Search results for: proof of work
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13935

Search results for: proof of work

13935 Implementation of Proof of Work Using Ganache

Authors: Sakshi Singh, Shampa Chakraverty

Abstract:

One of the essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the Blockchain. Moreover, one of the essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks.

Keywords: proof of work, blockchain, ganache, smart contract

Procedia PDF Downloads 165
13934 A Discovery on the Symmetrical Pattern of Mirror Primes in P²: Applications in the Formal Proof of the Goldbach Conjecture

Authors: Yingxu Wang

Abstract:

The base 6 structure and properties of mirror primes are discovered in this work towards the proof of Goldbach Conjecture. This paper reveals a fundamental pattern on pairs of mirror primes adjacent to any even number nₑ > 2 with symmetrical distances on both sides determined by a methodology of Mirror Prime Decomposition (MPD). MPD leads to a formal proof of the Goldbach conjecture, which states that the conjecture holds because any pivot even number, nₑ > 2, is a sum of at least an adjacent pair of primes divided by 2. This work has not only revealed the analytic pattern of base 6 primes but also proven the infinitive validation of the Goldbach conjecture.

Keywords: number theory, primes, mirror primes, double recursive patterns, Goldbach conjecture, formal proof, mirror-prime decomposition, applications

Procedia PDF Downloads 50
13933 Utilize 5G Mobile Connection as a Node in the Proof of Authority Blockchain Used for Microtransaction

Authors: Frode van der Laak

Abstract:

The paper contributes to the feasibility of using a 5G mobile connection as a node for a Proof of Authority (PoA) blockchain, which is used for microtransactions at the same time. It uses the phone number identity of the users that are linked to the crypto wallet address. It also proposed a consensus protocol based on Proof-of-Authority (PoA) blockchain; PoA is a permission blockchain where consensus is achieved through a set of designated authority rather than through mining, as is the case with a Proof of Work (PoW) blockchain. This report will first explain the concept of a PoA blockchain and how it works. It will then discuss the potential benefits and challenges of using a 5G mobile connection as a node in such a blockchain, and finally, the main open problem statement and proposed solutions with the requirements.

Keywords: 5G, mobile, connection, node, PoA, blockchain, microtransaction

Procedia PDF Downloads 96
13932 A Discovery of the Dual Sequential Pattern of Prime Numbers in P x P: Applications in a Formal Proof of the Twin-Prime Conjecture

Authors: Yingxu Wang

Abstract:

This work presents basic research on the recursive structures and dual sequential patterns of primes for the formal proof of the Twin-Prime Conjecture (TPC). A rigorous methodology of Twin-Prime Decomposition (TPD) is developed in MATLAB to inductively verify potential twins in the dual sequences of primes. The key finding of this basic study confirms that the dual sequences of twin primes are not only symmetric but also infinitive in the unique base 6 cycle, except a limited subset of potential pairs is eliminated by the lack of dual primality. Both theory and experiments have formally proven that the infinity of twin primes stated in TPC holds in the P x P space.

Keywords: number theory, primes, twin-prime conjecture, dual primes (P x P), twin prime decomposition, formal proof, algorithm

Procedia PDF Downloads 64
13931 A Proof of the Fact that a Finite Morphism is Proper

Authors: Ying Yi Wu

Abstract:

In this paper, we present a proof of the fact that a finite morphism is proper. We show that a finite morphism is universally closed and of finite type, which are the conditions for properness. Our proof is based on the theory of schemes and involves the use of the projection formula and the base change theorem. We first show that a finite morphism is of finite type and then proceed to show that it is universally closed. We use the fact that a finite morphism is also an affine morphism, which allows us to use the theory of coherent sheaves and their modules. We then show that the map induced by a finite morphism is flat and that the module it induces is of finite type. We use these facts to show that a finite morphism is universally closed. Our proof is constructive, and we provide details for each step of the argument.

Keywords: finite, morphism, schemes, projection.

Procedia PDF Downloads 109
13930 Judicial Analysis of the Burden of Proof on the Perpetrator of Corruption Criminal Act

Authors: Rahmayanti, Theresia Simatupang, Ronald H. Sianturi

Abstract:

Corruption criminal act develops rapidly since in the transition era there is weakness in law. Consequently, there is an opportunity for a few people to do fraud and illegal acts and to misuse their positions and formal functions in order to make them rich, and the criminal acts are done systematically and sophisticatedly. Some people believe that legal provisions which specifically regulate the corruption criminal act; namely, Law No. 31/1999 in conjunction with Law No. 20/2001 on the Eradication of Corruption Criminal Act are not effective any more, especially in onus probandi (the burden of proof) on corruptors. The research was a descriptive analysis, a research method which is used to obtain description on a certain situation or condition by explaining the data, and the conclusion is drawn through some analyses. The research used judicial normative approach since it used secondary data as the main data by conducting library research. The system of the burden of proof, which follows the principles of reversal of the burden of proof stipulated in Article 12B, paragraph 1 a and b, Article 37A, and Article 38B of Law No. 20/2001 on the Amendment of Law No. 31/1999, is used only as supporting evidence when the principal case is proved. Meanwhile, how to maximize the implementation of the burden of proof on the perpetrators of corruption criminal act in which the public prosecutor brings a corruption case to Court, depends upon the nature of the case and the type of indictment. The system of burden of proof can be used to eradicate corruption in the Court if some policies and general principles of justice such as independency, impartiality, and legal certainty, are applied.

Keywords: burden of proof, perpetrator, corruption criminal act

Procedia PDF Downloads 321
13929 Numerical Study of a 6080HP Open Drip Proof (ODP) Motor

Authors: Feng-Hisang Lai

Abstract:

CFD(Computational Fluid Dynamics) is conducted to numerically study the flow and heat transfer features of a two-pole, 6,080HP, 60Hz, 3,150V open drip-proof (ODP) motor. The stator and rotor cores in this high voltage induction motor are segmented with the use of spacers for cooling purposes, which leads to difficulties in meshing when the entire system is to be simulated. The system is divided into 4 parts, meshed separately and then combined using interfaces. The deviation between the CFD and experimental results in temperature and flow rate is less than 10%. The internal flow is further examined and a final design is proposed to reduce the winding temperature by 10 degrees.

Keywords: CFD, open drip proof, induction motor, cooling

Procedia PDF Downloads 197
13928 The Effect of Size, Thickness, and Type of the Bonding Interlayer on Bullet Proof Glass as per EN 1063

Authors: Rabinder Singh Bharj, Sandeep Kumar

Abstract:

This investigation presents preparation of sample and analysis of results of ballistic impact test as per EN 1063 on the size, thickness, number, position, and type of the bonding interlayer Polyvinyl Butyral, Poly Carbonate and Poly Urethane on bullet proof glass. It was observed that impact energy absorbed by bullet proof glass increases with the increase of the total thickness from 33mm to 42mm to 51mm for all the three samples respectively. Absorption impact energy is greater for samples with more number of bonding interlayers than with the number of glass layers for uniform increase in total sample thickness. There is no effect on the absorption impact energy with the change in position of the bonding interlayer.

Keywords: absorbed energy, bullet proof glass, laminated glass, safety glass

Procedia PDF Downloads 392
13927 Variants of Mathematical Induction as Strong Proof Techniques in Theory of Computing

Authors: Ahmed Tarek, Ahmed Alveed

Abstract:

In the theory of computing, there are a wide variety of direct and indirect proof techniques. However, mathematical induction (MI) stands out to be one of the most powerful proof techniques for proving hypotheses, theorems, and new results. There are variations of mathematical induction-based proof techniques, which are broadly classified into three categories, such as structural induction (SI), weak induction (WI), and strong induction (SI). In this expository paper, several different variants of the mathematical induction techniques are explored, and the specific scenarios are discussed where a specific induction technique stands out to be more advantageous as compared to other induction strategies. Also, the essential difference among the variants of mathematical induction are explored. The points of separation among mathematical induction, recursion, and logical deduction are precisely analyzed, and the relationship among variations of recurrence relations, and mathematical induction are being explored. In this context, the application of recurrence relations, and mathematical inductions are considered together in a single framework for codewords over a given alphabet.

Keywords: alphabet, codeword, deduction, mathematical, induction, recurrence relation, strong induction, structural induction, weak induction

Procedia PDF Downloads 164
13926 Research on Development and Accuracy Improvement of an Explosion Proof Combustible Gas Leak Detector Using an IR Sensor

Authors: Gyoutae Park, Seungho Han, Byungduk Kim, Youngdo Jo, Yongsop Shim, Yeonjae Lee, Sangguk Ahn, Hiesik Kim, Jungil Park

Abstract:

In this paper, we presented not only development technology of an explosion proof type and portable combustible gas leak detector but also algorithm to improve accuracy for measuring gas concentrations. The presented techniques are to apply the flame-proof enclosure and intrinsic safe explosion proof to an infrared gas leak detector at first in Korea and to improve accuracy using linearization recursion equation and Lagrange interpolation polynomial. Together, we tested sensor characteristics and calibrated suitable input gases and output voltages. Then, we advanced the performances of combustible gaseous detectors through reflecting demands of gas safety management fields. To check performances of two company's detectors, we achieved the measurement tests with eight standard gases made by Korea Gas Safety Corporation. We demonstrated our instruments better in detecting accuracy other than detectors through experimental results.

Keywords: accuracy improvement, IR gas sensor, gas leak, detector

Procedia PDF Downloads 391
13925 Digital Nudge, Social Proof Nudge and Trust on Brand loyalty

Authors: Mirza Amin Ul Haq

Abstract:

Purpose – the purpose of conducting this research is to check the impact of nudges constructs, whether they create an encouragement factor with consumer brand loyalty and relating of word-of-mouth power have some kind of effect with all independent variables. Desin/Methodology/Approach – this study adopted the four constructs (i.e., Digital Nudge, Social Proof Nudge, Trust, and the mediator Word of Mouth) and explore its effect and connection with Brand Loyalty. A total of 390 respondents were selected for self-administrated questionnaire to obtain the finding of the research. Findings – the impact and cause between the constructs were done through structural equation modeling. The findings show a positive impact of social proof nudge and word of mouth whereas, digital nudge and trust have the weaker influence on the consumer choices when talk about brand loyalty. Originality/Value – Further implication for research and its marketing strategies in the field of clothing industry creating brand loyalty with customer.

Keywords: nudge, digital nudge, social proof, online buying, brand loyalty, trust, word of mouth

Procedia PDF Downloads 111
13924 InfoMiracles in the Qur’an and a Mathematical Proof to the Existence of God

Authors: Mohammad Mahmoud Mandurah

Abstract:

The existence of InfoMiracles in scripture is evidence that the scripture has a divine origin. It is also evidence to the existence of God. An InfoMiracle is an information-based miracle. The basic component of an InfoMiracle is a piece of information that could not be obtained by a human except through a divine channel. The existence of a sufficient number of convincing InfoMiracles in a scripture necessitates the existence of the divine source to these InfoMiracles. A mathematical equation is developed to prove that the Qur’an has a divine origin, and hence, prove the existence of God. The equation depends on a single variable only, which is the number of InfoMiracles in the Qur’an. The Qur’an is rich with InfoMiracles. It is shown that the existence of less than 30 InfoMiracles in the Qur’an is sufficient proof to the existence of God and that the Qur’an is a revelation from God.

Keywords: InfoMiracle, God, mathematical proof, miracle, probability

Procedia PDF Downloads 217
13923 Developing Proof Demonstration Skills in Teaching Mathematics in the Secondary School

Authors: M. Rodionov, Z. Dedovets

Abstract:

The article describes the theoretical concept of teaching secondary school students proof demonstration skills in mathematics. It describes in detail different levels of mastery of the concept of proof-which correspond to Piaget’s idea of there being three distinct and progressively more complex stages in the development of human reflection. Lessons for each level contain a specific combination of the visual-figurative components and deductive reasoning. It is vital at the transition point between levels to carefully and rigorously recalibrate teaching to reflect the development of more complex reflective understanding. This can apply even within the same age range, since students will develop at different speeds and to different potential. The authors argue that this requires an aware and adaptive approach to lessons to reflect this complexity and variation. The authors also contend that effective teaching which enables students to properly understand the implementation of proof arguments must develop specific competences. These are: understanding of the importance of completeness and generality in making a valid argument; being task focused; having an internalised locus of control and being flexible in approach and evaluation. These criteria must be correlated with the systematic application of corresponding methodologies which are best likely to achieve success. The particular pedagogical decisions which are made to deliver this objective are illustrated by concrete examples from the existing secondary school mathematics courses. The proposed theoretical concept formed the basis of the development of methodological materials which have been tested in 47 secondary schools.

Keywords: education, teaching of mathematics, proof, deductive reasoning, secondary school

Procedia PDF Downloads 242
13922 A Development of Portable Intrinsically Safe Explosion-Proof Type of Dual Gas Detector

Authors: Sangguk Ahn, Youngyu Kim, Jaheon Gu, Gyoutae Park

Abstract:

In this paper, we developed a dual gas leak instrument to detect Hydrocarbon (HC) and Monoxide (CO) gases. To two kinds of gases, it is necessary to design compact structure for sensors. And then it is important to draw sensing circuits such as measuring, amplifying and filtering. After that, it should be well programmed with robust, systematic and module coding methods. In center of them, improvement of accuracy and initial response time are a matter of vital importance. To manufacture distinguished gas leak detector, we applied intrinsically safe explosion-proof structure to lithium ion battery, main circuits, a pump with motor, color LCD interfaces and sensing circuits. On software, to enhance measuring accuracy we used numerical analysis such as Lagrange and Neville interpolation. Performance test result is conducted by using standard Methane with seven different concentrations with three other products. We want raise risk prevention and efficiency of gas safe management through distributing to the field of gas safety. Acknowledgment: This study was supported by Small and Medium Business Administration under the research theme of ‘Commercialized Development of a portable intrinsically safe explosion-proof type dual gas leak detector’, (task number S2456036).

Keywords: gas leak, dual gas detector, intrinsically safe, explosion proof

Procedia PDF Downloads 228
13921 Workaholism: A Study of Iranian Journalists at Gender, Career, and Educational Diversity

Authors: Minavand Mohammad, Maghsoudi Masoud, Mousavi Mahdis, Vahed Zahra, Hamidi Shabnam

Abstract:

While workaholism in organizations has received considerable popular attention, our understanding of it on the basis of research proof is limited. This comes from the deficiency of both appropriate definitions and measures of the concept. The purpose of this paper is to investigate gender, career and educational diversity in three workaholism components among Iranian journalists. Data were collected from 243 journalists (110 men and 133 women) using nameless completed questionnaires, with a 48 percent response rate. No gender differences found between male and female respondents, so there seems no consistency with previous findings. Furthermore, the results showed that different levels of jobs and education score correspondingly on the measures of work involvement, feeling driven to work and work enjoyment. All data are gathered using self report questionnaires. It is not evident the extent to which these findings would generalize to men and women in other vocations. This investigation has a contribution to the small but growing literature on flow and optimal experience in media organizations in Iran.

Keywords: gender, career, education, workaholism, Iranian journalists, work involvement, work enjoyment, feeling driven to work

Procedia PDF Downloads 387
13920 Neuron-Based Control Mechanisms for a Robotic Arm and Hand

Authors: Nishant Singh, Christian Huyck, Vaibhav Gandhi, Alexander Jones

Abstract:

A robotic arm and hand controlled by simulated neurons is presented. The robot makes use of a biological neuron simulator using a point neural model. The neurons and synapses are organised to create a finite state automaton including neural inputs from sensors, and outputs to effectors. The robot performs a simple pick-and-place task. This work is a proof of concept study for a longer term approach. It is hoped that further work will lead to more effective and flexible robots. As another benefit, it is hoped that further work will also lead to a better understanding of human and other animal neural processing, particularly for physical motion. This is a multidisciplinary approach combining cognitive neuroscience, robotics, and psychology.

Keywords: cell assembly, force sensitive resistor, robot, spiking neuron

Procedia PDF Downloads 349
13919 On the Cyclic Property of Groups of Prime Order

Authors: Ying Yi Wu

Abstract:

The study of finite groups is a central topic in algebraic structures, and one of the most fundamental questions in this field is the classification of finite groups up to isomorphism. In this paper, we investigate the cyclic property of groups of prime order, which is a crucial result in the classification of finite abelian groups. We prove the following statement: If p is a prime, then every group G of order p is cyclic. Our proof utilizes the properties of group actions and the class equation, which provide a powerful tool for studying the structure of finite groups. In particular, we first show that any non-identity element of G generates a cyclic subgroup of G. Then, we establish the existence of an element of order p, which implies that G is generated by a single element. Finally, we demonstrate that any two generators of G are conjugate, which shows that G is a cyclic group. Our result has significant implications in the classification of finite groups, as it implies that any group of prime order is isomorphic to the cyclic group of the same order. Moreover, it provides a useful tool for understanding the structure of more complicated finite groups, as any finite abelian group can be decomposed into a direct product of cyclic groups. Our proof technique can also be extended to other areas of group theory, such as the classification of finite p-groups, where p is a prime. Therefore, our work has implications beyond the specific result we prove and can contribute to further research in algebraic structures.

Keywords: group theory, finite groups, cyclic groups, prime order, classification.

Procedia PDF Downloads 84
13918 Formal Asymptotic Stability Guarantees, Analysis, and Evaluation of Nonlinear Controlled Unmanned Aerial Vehicle for Trajectory Tracking

Authors: Soheib Fergani

Abstract:

This paper concerns with the formal asymptotic stability guarantees, analysis and evaluation of a nonlinear controlled unmanned aerial vehicles (uav) for trajectory tracking purpose. As the system has been recognised as an under-actuated non linear system, the control strategy has been oriented towards a hierarchical control. The dynamics of the system and the mission purpose make it mandatory to provide an absolute proof of the vehicle stability during the maneuvers. For this sake, this work establishes the complete theoretical proof for an implementable control oriented strategy that asymptotically stabilizes (GAS and LISS) the system and has never been provided in previous works. The considered model is reorganized into two partly decoupled sub-systems. The concidered control strategy is presented into two stages: the first sub-system is controlled by a nonlinear backstepping controller that generates the desired control inputs to stabilize the second sub-system. This methodology is then applied to a harware in the loop uav simulator (SiMoDrones) that reproduces the realistic behaviour of the uav in an indoor environment has been performed to show the efficiency of the proposed strategy.

Keywords: UAV application, trajectory tracking, backstepping, sliding mode control, input to state stability, stability evaluation

Procedia PDF Downloads 65
13917 The Portuguese Legal Instruments to Combat the Improper Use of the Contract Service

Authors: Ana Lambelho

Abstract:

Nowadays is very common that an activity may be performed independently or dependently. In Portugal, the Labour Law exclusively protects the dependent labour relations. The independent work is regulated by civil law, where the autonomy of the will is the main principle. For companies is more advantageous to hire people under a service agreement since, in that case, the relation is not submitted to the limits established in Labour law and collective bargaining. This practice has nothing wrong, if the performance of work is, in fact, made autonomously. The problem is the increased frequency of the celebration of service agreements to hide a legal relation of subordination. Aware of this and regarding the huge difficulty to demonstrate the existence of subordinated work (that often runs against the employee), the Portuguese legislator devoted some legislative rules in order to facilitate the evidence of legal subordination and, on the other hand, to avoid the misuse of the provision of service agreements. This study focuses precisely on the analysis of this solution, namely the so-called presumption of ‘laboralidade’ and on the lawsuit to recognize the existence of a labour contract. The presumption of the existence of a labour contract is present in the Portuguese legal system since 2003, and received, with the 2009 Labour Code, a new redaction that, according to the doctrine and the jurisprudence, finally approached it to a legal presumption, with the consequent reversal of the burden of proof and, in consequence, made easier to proof the legal subordination, because the employee will just have to plead and prove the existence of two of the elements described in the law to use this presumption. Another change in the Portuguese legal framework is related with the competencies of the Authority for Working Conditions (AWC): now, if during an inspection, the Authority finds a situation that seems to be an undeclared employment situation, it may access the company and, if it does not regularize voluntarily the situation, AWC has a duty to communicate to the public prosecutor, who will begin the lawsuit for the recognition of the existence of an employment contract. To defend the public interest, the action to recognize the existence of an employment contract will follow its terms, even against the employee will. Although the existence of these mechanisms does not solve by itself the problem of evasion of labour law and false ‘green receipts’, it is undeniable that it is an important step in combating fraud in this field.

Keywords: independent work, labour contract, Portugal, service agreement

Procedia PDF Downloads 326
13916 Transmission Loss Analysis for Panels Laminated with Felt and Film

Authors: Yoshio Kurosawa

Abstract:

To reduce the interior noise of cars in high-frequency region, sound proof materials are laminated with the body panels and the interior trims. Therefore, sound proof properties of the laminates play an important role for the efficient acoustical design. A program code which predicts both sound absorption properties and sound insulation properties of the laminates are developed. This program code is used for transfer matrix method by Biot theory. This report described the outline of this program code, and the calculation results almost agreed with the experimental results.

Keywords: porous media, transmission loss, Biot theory, transfer matrix method

Procedia PDF Downloads 274
13915 The Admissibility of Evidence Obtained in Contravention of the Right to Privacy in a Criminal Trial: A Comparative Study of Poland and Germany

Authors: Konstancja Syller

Abstract:

International law and European regulations remain hardly silent about the admissibility of evidence obtained illegally in a criminal trial. However, Article 6 of the European Convention on Human Rights guarantees the right to a fair trial, it does not normalise a proceeding status of specified sources or means of proof outright. Therefore, it is the preserve of national legislation and national law enforcement authorities to decide on this matter. In most countries, especially in Germany and Poland, a rather complex normative approach to the issue of proof obtained in violation of the right to privacy is evident, which pursues in practise to many interpretive doubts. In Germany the jurisprudence has a significant impact within the range of the matter mentioned above. The Constitutional Court and the Supreme Court of Germany protect the right to privacy quite firmly - they ruled on inadmissibility of obtaining a proof in the form of a diary or a journal as a protection measure of constitutional guaranteed right. At the same time, however, the Supreme Court is not very convinced with reference to the issue of whether materials collected as a result of an inspection, call recordings or listening to the premises, which were carried out in breach of law, can be used in a criminal trial. Generally speaking, German courts indicate a crucial importance of the principle of Truth and the principle of proportionality, which both enable a judgement to be made as to the possibility of using an evidence obtained unlawfully. Comparing, in Poland there is almost no jurisprudence of the Constitutional Tribunal relating directly to the issue of illegal evidence. It is somehow surprising, considering the doctrinal analysis of the admissibility of using such proof in a criminal trial is performed in relation to standards resulted from the Constitution. Moreover, a crucial de lega lata legal provision, which enables allowing a proof obtained in infringement of the provisions in respect of criminal proceedings or through a forbidden act, is widely criticised within the legal profession ant therefore many courts give it their own interpretation at odds with legislator’s intentions. The comparison of two civil law legal systems’ standards regarding to the admissibility of an evidence obtained in contravention of the right to privacy in a criminal trial, taking also into account EU legislation and judicature, is the conclusive aim of this article.

Keywords: criminal trial, evidence, Germany, right to privacy, Poland

Procedia PDF Downloads 156
13914 Remote Sensing of Aerated Flows at Large Dams: Proof of Concept

Authors: Ahmed El Naggar, Homyan Saleh

Abstract:

Dams are crucial for flood control, water supply, and the creation of hydroelectric power. Every dam has a water conveyance system, such as a spillway, providing the safe discharge of catastrophic floods when necessary. Spillway design has historically been investigated in laboratory research owing to the absence of suitable full-scale flow monitoring equipment and safety problems. Prototype measurements of aerated flows are urgently needed to quantify projected scale effects and provide missing validation data for design guidelines and numerical simulations. In this work, an image-based investigation of free-surface flows on a tiered spillway was undertaken at the laboratory (fixed camera installation) and prototype size (drone video) (drone footage) (drone footage). The drone videos were generated using data from citizen science. Analyses permitted the measurement of the free-surface aeration inception point, air-water surface velocities, fluctuations, and residual energy at the chute's downstream end from a remote site. The prototype observations offered full-scale proof of concept, while laboratory results were efficiently confirmed against invasive phase-detection probe data. This paper stresses the efficacy of image-based analyses at prototype spillways. It highlights how citizen science data may enable academics better understand real-world air-water flow dynamics and offers a framework for a small collection of long-missing prototype data.

Keywords: remote sensing, aerated flows, large dams, proof of concept, dam spillways, air-water flows, prototype operation, remote sensing, inception point, optical flow, turbulence, residual energy

Procedia PDF Downloads 92
13913 Characteristics of Middle Grade Students' Solution Strategies While Reasoning the Correctness of the Statements Related to Numbers

Authors: Ayşegül Çabuk, Mine Işıksal

Abstract:

Mathematics is a sense-making activity so that it requires meaningful learning. Hence based on this idea, meaningful mathematical connections are necessary to learn mathematics. At that point, the major question has become that which educational methods can provide opportunities to provide mathematical connections and to understand mathematics. The amalgam of reasoning and proof can be the one of the methods that creates opportunities to learn mathematics in a meaningful way. However, even if reasoning and proof should be included from prekindergarten to grade 12, studies in literature generally include secondary school students and pre-service mathematics teachers. With the light of the idea that the amalgam of reasoning and proof has significant effect on middle school students' mathematical learning, this study aims to investigate middle grade students' tendencies while reasoning the correctness of statements related to numbers. The sample included 272 middle grade students, specifically 69 of them were sixth grade students (25.4%), 101 of them were seventh grade students (37.1%) and 102 of them were eighth grade students (37.5%). Data was gathered through an achievement test including 2 essay types of problems about algebra. The answers of two items were analyzed both quantitatively and qualitatively in terms of students' solutions strategies while reasoning the correctness of the statements. Similar on the findings in the literature, most of the students, in all grade levels, used numerical examples to judge the statements. Moreover the results also showed that the majority of these students appear to believe that providing one or more selected examples is sufficient to show the correctness of the statement. Hence based on the findings of the study, even students in earlier ages have proving and reasoning abilities their reasoning's generally based on the empirical evidences. Therefore, it is suggested that examples and example-based reasoning can be a fundamental role on to generate systematical reasoning and proof insight in earlier ages.

Keywords: reasoning, mathematics learning, middle grade students

Procedia PDF Downloads 422
13912 Method for Identification of Through Defects of Polymer Films Applied onto Metal Parts

Authors: Yu A. Pluttsova , O. V. Vakhnina , K. B. Zhogova

Abstract:

Nowadays, many devices operate under conditions of enhanced humidity, temperature drops, fog, and vibration. To ensure long-term and uninterruptable equipment operation under adverse conditions, one applies moisture-proof films on products and electronics components, which helps to prevent corrosion, short circuit, allowing a significant increase in device lifecycle. The reliability of such moisture-proof films is mainly determined by their coating uniformity without gaps and cracks. Unprotected product edges, as well as pores in films, can cause device failure during operation. The work objective was to develop an effective, affordable, and profit-proved method for determining the presence of through defects of protective polymer films on the surface of parts made of iron and its alloys. As a diagnostic reagent, one proposed water solution of potassium ferricyanide (III) in hydrochloric acid, this changes the color from yellow to blue according to the reactions; Feº → Fe²⁺ and 4Fe²⁺ + 3[Fe³⁺(CN)₆]³⁻ → Fe ³⁺4[Fe²⁺(CN)₆]₃. There was developed the principle scheme of technological process for determining the presence of polymer films through defects on the surface of parts made of iron and its alloys. There were studied solutions with different diagnostic reagent compositions in water: from 0,1 to 25 mass fractions, %, of potassium ferricyanide (III), and from 5 to 25 mass fractions, %, of hydrochloride acid. The optimal component ratio was chosen. The developed method consists in submerging a part covered with a film into a vessel with a diagnostic reagent. In the polymer film through defect zone, the part material (ferrum) interacts with potassium ferricyanide (III), the color changes to blue. Pilot samples were tested by the developed method for the presence of through defects in the moisture-proof coating. It was revealed that all the studied parts had through defects of the polymer film coating. Thus, the claimed method efficiently reveals polymer film coating through defects on parts made of iron or its alloys, being affordable and profit-proved.

Keywords: diagnostic reagent, metal parts, polimer films, through defects

Procedia PDF Downloads 150
13911 Sustainable Urban Resilience and Climate-Proof Urban Planning

Authors: Carmela Mariano

Abstract:

The literature, the scientific and disciplinary debate related to the impacts of climate change on the territory has highlighted, in recent years, the need for climate-proof and resilient tools of urban planning that adopt an integrated and inter-scalar approach for the construction of urban regeneration strategies by the objectives of the European Strategy on adaptation to climate change, the 2030 Agenda for Sustainable Development and the Climate Conference. This article addresses the operational implications of urban climate resilience in urban planning tools as a priority objective of policymakers (government bodies, institutions, etc.) to respond to the risks of climate change-related impacts on the environment. Within the general framework of the research activities carried out by the author, this article provides a critical synthesis of the analysis and evaluation of some case studies from the Italian national context, which enabled, through an inductive method, the assessment of the process of implementing the adaptation to climate change within the regional urban planning frameworks (regional urban laws), specific regional adaptation strategies or local adaptation plans and within the territorial and urban planning tools of a metropolitan or local scale. This study aims to identify theoretical–methodological, and operational references for the innovation and integration of planning tools concerning climate change that allow local planners to test these references in specific territorial contexts to practical adaptation strategies for local action.

Keywords: urban resilience, urban regeneration, climate-proof-planning, urban planning

Procedia PDF Downloads 17
13910 Building a Blockchain-based Internet of Things

Authors: Rob van den Dam

Abstract:

Today’s Internet of Things (IoT) comprises more than a billion intelligent devices, connected via wired/wireless communications. The expected proliferation of hundreds of billions more places us at the threshold of a transformation sweeping across the communications industry. Yet, we found that the IoT architecture and solutions that currently work for billions of devices won’t necessarily scale to tomorrow’s hundreds of billions of devices because of high cost, lack of privacy, not future-proof, lack of functional value and broken business models. As the IoT scales exponentially, decentralized networks have the potential to reduce infrastructure and maintenance costs to manufacturers. Decentralization also promises increased robustness by removing single points of failure that could exist in traditional centralized networks. By shifting the power in the network from the center to the edges, devices gain greater autonomy and can become points of transactions and economic value creation for owners and users. To validate the underlying technology vision, IBM jointly developed with Samsung Electronics the autonomous decentralized peer-to- peer proof-of-concept (PoC). The primary objective of this PoC was to establish a foundation on which to demonstrate several capabilities that are fundamental to building a decentralized IoT. Though many commercial systems in the future will exist as hybrid centralized-decentralized models, the PoC demonstrated a fully distributed proof. The PoC (a) validated the future vision for decentralized systems to extensively augment today’s centralized solutions, (b) demonstrated foundational IoT tasks without the use of centralized control, (c) proved that empowered devices can engage autonomously in marketplace transactions. The PoC opens the door for the communications and electronics industry to further explore the challenges and opportunities of potential hybrid models that can address the complexity and variety of requirements posed by the internet that continues to scale. Contents: (a) The new approach for an IoT that will be secure and scalable, (b) The three foundational technologies that are key for the future IoT, (c) The related business models and user experiences, (d) How such an IoT will create an 'Economy of Things', (e) The role of users, devices, and industries in the IoT future, (f) The winners in the IoT economy.

Keywords: IoT, internet, wired, wireless

Procedia PDF Downloads 335
13909 The Isolation and Performance Evaluation of Yeast (Saccharomyces cerevisiae) from Raffia Palm (Raphia hookeri) Wine Used at Different Concentrations for Proofing of Bread Dough

Authors: Elizabeth Chinyere Amadi

Abstract:

Yeast (sacchoromyces cerevisiae) was isolated from the fermenting sap of raffia palm (Raphia hookeri) wine. Different concerntrations of the yeast isolate were used to produce bread samples – B, C, D, E, F containing (2, 3, 4, 5, 6) g of yeast isolate respectively, other ingredients were kept constant. Sample A, containing 2g of commercial baker yeast served as control. The proof heights, weights, volumes and specific volume of the dough and bread samples were determined. The bread samples were also subjected to sensory evaluation using a 9–point hedonic scale. Results showed that proof height increased with increased concentration of the yeast isolate; that is direct proportion. Sample B with the least concentration of the yeast isolate had the least loaf height and volume of 2.80c m and 200 cm³ respectively but exhibited the highest loaf weight of 205.50g. However, Sample A, (commercial bakers’ yeast) had the highest loaf height and volume of 5.00 cm and 400 cm³ respectively. The sensory evaluation results showed sample D compared favorably with sample A in all the organoleptic attributes-(appearance, taste, crumb texture, crust colour and overall acceptability) tested for (P< 0.05). It was recommended that 4g compressed yeast isolate per 100g flour could be used to proof dough as a substitute for commercial bakers’ yeast and produce acceptable bread loaves.

Keywords: isolation of yeast, performance evaluation of yeast, Raffia palm wine, used at different concentrations, proofing of bread dough

Procedia PDF Downloads 317
13908 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification

Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune

Abstract:

This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.

Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP

Procedia PDF Downloads 72
13907 A Proof for Goldbach's Conjecture

Authors: Hashem Sazegar

Abstract:

In 1937, Vinograd of Russian Mathematician proved that each odd large number can be shown by three primes. In 1973, Chen Jingrun proved that each odd number can be shown by one prime plus a number that has maximum two primes. In this article, we state one proof for Goldbach’conjecture. Introduction: Bertrand’s postulate state for every positive integer n, there is always at least one prime p, such that n < p < 2n. This was first proved by Chebyshev in 1850, which is why postulate is also called the Bertrand-Chebyshev theorem. Legendre’s conjecture states that there is a prime between n2 and (n+1)2 for every positive integer n, which is one of the four Landau’s problems. The rest of these four basic problems are; (i) Twin prime conjecture: There are infinitely many primes p such that p+2 is a prime. (ii) Goldbach’s conjecture: Every even integer n > 2 can be written asthe sum of two primes. (iii) Are there infinitely many primes p such that p−1 is a perfect square? Problems (i), (ii), and (iii) are open till date.

Keywords: Bertrand-Chebyshev theorem, Landau’s problems, twin prime, Legendre’s conjecture, Oppermann’s conjecture

Procedia PDF Downloads 402
13906 Accelerated Expansion of a Matter-Antimatter Universe and Gravity as an Electromagnetic Force

Authors: Maarten J. Van der Burgt

Abstract:

A universe containing matter and antimatter can only exist when matter and antimatter repel each other. Such a system, where like attracts like and like repels unlike, will always expand. Calculations made for such a symmetric universe demonstrate that the expansion is consistent with Hubble’s law, the observed increase in the expansion velocity with time, the initial high acceleration and the foam structure of the universe. Conversely, these observations can be considered as proof for a symmetrical universe and for antimatter possessing a negative gravitational mass. A second proof can be found by reinterpreting the behavior of relativistic moving charged particles. Attributing their behavior to a charge defect of √(1-v2/c2) instead of to a mass defect of 1/√(1-v2/c2) makes it plausible that gravitation is an electromagnetic force, as already suggested by Feynman. This would automatically imply that antimatter has a negative gravitational mass. These proofs underpin the untenability of the Weak Equivalence Principle which states that in a gravitational field all structure less point-like particles follow the same path.

Keywords: celestial mechanics, cosmology, gravitation astrophysics, origin of structure, miscellaneous (matter and antimatter)

Procedia PDF Downloads 228