factor set
Recently Published Documents


TOTAL DOCUMENTS

50
(FIVE YEARS 9)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Peter F. Faul

AbstractIt is well known that the set of isomorphism classes of extensions of groups with abelian kernel is characterized by the second cohomology group. In this paper we generalise this characterization of extensions to a natural class of extensions of monoids, the cosetal extensions. An extension "Equation missing" is cosetal if for all $$g,g' \in G$$ g , g ′ ∈ G in which $$e(g) = e(g')$$ e ( g ) = e ( g ′ ) , there exists a (not necessarily unique) $$n \in N$$ n ∈ N such that $$g = k(n)g'$$ g = k ( n ) g ′ . These extensions generalise the notion of special Schreier extensions, which are themselves examples of Schreier extensions. Just as in the group case where a semidirect product could be associated to each extension with abelian kernel, we show that to each cosetal extension (with abelian group kernel), we can uniquely associate a weakly Schreier split extension. The characterization of weakly Schreier split extensions is combined with a suitable notion of a factor set to provide a cohomology group granting a full characterization of cosetal extensions, as well as supplying a Baer sum.


Author(s):  
Abraham Love Prins

The Schur multiplier M(Ḡ1) ≅4 of the maximal subgroup Ḡ1 = 2⁶˙G₂(2)of the Rudvalis sporadic simple group Ru is a cyclic group of order 4. Hence a full representative group R of the type R = 4.(2⁶˙G₂(2)) exists for Ḡ1. Furthermore, Ḡ1 will have four sets IrrProj(Ḡ1;αi) of irreducible projective characters, where the associated factor sets α1, α2, α3 and α4, have orders of 1, 2, 4 and 4, respectively. In this paper, we will deal with a 2-fold cover 2. Ḡ1 of Ḡ1 which can be treated as a non-split extension of the form Ḡ = 27˙G2(2). The ordinary character table of Ḡ will be computed using the technique of the so-called Fischer matrices. Routines written in the computer algebra system GAP will be presented to compute the conjugacy classes and Fischer matrices of Ḡ and as well as the sizes of the sets |IrrProj(Hi; αi)| associated with each inertia factor Hi. From the ordinary irreducible characters Irr(Ḡ) of Ḡ, the set IrrProj(Ḡ1; α2) of irreducible projective characters of Ḡ1 with factor set α2 such that α22= 1, can be obtained.


eLife ◽  
2020 ◽  
Vol 9 ◽  
Author(s):  
Lianna Schwartz-Orbach ◽  
Chenzhen Zhang ◽  
Simone Sidoli ◽  
Richa Amin ◽  
Diljeet Kaur ◽  
...  

Nuclear RNAi provides a highly tractable system to study RNA-mediated chromatin changes and epigenetic inheritance. Recent studies have indicated that the regulation and function of nuclear RNAi-mediated heterochromatin are highly complex. Our knowledge of histone modifications and the corresponding histonemodifying enzymes involved in the system remains limited. In this study, we show that the heterochromatin mark, H3K23me3, is induced by nuclear RNAi at both exogenous and endogenous targets in C. elegans. In addition, dsRNA-induced H3K23me3 can persist for multiple generations after the dsRNA exposure has stopped. We demonstrate that the histone methyltransferase SET-32, methylates H3K23 in vitro. Both set-32 and the germline nuclear RNAi Argonaute, hrde-1, are required for nuclear RNAi-induced H3K23me3 in vivo. Our data poise H3K23me3 as an additional chromatin modification in the nuclear RNAi pathway and provides the field with a new target for uncovering the role of heterochromatin in transgenerational epigenetic silencing.


Author(s):  
Lianna Schwartz-Orbach ◽  
Chenzhen Zhang ◽  
Simone Sidoli ◽  
Richa Amin ◽  
Diljeet Kaur ◽  
...  

2020 ◽  
Vol 12 (5) ◽  
pp. 168781402092310
Author(s):  
Falin Wang ◽  
Zhinong Li ◽  
Xuepeng Guo ◽  
Wenhe Liao

Given that the cable harness wiring quality (CHWQ) of complex mechatronic products is affected by multiple factors and it is difficult to solve the resulting control problems, this paper proposes a quality prediction method for cable harness wiring using extension theory and a backpropagation (BP) neural network. First, a quality prediction framework is designed based on the factors influencing the composition and analysis of the CHWQ. Second, we establish a quality evaluation index system based on five aspects and design a first-level factor set and a second-level factor set. Based on the single factor index for various parameters and evaluation of data after dimensionless parameter processing, we use extension theory and the entropy weight method to determine the membership matrix and the fuzzy weight vector for the first-level evaluation. Additionally, the single factor and the synthetic fuzzy weight vector are determined using the entropy weight method and the analytic hierarchy process (AHP), respectively, and quality grade evaluation based on the fuzzy synthetic evaluation (FSE) method is completed. Finally, we use a three-layer feedforward neural network to predict the quality status of a specific phased array radar system. The results demonstrate that the proposed method can produce increased prediction accuracy.


System of bodily hubs or "matters" joined with hardware, programming, sensors, and linked to enact articles to move information from servers, included frameworks, or doubtlessly distinctive associated devices depending on a numerous correspondence foundations may be actualized with net of factors (IoT) version. IoT facts gathered from various sensors, hubs and government are moved to the cover over the net. The principle target of IoT protection is to ensure thriller of the statistics, and make certain the assurance of the consumer's statistics, frameworks, software program's facts substance, and smart machine's of the IoT, via manner of ensures the administrations accessibility of IoT organic gadget. The number one purpose of this exam article is to enhance protection highlights to IoT device becoming a member of with rectangular chain. The significance of Bit-coin the usage of rectangular chain innovation, which changed into at that factor set up for a few, financial nicely well worth exchanges because it have been. Anyhow, because of its Non-delivered collectively engineering, agile corruption and cryptographic defend benefits, for instance, pseudonymous personalities, statistics trustworthiness and take a look at, scientists and safety professionals round the sector are concentrating on the rectangular chain to decide coverage and protection issues of IoT. In this article, we have positioned a few right down to earth problems which can be associated with the becoming a member of of IoT devices with the square chain. At closing, we endorse a course ahead to determine a part of the large difficulties to the rectangular chain's utilization in IoT based totally software program.


2019 ◽  
Author(s):  
Albert Ansmann ◽  
Rodanthi-Elisavet Mamouri ◽  
Julian Hofer ◽  
Holger Baars ◽  
Dietrich Althausen ◽  
...  

Abstract. The POLIPHON (Polarization Lidar Photometer Networking) method permits the retrieval of particle number, surface area, and volume concentration for dust and non-dust aerosol components. The obtained microphysical properties are used to estimate height profiles of particle mass, cloud condensation nucleus (CCN) and ice-nucleation particle (INP) concentrations. Of central importance is the conversion of the lidar-derived extinction profiles into aerosol miccrophysical properties (number, surface area, volume). These conversion parameters are determined from Aerosol Robotic Network (AERONET) aerosol climatologies of optical and microphysical properties. In this article we focus on the dust-related POLIPHON retrieval and present an updated set of dust conversion factors considering all relevant deserts around the globe. We apply the new conversion factor set to a dust measurement with polarization lidar in Dushanbe, Tajikistan, in central Asia. Strong aerosol layering was observed with mineral dust advected from Kazakhstan (0–2 km height), Iran (2–5 km), the Arabian peninsula (5–7 km), and the Sahara (8–10 km). POLIPHON results obtained with different sets of conversion parameters were contrasted and discussed in terms of uncertainties.


Cell Reports ◽  
2018 ◽  
Vol 25 (8) ◽  
pp. 2273-2284.e3 ◽  
Author(s):  
Natallia Kalinava ◽  
Julie Zhouli Ni ◽  
Zoran Gajic ◽  
Matthew Kim ◽  
Helen Ushakov ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document