Let R be a ring. We define a dimension, called P-cotorsion dimension, for modules and rings. The aim of this article is to investigate P-cotorsion dimensions of modules and rings and the relations between P-cotorsion ...Let R be a ring. We define a dimension, called P-cotorsion dimension, for modules and rings. The aim of this article is to investigate P-cotorsion dimensions of modules and rings and the relations between P-cotorsion dimension and other homological dimensions. This dimension has nice properties when the ring in consideration is generalized morphic.展开更多
A ring R is called left morphic, if for any a ∈ R, there exists b ∈ R such that lR(a) =Rb and lR(b)= Ra. In this paper, we use the method which is different from that of Lee and Zhou to investigate when R[x, σ]...A ring R is called left morphic, if for any a ∈ R, there exists b ∈ R such that lR(a) =Rb and lR(b)= Ra. In this paper, we use the method which is different from that of Lee and Zhou to investigate when R[x, σ]/(x^n) is (left) morphic and when the ideal extension E(R, V) is (left) morphic. It is mainly shown that: (1) If is an automorphism of a division ring R, then S = R[x, σ]/(x^n) (n 〉 1) is a special ring. (2) If d,m are positive integers and n = dm, then E(Zn, mZn) is a morphic ring if and only if gcd(d, m) = 1.展开更多
Network coding is vulnerable to pollution at- tacks, which prevent receivers from recovering the source message correctly. Most existing schemes against pollution attacks either bring significant redundancy to the ori...Network coding is vulnerable to pollution at- tacks, which prevent receivers from recovering the source message correctly. Most existing schemes against pollution attacks either bring significant redundancy to the original message or require a high computational complexity to ver- ify received blocks. In this paper, we propose an efficient scheme against pollution attacks based on probabilistic key pre-distribution and homomorphic message authentication codes (MACs). In our scheme, each block is attached with a small number of MACs and each node can use these MACs to verify the integrity of the corresponding block with a high probability. Compared to previous schemes, our scheme still leverages a small number of keys to generate MACs for each block, but more than doubles the detection probability. Mean- while, our scheme is able to efficiently restrict pollution prop- agation within a small number of hops. Experimental results show that our scheme is more efficient in verification than existing ones based on public-key cryptography.展开更多
The Theory of Morphic Fields explains how co-evolution through collective information fields acquires its own organization pattern, nurtured by habits or thoughts that “in-form” the memory of species. The influences...The Theory of Morphic Fields explains how co-evolution through collective information fields acquires its own organization pattern, nurtured by habits or thoughts that “in-form” the memory of species. The influences of electromagnetic fields (EMFs) on bio-energy transport and its mechanism of changes has been investigated through analytic and numerical simulation as well as experimentation. As an answer to that need Therapeutic Acupunctural Resonance is born. This innovative therapeutic is rooted in concepts from classic Physics as well as Field Quantic Theory—highlighting the practical application of the criterion defined by the Soliton theory and the current, extraordinary discoveries at Cellular Quantic Kinetics level. The development of Therapeutic Acupuntural Resonance has taken into account to a certain extent these concepts: both the compatibility between the Five Element Theory and the principles of Euclidean Geometry, as well as the new forms of interpretation of Quantum mechanisms involved in Cellular Kinetics and its relationship with Chinese Ancient wisdom.展开更多
设(A,B,V,W,ψ,φ)是一个Morita Context,具有一对零态射ψ=0,φ=0,C= (A V W B)是对应的Morita Context环.本文给出了C与A,B,V,W之间关于环的π-正则性、semiclean性、Mophic性和环的Exchgange性、Potent性、GM性的关系.
基金supported by Collegial Natural Science Research Program of Education Department of Jiangsu Province (07KJD110043)
文摘Let R be a ring. We define a dimension, called P-cotorsion dimension, for modules and rings. The aim of this article is to investigate P-cotorsion dimensions of modules and rings and the relations between P-cotorsion dimension and other homological dimensions. This dimension has nice properties when the ring in consideration is generalized morphic.
基金The National Natural Science Foundation (10571026) of China, and the Natural Science Foundation (BK2005207) of Jiangsu Province.
文摘A ring R is called left morphic, if for any a ∈ R, there exists b ∈ R such that lR(a) =Rb and lR(b)= Ra. In this paper, we use the method which is different from that of Lee and Zhou to investigate when R[x, σ]/(x^n) is (left) morphic and when the ideal extension E(R, V) is (left) morphic. It is mainly shown that: (1) If is an automorphism of a division ring R, then S = R[x, σ]/(x^n) (n 〉 1) is a special ring. (2) If d,m are positive integers and n = dm, then E(Zn, mZn) is a morphic ring if and only if gcd(d, m) = 1.
文摘Network coding is vulnerable to pollution at- tacks, which prevent receivers from recovering the source message correctly. Most existing schemes against pollution attacks either bring significant redundancy to the original message or require a high computational complexity to ver- ify received blocks. In this paper, we propose an efficient scheme against pollution attacks based on probabilistic key pre-distribution and homomorphic message authentication codes (MACs). In our scheme, each block is attached with a small number of MACs and each node can use these MACs to verify the integrity of the corresponding block with a high probability. Compared to previous schemes, our scheme still leverages a small number of keys to generate MACs for each block, but more than doubles the detection probability. Mean- while, our scheme is able to efficiently restrict pollution prop- agation within a small number of hops. Experimental results show that our scheme is more efficient in verification than existing ones based on public-key cryptography.
文摘The Theory of Morphic Fields explains how co-evolution through collective information fields acquires its own organization pattern, nurtured by habits or thoughts that “in-form” the memory of species. The influences of electromagnetic fields (EMFs) on bio-energy transport and its mechanism of changes has been investigated through analytic and numerical simulation as well as experimentation. As an answer to that need Therapeutic Acupunctural Resonance is born. This innovative therapeutic is rooted in concepts from classic Physics as well as Field Quantic Theory—highlighting the practical application of the criterion defined by the Soliton theory and the current, extraordinary discoveries at Cellular Quantic Kinetics level. The development of Therapeutic Acupuntural Resonance has taken into account to a certain extent these concepts: both the compatibility between the Five Element Theory and the principles of Euclidean Geometry, as well as the new forms of interpretation of Quantum mechanisms involved in Cellular Kinetics and its relationship with Chinese Ancient wisdom.
文摘设(A,B,V,W,ψ,φ)是一个Morita Context,具有一对零态射ψ=0,φ=0,C= (A V W B)是对应的Morita Context环.本文给出了C与A,B,V,W之间关于环的π-正则性、semiclean性、Mophic性和环的Exchgange性、Potent性、GM性的关系.