期刊文献+
共找到14,261篇文章
< 1 2 250 >
每页显示 20 50 100
Time Dilation Cosmology 3: Mathematical Proof of the 3 Temporal and 2 Spatial Acceleration Factors
1
作者 Joseph H. (Cass) Forrington 《Journal of Modern Physics》 2024年第12期2228-2237,共10页
This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums... This is the fifth paper in a series on Time Dilation Cosmology, TDC. TDC is an eternal holographic model of the universe based on time dilation that ties astrophysics to quantum physics and resolves all the conundrums in astrophysics and serves as a model for the unified field. In the author’s previous four TDC papers, it was demonstrated that all gravitationally induced velocities are compensation for the apparent difference in the rates of time, “dRt”, due to mass/energy densities, and, vice-versa, in all force-induced velocities the dRt is compensation for the velocity, so the uniform evolution of the continuum at c is maintained at the invariant 1 s/s rate of time of the universe as a whole. These compensations make it impossible for an event to lag behind or get ahead of the evolving continuum. When the author did the first velocity formula derivations in “General Relativity: Effects in Time as Causation” [1], the author felt the explanations for the appearance of the 2spatial and the 3temporal acceleration factors in the formulas were correct, but poorly explained and incomplete. This paper is a proof of the temporal and spatial acceleration factors used in the time dilation-based velocity formula derivations in the Time Dilation Cosmology model. 展开更多
关键词 Mathematical proof Time Dilation Cosmology Acceleration Factors
下载PDF
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
2
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
下载PDF
Fool-Proof法在图书馆工作中的应用浅探 被引量:3
3
作者 黄建年 《冶金信息导刊》 2007年第1期36-39,22,共5页
防呆法在企业生产中有大量的应用,在一些大型企业中也取得了显著的效果。作为一个服务部门和信息生产部门,图书馆应用防呆法无疑有助于图书馆的自动化和规范化。根据防呆法原理从10个方面详细列举了防呆法在图书馆的可能应用。
关键词 Fool-proof PKKA-YOKE 愚巧法 防错法 图书馆
下载PDF
电影《相助》片尾曲《The Living Proof》的功能文体学分析
4
作者 盛桂兰 《兰州教育学院学报》 2018年第10期98-100,共3页
电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系... 电影歌曲作为整部电影的有机组成部分,其重要性不可小觑,一首好的歌曲能达到锦上添花的观影效果。目前国内对电影歌词的研究,大多集中在音乐学、美学、文学等语言学之外的领域,从功能语言学的角度对电影歌曲的解读尚且不多。本文拟以系统功能语法理论为指导,从语境、经验功能、人际功能着手解析电影《相助》片尾曲《The Living Proof》,以期丰富系统功能语法的研究内容,为电影歌词的分析提供新的视角,帮助观影者深度理解影片主题。 展开更多
关键词 《相助》 《The LIVING proof 系统功能语法
下载PDF
Empirical study of the dilemma regarding preliminary proof of causality and methods used by victims in China's environmental health litigation
5
作者 Shufen Sun Youhai Sun 《Chinese Journal of Population,Resources and Environment》 2020年第3期237-243,共7页
Environmental health incidents have occurred frequently in recent years;in China,however,litigation has not been effective in protecting the rights and interests of victims due to their heavy burden of proof.In order ... Environmental health incidents have occurred frequently in recent years;in China,however,litigation has not been effective in protecting the rights and interests of victims due to their heavy burden of proof.In order to mitigate the burden of proof for victims,the environmental judicature in China introduced the rule of inversion of burden of proof;this means that the victim only assumes the preliminary burden of proof,but in practice it has not been sufficient.Victims in environmental health litigation still face many difficulties in proving causality.Based on the statistical analysis of judicial big data,this paper demonstrates three dilemmas faced by victims.First,the preliminary burden of proof of causality has a high standard.Second,the victim's ability to produce evidence is low.Third,the casual relationship between pollution behaviors and health damage is difficult to identify.When examining the possible legal instruments,there are three aspects to the causes of these dilemmas:theory,judicial practice,and society.The theoretical aspect manifests as the differences between the rule of inversion of burden of proof and the presumption of causality;the practical aspect manifests as the lack of an identification system for personal injury;and the social aspect manifests as the victim's lack of economic,scientific,technological,and information resources,as well as the absence of assistance from government sectors and social organizations.Combining Chinese law with judicial practice,this paper proposes a solution to the dilemma of victims needing to prove causality in environmental health litigation.On the basis of clarifying the theoretical differences between the inversion of burden of proof and the presumption of causality,China should adhere to the rule of inversion of burden of proof,establish an identification system for personal injuries caused by environmental pollution,and use methods such as epidemiological causality,indirect counterevidence,and prima facie bewies.Furthermore,the full functions of the government and social organizations must be brought into play.This will not only help victims demonstrate causality,it can also help victims achieve equitable relief. 展开更多
关键词 Environmental health litigation proof of causality Inversion of burden of proof
下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
6
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
下载PDF
Comments and Research on Proofs of Chain Rule 被引量:1
7
作者 张通 《Chinese Quarterly Journal of Mathematics》 CSCD 2001年第3期100-104,共5页
In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independe... In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independednt variable u, but is not differentiable with respect to the dependent variable u=g(x). A strict proof of Chain Rule is presented. Incon sistency of the form and content of Chain Rule is disclosed. 展开更多
关键词 Chain Rule proof unstrict
下载PDF
Study on Ignition Proof AZ91D Magnesium Alloy Chips with Cerium Addition 被引量:8
8
作者 周宏 李伟 +1 位作者 王明星 赵宇 《Journal of Rare Earths》 SCIE EI CAS CSCD 2005年第4期466-469,共4页
The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ... The effect of Ce on ignition point of AZ91D magnesium alloy chips was studied. For the AZ91D and the AZ91D-xCe magnesium alloys, changing the sizes of the chips in the range of 58 - 270 μm has a limited influence on ignition point, however, the shift of the content of Ce has much effect on ignition point. Increasing the Ce content, x from 0.15 to 0.25, the ignition point increases with increasing of Ce; however, x from 0.25 to 0.45, the ignition point decreases with increasing of Ce. By the addition of Ce of 0.25 %. the ignition point is raised by 43℃. 展开更多
关键词 metal materials ignition proof CERIUM CHIPS magnesium alloy rare earths
下载PDF
A SIMPLE PROOF OF STABILITY AND CONVERGENCE IN L_2 FOR SOME DIFFERENCE SCHEMES AND THEIR EXTRAPOLATION METHOD FOR PARABOLIC EQUATIONS 被引量:1
9
作者 孙志忠 《Journal of Southeast University(English Edition)》 EI CAS 1994年第2期1-6,共6页
ASIMPLEPROOFOFSTABILITYANDCONVERGENCEINL_2FORSOMEDIFFERENCESCHEMESANDTHEIREXTRAPOLATIONMETHODFORPARABOLICEQU... ASIMPLEPROOFOFSTABILITYANDCONVERGENCEINL_2FORSOMEDIFFERENCESCHEMESANDTHEIREXTRAPOLATIONMETHODFORPARABOLICEQUATIONSSunZhizhong... 展开更多
关键词 simpld proof Wabelic equatiuns DIFFERENCE SCHEMES STABILITY convergenee EXTRAPOLATION METHOD
下载PDF
Local Geometric Proof of Riemann Conjecture 被引量:3
10
作者 Chuanmiao Chen 《Advances in Pure Mathematics》 2020年第10期589-610,共22页
Riemann hypothesis (RH) is a difficult problem. So far one doesn’t know how to go about it. Studying <i>ζ</i> and using analysis method likely are two incor-rect guides. Actually, a unique hope may study... Riemann hypothesis (RH) is a difficult problem. So far one doesn’t know how to go about it. Studying <i>ζ</i> and using analysis method likely are two incor-rect guides. Actually, a unique hope may study Riemann function <img alt="" src="Edit_8fcdfff5-6b95-42a4-8f47-2cabe2723dfc.bmp" />, <img alt="" src="Edit_6ce3a4bd-4c68-49e5-aabe-dec3e904e282.bmp" />, <img alt="" src="Edit_29ea252e-a81e-4b21-a41c-09209c780bb2.bmp" /> by geometric analysis, which has the symmetry: v=0 if <i>β</i>=0, and basic expression <img alt="" src="Edit_bc7a883f-312d-44fd-bcdd-00f25c92f80a.bmp" />. We show that |u| is single peak in each root-interval <img alt="" src="Edit_d7ca54c7-4866-4419-a4bd-cbb808b365af.bmp" /> of <i>u</i> for fixed <em>β</em> ∈(0,1/2]. Using the slope u<sub>t</sub>, we prove that <i>v</i> has opposite signs at two end-points of I<sub>j</sub>. There surely exists an inner point such that , so {|u|,|v|/<em>β</em>} form a local peak-valley structure, and have positive lower bound <img alt="" src="Edit_bac1a5f6-673e-49b6-892c-5adff0141376.bmp" /> in I<sub>j</sub>. Because each <i>t</i> must lie in some I<sub>j</sub>, then ||<em>ξ</em>|| > 0 is valid for any <i>t</i> (<i>i.e.</i> RH is true). Using the positivity <img alt="" src="Edit_83c3d2cf-aa7e-4aba-89f5-0eb44659918a.bmp" /> of Lagarias (1999), we show the strict monotone <img alt="" src="Edit_87eb4e9e-bc7b-43e3-b316-5dcf0efaf0d5.bmp" /> for <i>β</i> > <i>β</i><sub>0</sub> ≥ 0 , and the peak-valley structure is equiva-lent to RH, which may be the geometric model expected by Bombieri (2000). This research follows Liuhui’s methodology: “Computing can detect the un-known and method”.</i> 展开更多
关键词 Riemann Conjecture Local Geometric proof Symmetry Peak-Valley Struc-ture EQUIVALENCE Liuhui’s Methodology
下载PDF
Effect of RE on the ignition-proof, microstructure and properties of AZ91D magnesium alloy 被引量:8
11
作者 Zhihong Chen Xueping Ren Ya Zhang 《Journal of University of Science and Technology Beijing》 CSCD 2005年第6期540-544,共5页
The magnesium alloy is prone to burn during die-casting, which limits its applications severely, so the effect of adding rare earth (RE) on the ignition-proof of AZ91D Mg alloy is studied. The results indicate that ... The magnesium alloy is prone to burn during die-casting, which limits its applications severely, so the effect of adding rare earth (RE) on the ignition-proof of AZ91D Mg alloy is studied. The results indicate that the addition of mischmetal RE elements has a remarkable influence on the ignition-proof property of the magnesium alloy. It is found that the ignition temperature of the magnesium alloy can be greatly raised by adding a proper amount of RE. When the amount is 0.1wt%, the ignition temperature reaches 877℃ which is 206℃ higher than that of AZ91D without RE and the mechanical properties of the alloy are also improved, However, the amount of RE must be properly controlled because too much RE would induce grain coarsening and reduce the mechanical properties. 展开更多
关键词 AZ91D magnesium alloy ignition-proof RE mechanical properties MICROSTRUCTURE
下载PDF
Game-Based Automated Security Proofs for Cryptographic Protocols 被引量:1
12
作者 顾纯祥 光焱 祝跃飞 《China Communications》 SCIE CSCD 2011年第4期50-57,共8页
Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof ... Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme. 展开更多
关键词 cryptographic protocols probable security automatic security proof process calculus
下载PDF
EFI Colorproof数字打样系统定标及色彩校正流程 被引量:1
13
作者 田洪港 《印刷杂志》 2006年第2期52-55,共4页
关键词 数字打样 系统定标 色彩校正 EFI COLOR proof 基础线性化 色彩匹配
下载PDF
Analyses on Ignition-Proof Mechanics of AZ91D Alloy Added with Ce 被引量:4
14
作者 XiaofengHUANG HongZHOU 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2002年第3期279-280,共2页
Theoretical analysis on ignition-proof of AZ91D alloy added with Ce was studied. The effect of Ce on burning temperature was investigated. The burning temperature increases with increasing Ce by insulation work at dif... Theoretical analysis on ignition-proof of AZ91D alloy added with Ce was studied. The effect of Ce on burning temperature was investigated. The burning temperature increases with increasing Ce by insulation work at different temperatures. The influence of Ce on maximum insulation work time was also studied. The maximum insulation work time increases with increasing Ce and decreases with the melting temperature. There is a tendency for Ce to concentrate on the surface of melti.ng AZ91D alloy. Ce will react with MgO and O2. The resultant will fill the cavity of MgO film to form multifilm. So the density of surface film of liquid Mg will increase to prevent burning. 展开更多
关键词 AZ91D alloy Rare earths(Ce) Burning point Ignition-proof mechanism
下载PDF
一类决策模型的payoff-proof纳什均衡解
15
作者 孙晓勋 方奇志 《中国海洋大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第S2期167-170,共4页
研究1种基于线性规划约束的多人决策模型。首先,运用线性规划和对偶理论给出了纳什均衡点存在的充分必要条件,进而证明了在这种模型下的纳什均衡点可以在多项式时间内求解。其次,在原有的纳什均衡定义的基础上,定义了1个强均衡的概念—p... 研究1种基于线性规划约束的多人决策模型。首先,运用线性规划和对偶理论给出了纳什均衡点存在的充分必要条件,进而证明了在这种模型下的纳什均衡点可以在多项式时间内求解。其次,在原有的纳什均衡定义的基础上,定义了1个强均衡的概念—payoff-proof纳什均衡,并对前述模型研究了payoff-proof纳什均衡的性质和存在性。 展开更多
关键词 纳什均衡 对偶定理 payoff-proof纳什均衡
下载PDF
Membership Proof and Verification in Authenticated Skip Lists Based on Heap 被引量:1
16
作者 Shuanghe Peng Zhige Chen Deen Chen 《China Communications》 SCIE CSCD 2016年第6期195-204,共10页
How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ... How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees. 展开更多
关键词 authenticated skip list max heap membership proof STACK algorithms
下载PDF
Ignition-proof performance and mechanism of AZ91D-3Nd-xDy magnesium alloys at high temperatures 被引量:2
17
作者 Yong-yan Li Wei-min Zhao +1 位作者 Jian Ding Hai-tao Xue 《China Foundry》 SCIE 2018年第2期97-102,共6页
This study focused on the synergistic effect of alloying elements neodymium(Nd) and dysprosium(Dy) on the ignition-proof performance of AZ91D alloy. The ignition-proof mechanism of AZ91D-3 Nd-x Dy(x = 0.5, 1.0, 1.5, 2... This study focused on the synergistic effect of alloying elements neodymium(Nd) and dysprosium(Dy) on the ignition-proof performance of AZ91D alloy. The ignition-proof mechanism of AZ91D-3 Nd-x Dy(x = 0.5, 1.0, 1.5, 2.0 and 2.5 wt.%) alloy was discussed in depth through ignition-proof testing and microstructure observation. The results showed that the AZ91D-3 Nd-2 Dy alloy exhibited the highest ignition-point of 893 K, increased by 69 K as compared to the AZ91D alloy. The ignition-proof mechanism of Nd and Dy additions lay in three aspects:(1) the formation of denser oxide film consisting of Dy_2O_3 and MgO improves the oxidation resistance of the alloy,(2) the great reduction of the low melting-point phase β-Mg_(17)Al_(12), which leads to the decrease in the oxygen diffusion channels, and(3) the newly formed high melting-point phases(Al_2Nd and Al_2Dy), which block the oxygen diffusion channels and prevent the chemical reaction of Mg and oxygen. 展开更多
关键词 AZ91D ND DY ignition-proof high temperature
下载PDF
A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID 被引量:1
18
作者 Wen-Tsai Ko Shin-Yan Chiou +1 位作者 Erl-Huei Lu Henry Ker-Chang Chang 《Applied Mathematics》 2012年第4期336-341,共6页
An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryp... An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic Curve Cryptography) in public-key cryptosystem. In the next year, Lv et al. had shown that Batina et al.’s protocol was insecure against the tracking attack such that the privacy of tags did not be preserved properly. Then they proposed a revised protocol based on Batina et al.’s work. Their revised protocol was claimed to have all security properties and resisted tracking attack. But in this paper, we prove that Lv et al.’s protocol cannot work properly. Then we propose a new version protocol with some nonce to satisfy the functions of Batina et al.’s privacy-preserving grouping proof protocol. Further we try the tracing attack made by Lv et al. on our protocol and prove our protocol can resist this attack to recover the untraceability. 展开更多
关键词 ECC RFID GROUPING proof PRIVACY-PRESERVING
下载PDF
An Elementary Proof of Fermat’s Last Theorem for Epsilons 被引量:2
19
作者 Bibek Baran Nag 《Advances in Pure Mathematics》 2021年第8期735-740,共6页
The author presents a new approach which is used to solve an important Diophantine problem. An elementary argument is used to furnish another fully transparent proof of Fermat’s Last Theorem. This was first stated by... The author presents a new approach which is used to solve an important Diophantine problem. An elementary argument is used to furnish another fully transparent proof of Fermat’s Last Theorem. This was first stated by Pierre de Fermat in the seventeenth century. It is widely regarded that no elementary proof of this theorem exists. The author provides evidence to dispel this belief. 展开更多
关键词 DIOPHANTINE EQUATIONS Fermat Fermat’s LAST THEOREM ELEMENTARY Number Modular proof Factorize
下载PDF
Privacy-preserving Distributed Location Proof Generating System 被引量:3
20
作者 LIU Mengjun LIU Shubo +3 位作者 ZHANG Rui Li Yongkai WANG Jun CAO Hui 《China Communications》 SCIE CSCD 2016年第3期203-218,共16页
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr... The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results. 展开更多
关键词 computer software and theory location proof secret-sharing location privacy
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部