期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
注重联系生活实际 培养求证思维能力——以“黄金分割”一课教学为例
1
作者 刘等贝 《甘肃教育》 2016年第6期119-119,共1页
新课程数学教学不应仅仅是知识的传授和技能的培养,还应注意对学生进行数学研究方法的启迪和训练。黄金分割的教学不仅对于初中生了解数学美、了解数学的实用价值等有积极的意义,对培养学生的求证思维能力也大有裨益。笔者在黄金分割... 新课程数学教学不应仅仅是知识的传授和技能的培养,还应注意对学生进行数学研究方法的启迪和训练。黄金分割的教学不仅对于初中生了解数学美、了解数学的实用价值等有积极的意义,对培养学生的求证思维能力也大有裨益。笔者在黄金分割教学中注意联系生活实际,培养学生猜想、求证思维能力,收到了较好的效果。下面,笔者浅谈一些认识和做法。 展开更多
关键词 数学教学 生活实际 求证思维能力 黄金分割
下载PDF
质疑·联想·求证——初中历史教学“别样红”
2
作者 毕研顺 《东西南北(教育)》 2021年第3期23-23,共1页
在素质教育不断推行的大背景下,初中教育更加注重对学生素质的全方位培养,初中历史教学模式也在不断进行着创新。当前初中历史教学不再以应试为唯一目的,而是更加强调对学生综合学习素养提升,在教学也当中注重对学生个性和创新能力的培... 在素质教育不断推行的大背景下,初中教育更加注重对学生素质的全方位培养,初中历史教学模式也在不断进行着创新。当前初中历史教学不再以应试为唯一目的,而是更加强调对学生综合学习素养提升,在教学也当中注重对学生个性和创新能力的培养。而要想真正实现对学生综合素质的培养,初中历史老师就一定积极构建全面的课堂教学模式,更多地注重对学生质疑、联想和求证能力的培养,让学生们能够在自主探索、自主思考当中不断提升自身搜集、整合和处理信息的能力,实现对学生历史学习能力的有效提升。 展开更多
关键词 初中历史 质疑精神 联想能力 求证能力 批判思维
下载PDF
An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems 被引量:3
3
作者 Liquan Chen Sijie Qian +1 位作者 Ming Lim Shihui Wang 《China Communications》 SCIE CSCD 2018年第5期61-76,共16页
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony... In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme. 展开更多
关键词 network-connected UAV trusted computing direct anonymous attestation mutual authentication trusted platform module
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部