• Title/Summary/Keyword: IT-M

Search Result 41,995, Processing Time 0.065 seconds

Synthesis of m-Hydroxy N-dimethylaniline Derivatives (m-Hydroxy N-dimethylaniline 유도체의 합성)

  • 윤혜숙
    • YAKHAK HOEJI
    • /
    • v.18 no.2
    • /
    • pp.161-164
    • /
    • 1974
  • m-Hydroxyaniline was reported to be converted to m-methoxyaniline with dimethylsulfate. However, while repeating the experiment with the same reaction condition, it was learned that the reaction product was not m-methoxyaniline but m-methoxy dimethylaniline. It was confirmed with nmr and ir spectrum and the comparison of bp and mp of the derivatives. Elemental analyses of the derivatives were also consistant with the fact N-dimethylation along with O-methylation occurred.

  • PDF

WHEN AN $\mathfrak{S}$-CLOSED SUBMODULE IS A DIRECT SUMMAND

  • Wang, Yongduo;Wu, Dejun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.51 no.3
    • /
    • pp.613-619
    • /
    • 2014
  • It is well known that a direct sum of CLS-modules is not, in general, a CLS-module. It is proved that if $M=M_1{\oplus}M_2$, where $M_1$ and $M_2$ are CLS-modules such that $M_1$ and $M_2$ are relatively ojective (or $M_1$ is $M_2$-ejective), then M is a CLS-module and some known results are generalized.

Adaption and Assessment of ETSI M2M Standard in Smart Home Environments (ETSI M2M 표준의 스마트 홈 적용 및 적합성 평가)

  • Park, Yunjung;Wu, Hyuk;Paek, Hyung-Goo;Min, Dugki
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.241-255
    • /
    • 2012
  • Recently, smart home environments which provide complex services through smart appliances are becoming realized, due to the advances in connected devices and network technologies. Current smart home environments are mostly restricted, because of difficultly of integration of heterogeneous smart appliances. Therefore radical service integration is impracticable. In this paper, we analyze and implement Machine-to-Machine (M2M) standards which are established by European Telecommunications Standards Institute (ETSI) for integrating heterogeneous devices and services. Smart Home is one of the areas covered by ETSI M2M standards, however these standards are just standardized, so adaption and assessment in smart home are not proved yet. Therefore, this paper analyze ETSI M2M standards by focusing the data transport model and evaluate by selecting the most commonly used smart home scenarios and by implementing ETSI M2M standards compatible smart metering system. In some points ETSI M2M standards are not efficient because of its complexity of structure, however ETSI M2M provides sophisticated features for integrating M2M which are appropriate to adopt diverse smart home environments.

Consideration of FEM Analysis and Effect of Structure in Fault Rock (단층의 해석상의 고려사항과 암반구조물에 미치는 영향)

  • Ahn, Sung-Youll
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2007.09a
    • /
    • pp.160-169
    • /
    • 2007
  • In this study, Analyzed stress history, state of stress, ratio of stress/strength to use FEM. Fault Zone depth is 3m, 6m, 9m, 12m and 15m for study, and also Distance is 3m, 6m, 9m, 12m and 15m at center of tunnel with thickness 3m fault zone. It is not appeared that Arching in stress state and stress history by FEM. On the other hand, excessive shear stress and high compressive stress happened. Therefore, Tunnel design is desirable that do it so that state of stress that is the imbalance may be uplemented. it is important that examine each state of stress and stress history in detail tunnel design.

  • PDF

THE DIMENSION GRAPH FOR MODULES OVER COMMUTATIVE RINGS

  • Shiroyeh Payrovi
    • Communications of the Korean Mathematical Society
    • /
    • v.38 no.3
    • /
    • pp.733-740
    • /
    • 2023
  • Let R be a commutative ring and M be an R-module. The dimension graph of M, denoted by DG(M), is a simple undirected graph whose vertex set is Z(M) ⧵ Ann(M) and two distinct vertices x and y are adjacent if and only if dim M/(x, y)M = min{dim M/xM, dim M/yM}. It is shown that DG(M) is a disconnected graph if and only if (i) Ass(M) = {𝖕, 𝖖}, Z(M) = 𝖕 ∪ 𝖖 and Ann(M) = 𝖕 ∩ 𝖖. (ii) dim M = dim R/𝖕 = dim R/𝖖. (iii) dim M/xM = dim M for all x ∈ Z(M) ⧵ Ann(M). Furthermore, it is shown that diam(DG(M)) ≤ 2 and gr(DG(M)) = 3, whenever M is Noetherian with |Z(M) ⧵ Ann(M)| ≥ 3 and DG(M) is a connected graph.

An Empirical Analysis of Post-Merger Risk Following the M&As of IT Firms (IT 기업의 인수합병 이후 수익율 변동성에 대한 실증 분석)

  • Young Bong Chang;YoungOk Kwon
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.171-182
    • /
    • 2017
  • Although economic growth has been retarded since the global economic crisis over recent decades, a large number of firms consider mergers and acquisitions (M and A) as a strategy to survive in a highly competitive market. In particular, an increasing number of firms pursue M and A with IT firms in recent years. In this study, we analyze the post-merger risks measured as ROA volatility for acquiring firms when they seek to acquire an IT firm. Our analysis suggests that a firm with prior experience in M and A acquires IT firms aggressively. Moreover, a substantial number of IT firms are relatively small and unlisted when they are acquired. We also show that an acquiring firm's post-merger risk (i.e., ROA volatility) increases after its acquisition of IT firms. However, an increase in post-merger risk is alleviated when relatedness exists between an acquiring firm and target.

Physiological Genetic Studies on the Erects of Methyl methanesulfonate in Drosophila melanogaster (Drosophila melanogaster에 있어서 Methyl methane sulfonate의 영향에 대한 생리유전학적 연구)

  • 최혜영;최영현
    • Journal of Environmental Science International
    • /
    • v.6 no.1
    • /
    • pp.45-52
    • /
    • 1997
  • Methyl methanesulfonate (MMS) was fed to Drosophila melnogaster in order to investigate its toxic capability at developmental and adult stages, and the hereditary effect of toxicity and the potency for induction of sex-linked lethal mutation during the slyer-matogenesis by the means of an attached-X method. In the control group, the egg to adult viability of D. melnogaster was 95.2%, while 3. 5mM and 5.0mM treated groups were 90.0% and 84.1%, respectively. In the case of their progenies (Fl), the viability was 96.9% in the control group, while 3.5mM and 5.0mM treated groups were 54.5% and 1.6%, respectively. Therefore, these differences between two generations show significant physiological toxic effects in the next generation. In the parental generation, the developmental time was calculated 11.05 days in the control group, 12.43 days In 3.5%mM treated group, and 13.23 days in 5.0mM. In the case of Fl it was estimated 10.35 days in the control group, and 11.43 days In 3.5mM treated group. Compared with the control groups In two generations, the developmental time generally delayed as the dose of MMS increased. As to the sex-ratio, there was no differences between the control and MMS treated groups. The toxic values of adult stage showed which increased the frequency of mortality with MMS concentrations. The mortality at 120hr In the control group was 1.67% and it in 0.5mM MMS treated group 3.33%. In 2.5mM MMS treated group, it was 33.3% at 72hr, and it 95% at 120hr The increase of the morality was shown from 72hr in 4.0mM treated group which was 100% at 96hr. There was the concentration-dependent induction of sex-linked lethal mutation during the spermatogenesis by means of an attached-X method, MMS had more pronounced effect in sperm and spermaid stages in D. melnogaster.

  • PDF

MAXIMAL IDEALS IN POLYNOMIAL RINGS

  • Cho, Young-Hyun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.22 no.2
    • /
    • pp.117-119
    • /
    • 1985
  • Let R be a commutative noetherian ring with 1.neq.0, denoting by .nu.(I) the cardinality of a minimal basis of the ideal I. Let A be a polynomial ring in n>0 variables with coefficients in R, and let M be a maximal ideal of A. Generally it is shown that .nu.(M $A_{M}$).leq..nu.(M).leq..nu.(M $A_{M}$)+1. It is well known that the lower bound is not always satisfied, and the most classical examples occur in nonfactional Dedekind domains. But in many cases, (e.g., A is a polynomial ring whose coefficient ring is a field) the lower bound is attained. In [2] and [3], the conditions when the lower bound is satisfied is investigated. Especially in [3], it is shown that .nu.(M)=.nu.(M $A_{M}$) if M.cap.R=p is a maximal ideal or $A_{M}$ (equivalently $R_{p}$) is not regular or n>1. Hence the problem of determining whether .nu.(M)=.nu.(M $A_{M}$) can be studied when p is not maximal, $A_{M}$ is regular and n=1. The purpose of this note is to provide some conditions in which the lower bound is satisfied, when n=1 and R is a regular local ring (hence $A_{M}$ is regular)./ is regular).

  • PDF

M2M Architecture: Can It Realize Ubiquitous Computing in Daily life?

  • Babamir, Seyed Morteza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.566-579
    • /
    • 2012
  • Ubiquitous computing called pervasive one is based on the thought of pervading ability of computation in daily life applications. In other words, it aims to include computation in devices such as electronic equipment and automobiles. This has led to disengagement of computers from desktop form. Accordingly, the notice in ubiquitous computing being taken of a world steeped in remote and wireless computer-based-services. Handheld and wearable programmed devices such as sense and control appliances are such devices. This advancement is rapidly moving domestic tasks and life from device-and-human communication to the device-and-device model. This model called Machine to Machine (M2M) has led to acceleration of developments in sciences such as nano-science, bio-science, and information science. As a result, M2M led to appearance of applications in various fields such as, environment monitoring, agricultural, health care, logistics, and business. Since it is envisaged that M2M communications will play a big role in the future in all wireless applications and will be emerged as a progressive linkage for next-generation communications, this paper aims to consider how much M2M architectures can realize ubiquitous computing in daily life applications. This is carried out after acquainting and initiating readers with M2M architectures and arguments for M2M. Some of the applications was not achievable before but are becoming viable owing to emergence of M2M communications.

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment (M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구)

  • Jin, Byung-Wook;Park, Jae-Pyo;Lee, Keun-Wang;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.