• Title/Summary/Keyword: b-extensions

Search Result 85, Processing Time 0.027 seconds

SOME RESULTS ON 2-STRONGLY GORENSTEIN PROJECTIVE MODULES AND RELATED RINGS

  • Dong Chen;Kui Hu
    • Bulletin of the Korean Mathematical Society
    • /
    • v.60 no.4
    • /
    • pp.895-903
    • /
    • 2023
  • In this paper, we give some results on 2-strongly Gorenstein projective modules and related rings. We first investigate the relationship between strongly Gorenstein projective modules and periodic modules and then give the structure of modules over strongly Gorenstein semisimple rings. Furthermore, we prove that a ring R is 2-strongly Gorenstein hereditary if and only if every ideal of R is Gorenstein projective and the class of 2-strongly Gorenstein projective modules is closed under extensions. Finally, we study the relationship between 2-Gorenstein projective hereditary and 2-Gorenstein projective semisimple rings, and we also give an example to show the quotient ring of a 2-Gorenstein projective hereditary ring is not necessarily 2-Gorenstein projective semisimple.

Inter-Relationship Among the Extent of Past Consultations, Recommendation, Satisfaction, and Loyalty in Patient-Doctor Relationship: An Empirical Study

  • George, Babu P.;Salgaonkar, Pradeep B.
    • Journal of Global Scholars of Marketing Science
    • /
    • v.16 no.3
    • /
    • pp.17-37
    • /
    • 2006
  • The present study examines the relative roles of external recommendations and internally felt satisfaction in influencing patient loyalty to a doctor. It establishes that recommendations do result in preliminary loyalty formation in the patient to the doctor, but only until the formation of own experiences; the significance of external sources of recommendation in the determination of patient loyalty becomes insignificant thenceforth. Implications for the doctors are that they should strive at fostering bonds of emotional attachment in their present patients so that they become strongly loyal and spread positive word-of-mouth which could result in the doctor getting new patients as well. Probable extensions of this research are also discussed later in the paper.

  • PDF

Increase of Grb2 and Ras Proteins and Expression of Growth Factors in LPS Stimulated Odontoblast-like Dental Pulp Cells

  • Jeong, Soon-Jeong;Jeong, Moon-Jin
    • Applied Microscopy
    • /
    • v.43 no.1
    • /
    • pp.27-33
    • /
    • 2013
  • Inflammatory cells express the inflammatory cytokines and growth factors induced by lipopolysaccharide (LPS). Odontoblasts are located at the pulp-dentin interface and extend their cell processes far into the dentin where they are the first cells to encounter microorganisms or their products. Therefore, this study examined the expression of some growth factors related to the signal pathway, such as growth factor receptor binding protein 2 (Grb2)-Ras in odontoblast-like dental pulp cells, after a treatment with LPS. After 60 minutes, the mRNA and protein expression levels of Grb2 and Ras were higher in the LPS-treated cells than in the control cells. The level of vascular endothelial growth factor (VEGF) and basic fibroblast growth factor (bFGF) mRNA expression was increased significantly to a level similar to that of Grb2 and Ras at 60 minutes. The platelet-derived growth factor-AA (PDGF-AA) mRNA level was expressed strongly in the odontoblast like dental pulp cells without an association with LPS stimulation. Scanning electron microscopy revealed many extensions of the cytoplasmic processes and the number of processes increased gradually at 30, 60 and 90 minutes after LPS stimulation. From these results VEGF and bFGF expression might be induced through the Grb2-Ras signal transduction pathway in LPS treated odontoblasts.

Constitutive Model of Tendon Responses to Multiple Cyclic Demands(I) -Experimental Analysis-

  • Chun, Keyoung-Jin;Robert P. Hubbard
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.7
    • /
    • pp.1002-1012
    • /
    • 2001
  • The work reported here is an extensive study of tendon response to multiple cyclic tests including 3% constant peak strain level test (A-type test), 3% constant peak strain level test with two rest periods (B-type test), and 3∼4% different peak strain level test (C-type test). A sufficient number of specimens were tested at each type of the test to statistically evaluate many changes in response during testing and differences in response between each type of the test. In cyclic tests, there were decreses (relaxations) in the peak stresses and hysteresis, increases in the slack strains, and during lower peak strain level (3%) cyclic block after higher peak strain level (4%) cyclic block in the C-type tests. Considering the results of this study and those of the other study of multiple cyclic tests with rest periods by Hubbard and Chun, 1985, recovery phenomena during the rest periods occurred predominantly at the beginning of the rest periods. Consistently in both studies, the effects of rest periods were small and transient compared to the effects of the cyclic extensions. The recovery with cycles at lower peak strain level (3%) after higher peak strain level (4%) in the C-type test has not been previously documented. This recovery seems to be a natural phenomena in tissue behavior so that collagenous structures recover during periods of decreased demand.

  • PDF

Ore Extension Rings with Constant Products of Elements

  • Hashemi, Ebrahim;Alhevaz, Abdollah
    • Kyungpook Mathematical Journal
    • /
    • v.59 no.4
    • /
    • pp.603-615
    • /
    • 2019
  • Let R be an associative unital ring with an endomorphism α and α-derivation δ. The constant products of elements in Ore extension rings, when the coefficient ring is reversible, is investigated. We show that if f(x) = ∑ni=0 aixi and g(x) = ∑mj=0 bjxj be nonzero elements in Ore extension ring R[x; α, δ] such that g(x)f(x) = c ∈ R, then there exist non-zero elements r, a ∈ R such that rf(x) = ac, when R is an (α, δ)-compatible ring which is reversible. Among applications, we give an exact characterization of the unit elements in R[x; α, δ], when the coeficient ring R is (α, δ)-compatible. Furthermore, it is shown that if R is a weakly 2-primal ring which is (α, δ)-compatible, then J(R[x; α, δ]) = N iℓ(R)[x; α, δ]. Some other applications and examples of rings with this property are given, with an emphasis on certain classes of NI rings. As a consequence we obtain generalizations of the many results in the literature. As the final part of the paper we construct examples of rings that explain the limitations of the results obtained and support our main results.

GENERALIZED SEMI COMMUTATIVE RINGS AND THEIR EXTENSIONS

  • Baser, Muhittin;Harmanci, Abdullah;Kwak, Tai-Keun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.45 no.2
    • /
    • pp.285-297
    • /
    • 2008
  • For an endomorphism ${\alpha}$ of a ring R, the endomorphism ${\alpha}$ is called semicommutative if ab=0 implies $aR{\alpha}(b)$=0 for a ${\in}$ R. A ring R is called ${\alpha}$-semicommutative if there exists a semicommutative endomorphism ${\alpha}$ of R. In this paper, various results of semicommutative rings are extended to ${\alpha}$-semicommutative rings. In addition, we introduce the notion of an ${\alpha}$-skew power series Armendariz ring which is an extension of Armendariz property in a ring R by considering the polynomials in the skew power series ring $R[[x;\;{\alpha}]]$. We show that a number of interesting properties of a ring R transfer to its the skew power series ring $R[[x;\;{\alpha}]]$ and vice-versa such as the Baer property and the p.p.-property, when R is ${\alpha}$-skew power series Armendariz. Several known results relating to ${\alpha}$-rigid rings can be obtained as corollaries of our results.

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

A Study of Pants Pattern Design for Middle-aged Women Based on the BMI Index -For Women Aged 45 to 59 Years- (BMI 지수에 따른 중년여성의 팬츠패턴 설계연구 -45~59세를 대상-)

  • Lee, Jong Kyu;Lim, Ho Sun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.45 no.3
    • /
    • pp.477-494
    • /
    • 2021
  • This study examined four subjects with close to average body-size values in four stages based on the average BMI value of middle-aged women aged 45 to 59 years. The first experimental pants was developed with two kinds of educational materials pants pattern. After using a clothing-suitability evaluation to identify problems, a pants pattern suitable for the body shape of middle-aged women was developed by modifying and supplementing the initial design. The fit assessment revealed that pattern A had a problem with wrinkles in the hip and thigh areas due to the long crotch length, and pattern B had a short bottom length, which caused the bottom to curl in toward the groin or for the bottom to stick at the hips. The second experimental pants was developed to address these issues and overall satisfaction with the dimensions was higher than for the first educational pattern. The proper front and rear length extensions satisfied movement functionality and appearance requirements, and increasing the gradient of the back centerline-rather than expanding the width of the back crotch-improved the functionality.

Multimedia Document Databases : Representation, Query Processing and Navigation

  • Kalakota, Ravi S.;Whinston, Andrew B.
    • The Journal of Information Technology and Database
    • /
    • v.1 no.1
    • /
    • pp.31-62
    • /
    • 1994
  • Information systems for application areas like office automation, customer service or computer aided manufacturing are usually highly interactive and deal with complex document structures composed of multiple media formats. For the realization of these systems, nonstandard database systems, which we call document databases, need to handle different types of coarse-and fine-grained document objects(like full-text documents, graphics and images), hierarchical and non-hierarchical relationships between objects(like composition-links and cross-references using hypertext structures) and document attributes of different types such as formatting/presentation information and access control. In this paper, we present the underlying data model for document databases based on descriptive markup languages that provide mechanisms for specifying the logical structure(or schema) of individual documents stored in the database. We then describe extensions to the data model for supporting notion of composite structures("join" operators for documents) --composition and hyperlinking mechanisms for representing compound documents and inter-linked documents as unique entites separate from their components. Furthermore, due to the interactive nature of the application domains, the database system in conjunction with clients(or browsers) has to support visual navigation and graphical query mechanisms. We describe the functionality of a new user interface paradigm called HyBrow for meeting the above mentioned requirements. The underlying implementation strategy is also discussed.discussed.

  • PDF

3D Modeling of Safety Leg Guards Considering Skin Deformation and shape (피부길이변화를 고려한 3차원 다리보호대 모델링)

  • Lee, Hyojeong;Eom, Ran-i;Lee, Yejin
    • Korean Journal of Human Ecology
    • /
    • v.24 no.4
    • /
    • pp.555-569
    • /
    • 2015
  • During a design process of a protective equipment for sports activities, minimizing movement restrictions is important for enhancing its functions particularly for protection. This study presents a three-dimensional(3D) modeling methodology for designing baseball catcher's leg guards that will allow maximum possible performance, while providing necessary protection. 3D scanning is performed on three positions frequently used by a catcher during the course of a game by putting markings on the subject's legs at 3cm intervals : a standing, a half squat with knees bent to 90 degrees and 120 degrees of knee flexion. Using data obtained from the 3D scan, we analyzed the changes in skin length, radii of curvatures, and cross-sectional shapes, depending on the degree of knee flexion. The results of the analysis were used to decide an on the ideal segmentation of the leg guards by modeling posture. Knee flexions to 90 degrees and to $120^{\circ}$ induced lengthwise extensions than a standing. In particular, the vertical length from the center of the leg increases to a substantially higher degree when compared to those increased from the inner and the outer side of the leg. The degree of extension is varied by positions. Therefore, the leg guards are segmented at points where the rate of increase changed. It resulted in a three-part segmentation of the leg guards at the thigh, the knee, and the shin. Since the 120 degree knee-flexion posture can accommodate other positions as well, the related 3D data are used for modeling Leg Guard (A) with the loft method. At the same time, Leg Guard (B) was modeled with two-part segmentation without separating the knee and the shin as in existing products. A biomechanical analysis of the new design is performed by simulating a 3D dynamic analysis. The analysis revealed that the three-part type (A) leg guards required less energy from the human body than the two-part type (B).