您现在的位置: 首页> 研究主题> proof

proof

proof的相关文献在1983年到2022年内共计68篇,主要集中在数学、信息与知识传播、常用外国语 等领域,其中期刊论文68篇、相关期刊49种,包括九江学院学报(哲学社会科学版)、韩山师范学院学报、中学教研:数学版等; proof的相关文献由97位作者贡献,包括Silviu Guiasu、A.Rivera、Azza A. El-Halwagy等。

proof—发文量

期刊论文>

论文:68 占比:100.00%

总计:68篇

proof—发文趋势图

proof

-研究学者

  • Silviu Guiasu
  • A.Rivera
  • Azza A. El-Halwagy
  • Bilin SHAO
  • CAI MaoLin
  • CHEN Xiao
  • Chen Shizhou(Department of Mathematics)
  • Chen Xi LI~* Ru Yu CHEN Institute of Elemento-organic Chemistry Nankai University Tianjin 300071
  • Christian Wiesendanger
  • Chunming Tang
  • 期刊论文

搜索

排序:

年份

期刊

关键词

    • 摘要: This document provides some guidelines to authors for submission in order to work towards a seamless submission process.While complete adherence to the following guidelines is not enforced,authors should note that following through with the guidelines will be helpful in expediting the copyediting and proofreading processes,and allow for improved readability during the review process.
    • 摘要: Corrigendum:M1-type microglia can induce astrocytes to deposit chondroitin sulfate proteoglycan after spinal cord injury https://doi.org/10.4103/1673-5374.330626 In the article titled“M1-type microglia can induce astrocytes to deposit chondroitin sulfate proteoglycan after spinal cord injury”published on pages 1072-1079,Issue 5,Volume 17 of Neural Regeneration Research(Yu et al.,2022),the authors would like to correct the following errors because of mistake in description and also oversight during final proof checking.
    • Pascal Stiefenhofer
    • 摘要: This paper introduces a conceptual framework for developing pedagogical games of mathematical proof (PGMP) designed to help non-STEM students learn mathematical reasoning in a playful manner and without “fear”. Within the constructivist learning paradigm it develops an in-class learning activity where social science students learn the concept of mathematical deduction playfully using toys to construct tables from which formal proofs of propositions are derived without calculations. A PGMP pedagogy quality assurance evaluation method based on fuzzy evaluation mappings capturing learning effectiveness, learning efficiency, and learning satisfaction is introduced. Our results from an in-class experiment show that pedagogical games of mathematical proof help non-STEM students to effectively engage with mathematical reasoning playfully. The results are consistent according to a quality assurance consistency index.
    • Gilles PISIER
    • 摘要: In two instances,the author unfortunately confused the weak^(*) separability and the separability of the predual for a von Neumann algebra.Therefore the Remark 1.3 and the proof of Proposition 7.1 must be replaced by what follows.
    • Jianzhong Zhao
    • 摘要: Cryptography is crucial to communication security. In 1984, a well-known QKD (quantum key distribution) protocol, BB84, was published by Bennett and Brassard. The BB84 Protocol was followed by the QKD protocols published by Ekert (1991) (E91) and Bennett (1992) (B92). Some authors proved security of the theoretical QKD protocols in different theoretical frameworks by defining security of QKD protocols differently. My argument is that the previous proofs of security are neither unique nor exhaustive for each theoretical QKD protocol, which means that proof of security of the theoretical QKD protocols has not been completed or achieved. The non-uniqueness and the non-exhaustiveness of the proofs will lead to more proofs. However, a coming “proof” of security of the theoretical QKD protocols is possible to be a disproof. The research by quantum mechanics in this paper disproves security of the theoretical QKD protocols, by establishing the theoretical framework of quantum mechanical proof, defining security of QKD protocols, establishing the quantum state of the final key of the theoretical protocols from their information leakages, and applying Grover’s fast quantum mechanical algorithm for database search to the quantum state of the final key to result in the Insecurity Theorem. This result is opposite to those of the previous proofs where the theoretical QKD protocols were secure. It is impossible for Alice and Bob to protect their communications from information leakage by stopping or canceling the protocols. The theoretical QKD keys are conventional and basically insecure. Disproof of security of the theoretical QKD protocols is logical.
    • 摘要: IN a world fraught with uncertainties,common challenges,resurging unilateralism,and smallclique politics,the freshly concluded 22nd meeting of the Council of Heads of State of the Shanghai Cooperation Organization(SCO)promised unity,development,and cooperation.The summit released a slew of statements and documents on safeguarding global food and energy security,addressing climate change,and maintaining a secure,stable,and diversified supply chain.The very fact that the SCO membership keeps on expanding in addition to engaging new dialogue partners is proof of the international organization’s growing popularity and inclusiveness.
    • LIN Xi
    • 摘要: This is a lesson integrated with multiple approaches in geometry classroom to deepen middle school students’understanding of geometry and spatial sense in the topic of sums of interior angles in polygons.In three activities,teachers lead students to explore the pattern of interior angles throughout folding paper Origami,constructing animated polygons in Geometer’s Sketchpad,and establishing proof with Parallel Line Theorem.The lesson plan is developed with detailed procedures and prompting questions.The goal of the lesson is to identify the pattern of interior angles in polygons and to analyze the relationship among polygons in the setting of 25 to 30 middle school students.
    • Zhao Xinhua
    • 摘要: In January 2021,a fire broke out in the apartment where Russian rhythmic gymnast and Olympic champion Daria Valeryevna Shkurikhina lived.But surprisingly,Daria's Beijing 2008 Olympic Games gold medal,down to its ribbons,was left almost intact in the fire.The medal ribbon of Beijing 2008 Olympic Games is through high-tech nano treatment,not only waterproof,mothproof,antifouling,fire,and never fade.
    • 摘要: This document provides some guidelines to authors for submission in order to work towards a seamless submission process.While complete adherence to the following guidelines is not enforced,authors should note that following through with the guidelines will be helpful in expediting the copyediting and proofreading processes,and allow for improved readability during the review process.
    • 摘要: This document provides some guidelines to authors for submission in order to work towards a seamless submission process.While complete adherence to the following guidelines is not enforced,authors should note that following through with the guidelines will be helpful in expediting the copyediting and proofreading processes,and allow for improved readability during the review process.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号