• Title/Summary/Keyword: G-function

Search Result 4,254, Processing Time 0.026 seconds

EXISTENCE OF PICARD-JUNGCK OPERATOR USING CG-SIMULATION FUNCTIONS IN GENERALIZED METRIC SPACES

  • CHANDOK, SUMIT
    • Journal of applied mathematics & informatics
    • /
    • v.37 no.5_6
    • /
    • pp.481-489
    • /
    • 2019
  • In this manuscript, we provide some new results with short proofs for the existence of Picard-Jungck operators in the framework of generalized metric spaces using $C_G$-simulation functions. An example is also provided to illustrate the usability of the results.

GRADIENT YAMABE SOLITONS WITH CONFORMAL VECTOR FIELD

  • Fasihi-Ramandi, Ghodratallah;Ghahremani-Gol, Hajar
    • Communications of the Korean Mathematical Society
    • /
    • v.36 no.1
    • /
    • pp.165-171
    • /
    • 2021
  • The purpose of this paper is to investigate the geometry of complete gradient Yamabe soliton (Mn, g, f, λ) with constant scalar curvature admitting a non-homothetic conformal vector field V leaving the potential vector field invariant. We show that in such manifolds the potential function f is constant and the scalar curvature of g is determined by its soliton scalar. Considering the locally conformally flat case and conformal vector field V, without constant scalar curvature assumption, we show that g has constant curvature and determines the potential function f explicitly.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Regulation of a Novel Guanine Nucleotide Binding Protein Tissue Transglutaminase ($G{\alpha}_n$).

  • Im, Mie-Jae
    • BMB Reports
    • /
    • v.34 no.2
    • /
    • pp.95-101
    • /
    • 2001
  • Tissue transglutaminase (TGII, $G{\alpha}h$) belongs to a family of enzymes which catalyze post-translational modification of proteins by forming isopeptides via $Ca^{2+}$-dependent reaction. Although TGII-mediated formation of isopeptides has been implicated to play a role in a variety of cellular processes, the physiological function of TGII remains unclear. In addition to this Tease activity, TGII is a guanosine triphosphatase (GTPase) which binds and hydrolyzes GTP It is now well recognized that the GTPase action of TGII regulates a receptor-mediated transmembrane signaling, functioning as a signal transducer of the receptor. This TGII function signifies that TGII is a new class of GTP-binding regulatory protein (G-protein) that differs from "Classical" heterotrimeric G-proteins. Regulation of enzyme is an important biological process for maintaining cell integrity. This review summarizes the recent development in regulation of TGII that may help for the better understanding of this unique enzyme. Since activation and inactivation of GTPase of TGII are similar to the heterotrimeric G-proteins, the regulation of heterotrimeric G-protein in the transmembrane signaling is also discussed.

  • PDF

SOLVABILITY AND BOUNDEDNESS FOR GENERAL VARIATIONAL INEQUALITY PROBLEMS

  • Luo, Gui-Mei
    • Bulletin of the Korean Mathematical Society
    • /
    • v.50 no.2
    • /
    • pp.589-599
    • /
    • 2013
  • In this paper, we propose a sufficient condition for the existence of solutions to general variational inequality problems (GVI(K, F, $g$)). The condition is also necessary when F is a $g-P^M_*$ function. We also investigate the boundedness of the solution set of (GVI(K, F, $g$)). Furthermore, we show that when F is norm-coercive, the general complementarity problems (GCP(K, F, $g$)) has a nonempty compact solution set. Finally, we establish some existence theorems for (GNCP(K, F, $g$)).

GRADED INTEGRAL DOMAINS AND NAGATA RINGS, II

  • Chang, Gyu Whan
    • Korean Journal of Mathematics
    • /
    • v.25 no.2
    • /
    • pp.215-227
    • /
    • 2017
  • Let D be an integral domain with quotient field K, X be an indeterminate over D, K[X] be the polynomial ring over K, and $R=\{f{\in}K[X]{\mid}f(0){\in}D\}$; so R is a subring of K[X] containing D[X]. For $f=a_0+a_1X+{\cdots}+a_nX^n{\in}R$, let C(f) be the ideal of R generated by $a_0$, $a_1X$, ${\ldots}$, $a_nX^n$ and $N(H)=\{g{\in}R{\mid}C(g)_{\upsilon}=R\}$. In this paper, we study two rings $R_{N(H)}$ and $Kr(R,{\upsilon})=\{{\frac{f}{g}}{\mid}f,g{\in}R,\;g{\neq}0,{\text{ and }}C(f){\subseteq}C(g)_{\upsilon}\}$. We then use these two rings to give some examples which show that the results of [4] are the best generalizations of Nagata rings and Kronecker function rings to graded integral domains.

STRONG DIFFERENTIAL SUBORDINATION AND APPLICATIONS TO UNIVALENCY CONDITIONS

  • Antonino Jose- A.
    • Journal of the Korean Mathematical Society
    • /
    • v.43 no.2
    • /
    • pp.311-322
    • /
    • 2006
  • For the Briot-Bouquet differential equations of the form given in [1] $${{\mu}(z)+\frac {z{\mu}'(z)}{z\frac {f'(z)}{f(z)}\[\alpha{\mu}(z)+\beta]}=g(z)$$ we can reduce them to $${{\mu}(z)+F(z)\frac {v'(z)}{v(z)}=h(z)$$ where $$v(z)=\alpha{\mu}(z)+\beta,\;h(z)={\alpha}g(z)+\beta\;and\;F(z)=f(z)/f'(z)$$. In this paper we are going to give conditions in order that if u and v satisfy, respectively, the equations (1) $${{\mu}(z)+F(z)\frac {v'(z)}{v(z)}=h(z)$$, $${{\mu}(z)+G(z)\frac {v'(z)}{v(z)}=g(z)$$ with certain conditions on the functions F and G applying the concept of strong subordination $g\;\prec\;\prec\;h$ given in [2] by the author, implies that $v\;\prec\;{\mu},\;where\;\prec$ indicates subordination.

RELIABILITY OF NUMERICAL SOLUTIONS OF THE G-EULER PROCESS

  • YU, DONG WON
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.26 no.1
    • /
    • pp.49-66
    • /
    • 2022
  • The G-Euler process has been proposed to overcome the difficulties of the calculation of the exponential function of the Jacobian. It is an explicit method that uses the exponential function of the scalar skew-symmetric matrix. We define the moving shapes of true solutions and the moving shapes of numerical solutions. It is discussed whether the moving shape of the numerical solution matches the moving shape of the true solution. The match rates of these two kinds of moving shapes are sequentially calculated by the G-Euler process without using the true solution. It is shown that the closer the minimum match rate is to 100%, the more closely the numerical solutions follow the true solutions to the end. The minimum match rate indicates the reliability of the numerical solution calculated by the G-Euler process. The graphs of the Lorenz system in Perko [1] are different from those drawn by the G-Euler process. By the way, there is no basis for claiming that the Perko's graphs are reliable.

A Study on the Kinematics of Ocean Waves by Gravity Wave Theory and Stream Function Method (해양파(海洋波)의 운동학(運動學)에 대한 중력파이론(重力波理論)과 Steam Function Method의 비교연구(比較硏究))

  • Y.K.,Bang;I.H.,Chang;H.S.,Choi
    • Bulletin of the Society of Naval Architects of Korea
    • /
    • v.19 no.2
    • /
    • pp.33-39
    • /
    • 1982
  • It is one of the basic problems of naval architecture and ocean engineering how to describe the wave kinematics normally under the assumption of an ideal fluid. At present, there are many wave theories available for design purposes. These can be classified into two groups: One is the analytic theory and the other is the numerical theory. This paper briefly introduces the stream function method of R.G. Dean which belongs to the latter group and shows its numerical evaluations exemplified for two cases: One is applied to observed waves and the other is for design waves. In the former case, the wave profiles are calculated by the stream function method and compared with those of the observed waves and also with the results of R.G. Dean. They show good agreement. In the latter case, the wave kinematics and wave loads on a column of diameter 1m are calculated by the stream function method and these are compared with those resulted from the 5th-order gravity wave theory. As a result of comparison the values by the stream function method are slightly larger than those by the 5th-order gravity wave theory but the difference are negligible. From this it is concluded that the stream function method is very useful. And as characteristics of the numerical theories, the stream function method of R.G. Dean can be easily extended to the higher order terms and can include easily the current velocity and the pressure distribution on the free surface. In addition, when the data of observed wave profile are given, this method can reproduced the observed wave profile as closely as possible so that this method seems to describe the ocean wave more realistically. And from standpoint of a mathematical principle the stream function method exactly satisfies the kinematic free-surface boundary condition.

  • PDF

In Vivo Antifungal Activities of 67 Plant Fruit Extracts Against Six Plant Pathogenic Fungi

  • Choi Gyung-Ja;Kim Jin-Cheol;Jang Kyoung-Soo;Lim He-Kyoung;Park Il-Kwon;Shin Sang-Chul;Cho Kwang-Yun
    • Journal of Microbiology and Biotechnology
    • /
    • v.16 no.3
    • /
    • pp.491-495
    • /
    • 2006
  • Methanol extracts of fruits of 67 plants were screened for in vivo antifungal activity against Magnaporthe grisea, Corticium sasaki, Botrytis cinerea, Phytophthora infestans, Puccinia recondita, and Blumeria graminis f. sp. hordei. Among them, 13 plant extracts ($3,000\;{\mu}g/ml$) showed more than 90% disease-control efficacy against at least one of six plant diseases. Specifically, the extracts of Aleurites fordii, Angelica dahurica, Camellia japonica, Chamaecyparis pisifera, Pittosporum tobira, and Styrax japonica controlled more than 90% of the development of rice blast at $1,000{\mu}g/ml$. Extracts of both S. japonica and A. dahurica fruits at $333{\mu}g/ml$ concentration displayed strong antifungal activity against M. grisea on rice seedlings.