SlideShare a Scribd company logo
1 of 3
Download to read offline
The International Journal Of Engineering And Science (IJES)
|| Volume || 5 || Issue || 8 || Pages || PP -18-20 || 2016 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 18
On essential pseudo principally-injective modules
R.S. Wadbudhe
Mahatma Fule Arts, Commerce and Sitaramji Chaudhari Science Mahavidyalaya, Warud. Amravati, SGB Uni.
Amravati, 444906 [M.S.] INDIA
--------------------------------------------------------ABSTRACT-----------------------------------------------------------
Pseudo-injectivity is a generalization of quasi- injectivity. An essential Pseudo-injective module wasintroduced
by R. Jaiswal, P.C. Bharadwaj and S. Wongwai [7]. This paper is generalization of above notion with new
properties.
Keywords: Pseudo-injective module, essential pseudo-injective module, essential –Principally submodule and
essential pseudo-Principally-injective module. .
--------------------------------------------------------------------------------------------------------------------------
Date of Submission: 17 May 2016 Date of Accepted: 22 August 2016
----------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Through this paper, by a ring R we always mean as associative with identity and every R-module is unitary. The
notion principally injective module was introduced by Camollo [9]. R.Jaiswal and P.C. Bharadwaj studied the
structure of essentially pseudo principally injective modules. A submodule K of M is called essential submodule
if 0LK  for every nonzero submodule L of M. In other words K  N = 0  K = 0 (briefly; K ≤e
M). In
this case M is called essential extension of K. A monomorphism MK:f  is said to be essential if
Mimf e
 . ( (M)EndRS Denotes endomorphism ring of M). An R-module M is said to be principally
injective if for each R-homomorphism MaR:α  such that a R, extends to R. An R-module M is said to
be pseudo injective if for every R-monomorphism MA:β  and MA:  , there exists End(M)γ
such that γ.αβ  An R-module M is said to be pseudo M- injective if for every submodule A of M, any
monomorphism MA:α  can be extends to a homomorphism N)Hom(M,β .An R-module M is said to
be essential pseudo injective if for every sub module A, any essential monomorphism MA:α  and
monomorphism MA:β  there exists End(M)h such that h.βα  .An R-module N is said to be
pseudo M-P-injective if for any sS = End(M) and every monomorphism from s(M) to N, can be extended to a
homomorphism from M to N. An R-module N is said to be essential pseudo M-P-injective if for any principally
essential submodule s(M) of M, any monomorphism Ns(M):f  can be extended to some
N)Hom(M,g
II. MAIN RESULTS
Proposition.2.1. Let N be a module. Then following statements are equivalent:
1. If N is essential pseudo injective.
2. For every essential monomorphism Ms(M):β  and Ns(M):  , where N embeds in M, there
exists M)(N,Homγ R such that γ.αβ  .
3. For every essential monomorphism Ms(M):β  and Ns(M):  , where N is a submodule of M,
there exists M)(N,Homγ R such that γ.αβ  .
4. Every essential monomorphism MN:  where N is a submodule of M, can be extended to End(M).
Proof. (1)  (2) Let Ms(M):  and Ns(M):  , are essential monomorphisms. There exists
MN:γ1  . It is easy to check that Ms(M):.αγ1  is monic. Then there exists End(M)γ2  Such that
β.αγγ 12  , Since M is essential pseudo injective. Let MN:γγγ 12  .Then γ.αβ  .
(2)(3)(4) clearly.
On essential pseudo principally-injective modules
www.theijes.com The IJES Page 19
(4)(1) Let Ms(M):  and Ns(M):  , be essential monomorphisms. Then
)Im(s(M):   is an isomorphism, so there exists s(M))αIm(:α 1

such that -1
. = 1s(M).Then
.-1
: Im()M is monic. Therefore there exists  EndR(M) such that Im = .-1
, for every as(M), .(a) =
.-1
.(a) = (a), i.e. . = .
Proposition.2.2. Let MR be an essential pseudo injective module. Then
1) Every essential monomorphism   EndR(M) splits.
2) For every essential monomorphism  : s(M)  M and  : s(M)  s(M), There exists
  HomR(s(M), M) such that  = ..
3) Every essential monomorphism   HomR(M,N), where N embeds in M splits.
Proof.
1) Obvious
2) Let  : s(M)  M and  : s(M)  s(M) be monomorphisms. Then s(M) embeds in M.
So there exists   HomR(s(M), M) such that  = .. by (1.1).
3) Let   HomR(M,N) be an essential monomorphism. Then for  : M  N and 1M : M M, There exists  
HomR(N,M) such that 1M = . by (1.1).
Proposition.2.3.Let (Ua)aI be an indexed set of right R-modules. If IUa essential pseudo injective, then the
every essential monomorphism  : s(M)  Ua and : s(M)  Ub where a, b  I, there exists   HomR( Ua,
Ub) such that  = ..
Proof. Let (Ua)aI be an indexed set of right R-modules. Let  : s(M)  Ua and : s(M)  Ub be essential
monomorphisms . For ia : s(M)  IUa and : s(M)  Ub , where ia is essential monomorphism from Ua to
IUa and the images ias(M) are in IUa , there exists   HomR(Ub, IUa) such that ia =. by (1.1). Let  =
a. : Ua  Ua . then . =a. = a. ia = .
Corollary.2.1. Every direct summand of essential pseudo module is also essential pseudo injective module.
III. ESSENTIAL PRINCIPALLY PSEUDO-INJECTIVE MODULE
(EPP-injective module)
An R-module M is called essential principally pseudo- injective if each essential monomorphism from an
essential principal submodule of M to M can be extended to an endomorphism of M to M.
Let M be an R-module. We Write R}r0,mr:M{m(m)M l and
M}m0,mr:R{r(m)M r for each X  M , the fined by right (left) annihilator of x in R is defined
by X}x0,xr:R{r(X)R r
X}x0,xr:R{r(X)R l
Am = {nM : rR(n) = rR(m),  mM},
S(,m) = {S : ker  mR = ker  mR,  mM}
Bm = {S : ker  mR = 0,  mM}.
Proposition3.1. For a given module M with
S = EndR(M), the following conditions are equivalent for an element m M:
1. M is EPP-injective module.
2. Am = Bmm
3. If Am = An, then Bm m = Bnn.
4. For every essential monomorphism: mR  M and : mR  M, there exists
 EndR(M) such that  = ..
Proof. (1)  (2) let M be EPP-injective module. If n is an element, then Am = An..Consider the mapping : mR
 M defined by (mr) = nr. Let mr1 =mr2 for all r1, r2R, so mr1 - mr2 = 0
(m(r1 - r2 )) = 0  n(r1 - r2 ) = 0  nr1 = n r2 . Since M is EPP-injective, so  is monomorphism, can be
extended M to M. Then s(m) = (m) = n = sm, where s  Bm. Conversely; If sm  Bmm, then s  Bm i.e.
{kers mR} = 0. It is clear that rR(sm)  rR(m). If r  rR(sm), then smr = 0, so mr  kers mR = 0, and
r  rR(m)  mr = 0. Therefore rR(sm) = rR(m). Then sm  Am.
(2)  (3) Let Am = An. Then Am = Bmm and An = Bnn. So Bmm = Bnn.
On essential pseudo principally-injective modules
www.theijes.com The IJES Page 20
(3)  (4) Let : mR  M and : mR  M be essential monomorphisms. Then rR(m) = rR(m). So Am =
Am, and Bm m= Bmm by (3). Because {kers1M  mR} = 0 1M Bm. Then m Bmm. There exists 
 Bm such that  = ..
(4)  (1) Put  = imR in (4).
Proposition.3.2. Let M be EPP-injective module
with S = EndR(M). Then S(,m) = Bm  + lS(M).
Proof. If  S(,m) , then ker  mR = ker 
mR, for all mM, Since rR(m) = rR(m).
If (m)r = 0
 mr  ker  mR, = ker  mR, so (m)r = 0. If (m)r1 = 0  mr1  ker  mR = ker  mR, so (m)r1 =
0. Thus m  Bm m by 2.1. This shows m = bm for all b  Bm. this means -b  lS(m).    b +
lS(m) . Conversely; Let b +s  Bm  + lS(m), with b  Bm , s  lS(m). If mr  ker(b +s)  mR ( b
+s)(mr) = bmr + smr =bbmr = 0  mr  kerb  mR = 0. So mr ker  mR. If mr1 ker  mR 
mr1 = 0 ( b +s)mr1 = bmr1 + smr1 =bbmr1 = 0  mr  kerb  mR = 0. So b +s  S(,m) . Hence
S(,m) = Bm  + lS(M)
ACKNOWLEDGEMENT
Author is grateful for the motivation, useful suggestion and helps by the Prof. and head, Dr. R. S. Singh, Dr. H.
S. Gour Central University, Sagar,[M.P.] INDIA.
REFERENCES
[1]. A.K. Chaturvedi, B.M. Pandeya, A.J. Gupta, Quasi pseudo principally injective modules, Algebra Colloq. 16(3) (2009) 397-402.
[2]. A.K. Chaturvedi, B.M. Pandeya, A.J. Gupta, Modules whose M-cyclics are summand,
[3]. Int. J. Algebra 3921) (2010) 1045-1049.
[4]. A.K. Chaturvedi, QP-injective and QPP-injective Modules, Southeast Asian Bull Math. 38 (2014) 191-104.
[5]. C.C Yucel, A note on ECS-modules, Palestine J. Math. 3(1) (2014) 383-387.
[6]. F. W. Anderson, K. R. Fuller, Rings and Categories of Modules, Springer-Verlag, New-York, 1992.
[7]. H. Kalita, H.K. Sakiya, Pseudo p- injective modules and k-non singularity, Int. J. Math. Archiv 4(9) (2013) 233-236.
[8]. S.Wongwai, Small PQ-Principally injective modules, Int. J. Math. Archive -3(3). 2012 962-967.
[9]. S. Baupradist, H.D. Hai, N.V. Sanh, on pseudo p-injectivity, Southeast Asian Bull Math. 35 (2011) (1) 21-27.
[10]. V. Camillo, Commutative rings whose principal ideals are annihilators, Portugal Math. 46. (1989) 33 -37.
[11]. W.K. Nicholson, J.K. Park, M.F. Yousif, Principally quasi injective modules, Comm. Algebra 27(4) (1999)1683-1693.
[12]. Z. Zhu, Pseudo QP-injective modules and generalized pseudo QP-injective module, Int. Electron. J. Algebra 14(2013) 32-43.

More Related Content

Viewers also liked

The Ideal, The Mission, The Vision, The Goals and The Competences
The Ideal, The Mission, The Vision, The Goals and The CompetencesThe Ideal, The Mission, The Vision, The Goals and The Competences
The Ideal, The Mission, The Vision, The Goals and The Competencestheijes
 
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...theijes
 
Application of Central Limit Theorem to Study the Student Skills in Verbal, A...
Application of Central Limit Theorem to Study the Student Skills in Verbal, A...Application of Central Limit Theorem to Study the Student Skills in Verbal, A...
Application of Central Limit Theorem to Study the Student Skills in Verbal, A...theijes
 
Strength Improvement of Mud Houses Through Stabilization of the Lateritic Mat...
Strength Improvement of Mud Houses Through Stabilization of the Lateritic Mat...Strength Improvement of Mud Houses Through Stabilization of the Lateritic Mat...
Strength Improvement of Mud Houses Through Stabilization of the Lateritic Mat...theijes
 
The role of technology transfer & cooperation for the development of wind pow...
The role of technology transfer & cooperation for the development of wind pow...The role of technology transfer & cooperation for the development of wind pow...
The role of technology transfer & cooperation for the development of wind pow...theijes
 
Optimum Conditions for the Removal of Cadmium from Aqueous Solution with Bamb...
Optimum Conditions for the Removal of Cadmium from Aqueous Solution with Bamb...Optimum Conditions for the Removal of Cadmium from Aqueous Solution with Bamb...
Optimum Conditions for the Removal of Cadmium from Aqueous Solution with Bamb...theijes
 
MRI rat organ Assessment under recurrent Interferon administration
MRI rat organ Assessment under recurrent Interferon administrationMRI rat organ Assessment under recurrent Interferon administration
MRI rat organ Assessment under recurrent Interferon administrationtheijes
 
Selection Sort with Improved Asymptotic Time Bounds
Selection Sort with Improved Asymptotic Time BoundsSelection Sort with Improved Asymptotic Time Bounds
Selection Sort with Improved Asymptotic Time Boundstheijes
 
Investigate the Use of Shear Walls in Concrete Structures, Considering the Ex...
Investigate the Use of Shear Walls in Concrete Structures, Considering the Ex...Investigate the Use of Shear Walls in Concrete Structures, Considering the Ex...
Investigate the Use of Shear Walls in Concrete Structures, Considering the Ex...theijes
 
Experimental Study on Durability Characteristics of High Performance Concrete...
Experimental Study on Durability Characteristics of High Performance Concrete...Experimental Study on Durability Characteristics of High Performance Concrete...
Experimental Study on Durability Characteristics of High Performance Concrete...theijes
 
Sediment Source and Transport in River Channels: Implications for River Struc...
Sediment Source and Transport in River Channels: Implications for River Struc...Sediment Source and Transport in River Channels: Implications for River Struc...
Sediment Source and Transport in River Channels: Implications for River Struc...theijes
 
Comparative Analysis of Different Denial of Service Attacks
Comparative Analysis of Different Denial of Service AttacksComparative Analysis of Different Denial of Service Attacks
Comparative Analysis of Different Denial of Service Attackstheijes
 
Mediating Role of Gratitude In Effect of Bonds on Customer Loyalty
Mediating Role of Gratitude In Effect of Bonds on Customer LoyaltyMediating Role of Gratitude In Effect of Bonds on Customer Loyalty
Mediating Role of Gratitude In Effect of Bonds on Customer Loyaltytheijes
 
H.D.L Design for Ultra High Multi Frequency Rate P.R.B.S Generator for Identi...
H.D.L Design for Ultra High Multi Frequency Rate P.R.B.S Generator for Identi...H.D.L Design for Ultra High Multi Frequency Rate P.R.B.S Generator for Identi...
H.D.L Design for Ultra High Multi Frequency Rate P.R.B.S Generator for Identi...theijes
 

Viewers also liked (14)

The Ideal, The Mission, The Vision, The Goals and The Competences
The Ideal, The Mission, The Vision, The Goals and The CompetencesThe Ideal, The Mission, The Vision, The Goals and The Competences
The Ideal, The Mission, The Vision, The Goals and The Competences
 
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
 
Application of Central Limit Theorem to Study the Student Skills in Verbal, A...
Application of Central Limit Theorem to Study the Student Skills in Verbal, A...Application of Central Limit Theorem to Study the Student Skills in Verbal, A...
Application of Central Limit Theorem to Study the Student Skills in Verbal, A...
 
Strength Improvement of Mud Houses Through Stabilization of the Lateritic Mat...
Strength Improvement of Mud Houses Through Stabilization of the Lateritic Mat...Strength Improvement of Mud Houses Through Stabilization of the Lateritic Mat...
Strength Improvement of Mud Houses Through Stabilization of the Lateritic Mat...
 
The role of technology transfer & cooperation for the development of wind pow...
The role of technology transfer & cooperation for the development of wind pow...The role of technology transfer & cooperation for the development of wind pow...
The role of technology transfer & cooperation for the development of wind pow...
 
Optimum Conditions for the Removal of Cadmium from Aqueous Solution with Bamb...
Optimum Conditions for the Removal of Cadmium from Aqueous Solution with Bamb...Optimum Conditions for the Removal of Cadmium from Aqueous Solution with Bamb...
Optimum Conditions for the Removal of Cadmium from Aqueous Solution with Bamb...
 
MRI rat organ Assessment under recurrent Interferon administration
MRI rat organ Assessment under recurrent Interferon administrationMRI rat organ Assessment under recurrent Interferon administration
MRI rat organ Assessment under recurrent Interferon administration
 
Selection Sort with Improved Asymptotic Time Bounds
Selection Sort with Improved Asymptotic Time BoundsSelection Sort with Improved Asymptotic Time Bounds
Selection Sort with Improved Asymptotic Time Bounds
 
Investigate the Use of Shear Walls in Concrete Structures, Considering the Ex...
Investigate the Use of Shear Walls in Concrete Structures, Considering the Ex...Investigate the Use of Shear Walls in Concrete Structures, Considering the Ex...
Investigate the Use of Shear Walls in Concrete Structures, Considering the Ex...
 
Experimental Study on Durability Characteristics of High Performance Concrete...
Experimental Study on Durability Characteristics of High Performance Concrete...Experimental Study on Durability Characteristics of High Performance Concrete...
Experimental Study on Durability Characteristics of High Performance Concrete...
 
Sediment Source and Transport in River Channels: Implications for River Struc...
Sediment Source and Transport in River Channels: Implications for River Struc...Sediment Source and Transport in River Channels: Implications for River Struc...
Sediment Source and Transport in River Channels: Implications for River Struc...
 
Comparative Analysis of Different Denial of Service Attacks
Comparative Analysis of Different Denial of Service AttacksComparative Analysis of Different Denial of Service Attacks
Comparative Analysis of Different Denial of Service Attacks
 
Mediating Role of Gratitude In Effect of Bonds on Customer Loyalty
Mediating Role of Gratitude In Effect of Bonds on Customer LoyaltyMediating Role of Gratitude In Effect of Bonds on Customer Loyalty
Mediating Role of Gratitude In Effect of Bonds on Customer Loyalty
 
H.D.L Design for Ultra High Multi Frequency Rate P.R.B.S Generator for Identi...
H.D.L Design for Ultra High Multi Frequency Rate P.R.B.S Generator for Identi...H.D.L Design for Ultra High Multi Frequency Rate P.R.B.S Generator for Identi...
H.D.L Design for Ultra High Multi Frequency Rate P.R.B.S Generator for Identi...
 

Similar to On essential pseudo principally-injective modules

Generalization of p injective rings and projective modules
Generalization of p injective rings and projective modulesGeneralization of p injective rings and projective modules
Generalization of p injective rings and projective modulesAlexander Decker
 
Postgraduate module theory 2013- lectures
Postgraduate  module theory 2013- lecturesPostgraduate  module theory 2013- lectures
Postgraduate module theory 2013- lectureskhudair al fauudi
 
Studying Some Results about Completely Coretractable Ring (CC-ring)
Studying Some Results about Completely Coretractable Ring (CC-ring)Studying Some Results about Completely Coretractable Ring (CC-ring)
Studying Some Results about Completely Coretractable Ring (CC-ring)Shukur Neamal Al-aeashi
 
Some Categories and Their Properties
Some Categories and Their PropertiesSome Categories and Their Properties
Some Categories and Their Propertiespaperpublications3
 
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesSome Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesIJERA Editor
 
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesSome Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesIJERA Editor
 
Some results about coretractable modules
Some results about coretractable modulesSome results about coretractable modules
Some results about coretractable modulesShukur Neamal Al-aeashi
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
ON ANNIHILATOR OF INTUITIONISTIC FUZZY SUBSETS OF MODULES
ON ANNIHILATOR OF INTUITIONISTIC FUZZY SUBSETS OF MODULESON ANNIHILATOR OF INTUITIONISTIC FUZZY SUBSETS OF MODULES
ON ANNIHILATOR OF INTUITIONISTIC FUZZY SUBSETS OF MODULEScsandit
 
On recurrent Light like Hypersurfaces of Indefinite Sasakian Manifold
On recurrent Light like Hypersurfaces of Indefinite Sasakian ManifoldOn recurrent Light like Hypersurfaces of Indefinite Sasakian Manifold
On recurrent Light like Hypersurfaces of Indefinite Sasakian ManifoldAI Publications
 
On Normal and Unitary Polynomial Matrices
On Normal and Unitary Polynomial MatricesOn Normal and Unitary Polynomial Matrices
On Normal and Unitary Polynomial MatricesIJMER
 
G0502 01 3236
G0502 01 3236G0502 01 3236
G0502 01 3236IJMER
 
Interpolating rational bézier spline curves with local shape control
Interpolating rational bézier spline curves with local shape controlInterpolating rational bézier spline curves with local shape control
Interpolating rational bézier spline curves with local shape controlijcga
 
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...IJERA Editor
 

Similar to On essential pseudo principally-injective modules (16)

Generalization of p injective rings and projective modules
Generalization of p injective rings and projective modulesGeneralization of p injective rings and projective modules
Generalization of p injective rings and projective modules
 
Postgraduate module theory 2013- lectures
Postgraduate  module theory 2013- lecturesPostgraduate  module theory 2013- lectures
Postgraduate module theory 2013- lectures
 
Studying Some Results about Completely Coretractable Ring (CC-ring)
Studying Some Results about Completely Coretractable Ring (CC-ring)Studying Some Results about Completely Coretractable Ring (CC-ring)
Studying Some Results about Completely Coretractable Ring (CC-ring)
 
Some Categories and Their Properties
Some Categories and Their PropertiesSome Categories and Their Properties
Some Categories and Their Properties
 
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesSome Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
 
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication ModulesSome Remarks on Prime Submodules in Weak Co-Multiplication Modules
Some Remarks on Prime Submodules in Weak Co-Multiplication Modules
 
Some results about coretractable modules
Some results about coretractable modulesSome results about coretractable modules
Some results about coretractable modules
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
ON ANNIHILATOR OF INTUITIONISTIC FUZZY SUBSETS OF MODULES
ON ANNIHILATOR OF INTUITIONISTIC FUZZY SUBSETS OF MODULESON ANNIHILATOR OF INTUITIONISTIC FUZZY SUBSETS OF MODULES
ON ANNIHILATOR OF INTUITIONISTIC FUZZY SUBSETS OF MODULES
 
On recurrent Light like Hypersurfaces of Indefinite Sasakian Manifold
On recurrent Light like Hypersurfaces of Indefinite Sasakian ManifoldOn recurrent Light like Hypersurfaces of Indefinite Sasakian Manifold
On recurrent Light like Hypersurfaces of Indefinite Sasakian Manifold
 
On Normal and Unitary Polynomial Matrices
On Normal and Unitary Polynomial MatricesOn Normal and Unitary Polynomial Matrices
On Normal and Unitary Polynomial Matrices
 
G0502 01 3236
G0502 01 3236G0502 01 3236
G0502 01 3236
 
F04924352
F04924352F04924352
F04924352
 
Interpolating rational bézier spline curves with local shape control
Interpolating rational bézier spline curves with local shape controlInterpolating rational bézier spline curves with local shape control
Interpolating rational bézier spline curves with local shape control
 
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
Performance Analysis of Adaptive DOA Estimation Algorithms For Mobile Applica...
 
farrell1966.pdf
farrell1966.pdffarrell1966.pdf
farrell1966.pdf
 

Recently uploaded

Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 

Recently uploaded (20)

Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 

On essential pseudo principally-injective modules

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 5 || Issue || 8 || Pages || PP -18-20 || 2016 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 18 On essential pseudo principally-injective modules R.S. Wadbudhe Mahatma Fule Arts, Commerce and Sitaramji Chaudhari Science Mahavidyalaya, Warud. Amravati, SGB Uni. Amravati, 444906 [M.S.] INDIA --------------------------------------------------------ABSTRACT----------------------------------------------------------- Pseudo-injectivity is a generalization of quasi- injectivity. An essential Pseudo-injective module wasintroduced by R. Jaiswal, P.C. Bharadwaj and S. Wongwai [7]. This paper is generalization of above notion with new properties. Keywords: Pseudo-injective module, essential pseudo-injective module, essential –Principally submodule and essential pseudo-Principally-injective module. . -------------------------------------------------------------------------------------------------------------------------- Date of Submission: 17 May 2016 Date of Accepted: 22 August 2016 ---------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Through this paper, by a ring R we always mean as associative with identity and every R-module is unitary. The notion principally injective module was introduced by Camollo [9]. R.Jaiswal and P.C. Bharadwaj studied the structure of essentially pseudo principally injective modules. A submodule K of M is called essential submodule if 0LK  for every nonzero submodule L of M. In other words K  N = 0  K = 0 (briefly; K ≤e M). In this case M is called essential extension of K. A monomorphism MK:f  is said to be essential if Mimf e  . ( (M)EndRS Denotes endomorphism ring of M). An R-module M is said to be principally injective if for each R-homomorphism MaR:α  such that a R, extends to R. An R-module M is said to be pseudo injective if for every R-monomorphism MA:β  and MA:  , there exists End(M)γ such that γ.αβ  An R-module M is said to be pseudo M- injective if for every submodule A of M, any monomorphism MA:α  can be extends to a homomorphism N)Hom(M,β .An R-module M is said to be essential pseudo injective if for every sub module A, any essential monomorphism MA:α  and monomorphism MA:β  there exists End(M)h such that h.βα  .An R-module N is said to be pseudo M-P-injective if for any sS = End(M) and every monomorphism from s(M) to N, can be extended to a homomorphism from M to N. An R-module N is said to be essential pseudo M-P-injective if for any principally essential submodule s(M) of M, any monomorphism Ns(M):f  can be extended to some N)Hom(M,g II. MAIN RESULTS Proposition.2.1. Let N be a module. Then following statements are equivalent: 1. If N is essential pseudo injective. 2. For every essential monomorphism Ms(M):β  and Ns(M):  , where N embeds in M, there exists M)(N,Homγ R such that γ.αβ  . 3. For every essential monomorphism Ms(M):β  and Ns(M):  , where N is a submodule of M, there exists M)(N,Homγ R such that γ.αβ  . 4. Every essential monomorphism MN:  where N is a submodule of M, can be extended to End(M). Proof. (1)  (2) Let Ms(M):  and Ns(M):  , are essential monomorphisms. There exists MN:γ1  . It is easy to check that Ms(M):.αγ1  is monic. Then there exists End(M)γ2  Such that β.αγγ 12  , Since M is essential pseudo injective. Let MN:γγγ 12  .Then γ.αβ  . (2)(3)(4) clearly.
  • 2. On essential pseudo principally-injective modules www.theijes.com The IJES Page 19 (4)(1) Let Ms(M):  and Ns(M):  , be essential monomorphisms. Then )Im(s(M):   is an isomorphism, so there exists s(M))αIm(:α 1  such that -1 . = 1s(M).Then .-1 : Im()M is monic. Therefore there exists  EndR(M) such that Im = .-1 , for every as(M), .(a) = .-1 .(a) = (a), i.e. . = . Proposition.2.2. Let MR be an essential pseudo injective module. Then 1) Every essential monomorphism   EndR(M) splits. 2) For every essential monomorphism  : s(M)  M and  : s(M)  s(M), There exists   HomR(s(M), M) such that  = .. 3) Every essential monomorphism   HomR(M,N), where N embeds in M splits. Proof. 1) Obvious 2) Let  : s(M)  M and  : s(M)  s(M) be monomorphisms. Then s(M) embeds in M. So there exists   HomR(s(M), M) such that  = .. by (1.1). 3) Let   HomR(M,N) be an essential monomorphism. Then for  : M  N and 1M : M M, There exists   HomR(N,M) such that 1M = . by (1.1). Proposition.2.3.Let (Ua)aI be an indexed set of right R-modules. If IUa essential pseudo injective, then the every essential monomorphism  : s(M)  Ua and : s(M)  Ub where a, b  I, there exists   HomR( Ua, Ub) such that  = .. Proof. Let (Ua)aI be an indexed set of right R-modules. Let  : s(M)  Ua and : s(M)  Ub be essential monomorphisms . For ia : s(M)  IUa and : s(M)  Ub , where ia is essential monomorphism from Ua to IUa and the images ias(M) are in IUa , there exists   HomR(Ub, IUa) such that ia =. by (1.1). Let  = a. : Ua  Ua . then . =a. = a. ia = . Corollary.2.1. Every direct summand of essential pseudo module is also essential pseudo injective module. III. ESSENTIAL PRINCIPALLY PSEUDO-INJECTIVE MODULE (EPP-injective module) An R-module M is called essential principally pseudo- injective if each essential monomorphism from an essential principal submodule of M to M can be extended to an endomorphism of M to M. Let M be an R-module. We Write R}r0,mr:M{m(m)M l and M}m0,mr:R{r(m)M r for each X  M , the fined by right (left) annihilator of x in R is defined by X}x0,xr:R{r(X)R r X}x0,xr:R{r(X)R l Am = {nM : rR(n) = rR(m),  mM}, S(,m) = {S : ker  mR = ker  mR,  mM} Bm = {S : ker  mR = 0,  mM}. Proposition3.1. For a given module M with S = EndR(M), the following conditions are equivalent for an element m M: 1. M is EPP-injective module. 2. Am = Bmm 3. If Am = An, then Bm m = Bnn. 4. For every essential monomorphism: mR  M and : mR  M, there exists  EndR(M) such that  = .. Proof. (1)  (2) let M be EPP-injective module. If n is an element, then Am = An..Consider the mapping : mR  M defined by (mr) = nr. Let mr1 =mr2 for all r1, r2R, so mr1 - mr2 = 0 (m(r1 - r2 )) = 0  n(r1 - r2 ) = 0  nr1 = n r2 . Since M is EPP-injective, so  is monomorphism, can be extended M to M. Then s(m) = (m) = n = sm, where s  Bm. Conversely; If sm  Bmm, then s  Bm i.e. {kers mR} = 0. It is clear that rR(sm)  rR(m). If r  rR(sm), then smr = 0, so mr  kers mR = 0, and r  rR(m)  mr = 0. Therefore rR(sm) = rR(m). Then sm  Am. (2)  (3) Let Am = An. Then Am = Bmm and An = Bnn. So Bmm = Bnn.
  • 3. On essential pseudo principally-injective modules www.theijes.com The IJES Page 20 (3)  (4) Let : mR  M and : mR  M be essential monomorphisms. Then rR(m) = rR(m). So Am = Am, and Bm m= Bmm by (3). Because {kers1M  mR} = 0 1M Bm. Then m Bmm. There exists   Bm such that  = .. (4)  (1) Put  = imR in (4). Proposition.3.2. Let M be EPP-injective module with S = EndR(M). Then S(,m) = Bm  + lS(M). Proof. If  S(,m) , then ker  mR = ker  mR, for all mM, Since rR(m) = rR(m). If (m)r = 0  mr  ker  mR, = ker  mR, so (m)r = 0. If (m)r1 = 0  mr1  ker  mR = ker  mR, so (m)r1 = 0. Thus m  Bm m by 2.1. This shows m = bm for all b  Bm. this means -b  lS(m).    b + lS(m) . Conversely; Let b +s  Bm  + lS(m), with b  Bm , s  lS(m). If mr  ker(b +s)  mR ( b +s)(mr) = bmr + smr =bbmr = 0  mr  kerb  mR = 0. So mr ker  mR. If mr1 ker  mR  mr1 = 0 ( b +s)mr1 = bmr1 + smr1 =bbmr1 = 0  mr  kerb  mR = 0. So b +s  S(,m) . Hence S(,m) = Bm  + lS(M) ACKNOWLEDGEMENT Author is grateful for the motivation, useful suggestion and helps by the Prof. and head, Dr. R. S. Singh, Dr. H. S. Gour Central University, Sagar,[M.P.] INDIA. REFERENCES [1]. A.K. Chaturvedi, B.M. Pandeya, A.J. Gupta, Quasi pseudo principally injective modules, Algebra Colloq. 16(3) (2009) 397-402. [2]. A.K. Chaturvedi, B.M. Pandeya, A.J. Gupta, Modules whose M-cyclics are summand, [3]. Int. J. Algebra 3921) (2010) 1045-1049. [4]. A.K. Chaturvedi, QP-injective and QPP-injective Modules, Southeast Asian Bull Math. 38 (2014) 191-104. [5]. C.C Yucel, A note on ECS-modules, Palestine J. Math. 3(1) (2014) 383-387. [6]. F. W. Anderson, K. R. Fuller, Rings and Categories of Modules, Springer-Verlag, New-York, 1992. [7]. H. Kalita, H.K. Sakiya, Pseudo p- injective modules and k-non singularity, Int. J. Math. Archiv 4(9) (2013) 233-236. [8]. S.Wongwai, Small PQ-Principally injective modules, Int. J. Math. Archive -3(3). 2012 962-967. [9]. S. Baupradist, H.D. Hai, N.V. Sanh, on pseudo p-injectivity, Southeast Asian Bull Math. 35 (2011) (1) 21-27. [10]. V. Camillo, Commutative rings whose principal ideals are annihilators, Portugal Math. 46. (1989) 33 -37. [11]. W.K. Nicholson, J.K. Park, M.F. Yousif, Principally quasi injective modules, Comm. Algebra 27(4) (1999)1683-1693. [12]. Z. Zhu, Pseudo QP-injective modules and generalized pseudo QP-injective module, Int. Electron. J. Algebra 14(2013) 32-43.