نتایج جستجو برای: module extension

تعداد نتایج: 213490  

2001
Anurag K. Singh A. V. Geramita

Test ideals play a crucial role in the theory of tight closure developed by Melvin Hochster and Craig Huneke. Recently, Karen Smith showed that test ideals are closely related to certain multiplier ideals that arise in vanishing theorems in algebraic geometry. In this paper we develop a generalization of the notion of test ideals: for complete local rings R and S, where S is a module-6nite exte...

2013
William Gatens Boris Konev Frank Wolter

We present an implementation (AMEX) of a module extraction algorithm for acyclic description logic ontologies. The implementation uses a QBF solver (sKizzo) to check whether one ontology is a conservative extension of another ontology relativised to interpretations of cardinality one. We evaluate AMEX by applying it to NCI (the National Cancer Institute Thesaurus) and by comparing the extracted...

2001
Brendon J. Woodford Nikola K. Kasabov

This paper introduces an extension of the existing theory of the Evolving Fuzzy Neural Network (EFuNN) to also be a multi-module classifier. We call this proposed architecture multiEFuNN. The incorporation of the Evolving Clustering Method (ECM) is used to partition the input space of the dataset and also determine how many EFUNNs are to be used to classify it. The main advantages of this mult-...

2002
Mladen Kezunovic Zhifang Ren

The automated circuit breaker diagnostic system described in this paper is an extension of the widely used portable circuit breaker testing device concept. The testing devices can be connected to the circuit breaker’s control circuit to record analog and digital signals. The automated system consists of a signal processing module and an expert system module. The two modules process the voltage ...

2008
Matthew Burnside Mack Lu Angelos D. Keromytis

Tw o common tools in Linuxand UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substantially different purposes, but they are often used in conjunction. In this paper, we describe a weakness in their interaction and present our solution, public-key sudo. Public-key sudo1 is an extension to the sudo authen...

Journal: :journal of algebra and related topics 0
t. amouzegar quchan university of advanced technology

let $r$ be a ring and $m$ a right $r$-module with $s=end_r(m)$. a module $m$ is called semi-projective if for any epimorphism $f:mrightarrow n$, where $n$ is a submodule of $m$, and for any homomorphism $g: mrightarrow n$, there exists $h:mrightarrow m$ such that $fh=g$. in this paper, we study sgq-projective and$pi$-semi-projective modules as two generalizations of semi-projective modules. a m...

Journal: :journal of algebraic systems 2014
hosein fazaeli moghim fatemeh rashedi

let $r$ be a commutative ring with identity and $m$ be a unitary$r$-module. the primary-like spectrum $spec_l(m)$ is thecollection of all primary-like submodules $q$ such that $m/q$ is aprimeful $r$-module. here, $m$ is defined to be rsp if $rad(q)$ isa prime submodule for all $qin spec_l(m)$. this class containsthe family of multiplication modules properly. the purpose of thispaper is to intro...

Journal: :CoRR 2017
Keehang Kwon

We propose a notion of local modules for imperative langauges. To be specific, we introduce a new implication statement of the form D ⊃ G where D is a module (i.e., a set of procedure declarations) and G is a statement. This statement tells the machine to add D temporarily to the program in the course of executing G. Thus, D acts as a local module and will be discarded after executing G. It the...

2017
Yuta Watanabe

In this paper, we introduce an algebra H from a subspace lattice with respect to a fixed flag which contains its incidence algebra as a proper subalgebra. We then establish a relation between the algebra H and the quantum affine algebra Uq1/2(ŝl2), where q denotes the cardinality of the base field. It is an extension of the well-known relation between the incidence algebra of a subspace lattice...

Journal: :CoRR 2005
Nicolai Kuntze Thomas Rauch Andreas U. Schmidt

Identity Management is becoming more and more important in business systems as they are opened for third parties including trading partners, consumers and suppliers. This paper presents an approach securing a system without any knowledge of the system source code. The security module adds to the existing system authentication and authorisation based on aspect oriented programming and the libert...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید