STRUCTURE AND DETECTION THEOREMS FOR k[C2×C4]-MODULES

نویسنده

  • SEMRA ÖZTÜRK
چکیده

Let k[G] be the group algebra, where G is a finite abelian p-group and k is a field of characteristic p. A complete classification of finitely generated k[G]-modules is available only when G is cyclic, Cpn , or C2 × C2. Tackling the first interesting case, namely modules over k[C2 × C4], some structure theorems revealing the differences between elementary and non-elementary abelian group cases are obtained. The shifted cyclic subgroups of k[C2 × C4] are characterized. Using the direct sum decompositions of the restrictions of a k[C2 × C2]-module M to shifted cyclic subgroups we define the set of multiplicities of M . It is an invariant richer than the rank variety. Certain types of k[C2 × C4]-modules having the same rank variety as k[C2 × C2]modules can be detected by the set of multiplicities, where C2 × C2 is the unique maximal elementary abelian subgroup of C2 × C4.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algorithms for Computing Topological Invariants in 2D and 3D Digital Spaces

Based on previous results of digital topology, this paper focuses on algorithms of topological invariants of objects in 2D and 3D Digital Spaces. We specifically interest in solving hole counting of 2D objects and genus of closed surface in 3D. We first prove a new formula for hole counting in 2D. The number of of holes is h = 1+(|C4|− |C2|)/4 where C4 and C2 are sets of inward and outward corn...

متن کامل

DASTWAR: a tool for completeness estimation in magnitude-size plane

Today, great observatories around the world, devote a substantial amount of observing time to sky surveys. The resulted images are inputs of source finder modules. These modules search for the target objects and provide us with source catalogues. We sought to quantify the ability of detection tools in recovering faint galaxies regularly encountered in deep surveys. Our approach was based on com...

متن کامل

C-edited H NMR Spectroscopy with Selective Resonance Suppression Using Asymmetric Adiabatic RF Pulses

Introduction The detection of C label incorporation in conjunction with C label administration is a powerful tool to explore cerebral metabolism. In contrast to direct detection by C NMR, indirect detection can offer higher sensitivity albeit at lower spectral resolution. For instance, the observation of C label incorporation into the C6 of NAA at 2.01ppm is easily obscured by the intensive lab...

متن کامل

Real - Time Simulation for Intruder Detection System Analysis

This paper describes a distributed simulation system developed for evaluation of physical security systems. The work extends previous work by extracting several system components that were previously integrated into the simulation model and creating distributed modules that interact directly with the system database. This allows the modules to incorporate arbitrarily complex logic and to be dev...

متن کامل

Real-time damage detection of bridges using adaptive time-frequency analysis and ANN

Although traditional signal-based structural health monitoring algorithms have been successfully employed for small structures, their application for large and complex bridges has been challenging due to non-stationary signal characteristics with a high level of noise. In this paper, a promising damage detection algorithm is proposed by incorporation of adaptive signal processing and Artificial...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009