نتایج جستجو برای: elastic modules

تعداد نتایج: 128276  

In this paper we introduce a new class of modules which is closely related to the class of Noetherian modules. Let $R$ be a commutative ring with identity and let $M$ be an $R$-module such that $Nil(M)$ is a divided prime submodule of $M$. $M$ is called a Nonnil-Noetherian $R$-module if every nonnil submodule of $M$ is finitely generated. We prove that many of the properties of Noetherian modul...

Journal: :journal of algebraic systems 2015
moharram aghapournahr khadijeh ahmadi-amoli miryousef sadeghi

‎we introduce a generalization of the notion of‎ depth of an ideal on a module by applying the concept of‎ local cohomology modules with respect to a pair‎ ‎of ideals‎. ‎we also introduce the concept of $(i,j)$-cohen--macaulay modules as a generalization of concept of cohen--macaulay modules‎. ‎these kind of modules are different from cohen--macaulay modules‎, as an example shows‎. ‎also an art...

‎Highest weight modules of the double affine Lie algebra $widehat{widehat{mathfrak{sl}}}_{2}$ are studied under a‎ ‎new triangular decomposition‎. ‎Singular vectors of Verma modules are‎ ‎determined using a similar condition with horizontal affine Lie‎ ‎subalgebras‎, ‎and highest weight modules are described under the‎ ‎condition $c_1>0$ and $c_2=0$.

This paper is concerned with the relation between local cohomology modules defined by a pair of ideals and the Serre subcategories of the category of modules. We characterize the membership of local cohomology modules in a certain Serre subcategory from lower range or upper range.

Abstract. Certain facts about frames and generalized frames (g- frames) are extended for the g-frames for Hilbert C*-modules. It is shown that g-frames for Hilbert C*-modules share several useful properties with those for Hilbert spaces. The paper also character- izes the operators which preserve the class of g-frames for Hilbert C*-modules. Moreover, a necessary and suffcient condition is ob- ...

Journal: :I. J. Network Security 2015
Felipe dos Anjos Lima Edward David Moreno Dellano Oliveira D. dos Santos Wanderson Roger Azevedo Dias

This article shows the results obtained during simulations that measured runtime and energy consumption of a security module (SEMO) when it executes in ARM processor. For the simulations, we considered the impacts of four algorithms (i.e. RSA, SHA-1, Random Numbers Generator and AES). We have used the Sim-Panalyzer simulator and obtained an average energy consumption (x2 Joules) and runtime (x2...

2005
Gildas Avoine Felix Gärtner Rachid Guerraoui Marko Vukolić

The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security module. The security modules trust each other but can only communicate by exchanging messages through their untrusted host parties, that could drop those messages. We describe a synchronous algorithm that ensures determ...

2010
Kenji Yamamoto Toshihiro Yamauchi

Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the p...

Journal: :international journal of nano dimension 0
s. saber-samandari new technologies research centre, amirkabir university of technology, tehran, po box 1591633311, iran.

in the current paper, finite element method is employed for numerical simulations and the study of influential parameters on elastic modulus of polymer-matrix nano-composites. effects of different key parameters including particle elastic modulus, interphase elastic modulus, matrix elastic modulus, interphase thickness and particle volume fraction on total elastic modulus of nano-composite mate...

2017
Nivaasini Sivarajah

In general excellent results cannot be guaranteed when using resin-based composites for posterior restorations. This is due to polymerization shrinkage which can still be regarded as the primary negative characteristics of composites.Sevaral factors responsible for the polymerization shrinkage process may negatively affect the integrity of the resoration.The materials shrinkage is associated wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید