• Title/Summary/Keyword: M&A

Search Result 124,240, Processing Time 0.097 seconds

Mobility Management of M2M Devices with Grouping in the LTE System (LTE 시스템에서 그룹 기반 M2M 단말 이동성 관리)

  • Roh, Hee-Tae;Lee, Jang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1119-1127
    • /
    • 2012
  • The one of features of M2M communications, which are recently attracted attention as a future business of mobile communications, is that there is a large number of devices compared with traditional communication services. Hence, the control signal that are generated by the M2M devices may cause a significant congestion in the network and in order to solve this problem, a standardization is progressing for reducing the redundant signaling by managing M2M devices as a group in 3GPP standardization. In this paper, we propose a method of group based mobility management by managing M2M devices that have the same mobility as a group. In the proposed method, M2M devices that have the same mobility are grouped by the Mobility Management Entity (MME) and the MME elects a group header among the M2M devices in the group. Then, the group header performs the Tracking Area Update (TAU) on behalf of the group members to reduce the signaling overhead of mobility management. With the proposed method, we can achieve 80% decrease of the signaling overhead of mobility management compared with the case where each M2M device individually performs its TAU procedure.

STRONG MORI MODULES OVER AN INTEGRAL DOMAIN

  • Chang, Gyu Whan
    • Bulletin of the Korean Mathematical Society
    • /
    • v.50 no.6
    • /
    • pp.1905-1914
    • /
    • 2013
  • Let D be an integral domain with quotient field K, M a torsion-free D-module, X an indeterminate, and $N_v=\{f{\in}D[X]|c(f)_v=D\}$. Let $q(M)=M{\otimes}_D\;K$ and $M_{w_D}$={$x{\in}q(M)|xJ{\subseteq}M$ for a nonzero finitely generated ideal J of D with $J_v$ = D}. In this paper, we show that $M_{w_D}=M[X]_{N_v}{\cap}q(M)$ and $(M[X])_{w_{D[X]}}{\cap}q(M)[X]=M_{w_D}[X]=M[X]_{N_v}{\cap}q(M)[X]$. Using these results, we prove that M is a strong Mori D-module if and only if M[X] is a strong Mori D[X]-module if and only if $M[X]_{N_v}$ is a Noetherian $D[X]_{N_v}$-module. This is a generalization of the fact that D is a strong Mori domain if and only if D[X] is a strong Mori domain if and only if $D[X]_{N_v}$ is a Noetherian domain.

IDEALS AND SUBMODULES OF MULTIPLICATION MODULES

  • LEE, SANG CHEOL;KIM, SUNAH;CHUNG, SANG-CHO
    • Journal of the Korean Mathematical Society
    • /
    • v.42 no.5
    • /
    • pp.933-948
    • /
    • 2005
  • Let R be a commutative ring with identity and let M be an R-module. Then M is called a multiplication module if for every submodule N of M there exists an ideal I of R such that N = 1M. Let M be a non-zero multiplication R-module. Then we prove the following: (1) there exists a bijection: N(M)$\bigcap$V(ann$\_{R}$(M))$\rightarrow$Spec$\_{R}$(M) and in particular, there exists a bijection: N(M)$\bigcap$Max(R)$\rightarrow$Max$\_{R}$(M), (2) N(M) $\bigcap$ V(ann$\_{R}$(M)) = Supp(M) $\bigcap$ V(ann$\_{R}$(M)), and (3) for every ideal I of R, The ideal $\theta$(M) = $\sum$$\_{m(Rm :R M) of R has proved useful in studying multiplication modules. We generalize this ideal to prove the following result: Let R be a commutative ring with identity, P $\in$ Spec(R), and M a non-zero R-module satisfying (1) M is a finitely generated multiplication module, (2) PM is a multiplication module, and (3) P$^{n}$M$\neq$P$^{n+1}$ for every positive integer n, then $\bigcap$$^{$\_{n=1}$(P$^{n}$ + ann$\_{R}$(M)) $\in$ V(ann$\_{R}$(M)) = Supp(M) $\subseteq$ N(M).

경주시 감산사단층 부근에서의 탄성파 굴절법 조사

  • Kim, Gi-Yeong;Kim, Dong-Hun
    • Journal of the Korean Geophysical Society
    • /
    • v.5 no.1
    • /
    • pp.41-50
    • /
    • 2002
  • In order to delineate distribution of the basement in the vicinity of a Quaternary fault outcrop near the Gamsansa temple in Gyeongju, we conducted a seismic refraction survey along a 188 m profile with a 4 m receiver interval. Through tomographic inversion, we define four layers with refraction velocities of approximately 350 m/s, 600 m/s, 1,100 m/s and 2,400 m/s, respectively. We depict a reversed fault at a location of 40 m apart from the base station of the profile and interpret a fracture zone related to fault movements in the NNW of the profile.

  • PDF

ON GRAPHS ASSOCIATED WITH MODULES OVER COMMUTATIVE RINGS

  • Pirzada, Shariefuddin;Raja, Rameez
    • Journal of the Korean Mathematical Society
    • /
    • v.53 no.5
    • /
    • pp.1167-1182
    • /
    • 2016
  • Let M be an R-module, where R is a commutative ring with identity 1 and let G(V,E) be a graph. In this paper, we study the graphs associated with modules over commutative rings. We associate three simple graphs $ann_f({\Gamma}(M_R))$, $ann_s({\Gamma}(M_R))$ and $ann_t({\Gamma}(M_R))$ to M called full annihilating, semi-annihilating and star-annihilating graph. When M is finite over R, we investigate metric dimensions in $ann_f({\Gamma}(M_R))$, $ann_s({\Gamma}(M_R))$ and $ann_t({\Gamma}(M_R))$. We show that M over R is finite if and only if the metric dimension of the graph $ann_f({\Gamma}(M_R))$ is finite. We further show that the graphs $ann_f({\Gamma}(M_R))$, $ann_s({\Gamma}(M_R))$ and $ann_t({\Gamma}(M_R))$ are empty if and only if M is a prime-multiplication-like R-module. We investigate the case when M is a free R-module, where R is an integral domain and show that the graphs $ann_f({\Gamma}(M_R))$, $ann_s({\Gamma}(M_R))$ and $ann_t({\Gamma}(M_R))$ are empty if and only if $$M{\sim_=}R$$. Finally, we characterize all the non-simple weakly virtually divisible modules M for which Ann(M) is a prime ideal and Soc(M) = 0.

The functions of mTOR in ischemic diseases

  • Hwang, Seo-Kyoung;Kim, Hyung-Hwan
    • BMB Reports
    • /
    • v.44 no.8
    • /
    • pp.506-511
    • /
    • 2011
  • Mammalian Target of Rapamycin (mTOR) is a serine/threonine kinase and that forms two multiprotein complexes known as the mTOR complex 1 (mTORC1) and mTOR complex 2 (mTORC2). mTOR regulates cell growth, proliferation and survival. mTORC1 is composed of the mTOR catalytic subunit and three associated proteins: raptor, mLST8/$G{\beta}L$ and PRAS40. mTORC2 contains mTOR, rictor, mLST8/$G{\beta}L$, mSin1, and protor. Here, we discuss mTOR as a promising anti-ischemic agent. It is believed that mTORC2 lies down-stream of Akt and acts as a direct activator of Akt. The different functions of mTOR can be explained by the existence of two distinct mTOR complexes containing unique interacting proteins. The loss of TSC2, which is upstream of mTOR, activates S6K1, promotes cell growth and survival, activates mTOR kinase activities, inhibits mTORC1 and mTORC2 via mTOR inhibitors, and suppresses S6K1 and Akt. Although mTOR signaling pathways are often activated in human diseases, such as cancer, mTOR signaling pathways are deactivated in ischemic diseases. From Drosophila to humans, mTOR is necessary for Ser473 phosphorylation of Akt, and the regulation of Akt-mTOR signaling pathways may have a potential role in ischemic disease. This review evaluates the potential functions of mTOR in ischemic diseases. A novel mTOR-interacting protein deregulates over-expression in ischemic disease, representing a new mechanism for controlling mTOR signaling pathways and potential therapeutic strategies for ischemic diseases.

A Study on a High-Speed $mB_1Z$ Transmission Line Code (고속 $mB_1Z$ 전송로부호에 관한 연구)

  • 유봉선;원동호;김병찬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.4
    • /
    • pp.347-356
    • /
    • 1987
  • This paper is to propose a new line code suitable for a high speed unipolar pulse transmission system, such as a high speed optical digital transmission system. The original information speed can be converted into the transmission speed $\frac{(m+1)}{m}$ by the speed converter. Then this code, named mBiZ code, is generated by means of an Exclusive NOR between the bit stream inserted a space into every m bits and the bit stream delayed by the time slot allocated a single bit at the output coded sequence. Therefore, a mBiZ code can reduce a redundancy in the line code for transmission and its conversion circuits can be devised easily. The mBiZ code can also suppress undesirable long consecuitive identical digits and make line code balance in the mark and space ratio. Therefore, high frequency and low frequency components in power spectrum of a mBiZ code can be suppessed.

  • PDF

(L,M)-NEIGHBORHOOD SPACES

  • Kim, Y.C.;Ramadan, A.;Usama, M.A.
    • Korean Journal of Mathematics
    • /
    • v.15 no.2
    • /
    • pp.121-133
    • /
    • 2007
  • We introduce the notions of (L,M)-neighborhood spaces and (2,M)-fuzzifying neighborhood spaces. We investigate the relations among (L,M)-neighborhood spaces, (L,M)-topological spaces and (2,M)-fuzzifying neighborhood spaces.

  • PDF

SYMMETRY AND UNIQUENESS OF EMBEDDED MINIMAL HYPERSURFACES IN ℝn+1

  • Park, Sung-Ho
    • Bulletin of the Korean Mathematical Society
    • /
    • v.58 no.1
    • /
    • pp.21-30
    • /
    • 2021
  • In this paper, we prove some rigidity results about embedded minimal hypersurface M ⊂ ℝn+1 with compact ∂M that has one end which is regular at infinity. We first show that if M ⊂ ℝn+1 meets a hyperplane in a constant angle ≥ ��/2, then M is part of an n-dimensional catenoid. We show that if M meets a sphere in a constant angle and ∂M lies in a hemisphere determined by the hyperplane through the center of the sphere and perpendicular to the limit normal vector nM of the end, then M is part of either a hyperplane or an n-dimensional catenoid. We also show that if M is tangent to a C2 convex hypersurface S, which is symmetric about a hyperplane P and nM is parallel to P, then M is also symmetric about P. In special, if S is rotationally symmetric about the xn+1-axis and nM = en+1, then M is also rotationally symmetric about the xn+1-axis.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.