• Title/Summary/Keyword: (internal) exchange property

Search Result 7, Processing Time 0.019 seconds

X-LIFTING MODULES OVER RIGHT PERFECT RINGS

  • Chang, Chae-Hoon
    • Bulletin of the Korean Mathematical Society
    • /
    • v.45 no.1
    • /
    • pp.59-66
    • /
    • 2008
  • Keskin and Harmanci defined the family B(M,X) = ${A{\leq}M|{\exists}Y{\leq}X,{\exists}f{\in}Hom_R(M,X/Y),\;Ker\;f/A{\ll}M/A}$. And Orhan and Keskin generalized projective modules via the class B(M, X). In this note we introduce X-local summands and X-hollow modules via the class B(M, X). Let R be a right perfect ring and let M be an X-lifting module. We prove that if every co-closed submodule of any projective module P contains Rad(P), then M has an indecomposable decomposition. This result is a generalization of Kuratomi and Chang's result [9, Theorem 3.4]. Let X be an R-module. We also prove that for an X-hollow module H such that every non-zero direct summand K of H with $K{\in}B$(H, X), if $H{\oplus}H$ has the internal exchange property, then H has a local endomorphism ring.

ON THE DECOMPOSITION OF EXTENDING LIFTING MODULES

  • Chang, Chae-Hoon;Shin, Jong-Moon
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.6
    • /
    • pp.1069-1077
    • /
    • 2009
  • In 1984, Oshiro [11] has studied the decomposition of continuous lifting modules. He obtained the following: every continuous lifting module has an indecomposable decomposition. In this paper, we study extending lifting modules. We show that every extending lifting module has an indecomposable decomposition. This result is an expansion of Oshiro's result mentioned above. And we consider some application of this result.

On Direct Sums of Lifting Modules and Internal Exchange Property

  • Dejun, Wu
    • Kyungpook Mathematical Journal
    • /
    • v.46 no.1
    • /
    • pp.11-18
    • /
    • 2006
  • Let R be a ring with identity and let $M=M_1{\bigoplus}M_2$ be an amply supplemented R-module. Then it is proved that $M_i$ has ($D_1$) and is $M_j-^*ojective$ for $i{\neq}j$, i = 1, 2, if and only if for any coclosed submodule X of M, there exist $M\acute{_1}{\leq}M_1$ and $M\acute{_2}{\leq}M_2$ such that $M=X{\bigoplus}M\acute{_1}{\bigoplus}M\acute{_2}$.

  • PDF

Characterization of Mechanical Property Change in Polymer Aerogels Depending on the Ligand Structure of Acrylate Monomer

  • Lee, Kyu-Yeon;Jung, Hae-Noo-Ree;Mahadik, D.B.;Park, Hyung-Ho
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.23 no.3
    • /
    • pp.15-20
    • /
    • 2016
  • In an effort to overcome the weakness of aerogel, polymer aerogels have been prepared by copolymerizing the different types of monomers through sol-gel process. Polymerizing the successive phase of a high internal phase emulsion, which has interconnected porous structure, porous polymer aerogel can be manufactured. In this paper, we use the styrene/divinylbenzene chain as a basic monomer structure, and additionally use 2-ethylhexyl methacrylate (2-EHMA) or 2-ethylhexyl acrylate (2-EHA) as monomers for distinguishing the visible mechanical properties of synthesized polymer aerogel. We can observe the different tendency of polymer aerogels by kinds of monomer or ratio. Flexibility and microstructure can be changed by the types of monomer. EHA polymer aerogel shows high flexibility and thin microstructure, and EHMA polymer aerogel shows high hardness and thick microstructure. EHA/EHMA polymer aerogel shows the intermediate nature between them. By utilizing the mechanical properties of three types of polymer aerogels to adequate situation or environment, polymer aerogels could be used as drug agent, ion exchange resin, oil filter and insulator, and so on.

A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment (스마트홈 환경에서 패스워드 추측 공격에 안전한 개선된 3PAKE 기법에 대한 연구)

  • Lee, Dae-Hwi;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1471-1481
    • /
    • 2016
  • As concern about IoT is increasing recently, various IoT services are being launched. Smart home is closely related to our daily life by combining IoT with user's residential space. Therefore, if an unauthorized user accesses a device inside a Smart home, it can cause more serious damage to user as it is related with daily lives. For instance executing the command allowing unauthenticated access for the internal locking device can be a real harm to user's property like a home invasion. To prevent this problem, this paper introduces 3PAKE Techniques, which provides authenticated Key exchange through Home gateway using Password-based Authenticated Key Exchange(PAKE).

Design of ATM Switch-based on a Priority Control Algorithm (우선순위 알고리즘을 적용한 상호연결 망 구조의 ATM 스위치 설계)

  • Cho Tae-Kyung;Cho Dong-Uook;Park Byoung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.189-196
    • /
    • 2004
  • Most of the recent researches for ATM switches have been based on multistage interconnection network known as regularity and self-routing property. These networks can switch packets simultaneously and in parallel. However, they are blocking networks in the sense that packet is capable of collision with each other Mainly Banyan network have been used for structure. There are several ways to reduce the blocking or to increase the throughput of banyan-type switches: increasing the internal link speeds, placing buffers in each switching node, using multiple path, distributing the load evenly in front of the banyan network and so on. Therefore, this paper proposes the use of recirculating shuffle-exchange network to reduce the blocking and to improve hardware complexity. This structures are recirculating shuffle-exchange network as simplified in hardware complexity and Rank network with tree structure which send only a packet with highest priority to the next network, and recirculate the others to the previous network. after it decides priority number on the Packets transferred to the same destination, The transferred Packets into banyan network use the function of self routing through decomposition and composition algorithm and all they arrive at final destinations. To analyze throughput, waiting time and packet loss ratio according to the size of buffer, the probabilities are modeled by a binomial distribution of packet arrival. If it is 50 percentage of load, the size of buffer is more than 15. It means the acceptable packet loss ratio. Therefore, this paper simplify the hardware complexity as use of recirculating shuffle-exchange network instead of bitonic sorter.

  • PDF

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF