• Title/Summary/Keyword: $M_2$

Search Result 95,133, Processing Time 0.078 seconds

Geological Characteristics and Heat Flow Relationship in South Korea (남한지역 지질특성과 지열류량의 상호 관련성)

  • 김형찬;이사로;송무영
    • Economic and Environmental Geology
    • /
    • v.37 no.4
    • /
    • pp.391-400
    • /
    • 2004
  • The purpose of this study is to analyze the geothermal anomaly based on the relationship between heat flow values and geologic settings in South Korea. For this, a total of 247 heat flow data was constructed to spatial database and the spatial database was overlaid with 1 : 1,000,000-scale digital geologic map using GIS. As the result, the average of heat flow is 64$\pm$14mW$m^{-2}$in South Korea. In the lithological aspect, the area of sedimentary rock shows high heat flow of 74mW$m^{-2}$, sedimentary/volcanic rock area 62mW$m^{-2}$, plutonic rock area 63mW$m^{-2}$ and metamorphic rock area 61mW$m^{-2}$. In the geologic time sequence, the Cenozoic strata has 91mW$m^{-2}$, the Mesozoic and Paleozoic strata 65mW$m^{-2}$, the Proterozoic strata 55mW$m^{-2}$ and the Archean strata 61mW$m^{-2}$.

Karyotype Analysis of Juniperus rigida Sieb. et Zucc. of Two Different Provenances in Korea (한국산(韓國産) Juniperus rigida의 두 산지(産地)의 핵형분석(核型分析))

  • Kim, Chung Suk;Chung, Woo Kyu;Ahn, Joong Kug;Jeong, Mee Jeong;Han, Chang Sook
    • Journal of Korean Society of Forest Science
    • /
    • v.73 no.1
    • /
    • pp.9-13
    • /
    • 1986
  • Karyotypes are described for Juniperus rigida Sieb. et zucc, in two provenances of Gyeong-nam and Choong-puk. Chromosome numbers of two provenances, are 2n=22. The most common feature of mitotic chromosomes was shown at the chromosome 7, which has secondary constriction on the short arm. And the most differential chromosome was shown at chromosome 9 from Gyeong-nam and chromosome 5 from Choong-puk provenance which bore secondary constriction. The karyotype formulae are as follows; Gyeong-nam, Jinyang provenance race is $$K(2n)=22=2A^m+2B^m+2C^m+2D^{sm}+2E^{st}+2F^m+2^{sc}G^m+2H^m+2^{sc}I^t+2J^{st}+2K^m$$ Choong-puk, Jechun provenance race is $$K(2n)=22=2A^m+2B^m+2C^m+2D^{st}+2^{sc}E^{sm}+2F^m+2^{sc}G^m+2H^m+2I^m+2J^{st}+2K^{sm}$$.

  • PDF

M2M Network Platform Using the MSRP (MSRP를 이용한 M2M 플랫폼 구조)

  • Kim, Jung-Ho;Been, Jae-Man;Kang, Seung-Chan;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.752-757
    • /
    • 2016
  • Machine to Machine (M2M) communications is communications between a business application and devices via a communication network without any direct human interaction. The aim of our research is to connect any M2M device with an M2M AS (Application server) through an IMS (IP Multimedia Subsystem) Network Core using a M2M Gateway, in order to develop an M2M Horizontal Services Platform over IMS. An IP Multimedia Subsystem (IMS) is an architectural framework defined by the wireless standards body of the 3rd Generation Partnership Project (3GPP) for delivering IP multimedia services to mobile users. This paper shows the design and implementation of a Horizontal M2M Network Services Platform over an IP Multimedia Subsystem (IMS) using the Message Session Relay Protocol (MSRP). We summarize the protocols and architectures that formed the basis for the creation of our architecture. We provide a detailed description of our architecture design, describing the call flow of the proposed architecture and the entities operating in each process. We also describe the design and implementation process detailing the different tools used, explaining the selection of each component and its importance; also how we designed and implemented the M2M gateway, M2M Application Server, Open IMS Core, business application and M2M devices.

PROJECTIVE AND INJECTIVE PROPERTIES OF REPRESENTATIONS OF A QUIVER Q = • → • → •

  • Park, Sangwon;Han, Juncheol
    • Korean Journal of Mathematics
    • /
    • v.17 no.3
    • /
    • pp.271-281
    • /
    • 2009
  • We define injective and projective representations of a quiver $Q={\bullet}{\rightarrow}{\bullet}{\rightarrow}{\bullet}$. Then we show that a representation $M_1\longrightarrow[50]^{f1}M_2\longrightarrow[50]^{f2}M_3$ of a quiver $Q={\bullet}{\rightarrow}{\bullet}{\rightarrow}{\bullet}$ is projective if and only if each $M_1,\;M_2,\;M_3$ is projective left R-module and $f_1(M_1)$ is a summand of $M_2$ and $f_2(M_2)$ is a summand of $M_3$. And we show that a representation $M_1\longrightarrow[50]^{f1}M_2\longrightarrow[50]^{f2}M_3$ of a quiver $Q={\bullet}{\rightarrow}{\bullet}{\rightarrow}{\bullet}$ is injective if and only if each $M_1,\;M_2,\;M_3$ is injective left R-module and $ker(f_1)$ is a summand of $M_1$ and $ker(f_2)$ is a summand of $M_2$.

  • PDF

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

A New M-ary Sequence Family Constructed From Sidel'nikov Sequences (Sidel'nikov 수열로부터 생성한 새로운 M-진 수열군)

  • Kim, Young-Sik;Chung, Jung-Soo;No, Jong-Seon;Chung, Ha-Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10C
    • /
    • pp.959-964
    • /
    • 2007
  • In this paper, for a positive integer M and a prime p such that $M|p^n-1$, families of M-ary sequences using the M-ary Sidel'nikov sequences with period $p^n-1$ are constructed. The family has its maximum magnitude of correlation values upper bounded by $3\sqrt{p^{n}}+6$ and the family size is $(M-1)^2(2^{n-1}-1)$+M-1 for p=2 or $(M-1)^2(p^n-3)/2+M(M-1)/2$ for an odd prime p.

Preparation and Characterization of Dinuclear and Trinuclear Metal Complexes, $[(PPh_3)_2(CO)M({\mu}-E)M(CO)(PPh_3)_2]X_2$ (M=Rh, Ir; E=Pyrazine, 4,4'-Bipyridyl, $X=SO_3CF_3$; $E=Pd(CN)_4$, $Pt(CN)_4$, X=none)

  • Ko Jaejung;Lee Myunggab;Kim Moonsik;Kang Sang Ook
    • Bulletin of the Korean Chemical Society
    • /
    • v.13 no.2
    • /
    • pp.158-162
    • /
    • 1992
  • Hydrocarbon solution of $(PPh_3)_2(CO)MOSO_2CF_3(M=Rh$, Ir)reacts rapidly with Pyrazine or 4,4'-bipyridyl to yield dinuclear metal complexes $[(PPh_3)_3(CO)M({\mu}-pyrazine)M(CO)(PPh_3)_2](SO_3CF_3)_2$ (I: M= RhH; III: M=Ir) or [$(PPh_3)_2$(CO)M(${\mu}$-44'-bipyridyl)M(CO)$(PPh_3)_2](SO_3CF_3)_2$, (II: M=Rh; IV: M=Ir), respectively. Compounds, I, II, III, and IV were characterized by $^1H-NMR$, $^{13}C-NMR$, $^{31}P-NMR$, and infrared spectrum. Ethanol solution of $(PPh_3)_2(CO)MOSO_2CF_3$ (M=Rh, Ir) also reacts with $(TBA)_2$M'$(CN)_4$ (M'=Pd, Pt) to yield trinuclear metal complexes [$(PPh_3)_2$(CO)dM-NCM'$(CN)_2$CN-M(CO)$(PPh_3)_2]$ (V : M=Rh, M'=Pd; VI : M=Rh, M'=Pt; VII: M=Ir, M'=Pd; VIII: M=Ir, M'=Pt). The trinuclear metal complexes V, VI, VII, and VIII are bridged by the cyanide groups. The infrared spectrum of V, VI, VII, and VIII supports the presence of the bridged cyanide and terminal cyanide group.

Study on the Enzyme of Basidiomycetes(I) -The Effects of Iron Ions on the Light-Induced Mitochondrial $F_0F_1-ATPase$ of Lentinus edodes- (담자균류의 효소에 관한 연구(I) -표고버섯 중의 광감응성 Mitochondrial $F_0F_1-ATPase$의 철이온 효과-)

  • Min, Tae-jin;Lee, Mi-Ae;Bae, Kang-Gyu
    • The Korean Journal of Mycology
    • /
    • v.21 no.3
    • /
    • pp.165-171
    • /
    • 1993
  • The effects of the iron ions for the light-induced mitochondrial $F_0F_1-ATPase$ of Lentinus edodes was studied. The enzyme activity was stimulated up to 202% by 0.1 mM $Fe^{2-}$ ion, but was inhibited by $Fe^{3+}\;and\;Mg^{2+}$. In the presence of 0.5 mM $Mg^{2+}$, the activity also increased 32% by 0.1 mM $Fe^{2+}$ ion, and decreased to a similar extent by $Fe^{3+}$ ion than by only $Fe^{3+}$ ion. Also, the activity was inhibited 53% by 5.0 mM $Fe^{2-}$ ion in the presence of 0.5 mM $Mg^{2+}$ ion and various concentration of $Fe^{3+}$ ion(mM). These results showed that $Fe^{2+}$ strongly stimulated the enzyme activity and its role for the enzyme was independent of $Mg^{2+}$ ion, but was dependent of $Fe^{3+}$ ion. From inactivation of the enzyme by addition of metal chelating agent, EDTA, it is suggested that the enzyme is to be metalloenzyme. The optimal pH and temperature of the enzyme in the presence of 0.1 mM $Fe^{2+}$ was 7.6 and $63^{\circ}C$, respectively.

  • PDF

General Linear Group over a Ring of Integers of Modulo k

  • Han, Juncheol
    • Kyungpook Mathematical Journal
    • /
    • v.46 no.2
    • /
    • pp.255-260
    • /
    • 2006
  • Let $m$ and $k$ be any positive integers, let $\mathbb{Z}_k$ the ring of integers of modulo $k$, let $G_m(\mathbb{Z}_k)$ the group of all $m$ by $m$ nonsingular matrices over $\mathbb{Z}_k$ and let ${\phi}_m(k)$ the order of $G_m(\mathbb{Z}_k)$. In this paper, ${\phi}_m(k)$ can be computed by the following investigation: First, for any relatively prime positive integers $s$ and $t$, $G_m(\mathbb{Z}_{st})$ is isomorphic to $G_m(\mathbb{Z}_s){\times}G_m(\mathbb{Z}_t)$. Secondly, for any positive integer $n$ and any prime $p$, ${\phi}_m(p^n)=p^{m^2}{\cdot}{\phi}_m(p^{n-1})=p{^{2m}}^2{\cdot}{\phi}_m(p^{n-2})={\cdots}=p^{{(n-1)m}^2}{\cdot}{\phi}_m(p)$, and so ${\phi}_m(k)={\phi}_m(p_1^n1){\cdot}{\phi}_m(p_2^{n2}){\cdots}{\phi}_m(p_s^{ns})$ for the prime factorization of $k$, $k=p_1^{n1}{\cdot}p_2^{n2}{\cdots}p_s^{ns}$.

  • PDF