• Title/Summary/Keyword: Validity proofs

Search Result 10, Processing Time 0.025 seconds

The Reliability and Validity of Online Peer Assessment on Proofs in a Number Theory Course (증명 동료평가의 신뢰도 및 타당도 분석: 대학 정수론 수업의 사례를 중심으로)

  • Oh, Yaerin;Kwon, Oh Nam;Park, Jooyong
    • The Mathematical Education
    • /
    • v.57 no.3
    • /
    • pp.215-229
    • /
    • 2018
  • Despite the importance of learning to do mathematical proofs, researchers have reported that not only secondary school students but also undergraduate students have difficulties in learning proofs. In this study, we introduced a new toll for learning proofs and explored the reliability and the validity of peer assessment on proofs. In the course of a university in Seoul, students were given weekly proof assignments prior to class. After solving the proofs, each student had to assess other students' proofs. The inter-rater reliabilities of weekly peer assessment was higher than .9 over 90 percent of the observed cases. To examine the validity of peer assessment, we check whether students' assessments were similar to expert assessment. Analysis showed that the equivalence has been quite high throughout the semester and the validity was low in the middle of the semester but rose by the end of the semester. Based on these results, we believe instructors can consider the application of peer assessment on proving tasks as a tool to help students learn.

Understanding of Algebraic Proofs Including Literal Expressions: Expressions or Contexts? (문자식을 포함한 대수 증명에 대한 중학교 3학년 학생들의 이해 연구 - 문맥과 문자식, 어느 것을 보는가 -)

  • Chang, Hyewon;Kang, Jeong Gi
    • Journal of Educational Research in Mathematics
    • /
    • v.24 no.3
    • /
    • pp.359-374
    • /
    • 2014
  • Students' difficulties and errors in relation to mathematical proofs are worth while to say one of the dilemmas in mathematics education. The potential elements of their difficulty are scattered over the process of proving in geometry as well as algebra. This study aims to investigate whether middle school students understand the context of algebraic proof including literal expressions. We applied 24 third-grade middle school students a test item which shows a proof including a literal expression and missing the conclusion. Over the half of them responded wrong answers based on only the literal expression without considering its context. Three of them were interviewed individually to show their thinking. As a result, we could find some characteristics of their thinking including the perspective on proof as checking the validity of algebraic expression and the gap between proving and understanding of proof etc. From these, we also discussed about several didactical implications.

  • PDF

Exact Security Analysis of Some Designated Verifier Signature Schemes With Defective Security Proof (결함 있는 안전성 증명을 갖는 수신자 지정 서명기법들에 대한 정확한 안전성분석)

  • Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.37-48
    • /
    • 2010
  • Designated verifier signatures allow a signer to prove the validity of a signature to a specifically designated verifier. The designated verifier can be convinced but unable to prove the source of the message to a third party. Unlike conventional digital signatures, designated verifier signatures make it possible for a signer to repudiate his/her signature against anyone except the designated verifier. Recently, two designated verifier signature schemes, Zhang et al.'s scheme and Kang et al.'s scheme, have been shown to be insecure by concrete attacks. In this paper, we find the essential reason that the schemes open attacks while those were given with its security proofs, and show that Huang-Chou scheme and Du-Wen scheme have the same problem. Indeed, the security proofs of all the schemes reflect no message attackers only. Next, we show that Huang-Chou scheme is insecure by presenting universal forgery attack. Finally, we show that Du-Wen scheme is, indeed, secure by completing its defective security proof.

Secondary Teachers' Views about Proof and Judgements on Mathematical Arguments

  • Kim, Hangil
    • Research in Mathematical Education
    • /
    • v.25 no.1
    • /
    • pp.65-89
    • /
    • 2022
  • Despite its recognition in the field of mathematics education and mathematics, students' understanding about proof and performance on proof tasks have been far from promising. Research has documented that teachers tend to accept empirical arguments as proofs. In this study, an online survey was administered to examine how Korean secondary mathematic teachers make judgements on mathematical arguments varied along representations. The results indicate that, when asked to judge how convincing to their students the given arguments would be, the teachers tended to consider how likely students understand the given arguments and this surfaces as a controversial matter with the algebraic argument being both most and least convincing for their students. The teachers' judgements on the algebraic argument were shown to have statistically significant difference with respect to convincingness to them, convincingness to their students, and validity as mathematical proof.

Investigation of Research Trends in the Selective Functional Movement Assessment (SFMA) (선택적 기능 동작 평가의 연구 동향 분석)

  • Kim, Jae-Eun;Do, Kwang-Sun
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.9 no.2
    • /
    • pp.63-73
    • /
    • 2021
  • Purpose : Selective functional movement assessment(SFMA) is a movement-based assessment tool designed for clinicians to diagnose and treat pain and functional physical problems. This concept is used for assistance in occupations related to movement, including clinical medical personnel, such as physical therapists, physical education instructors, and athlete coaches. Although this concept is widely used by clinicians, research and scientific proofs are relatively insufficient. This study aimed to review the literature on the understanding, reliability and effectiveness of SFMA, and to consider its role in the future of rehabilitation. Methods : In this review, a total of nine articles were selected according to the eligibility criteria of three major thesis topics. The main topics covered in the literature are reliability and effectiveness of clinical use of SFMA. To gather research articles, we searched official term 'Selective Functional Movement Assessment'. Among the searched 60 studies, nine were mentioned in this study that contained overlapping information and matched our desired topic. We reviewed four reliability analyses, four case reports, and one experimental study. Results : Reliability has an intermediate degree between high raters and within raters. The validity of the SFMA system is influenced by a combination of experience and logic; hence, further improvement is needed. Therefore, if the intervention was effective based on the diagnosis result, then biomechanical evidence is necessary to further support the claim. Conclusion : In future research, to use SFMA as a diagnostic tool with high accuracy, it is necessary to improve the reliability of the main problem through breakout, support for guidelines and validity and efficiency.

Blockchain Interoperability Mechanism (블록체인 상호호환성 메커니즘)

  • Zhou, Qing;Lee, Young-seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1676-1686
    • /
    • 2021
  • In this paper, we propose a general cross-chain solution based on the idea of modularity, abstraction, and layering, which decoupling the cross-chain function from the consensus algorithm and specific application logic, and utilize a Merkle proof to ensure the validity and legality of cross-chain operations. Since the underlying implementations of homogeneous and heterogeneous blockchains are different, we treat them separately. For homogeneous blockchains, we suggest a TCP-like cross-chain transport protocol (CCTP). While for heterogeneous blockchains, we present a method to construct the relay chain to realize the cross-chain function. The proposed scheme can enable the correct, effective, reliable, orderly, and timely transmission of cross-chain data. However, the essential difference between the operations within a single blockchain and the interoperability between different blockchains is that the trust domain is different. Cross-chain interoperation itself breaks the completeness of the blockchain, therefore, some efficiency and safety must sacrifice to trade-off.

Maximum Delay-Aware Admission Control for Machine-to-Machine Communications in LTE-Advanced Systems (LTE-Advanced 시스템에서 M2M 통신의 최대 지연시간을 고려한 호 수락 방법)

  • Jun, Kyungkoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1113-1118
    • /
    • 2012
  • Smart grid and intelligent transportation system draw significant interest since they are considered as one of the green technologies. These systems require a large number of sensors, actuators, and controllers. Also, machine-to-machine (M2M) communications is important because of the automatic control. The LTE-Advanced networks is preparing a set of functions that facilitate the M2M communications, and particularly the development of an efficient call admission control mechanism is critical. A method that groups MTC devices according to QoS constraints and determines the admission depending on the QoS satisfaction is limitedly applied only if the data transmission period and the maximum delay are identical. This paper proposed a call admission control that is free from such limitation and also optimizes the admission process under the certain condition of the transmission period and maximum delay. The theorems regarding the proposed method are presented with the proofs. The simulations confirms its validity and shows it is better in call admission probability than existing works.

Efficient and General PVSS Based on ElGamal Encryption

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.375-388
    • /
    • 2012
  • PVSS stands for publicly verifiable secret sharing. In PVSS, a dealer shares a secret among multiple share holders. He encrypts the shares using the shareholders' encryption algorithms and publicly proves that the encrypted shares are valid. Most of the existing PVSS schemes do not employ an ElGamal encryption to encrypt the shares. Instead, they usually employ other encryption algorithms like a RSA encryption and Paillier encryption. Those encryption algorithms do not support the shareholders' encryption algorithms to employ the same decryption modulus. As a result, PVSS based on those encryption algorithms must employ additional range proofs to guarantee the validity of the shares obtained by the shareholders. Although the shareholders can employ ElGamal encryptions with the same decryption modulus in PVSS such that the range proof can be avoided, there are only two PVSS schemes based on ElGamal encryption. Moreover, the two schemes have their drawbacks. One of them employs a costly repeating-proof mechanism, which needs to repeat the dealer's proof at least scores of times to achieve satisfactory soundness. The other requires that the dealer must know the discrete logarithm of the secret to share and thus weakens the generality and it cannot be employed in many applications. A new PVSS scheme based on an ElGamal encryption is proposed in this paper. It employs the same decryption modulus for all the shareholders' ElGamal encryption algorithms, so it does not need any range proof. Moreover, it is a general PVSS technique without any special limitation. Finally, an encryption-improving technique is proposed to achieve very high efficiency in the new PVSS scheme. It only needs a number of exponentiations in large cyclic groups that are linear in the number of the shareholders, while all the existing PVSS schemes need at least a number of exponentiations in large cyclic groups that are linear in the square of the number of the shareholders.

A Study on the Validity of Bamboo-Bundle System and its Improvement - Analysis of the Component Factors of Bamboo-Bundle System - (현행(現行) 죽재결속법(竹材結束法)의 적정분석(適正分析)과 그의 개선(改善) - 결속구성인자(結束構成因子)의 분석(分析)을 중심(中心)으로 -)

  • Lee, Kwang-Nam
    • Journal of Korean Society of Forest Science
    • /
    • v.25 no.1
    • /
    • pp.49-71
    • /
    • 1975
  • The importance of bamboo as raw material for bamboo wares and several kinds of industrial products is highly appreciated at home and abroad. But different kinds of bamboo-bundle systems have been traditionally used in the local areas. There being no reasonable bamboo-bundle system, we have a lot of difficulty in trading bamboo products and executing adrinistmative works. Therefore, a reasonable bamboo-bundle system based on scientific proofs needs to be tested and established for fair trade and administration. This study is carried out to solve the above difficulty with statistical investigation and analysis. The results obtained are as follows. 1. The larger the circles at eye-height become, the more the possibility of the largest internode covering the span between eye-height and 1/4 height increases. 2. The longest internodes are distributed according to a rule without relation to circles at eye-height. 3. The tapering grade of bamboo culms is very high and its form is almost the same without relation to its size. (Form exponent; 0.71-1.05, eye-height form factor; 0.60-0.66, 1/4 becomes, seeing that the circle grade and the percentage of actual volume height form factor; 0.61-0.69). 4. The larger the circles at eye-height are, the lower the percentage of actual volume have negative curve relation to each other. 5. It is considered that the numbers of bamboos bundled in a "Sok" is not decided according to the usefulness of bamboos, judging from the fact that the outputs of bamboo wares per "Sok" in every circle grade are not the same. 6. As the results of the regression analysis, the empirical formulae of several amounts to circles at eye-height and culm length are as follows; Volume, $${\hat{y}}_i=\bar{3}.821874+2.013181log\;C_i+0.839128log\;H_i$$ $$V=0.0066355\;C^{2.013181}\;H^{0.839128}$$ Actual volume, $${\hat{y}}_{ai}=3.915338+0.776549log\;C_i+1.857000log\;H_i$$ $$V_a=0.0082288\;C^{0.776549}\;H^{1.857000}$$ Weight, $$w_i=3.869148+1.936410log\;C_i+0.566904log\;H_i$$ $$W=0.0073986\;G^{1.936410}\;H^{0.565904}$$ 7. Korean Phyllostachys bambusoides Sieb. et Zucc. is almost the same as that of Japan in several amounts, just the same especially in the weight. 8. It is found that the bamboo-bundle systems of Korea and Japan have much closer relation to the weight than other amounts. So It is, therefore, considered that the weight is important factor in deciding bamboo-bundle system. 9. According to the item 8, I should like to propose the appropriate numbers per "Sok" adjusted on the basis of the weight in the Table 18.

  • PDF

Measuring Consumer-Brand Relationship Quality (소비자-브랜드 관계 품질 측정에 관한 연구)

  • Kang, Myung-Soo;Kim, Byoung-Jai;Shin, Jong-Chil
    • Journal of Global Scholars of Marketing Science
    • /
    • v.17 no.2
    • /
    • pp.111-131
    • /
    • 2007
  • As a brand becomes a core asset in creating a corporation's value, brand marketing has become one of core strategies that corporations pursue. Recently, for customer relationship management, possession and consumption of goods were centered on brand for the management. Thus, management related to this matter was developed. The main reason of the increased interest on the relationship between the brand and the consumer is due to acquisition of individual consumers and development of relationship with those consumers. Along with the development of relationship, a corporation is able to establish long-term relationships. This has become a competitive advantage for the corporation. All of these processes became the strategic assets of corporations. The importance and the increase of interest of a brand have also become a big issue academically. Brand equity, brand extension, brand identity, brand relationship, and brand community are the results derived from the interest of a brand. More specifically, in marketing, the study of brands has been led to the study of factors related to building of powerful brands and the process of building the brand. Recently, studies concentrated primarily on the consumer-brand relationship. The reason is that brand loyalty can not explain the dynamic quality aspects of loyalty, the consumer-brand relationship building process, and especially interactions between the brands and the consumers. In the studies of consumer-brand relationship, a brand is not just limited to possession or consumption objectives, but rather conceptualized as partners. Most of the studies from the past concentrated on the results of qualitative analysis of consumer-brand relationship to show the depth and width of the performance of consumer-brand relationship. Studies in Korea have been the same. Recently, studies of consumer-brand relationship started to concentrate on quantitative analysis rather than qualitative analysis or even go further with quantitative analysis to show effecting factors of consumer-brand relationship. Studies of new quantitative approaches show the possibilities of using the results as a new concept of viewing consumer-brand relationship and possibilities of applying these new concepts on marketing. Studies of consumer-brand relationship with quantitative approach already exist, but none of them include sub-dimensions of consumer-brand relationship, which presents theoretical proofs for measurement. In other words, most studies add up or average out the sub-dimensions of consumer-brand relationship. However, to do these kind of studies, precondition of sub-dimensions being in identical constructs is necessary. Therefore, most of the studies from the past do not meet conditions of sub-dimensions being as one dimension construct. From this, we question the validity of past studies and their limits. The main purpose of this paper is to overcome the limits shown from the past studies by practical use of previous studies on sub-dimensions in a one-dimensional construct (Naver & Slater, 1990; Cronin & Taylor, 1992; Chang & Chen, 1998). In this study, two arbitrary groups were classified to evaluate reliability of the measurements and reliability analyses were pursued on each group. For convergent validity, correlations, Cronbach's, one-factor solution exploratory analysis were used. For discriminant validity correlation of consumer-brand relationship was compared with that of an involvement, which is a similar concept with consumer-based relationship. It also indicated dependent correlations by Cohen and Cohen (1975, p.35) and results showed that it was different constructs from 6 sub-dimensions of consumer-brand relationship. Through the results of studies mentioned above, we were able to finalize that sub-dimensions of consumer-brand relationship can viewed from one-dimensional constructs. This means that the one-dimensional construct of consumer-brand relationship can be viewed with reliability and validity. The result of this research is theoretically meaningful in that it assumes consumer-brand relationship in a one-dimensional construct and provides the basis of methodologies which are previously preformed. It is thought that this research also provides the possibility of new research on consumer-brand relationship in that it gives root to the fact that it is possible to manipulate one-dimensional constructs consisting of consumer-brand relationship. In the case of previous research on consumer-brand relationship, consumer-brand relationship is classified into several types on the basis of components consisting of consumer-brand relationship and a number of studies have been performed with priority given to the types. However, as we can possibly manipulate a one-dimensional construct through this research, it is expected that various studies which make the level or strength of consumer-brand relationship practical application of construct will be performed, and not research focused on separate types of consumer-brand relationship. Additionally, we have the theoretical basis of probability in which to manipulate the consumer-brand relationship with one-dimensional constructs. It is anticipated that studies using this construct, which is consumer-brand relationship, practical use of dependent variables, parameters, mediators, and so on, will be performed.

  • PDF