Mathematics / Matematik

Permanent URI for this collectionhttps://hdl.handle.net/11147/8

Browse

Search Results

Now showing 1 - 3 of 3
  • Article
    Citation - WoS: 3
    Citation - Scopus: 3
    Dual Kasch rings
    (World Scientific Publishing, 2023) Lomp, Christian; Büyükaşık, Engin; Yurtsever, Haydar Baran
    It is well known that a ring R is right Kasch if each simple right R-module embeds in a projective right R-module. In this paper we study the dual notion and call a ring R right dual Kasch if each simple right R-module is a homomorphic image of an injective right R-module. We prove that R is right dual Kasch if and only if every finitely generated projective right R-module is coclosed in its injective hull. Typical examples of dual Kasch rings are self-injective rings, V-rings and commutative perfect rings. Skew group rings of dual Kasch rings by finite groups are dual Kasch if the order of the group is invertible. Many examples are given to separate the notion of Kasch and dual Kasch rings. It is shown that commutative Kasch rings are dual Kasch, and a commutative ring with finite Goldie dimension is dual Kasch if and only if it is a classical ring (i.e. every element is a zero divisor or invertible). We obtain that, for a field k, a finite dimensional k-algebra is right dual Kasch if and only if it is left Kasch. We also discuss the rings over which every simple right module is a homomorphic image of its injective hull, and these rings are termed strongly dual Kasch.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 1
    Fatigue Life Prediction and Optimization of Gfrp Composites Based on Failure Tensor Polynomial in Fatigue Model With Exponential Fitting Approach
    (SAGE Publications, 2022) Güneş, Mehmet Deniz; İmamoğlu Karabaş, Neslişah; Deveci, Hamza Arda; Tanoğlu, Gamze; Tanoğlu, Metin
    In this study, a new fatigue life prediction and optimization strategy utilizing the Failure Tensor Polynomial in Fatigue (FTPF) model with exponential fitting and numerical bisection method for fiber reinforced polymer composites has been proposed. Within the experimental stage, glass/epoxy composite laminates with (Formula presented.), (Formula presented.), and (Formula presented.) lay-up configurations were fabricated, quasi-static and fatigue mechanical behavior of GFRP composites was characterized to be used in the FTPF model. The prediction capability of the FTPF model was tested based on the experimental data obtained for multidirectional laminates of various composite materials. Fatigue life prediction results of the glass/epoxy laminates were found to be better as compared to those for the linear fitting predictions. The results also indicated that the approach with exponential fitting provides better fatigue life predictions as compared to those obtained by linear fitting, especially for glass/epoxy laminates. Moreover, an optimization study using the proposed methodology for fatigue life advancement of the glass/epoxy laminates was performed by a powerful hybrid algorithm, PSA/GPSA. So, two optimization scenarios including various loading configurations were considered. The optimization results exhibited that the optimized stacking sequences having maximized fatigue life can be obtained in various loading cases. It was also revealed that the tension-compression loading and the loadings involving shear loads are critical for fatigue, and further improvement in fatigue life may be achieved by designing only symmetric lay-ups instead of symmetric-balanced and diversification of fiber angles to be used in the optimization.
  • Article
    Malleability and Ownership of Proxy Signatures: Towards a Stronger Definiton and Its Limitations
    (American Institute of Mathematical Sciences, 2020) Chatterjee, Sanjit; Ustaoğlu, Berkant
    Proxy signature is a cryptographic primitive that allows an entity to delegate singing rights to another entity. Noticing the ad-hoc nature of security analysis prevalent in the existing literature, Boldyreva, Palacio and Warinschi proposed a formal security model for proxy signature. We revisit their proposed security definition in the context of the most natural construction of proxy signature - delegation-by-certificate. Our analysis indicates certain limitations of their definition that arise due to malleability of proxy signature as well as signature ownership in the context of standard signature. We propose a stronger definition of proxy signature to address these issues. However, we observe that the natural reductionist security argument of the delegation-by certificate proxy signature construction under this definition seems to require a rather unnatural security property for a standard signature.