627 research outputs found

    A Reduction Functor, Tameness, and Tits Form for a Class of Orders

    Get PDF
    AbstractLet D be a complete discrete valuation domain which is an algebra over an algebraically closed field K. We study in the paper a class of suborders Λ of tiled D-orders by means of a rational quadratic form qΛ associated to Λ and a finite poset I*+Λ having exactly two maximal elements ∗ and +. Criteria for finite lattice type and for tame lattice type of Λ are given in terms of the form qΛ and of the category I*+Λ-spr of socle projective K-linear representations of the poset I*+Λ. The shape of Auslander-Reiten quiver Γ(latt(Λ)) is described in Corollary 3.2. A reduction functor H: latt(Λ) → I*+Λ-spr preserving representation types is constructed. It is shown in Corollary 2.10 that for any poset I having exactly two maximal elements there exists a D-order in our class, an additive functor latt(Λ) → I-spr preserving representation types and a poset isomorphism I ≅ I*+Λ

    On large indecomposable modules, endo-wild representation type and right pure semisimple rings

    No full text
    The existence of large indecomposable right Rmodules over a right artinian ring R is discussed in connection with the pure semisimplicity problem and the endo-wildness of the category Mod(R) of right R-modules. Some conjectures and open problems are presented

    4D STEM: high efficiency phase contrast imaging using a fast pixelated detector

    Get PDF
    Phase contrast imaging is widely used for imaging beam sensitive and weak phase objects in electron microscopy. In this work we demonstrate the achievement of high efficient phase contrast imaging in STEM using the pnCCD, a fast direct electron pixelated detector, which records the diffraction patterns at every probe position with a speed of 1000 to 4000 frames per second, forming a 4D STEM dataset simultaneously with the incoherent Z-contrast imaging. Ptychographic phase reconstruction has been applied and the obtained complex transmission function reveals the phase of the specimen. The results using GaN and Ti, Nd- doped BiFeO3 show that this imaging mode is especially powerful for imaging light elements in the presence of much heavier elements

    Design principles and patterns for computer systems that are simultaneously secure and usable

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Includes bibliographical references (p. 429-464) and index.It is widely believed that security and usability are two antagonistic goals in system design. This thesis argues that there are many instances in which security and usability can be synergistically improved by revising the way that specific functionality is implemented in many of today's operating systems and applications. Specific design principles and patterns are presented that can accomplish this goal. Patterns are presented that minimize the release of confidential information through remnant and remanent data left on hard drives, in web browsers, and in documents. These patterns are based on a study involving the purchase of 236 hard drives on the secondary market, interviews conducted with organizations whose drives had been acquired, and through a detailed examination of modern web browsers and reports of information leakage in documents. Patterns are presented that enable secure messaging through the adoption of new key management techniques. These patterns are supported through an analysis of S/MIME handling in modern email clients, a survey of 469 Amazon.com merchants, and a user study of 43 individuals. Patterns are presented for promoting secure operation and for reducing the danger of covert monitoring. These patterns are supported by the literature review and an analysis of current systems.(cont.) In every case considered, it is shown that the perceived antagonism of security and usability can be scaled back or eliminated by revising the underlying designs on which modern systems are conceived. In many cases these designs can be implemented without significant user interface changes. The patterns described in this thesis can be directly applied by today's software developers and used for educating the next generation of programmers so that longstanding usability problems in computer security can at last be addressed. It is very likely that additional patterns can be identified in other related areas.by Simson L. Garfinkel.Ph.D

    ANALISIS DAN PERANCANGAN PERANGKAT AJAR BAHASA JEPANG BERBASISKAN MULTIMEDIA PADA PT. GADIKA PUSTAKA

    Get PDF
    ANALISIS DAN PERANCANGAN PERANGKAT AJAR BAHASA JEPANG BERBASISKAN MULTIMEDIA PADA PT. GADIKA PUSTAKA - perangkat ajar, Bahasa Jepang, multimedi

    Rupture of multiple parallel molecular bonds under dynamic loading

    Full text link
    Biological adhesion often involves several pairs of specific receptor-ligand molecules. Using rate equations, we study theoretically the rupture of such multiple parallel bonds under dynamic loading assisted by thermal activation. For a simple generic type of cooperativity, both the rupture time and force exhibit several different scaling regimes. The dependence of the rupture force on the number of bonds is predicted to be either linear, like a square root or logarithmic.Comment: 8 pages, 2 figure

    Algorithms computing O(n, Z)-orbits of P-critical edge-bipartite graphs and P-critical unit forms using Maple and C#

    No full text
    We present combinatorial algorithms constructing loop-free P-critical edge-bipartite (signed) graphs Δ′, with n ≥ 3 vertices, from pairs (Δ, w), with Δ a positive edge-bipartite graph having n-1 vertices and w a sincere root of Δ, up to an action ∗ : UBigrn × O(n, Z) → UBigrn of the orthogonal group O(n, Z) on the set UBigrn of loop-free edge-bipartite graphs, with n ≥ 3 vertices. Here Z is the ring of integers. We also present a package of algorithms for a Coxeter spectral analysis of graphs in UBigrn and for computing the O(n, Z)-orbits of P-critical graphs Δ in UBigrn as well as the positive ones. By applying the package, symbolic computations in Maple and numerical computations in C#, we compute P-critical graphs in UBigrn and connected positive graphs in UBigrn, together with their Coxeter polynomials, reduced Coxeter numbers, and the O(n, Z)-orbits, for n ≤ 10. The computational results are presented in tables of Section 5

    Potensi Ketersediaan Air Pada Free Intake Wae Musur 1 dan 2 Untuk Pengembangan Lahan Pertanian Di DAS Borong Kabupaten Manggarai Timur

    Get PDF
    This study aims to analyze the potential of water availability in the free intake of Wae Musur 1 and 2 which are used to meet the needs of functional and potential irrigation water in the Borong watershed, East Manggarai Regency. The method used in this research is quantitative analysis method. The calculated availability of water is surface water in the form of a reliable river discharge. Water requirements for functional and potential land are calculated based on the assumption that 1 hectare is equal to 1 liter / second. The analysis shows that the average availability of mainstay debit in January to December is 4,5 million m3/month. Balance sheet analysis shows that the mainstay discharge available for free intake of Wae Musur 1 and 2 is able to meet the needs of functional land irrigation water and is still surplus. Therefore, this surplus is used to meet potential land irrigation water needs. After analyzing the water balance, the potential for irrigation water needs is apparently still experiencing a surplus as well. Surplus ranges from 0,3 million to 6,3 million m3/month

    Hereditary stable tubes in module categories

    No full text
    The concepts of a self-hereditary stable tube T and a hereditary stable tube T in a module category modA are introduced, where A is a finite dimensional algebra over an algebraically closed field. Characterisations of self-hereditary stable tubes and hereditary stable tubes are given, and illustrative examples of such tubes are presented. Some open problems are presented
    corecore