Search results for: delegated proof of stake
453 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector
Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar
Abstract:
Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake
Procedia PDF Downloads 137452 Implementation of Proof of Work Using Ganache
Authors: Sakshi Singh, Shampa Chakraverty
Abstract:
One of the essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the Blockchain. Moreover, one of the essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks.Keywords: proof of work, blockchain, ganache, smart contract
Procedia PDF Downloads 165451 Utilize 5G Mobile Connection as a Node in the Proof of Authority Blockchain Used for Microtransaction
Authors: Frode van der Laak
Abstract:
The paper contributes to the feasibility of using a 5G mobile connection as a node for a Proof of Authority (PoA) blockchain, which is used for microtransactions at the same time. It uses the phone number identity of the users that are linked to the crypto wallet address. It also proposed a consensus protocol based on Proof-of-Authority (PoA) blockchain; PoA is a permission blockchain where consensus is achieved through a set of designated authority rather than through mining, as is the case with a Proof of Work (PoW) blockchain. This report will first explain the concept of a PoA blockchain and how it works. It will then discuss the potential benefits and challenges of using a 5G mobile connection as a node in such a blockchain, and finally, the main open problem statement and proposed solutions with the requirements.Keywords: 5G, mobile, connection, node, PoA, blockchain, microtransaction
Procedia PDF Downloads 95450 A Proof of the Fact that a Finite Morphism is Proper
Authors: Ying Yi Wu
Abstract:
In this paper, we present a proof of the fact that a finite morphism is proper. We show that a finite morphism is universally closed and of finite type, which are the conditions for properness. Our proof is based on the theory of schemes and involves the use of the projection formula and the base change theorem. We first show that a finite morphism is of finite type and then proceed to show that it is universally closed. We use the fact that a finite morphism is also an affine morphism, which allows us to use the theory of coherent sheaves and their modules. We then show that the map induced by a finite morphism is flat and that the module it induces is of finite type. We use these facts to show that a finite morphism is universally closed. Our proof is constructive, and we provide details for each step of the argument.Keywords: finite, morphism, schemes, projection.
Procedia PDF Downloads 107449 Judicial Analysis of the Burden of Proof on the Perpetrator of Corruption Criminal Act
Authors: Rahmayanti, Theresia Simatupang, Ronald H. Sianturi
Abstract:
Corruption criminal act develops rapidly since in the transition era there is weakness in law. Consequently, there is an opportunity for a few people to do fraud and illegal acts and to misuse their positions and formal functions in order to make them rich, and the criminal acts are done systematically and sophisticatedly. Some people believe that legal provisions which specifically regulate the corruption criminal act; namely, Law No. 31/1999 in conjunction with Law No. 20/2001 on the Eradication of Corruption Criminal Act are not effective any more, especially in onus probandi (the burden of proof) on corruptors. The research was a descriptive analysis, a research method which is used to obtain description on a certain situation or condition by explaining the data, and the conclusion is drawn through some analyses. The research used judicial normative approach since it used secondary data as the main data by conducting library research. The system of the burden of proof, which follows the principles of reversal of the burden of proof stipulated in Article 12B, paragraph 1 a and b, Article 37A, and Article 38B of Law No. 20/2001 on the Amendment of Law No. 31/1999, is used only as supporting evidence when the principal case is proved. Meanwhile, how to maximize the implementation of the burden of proof on the perpetrators of corruption criminal act in which the public prosecutor brings a corruption case to Court, depends upon the nature of the case and the type of indictment. The system of burden of proof can be used to eradicate corruption in the Court if some policies and general principles of justice such as independency, impartiality, and legal certainty, are applied.Keywords: burden of proof, perpetrator, corruption criminal act
Procedia PDF Downloads 320448 A Discovery on the Symmetrical Pattern of Mirror Primes in P²: Applications in the Formal Proof of the Goldbach Conjecture
Authors: Yingxu Wang
Abstract:
The base 6 structure and properties of mirror primes are discovered in this work towards the proof of Goldbach Conjecture. This paper reveals a fundamental pattern on pairs of mirror primes adjacent to any even number nₑ > 2 with symmetrical distances on both sides determined by a methodology of Mirror Prime Decomposition (MPD). MPD leads to a formal proof of the Goldbach conjecture, which states that the conjecture holds because any pivot even number, nₑ > 2, is a sum of at least an adjacent pair of primes divided by 2. This work has not only revealed the analytic pattern of base 6 primes but also proven the infinitive validation of the Goldbach conjecture.Keywords: number theory, primes, mirror primes, double recursive patterns, Goldbach conjecture, formal proof, mirror-prime decomposition, applications
Procedia PDF Downloads 49447 Intertidal Fixed Stake Net Trap (Hadrah) Fishery in Kuwait, Distribution, Catch Rate, and Species Composition
Authors: Ali F. Al-Baz, Mohsen M. Al-Husaini, James M. Bishop
Abstract:
Intertidal fixed stake net trap (hadrah) is one of the oldest fishing gears used throughout the Arabian Gulf countries since 1800s and also one of most efficient methods of capturing fish from the intertidal area. This study described the hadrah fishery in Kuwait. From October 2001 to December 2002, more than 37,372 specimens representing 95 species (89 fish, 2 mollusks, 4 crustaceans) were measured from hadrah located in three different areas along Kuwait's coast. In Kuwait Bay, catch rates averaged 62 kg/sir day (range 14 kg/sir-day in February to 160 kg/sir-day in October 2002). Commercial species accounted for 41% of the catches. Catches from Failakah Island averaged 96 kg/sir-day from June through September, with 61% of the catch being commercial species. In the southern area, catches averaged only 32 kg/sir-day, and only 34% were commercially important. Forty percent of the hadrah catches were juveniles which shows that the shallow intertidal waters are prime nursery habitat, particularly in Kuwait Bay. To maintain ecosystem biodiversity and recruitment success of the fishes, we recommended that all hadrah should be removed from Kuwait Bay. In the future, removal of hadrah in other locations should be considered.Keywords: catch and effort, hadrah, intertidal fixed stake net, Kuwait, species composition
Procedia PDF Downloads 501446 Numerical Study of a 6080HP Open Drip Proof (ODP) Motor
Authors: Feng-Hisang Lai
Abstract:
CFD(Computational Fluid Dynamics) is conducted to numerically study the flow and heat transfer features of a two-pole, 6,080HP, 60Hz, 3,150V open drip-proof (ODP) motor. The stator and rotor cores in this high voltage induction motor are segmented with the use of spacers for cooling purposes, which leads to difficulties in meshing when the entire system is to be simulated. The system is divided into 4 parts, meshed separately and then combined using interfaces. The deviation between the CFD and experimental results in temperature and flow rate is less than 10%. The internal flow is further examined and a final design is proposed to reduce the winding temperature by 10 degrees.Keywords: CFD, open drip proof, induction motor, cooling
Procedia PDF Downloads 197445 The Effect of Size, Thickness, and Type of the Bonding Interlayer on Bullet Proof Glass as per EN 1063
Authors: Rabinder Singh Bharj, Sandeep Kumar
Abstract:
This investigation presents preparation of sample and analysis of results of ballistic impact test as per EN 1063 on the size, thickness, number, position, and type of the bonding interlayer Polyvinyl Butyral, Poly Carbonate and Poly Urethane on bullet proof glass. It was observed that impact energy absorbed by bullet proof glass increases with the increase of the total thickness from 33mm to 42mm to 51mm for all the three samples respectively. Absorption impact energy is greater for samples with more number of bonding interlayers than with the number of glass layers for uniform increase in total sample thickness. There is no effect on the absorption impact energy with the change in position of the bonding interlayer.Keywords: absorbed energy, bullet proof glass, laminated glass, safety glass
Procedia PDF Downloads 391444 Variants of Mathematical Induction as Strong Proof Techniques in Theory of Computing
Authors: Ahmed Tarek, Ahmed Alveed
Abstract:
In the theory of computing, there are a wide variety of direct and indirect proof techniques. However, mathematical induction (MI) stands out to be one of the most powerful proof techniques for proving hypotheses, theorems, and new results. There are variations of mathematical induction-based proof techniques, which are broadly classified into three categories, such as structural induction (SI), weak induction (WI), and strong induction (SI). In this expository paper, several different variants of the mathematical induction techniques are explored, and the specific scenarios are discussed where a specific induction technique stands out to be more advantageous as compared to other induction strategies. Also, the essential difference among the variants of mathematical induction are explored. The points of separation among mathematical induction, recursion, and logical deduction are precisely analyzed, and the relationship among variations of recurrence relations, and mathematical induction are being explored. In this context, the application of recurrence relations, and mathematical inductions are considered together in a single framework for codewords over a given alphabet.Keywords: alphabet, codeword, deduction, mathematical, induction, recurrence relation, strong induction, structural induction, weak induction
Procedia PDF Downloads 163443 Research on Development and Accuracy Improvement of an Explosion Proof Combustible Gas Leak Detector Using an IR Sensor
Authors: Gyoutae Park, Seungho Han, Byungduk Kim, Youngdo Jo, Yongsop Shim, Yeonjae Lee, Sangguk Ahn, Hiesik Kim, Jungil Park
Abstract:
In this paper, we presented not only development technology of an explosion proof type and portable combustible gas leak detector but also algorithm to improve accuracy for measuring gas concentrations. The presented techniques are to apply the flame-proof enclosure and intrinsic safe explosion proof to an infrared gas leak detector at first in Korea and to improve accuracy using linearization recursion equation and Lagrange interpolation polynomial. Together, we tested sensor characteristics and calibrated suitable input gases and output voltages. Then, we advanced the performances of combustible gaseous detectors through reflecting demands of gas safety management fields. To check performances of two company's detectors, we achieved the measurement tests with eight standard gases made by Korea Gas Safety Corporation. We demonstrated our instruments better in detecting accuracy other than detectors through experimental results.Keywords: accuracy improvement, IR gas sensor, gas leak, detector
Procedia PDF Downloads 391442 Digital Nudge, Social Proof Nudge and Trust on Brand loyalty
Authors: Mirza Amin Ul Haq
Abstract:
Purpose – the purpose of conducting this research is to check the impact of nudges constructs, whether they create an encouragement factor with consumer brand loyalty and relating of word-of-mouth power have some kind of effect with all independent variables. Desin/Methodology/Approach – this study adopted the four constructs (i.e., Digital Nudge, Social Proof Nudge, Trust, and the mediator Word of Mouth) and explore its effect and connection with Brand Loyalty. A total of 390 respondents were selected for self-administrated questionnaire to obtain the finding of the research. Findings – the impact and cause between the constructs were done through structural equation modeling. The findings show a positive impact of social proof nudge and word of mouth whereas, digital nudge and trust have the weaker influence on the consumer choices when talk about brand loyalty. Originality/Value – Further implication for research and its marketing strategies in the field of clothing industry creating brand loyalty with customer.Keywords: nudge, digital nudge, social proof, online buying, brand loyalty, trust, word of mouth
Procedia PDF Downloads 108441 InfoMiracles in the Qur’an and a Mathematical Proof to the Existence of God
Authors: Mohammad Mahmoud Mandurah
Abstract:
The existence of InfoMiracles in scripture is evidence that the scripture has a divine origin. It is also evidence to the existence of God. An InfoMiracle is an information-based miracle. The basic component of an InfoMiracle is a piece of information that could not be obtained by a human except through a divine channel. The existence of a sufficient number of convincing InfoMiracles in a scripture necessitates the existence of the divine source to these InfoMiracles. A mathematical equation is developed to prove that the Qur’an has a divine origin, and hence, prove the existence of God. The equation depends on a single variable only, which is the number of InfoMiracles in the Qur’an. The Qur’an is rich with InfoMiracles. It is shown that the existence of less than 30 InfoMiracles in the Qur’an is sufficient proof to the existence of God and that the Qur’an is a revelation from God.Keywords: InfoMiracle, God, mathematical proof, miracle, probability
Procedia PDF Downloads 215440 A Discovery of the Dual Sequential Pattern of Prime Numbers in P x P: Applications in a Formal Proof of the Twin-Prime Conjecture
Authors: Yingxu Wang
Abstract:
This work presents basic research on the recursive structures and dual sequential patterns of primes for the formal proof of the Twin-Prime Conjecture (TPC). A rigorous methodology of Twin-Prime Decomposition (TPD) is developed in MATLAB to inductively verify potential twins in the dual sequences of primes. The key finding of this basic study confirms that the dual sequences of twin primes are not only symmetric but also infinitive in the unique base 6 cycle, except a limited subset of potential pairs is eliminated by the lack of dual primality. Both theory and experiments have formally proven that the infinity of twin primes stated in TPC holds in the P x P space.Keywords: number theory, primes, twin-prime conjecture, dual primes (P x P), twin prime decomposition, formal proof, algorithm
Procedia PDF Downloads 63439 Developing Proof Demonstration Skills in Teaching Mathematics in the Secondary School
Authors: M. Rodionov, Z. Dedovets
Abstract:
The article describes the theoretical concept of teaching secondary school students proof demonstration skills in mathematics. It describes in detail different levels of mastery of the concept of proof-which correspond to Piaget’s idea of there being three distinct and progressively more complex stages in the development of human reflection. Lessons for each level contain a specific combination of the visual-figurative components and deductive reasoning. It is vital at the transition point between levels to carefully and rigorously recalibrate teaching to reflect the development of more complex reflective understanding. This can apply even within the same age range, since students will develop at different speeds and to different potential. The authors argue that this requires an aware and adaptive approach to lessons to reflect this complexity and variation. The authors also contend that effective teaching which enables students to properly understand the implementation of proof arguments must develop specific competences. These are: understanding of the importance of completeness and generality in making a valid argument; being task focused; having an internalised locus of control and being flexible in approach and evaluation. These criteria must be correlated with the systematic application of corresponding methodologies which are best likely to achieve success. The particular pedagogical decisions which are made to deliver this objective are illustrated by concrete examples from the existing secondary school mathematics courses. The proposed theoretical concept formed the basis of the development of methodological materials which have been tested in 47 secondary schools.Keywords: education, teaching of mathematics, proof, deductive reasoning, secondary school
Procedia PDF Downloads 241438 A Development of Portable Intrinsically Safe Explosion-Proof Type of Dual Gas Detector
Authors: Sangguk Ahn, Youngyu Kim, Jaheon Gu, Gyoutae Park
Abstract:
In this paper, we developed a dual gas leak instrument to detect Hydrocarbon (HC) and Monoxide (CO) gases. To two kinds of gases, it is necessary to design compact structure for sensors. And then it is important to draw sensing circuits such as measuring, amplifying and filtering. After that, it should be well programmed with robust, systematic and module coding methods. In center of them, improvement of accuracy and initial response time are a matter of vital importance. To manufacture distinguished gas leak detector, we applied intrinsically safe explosion-proof structure to lithium ion battery, main circuits, a pump with motor, color LCD interfaces and sensing circuits. On software, to enhance measuring accuracy we used numerical analysis such as Lagrange and Neville interpolation. Performance test result is conducted by using standard Methane with seven different concentrations with three other products. We want raise risk prevention and efficiency of gas safe management through distributing to the field of gas safety. Acknowledgment: This study was supported by Small and Medium Business Administration under the research theme of ‘Commercialized Development of a portable intrinsically safe explosion-proof type dual gas leak detector’, (task number S2456036).Keywords: gas leak, dual gas detector, intrinsically safe, explosion proof
Procedia PDF Downloads 228437 Studying the Relationship Between Washback Effects of IELTS Test on Iranian Language Teachers, Teaching Strategies and Candidates
Authors: Afsaneh Jasmine Majidi
Abstract:
Language testing is an important part of language teaching experience and language learning process as it presents assessment strategies for teachers to evaluate the efficiency of teaching and for learners to examine their outcomes. However, language testing is demanding and challenging because it should provide the opportunity for proper and objective decision. In addition to all the efforts test designers put to design valid and reliable tests, there are some other determining factors which are even more complex and complicated. These factors affect the educational system, individuals, and society, and the impact of the tests vary according to the scope of the test. Seemingly, the impact of a simple classroom assessment is not the same as that of high stake tests such as International English Language Testing System (IELTS). As the importance of the test increases, it affects wider domain. Accordingly, the impacts of high stake tests are reflected not only in teaching, learning strategies but also in society. Testing experts use the term ‘washback’ or ‘impact’ to define the different effects of a test on teaching, learning, and community. This paper first looks at the theoretical background of ‘washback’ and ‘impact’ in language testing by reviewing of relevant literature in the field and then investigates washback effects of IELTS test of on Iranian IELTS teachers and students. The study found significant relationship between the washback effect of IELTS test and teaching strategies of Iranian IELTS teachers as well as performance of Iranian IELTS candidates and their community.Keywords: high stake tests, IELTS, Iranian Candidates, language testing, test impact, washback
Procedia PDF Downloads 327436 What Is At Stake When Developing and Using a Rubric to Judge Chemistry Honours Dissertations for Entry into a PhD?
Authors: Moira Cordiner
Abstract:
As a result of an Australian university approving a policy to improve the quality of assessment practices, as an academic developer (AD) with expertise in criterion-referenced assessment commenced in 2008. The four-year appointment was to support 40 'champions' in their Schools. This presentation is based on the experiences of a group of Chemistry academics who worked with the AD to develop and implement an honours dissertation rubric. Honours is a research year following a three-year undergraduate year. If the standard of the student's work is high enough (mainly the dissertation) then the student can commence a PhD. What became clear during the process was that much more was at stake than just the successful development and trial of the rubric, including academics' reputations, university rankings and research outputs. Working with the champion-Head of School(HOS) and the honours coordinator, the AD helped them adapt an honours rubric that she had helped create and trial successfully for another Science discipline. A year of many meetings and complex power plays between the two academics finally resulted in a version that was critiqued by the Chemistry teaching and learning committee. Accompanying the rubric was an explanation of grading rules plus a list of supervisor expectations to explain to students how the rubric was used for grading. Further refinements were made until all staff were satisfied. It was trialled successfully in 2011, then small changes made. It was adapted and implemented for Medicine honours with her help in 2012. Despite coming to consensus about statements of quality in the rubric, a few academics found it challenging matching these to the dissertations and allocating a grade. They had had no time to undertake training to do this, or make overt their implicit criteria and standards, which some admitted they were using - 'I know what a first class is'. Other factors affecting grading included: the small School where all supervisors knew each other and the students, meant that friendships and collegiality were at stake if low grades were given; no external examiners were appointed-all were internal with the potential for bias; supervisors’ reputations were at stake if their students did not receive a good grade; the School's reputation was also at risk if insufficient honours students qualified for PhD entry; and research output was jeopardised without enough honours students to work on supervisors’ projects. A further complication during the study was a restructure of the university and retrenchments, with pressure to increase research output as world rankings assumed greater importance to senior management. In conclusion, much more was at stake than developing a usable rubric. The HOS had to be seen to champion the 'new' assessment practice while balancing institutional demands for increased research output and ensuring as many honours dissertations as possible met high standards, so that eventually the percentage of PhD completions and research output rose. It is therefore in the institution's best interest for this cycle to be maintained as it affects rankings and reputations. In this context, are rubrics redundant?Keywords: explicit and implicit standards, judging quality, university rankings, research reputations
Procedia PDF Downloads 336435 Smart Card Technology Adaption in a Hospital Setting
Authors: H. K. V. Narayan
Abstract:
This study was conducted at Tata Memorial Hospital (TMH), Mumbai, India. The study was to evaluate the impact of adapting Smart Card (SC) for clinical and business transactions in order to reduce Lead times and to enforce business rules of the hospital. The objective for implementing the Smart Card was to improve the patient perception of quality in terms of structures process and outcomes and also to improve the productivity of the Institution. The Smart Card was implemented in phases from 2011 and integrated with the Hospital Information System (HIS/EMR). The implementation was a learning curve for all the stake holders as software obviated the need to use hardcopies of transactions. The acceptability to the stake holders was challenge in change management. The study assessed the impact 3 years into the implementation and the observed trends have suggested that it has decreased the lead times for services and increased the no of transactions and thereby the productivity. Patients who used to complain of multiple queues and cumbersome transactions now compliment the administration for effective use of Information and Communication Technology.Keywords: smart card, high availability of health care information, reduction in potential medical errors due to elimination of transcription errors, reduction in no of queues, increased transactions, augmentation of revenue
Procedia PDF Downloads 285434 Transmission Loss Analysis for Panels Laminated with Felt and Film
Authors: Yoshio Kurosawa
Abstract:
To reduce the interior noise of cars in high-frequency region, sound proof materials are laminated with the body panels and the interior trims. Therefore, sound proof properties of the laminates play an important role for the efficient acoustical design. A program code which predicts both sound absorption properties and sound insulation properties of the laminates are developed. This program code is used for transfer matrix method by Biot theory. This report described the outline of this program code, and the calculation results almost agreed with the experimental results.Keywords: porous media, transmission loss, Biot theory, transfer matrix method
Procedia PDF Downloads 273433 The Admissibility of Evidence Obtained in Contravention of the Right to Privacy in a Criminal Trial: A Comparative Study of Poland and Germany
Authors: Konstancja Syller
Abstract:
International law and European regulations remain hardly silent about the admissibility of evidence obtained illegally in a criminal trial. However, Article 6 of the European Convention on Human Rights guarantees the right to a fair trial, it does not normalise a proceeding status of specified sources or means of proof outright. Therefore, it is the preserve of national legislation and national law enforcement authorities to decide on this matter. In most countries, especially in Germany and Poland, a rather complex normative approach to the issue of proof obtained in violation of the right to privacy is evident, which pursues in practise to many interpretive doubts. In Germany the jurisprudence has a significant impact within the range of the matter mentioned above. The Constitutional Court and the Supreme Court of Germany protect the right to privacy quite firmly - they ruled on inadmissibility of obtaining a proof in the form of a diary or a journal as a protection measure of constitutional guaranteed right. At the same time, however, the Supreme Court is not very convinced with reference to the issue of whether materials collected as a result of an inspection, call recordings or listening to the premises, which were carried out in breach of law, can be used in a criminal trial. Generally speaking, German courts indicate a crucial importance of the principle of Truth and the principle of proportionality, which both enable a judgement to be made as to the possibility of using an evidence obtained unlawfully. Comparing, in Poland there is almost no jurisprudence of the Constitutional Tribunal relating directly to the issue of illegal evidence. It is somehow surprising, considering the doctrinal analysis of the admissibility of using such proof in a criminal trial is performed in relation to standards resulted from the Constitution. Moreover, a crucial de lega lata legal provision, which enables allowing a proof obtained in infringement of the provisions in respect of criminal proceedings or through a forbidden act, is widely criticised within the legal profession ant therefore many courts give it their own interpretation at odds with legislator’s intentions. The comparison of two civil law legal systems’ standards regarding to the admissibility of an evidence obtained in contravention of the right to privacy in a criminal trial, taking also into account EU legislation and judicature, is the conclusive aim of this article.Keywords: criminal trial, evidence, Germany, right to privacy, Poland
Procedia PDF Downloads 156432 Characteristics of Middle Grade Students' Solution Strategies While Reasoning the Correctness of the Statements Related to Numbers
Authors: Ayşegül Çabuk, Mine Işıksal
Abstract:
Mathematics is a sense-making activity so that it requires meaningful learning. Hence based on this idea, meaningful mathematical connections are necessary to learn mathematics. At that point, the major question has become that which educational methods can provide opportunities to provide mathematical connections and to understand mathematics. The amalgam of reasoning and proof can be the one of the methods that creates opportunities to learn mathematics in a meaningful way. However, even if reasoning and proof should be included from prekindergarten to grade 12, studies in literature generally include secondary school students and pre-service mathematics teachers. With the light of the idea that the amalgam of reasoning and proof has significant effect on middle school students' mathematical learning, this study aims to investigate middle grade students' tendencies while reasoning the correctness of statements related to numbers. The sample included 272 middle grade students, specifically 69 of them were sixth grade students (25.4%), 101 of them were seventh grade students (37.1%) and 102 of them were eighth grade students (37.5%). Data was gathered through an achievement test including 2 essay types of problems about algebra. The answers of two items were analyzed both quantitatively and qualitatively in terms of students' solutions strategies while reasoning the correctness of the statements. Similar on the findings in the literature, most of the students, in all grade levels, used numerical examples to judge the statements. Moreover the results also showed that the majority of these students appear to believe that providing one or more selected examples is sufficient to show the correctness of the statement. Hence based on the findings of the study, even students in earlier ages have proving and reasoning abilities their reasoning's generally based on the empirical evidences. Therefore, it is suggested that examples and example-based reasoning can be a fundamental role on to generate systematical reasoning and proof insight in earlier ages.Keywords: reasoning, mathematics learning, middle grade students
Procedia PDF Downloads 420431 Sustainable Urban Resilience and Climate-Proof Urban Planning
Authors: Carmela Mariano
Abstract:
The literature, the scientific and disciplinary debate related to the impacts of climate change on the territory has highlighted, in recent years, the need for climate-proof and resilient tools of urban planning that adopt an integrated and inter-scalar approach for the construction of urban regeneration strategies by the objectives of the European Strategy on adaptation to climate change, the 2030 Agenda for Sustainable Development and the Climate Conference. This article addresses the operational implications of urban climate resilience in urban planning tools as a priority objective of policymakers (government bodies, institutions, etc.) to respond to the risks of climate change-related impacts on the environment. Within the general framework of the research activities carried out by the author, this article provides a critical synthesis of the analysis and evaluation of some case studies from the Italian national context, which enabled, through an inductive method, the assessment of the process of implementing the adaptation to climate change within the regional urban planning frameworks (regional urban laws), specific regional adaptation strategies or local adaptation plans and within the territorial and urban planning tools of a metropolitan or local scale. This study aims to identify theoretical–methodological, and operational references for the innovation and integration of planning tools concerning climate change that allow local planners to test these references in specific territorial contexts to practical adaptation strategies for local action.Keywords: urban resilience, urban regeneration, climate-proof-planning, urban planning
Procedia PDF Downloads 17430 The Isolation and Performance Evaluation of Yeast (Saccharomyces cerevisiae) from Raffia Palm (Raphia hookeri) Wine Used at Different Concentrations for Proofing of Bread Dough
Authors: Elizabeth Chinyere Amadi
Abstract:
Yeast (sacchoromyces cerevisiae) was isolated from the fermenting sap of raffia palm (Raphia hookeri) wine. Different concerntrations of the yeast isolate were used to produce bread samples – B, C, D, E, F containing (2, 3, 4, 5, 6) g of yeast isolate respectively, other ingredients were kept constant. Sample A, containing 2g of commercial baker yeast served as control. The proof heights, weights, volumes and specific volume of the dough and bread samples were determined. The bread samples were also subjected to sensory evaluation using a 9–point hedonic scale. Results showed that proof height increased with increased concentration of the yeast isolate; that is direct proportion. Sample B with the least concentration of the yeast isolate had the least loaf height and volume of 2.80c m and 200 cm³ respectively but exhibited the highest loaf weight of 205.50g. However, Sample A, (commercial bakers’ yeast) had the highest loaf height and volume of 5.00 cm and 400 cm³ respectively. The sensory evaluation results showed sample D compared favorably with sample A in all the organoleptic attributes-(appearance, taste, crumb texture, crust colour and overall acceptability) tested for (P< 0.05). It was recommended that 4g compressed yeast isolate per 100g flour could be used to proof dough as a substitute for commercial bakers’ yeast and produce acceptable bread loaves.Keywords: isolation of yeast, performance evaluation of yeast, Raffia palm wine, used at different concentrations, proofing of bread dough
Procedia PDF Downloads 316429 Initiating Learning to Know among Fishers for Sustainable Fishery on Lake Victoria. A Case of Kigungu Fishing Ground Wakiso District
Authors: Namubiru Zula, Aganyira Kelle, Van der Linden Josje, Openjuru George Laadah
Abstract:
Learning to know is a key principle to lifelong learning, with self-direction as the cornerstone. This study sought to initiate self-direction for lifelong learning through social constructivism among fishers; with the major goal of creating a community of fishers who continuously learn from each other for sustainable fishing. Government of Uganda has instituted several mechanisms like co-management with Beach Management Unit (BMU) System against illegal fishing. However, illegal fishing persists, there is reduced fish stocks with several outcry on how fishers are handled. Some studies have indicated that it’s the poor orientation of BMU leaders and fishers which are top down. This initial engagement of fishers was conducted through a meeting and use of stake holder’s analysis tool to discuss the relevance of the study; harnessing fishers’ knowledge for sustainable fisheries on Lake Victoria, its objectives, the key stake holders to enable them fish sustainably. It revealed initial attempt to learn from each other and learning to know among fishers, with some elements of self-direction. However, fishers attempt to learning and self-direction are affected by prior brutal enforcement experiences. This meeting led to fishers gain some sense of hope towards enforcement brutality. The key stakeholders highlighted include MAAIF, FAO, UNBS, NaFIRRI, LVFO, BMU, UFPEA, Fishers m employers, Fisheries Protection Unit, GIZ, and any Non-Government organization but declined the Association of Fisheries and Lake Users in Uganda.Keywords: self direction, lifelong learning, social constructivism, sustainable fishing
Procedia PDF Downloads 85428 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification
Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune
Abstract:
This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP
Procedia PDF Downloads 69427 A Proof for Goldbach's Conjecture
Authors: Hashem Sazegar
Abstract:
In 1937, Vinograd of Russian Mathematician proved that each odd large number can be shown by three primes. In 1973, Chen Jingrun proved that each odd number can be shown by one prime plus a number that has maximum two primes. In this article, we state one proof for Goldbach’conjecture. Introduction: Bertrand’s postulate state for every positive integer n, there is always at least one prime p, such that n < p < 2n. This was first proved by Chebyshev in 1850, which is why postulate is also called the Bertrand-Chebyshev theorem. Legendre’s conjecture states that there is a prime between n2 and (n+1)2 for every positive integer n, which is one of the four Landau’s problems. The rest of these four basic problems are; (i) Twin prime conjecture: There are infinitely many primes p such that p+2 is a prime. (ii) Goldbach’s conjecture: Every even integer n > 2 can be written asthe sum of two primes. (iii) Are there infinitely many primes p such that p−1 is a perfect square? Problems (i), (ii), and (iii) are open till date.Keywords: Bertrand-Chebyshev theorem, Landau’s problems, twin prime, Legendre’s conjecture, Oppermann’s conjecture
Procedia PDF Downloads 401426 Crisis, Identity and Challenge: Next Steps for the ‘English’ Constitution
Authors: Carol Howells, Edwin Parks
Abstract:
This paper explores the existing and evolving constitutional arrangements within the United Kingdom and within the wider international context of the EU. It considers the nature of an ‘English’ constitution and internal colonialism that underpins it. The debates over the UK’s exit from the EU have been many however the constitutional position of the devolved nations (Scotland, Northern Ireland and Wales) is little understood or explored. Their constitutional position has been touched upon in academic debate (but not widely) and is only now beginning to receive attention. The paper considers the constitutional role of the legislatures within the UK; the UK Parliament Bill for exiting the European Union and provides a commentary on the Brexit process in relation to constitutional arrangements within the UK and EU. Questions arise over the constitutional framework and, whether, having delegated competencies, the UK Parliament can now legislate in relation to delegated competencies without the consent. The Scottish Parliament and Welsh Assembly are a permanent and a fixed feature of the UK’s constitution, but their position is set within the traditional concept of the ‘English’ constitution. The current situation is opaque and complex and raises significant constitutional questions. In relation to exit from the EU two of the nations did not vote in favour of Brexit and the third is in receipt of an inequitable funding settlement. Questions arise as to whether the work of modernising the UK’s constitution over the past twenty years in recognising the Nations and governments within those nations is now being unpicked and whether the piecemeal and unequal process of devolution and new constitutional arrangements hold weight. Questions of democratic legitimacy arise throughout. An advisory referendum (where no definition of the EU was provided) in which two of the four nations voted to leave the EU and two voted to remain has led the UK Government negotiating a wholesale exit from the EU based on ‘English’ constitutional law principles. Previous constitutional referendums in relation to devolution within the UK have been treated differently. Within the EU questions are being raised in relation to the focus on member states. The goals of the EU mention member countries and its purpose is seen as being to promote greater social, political and economic harmony among the nations of Europe. The emphasis on member states is proving challenging and has led flawed processes. Scrutiny of legislative proposals, historical developments, and social commentary reveal distinct national identities within the UK. Analysis of the debate, legislation and case law surrounding the exiting process from the EU reveal a muddled picture of a constitution in crisis and significant challenges to principles underpinning the rule of law. Suggestions are made for future reforms and a move towards new constitutional arrangements beyond the current ‘English’ constitution.Keywords: English, constitution, parliament, devolved
Procedia PDF Downloads 124425 Accelerated Expansion of a Matter-Antimatter Universe and Gravity as an Electromagnetic Force
Authors: Maarten J. Van der Burgt
Abstract:
A universe containing matter and antimatter can only exist when matter and antimatter repel each other. Such a system, where like attracts like and like repels unlike, will always expand. Calculations made for such a symmetric universe demonstrate that the expansion is consistent with Hubble’s law, the observed increase in the expansion velocity with time, the initial high acceleration and the foam structure of the universe. Conversely, these observations can be considered as proof for a symmetrical universe and for antimatter possessing a negative gravitational mass. A second proof can be found by reinterpreting the behavior of relativistic moving charged particles. Attributing their behavior to a charge defect of √(1-v2/c2) instead of to a mass defect of 1/√(1-v2/c2) makes it plausible that gravitation is an electromagnetic force, as already suggested by Feynman. This would automatically imply that antimatter has a negative gravitational mass. These proofs underpin the untenability of the Weak Equivalence Principle which states that in a gravitational field all structure less point-like particles follow the same path.Keywords: celestial mechanics, cosmology, gravitation astrophysics, origin of structure, miscellaneous (matter and antimatter)
Procedia PDF Downloads 227424 Societal Stakes for Small Cruise Ships: A Recurrent Issue of Our Time
Authors: Maud Tixier
Abstract:
Societal issues are at stake for cruises anywhere, whatever the size of the ships and their destinations are. However, the Mediterranean sea is the main region where many operate and the challenges are both social and environmental. The presentation focuses on small ships, accounting for market niches, aimed at more specific cruise passengers and calling at less visited areas. How they cope with the benefit of all stakeholders is a persistent issue of our time.Keywords: environment, management, social, societal, safety
Procedia PDF Downloads 331