نتایج جستجو برای: hilbertc modules
تعداد نتایج: 57807 فیلتر نتایج به سال:
let $m$ be a non-zero finitely generated module over a commutative noetherian local ring $(r,mathfrak{m})$ with $dim_r(m)=t$. let $i$ be an ideal of $r$ with $grade(i,m)=c$. in this article we will investigate several natural homomorphisms of local cohomology modules. the main purpose of this article is to investigate when the natural homomorphisms $gamma: tor^{r}_c(k,h^c_i(m))to kotim...
abstract accurate water measurement and delivery are basic issues in irrigation networks management and performance. in this regard, baffle modules have been considered as appropriate means for delivering almost constant discharge within a specific range of upstream water variation. the structure is meant for low discharge delivery and could be employed in farm irrigation. however, the design c...
in this paper we investigate decompositions of submodules in modules over a proufer domain into intersections of quasi-primary and classical quasi-primary submodules. in particular, existence and uniqueness of quasi-primary decompositions in modules over a proufer domain of finite character are proved. proufer domain; primary submodule; quasi-primary submodule; classical quasi-primary; decomposi...
we give the concept of ‘braiding’ for 2-groupoids, and we show that this structure is equivalent tobraided regular, crossed modules.
In this paper we focus on a special class of commutative local rings called SPAP-rings and study the relationship between this class and other classes of rings. We characterize the structure of modules and especially, the prime submodules of free modules over an SPAP-ring and derive some basic properties. Then we answer the question of Lam and Reyes about strongly Oka ideals fam...
Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSs can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSs for Linux have been developed. In these OSs, different implementation methods have been adopted. However, there is no method for easily evaluating the perf...
Current research in Intrusion Detection Systems (IDSs), targeted towards preventing computer attacks, is mainly focused on improving detection and reaction mechanisms, without preserving the protection of the system itself. This way, if an attacker compromises the security of the detection system, she may be able to disarm the detection or reaction mechanisms, as well as delete log entries that...
Let $ m , n in mathbb{N}$, $D$ be a division ring, and $M_{m times n}(D)$ denote the bimodule of all $m times n$ matrices with entries from $D$. First, we characterize one-sided submodules of $M_{m times n}(D)$ in terms of left row reduced echelon or right column reduced echelon matrices with entries from $D$. Next, we introduce the notion of a nest module of matrices with entries from $D$. We ...
G-frames are natural generalizations of frames which provide more choices on analyzing functions from frame expansion coefficients. First, they were defined in Hilbert spaces and then generalized on C*-Hilbert modules. In this paper, we first generalize the concept of g-frames to Hilbert modules over pro-C*-algebras. Then, we introduce the g-frame operators in such spaces and show that they sha...
The examination of variation of elastic modules in single wall carbon nanotubes (SWCNTs) is the aim of this paper. Full nonlinear spring-like elements are employed to simulate specific atomic structures in the commercial code ABAQUS. Carbon atoms are attached to each node as a mass point using atomic mass of carbon atoms. The influence of dimensions such as variation of length, diameter, aspect...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید