item: Supported by the National Natural Science Foundation of China (19974031) and US DOE(DE-AC02-98CH10886) Biography: WANG Ren-hui (1937-), male, Professor.  相似文献   

5.
0 IntroductionLeqtuiliHnebaer afo rHimlbaenrtd sap baoceun.dLeedtlianaenardfufnbceti oan baolu onndeHd ,serse--spectively. Our goal is to seekv∈Hsuchthata(u,v) =f(u) , u∈ H (1)As a rule, we call the expression (1) a variational equationandva solutiontothis equation.By virtue of the Riesz repre-sentationtheorem,there exists a uniquely determined boundedlinear operatorA:H→Hsuchthata(u,v) =〈u,Av〉, u,v∈ H,where〈·,·〉is the inner product onH.If the sesquilinearformais also with posit…  相似文献   

6.
It is known that any strict tensor category (C,⊗,I) can determine a strict braided tensor categoryZ(C), the centre ofC. WhenA is a finite Hopf algebra, Drinfel’d has proved thatZ( AM) is equivalent toD(A)M as a braided tensor category, whereAM is the left A-module category, andD(A) is the Drinfel’d double ofA. This is the categorical interpretation ofD(A). Z( AM) is proved to be equivalent to the Yetter-Drinfel’d module category,AYD A as a braided tensor category for any Hopf algebraA. Furthermore, for right A-comodule categoryM A, Z(MA) is proved to be equivalent to the Yetter-Drinfel’d module categoryAY DA as a braided tensor category. But,in the two cases, the Yetter-Drinfel’d module categoryAY DA has different braided tensor structures.  相似文献   

7.
L r convergence and convergence in probability for weighted sums ofL q-mixingale arrays have been discussed and the Marcinkiewicz type weak law of large numbers forL q-mixingale arrays has been obtained. Foundation item: Supported by the National Natural Science Foundation of China (10071058) Biography: Gan Shi-xin (1939-), male, Professor, research direction; martingale theory, probability limiting theory and Banach space geometry theory.  相似文献   

8.
The irreversible modifying effects onPst I of several inhibitors have been studied with the irreversible inhibition kinetic theory of single substrate reaction provided by Tsou, C. L. Pyridoxal phosphate (PLP), p-chloromercuribenzoic acid (PCMB), diisopropyl fluorophosphate (DEP), 2,3-diacetyl (DAC) and N-ethyl-5-phenylisoxazoliun-3′-sulfonate (woodward's reagent K, WRK) modify the lysine, cysine, serteine, arginine and carboxyl groups of the protein molecule respectively. These five inhibitors have been found to inhibit both the prime activity and star activity ofPst I. Used with the irreversible inhibition theory, the apparent inhibition rate constant,A and the microcosmic inhibition rate constants,k +0 andk′ +0 of every inhibitor were calculated. We also found that their inhibition effects belong to the noncompetitive irreversible inhibition. Results show that among the groups to be modified, some have nothing to do with the combination with the substrate, and some may have, but any of them isn't the only factor involved in the specific binding. Despite all this, they may take part in the catalysis of enzyme or have important effects on maintaining the active structure of enzyme molecules. Furthermore, serine and arginine residues are related to the alteration ofPst I conformation and then influence the ability ofPst I recognizing and incising DNA specifically. Foundation item: Supported by the Research Fund for the Doctoral Program of Higher Education (1999048601) Biography: Zou Guo-lin (1947-), male, Professor, research direction: enzymology.  相似文献   

9.
Neurofibrillary tangles (NFTs) are one of the neuropathological hallmarks of Alzheimer‘s disease (AD) and abnormally hyperphosphorylated tau is the major protein of NFTs. It was reported that cyclin-dependent kinase5 (Cdk-5) could phosphorylate tau at most AD-related epitopes in vivo. In this study, we investigated the effect of cdk-5 overexpression on tau hyperphosphorylation in neuroblastoma N2a cells. We demonstrated that overexpression of cdk-5 whieh rcsul-ted in a 3.5-fold Cdk-5 activation in the transfected cells induced a dramatic increase in phosphorylation of tau at several phosphorylation sites. Overexpression of cdk-5 led to a reduced staining with antibody Tau-1 and an enhanced staining with antibody PHF-1, suggesting hyperphosphorylation of tau at Ser199/202 and Ser396/404 sites. It implies that in vitro overexpression of cdk-5 leads to Cdk-5 overactivation and tau hyperphosphorylation may be the underline mechanism.  相似文献   

10.
Using the finite determinacy relation with the regular sequence in the Ring Theory and the complete intersection in Analytic Geometry, the finite indeterminacy of homogeneous polynomial germs under some subgroups R1(r) of R in both real and complex case is proven by the homogeneity of the polynomial germs. It results in the finite determinacy of homogeneous polynomial germs needn't be discussed respectively.  相似文献   

11.
在Kleinian群中,研究离散群的代数收敛性是一个重要的问题,群列的代数收敛性与流形的形变以及极限集的Hausdorff维数的收敛性有密切关系.随着非阿基米德域上的李群和非阿基米德域上的动力系统的发展,讨论非阿基米德域上的离散群的代数收敛性就是一个重要的问题.这篇文章讨论了PSL(2,Qp)中由r个元素生成的非初等离散群的代数收敛性,利用PSL(2,Qp)中关于子群的非阿基米德Jorgensen不等式,以及群双曲Berkovich空间上的双曲等距性,证明了非初等群列代数收敛到非初等群列上.  相似文献   

12.
0 IntroductionLeRte(f K.[,1]O), ,ki) .e b.e, aOips- am ocdoumlaplre tseys dtiesmcre(tese eva lCuhatpito .nII Iri nignwith unique maxi mal idealJ(O) suchthatJ(O) =(π)forπ∈O,Kis the quotient field ofOcharacteristic 0 ,andkis theresidue fieldO/(π)of characteristicp, wherepis a fixedpri me number .Inthis paper , we fix a finite groupG,andletKcontains all the |G|-throots of unity,where |G|is the or-der of finite groupG.In particular bothKandkare splittingfields of every subgroup ofG.D…  相似文献   

13.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values A V and B V in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A V and B V are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.  相似文献   

14.
A fast algorithm FBTQ is presented which computes the QR factorization a block-Toeplitz matrixA(A∈R ms×ns ) in O(mns 3) multiplications. We prove that the QR decomposition ofA and the inverse Cholesky decomposition can be computed in parallel using the sametransformation. We also prove that some kind of Toeplitz-block matrices can be transformed into the corresponding block-Toeplitz matrices. Supported by the National Natural Science Foundation of China and the National Climb Projection of China Hu Xiao: born in Nov. 1970, MS  相似文献   

15.
By using an LKB-2277 bioactivity monitor and ampoule method, the fundamental thermogenesis curves of the metabolic process of liver mitochondria fromCarassius auratus hybrid carps and the toxic effect of Na2SeO3 on it were studied at 28°C. From the thermogenesis curves, the thermokinetic equations were established under different condition. The kinetics show that Na2SeO3 has toxic action on the metabolism process ofCarassius auratus hybrid carps liver mitochondria. Foundation item: Supported by the National Science Foundation of China (29973030, 30170010 and 5020310), Chenguang Project of Wuhan and National Postdoctor Foundation of China Biography: Li Xi (1968-), female, Associate pofessor, research direction: biothermochemistry and biomaterials.  相似文献   

16.
We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC), which shows more loss resistibility, less communication cost, and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme, and integrates the advantages of both. In this scheme, stream is firstly divided into blocks with n packets, and each block consists of m clusters, everyone of which contains a tree of packets. All clusters are chained together. Through EMTC, packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols, the proposed scheme has the following advantages: ① dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.  相似文献   

17.
The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number (SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.  相似文献   

18.
The recombinant expression vector pGEMD-fhit which contains full encoding region offhit gene was constructed. The recombinant was introduced into the BL21 (DE3) strain ofE. coli and induced by 1 mmol/L IPTG to express a 29×103 polypeptide offhit fusion protein. And the 29×103 protein was sensitive and specific in reaction with anti-fhit antibody in Western blot. Foundation item: Supported by the National Natural Science Foundation of China (39770373) Biography: SUN Yan (1975−), female, Master of science, Research direction: gene engineering  相似文献   

19.
(R)- and(S)-2-Allyl-1,3,2-dinaphtho (α,β) [d.f] dioxaborepin ((R)-2 and(S)-2) have been first prepared by the reaction of(R)-(+)- or(S)-(−)-1, 1′-bi-2-naphthol and triallylborane in THF at room temperature, respectively.(S)-2 and(R)-2 are sensitive to moisture and oxygen in air and disproportionate easily to triallylborane and 1,1′-bi-2 naphthyl bis (1,1′-bi-2-naphtholborate) at ambient temperature. However, THF is a stabilizer for them. The reactions of(R)-2 or(S)-2 and some aliphetic or aromatic aldehydes in CH2Cl2 at −78°C for several hours afforded β-alkylenyl alcohols in up to 84.8%ee. Among them, optically active 1-(3, 5-dichlorophenyl)-3-butenol and 1-(2-methoxyphenyl)-3-butenol were first prepared Foundation item: Supported by the National Natural Science Foundation of China (29972033) Biography: Liu Dejun (1973), male, Ph. D, research direction: asymmetric synthesis  相似文献   

20.
0 IntroductionPayrriodminaetiics hoenteer oofc ythcleics m .os tC oambupnoduanndts a cnodn tbaeisntin kgno twhnepyridine ring are widely distributedin nature,principally asenzymes and alkaloids . Pyridine enzymes have been foundintissues of all plants and ani mals examined thus far ,andare derivedfromeither nicotinic acid or Vitamin B6[1].Pyr-idine derivatives are also the building block of many phar-maceuticals with a wide range of functionalities that includeantitubercular compounds ,antivi…  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号