CINXE.COM

Search results for: social proof

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: social proof</title> <meta name="description" content="Search results for: social proof"> <meta name="keywords" content="social proof"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="social proof" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="social proof"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 9830</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: social proof</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9830</span> Implementation of Proof of Work Using Ganache</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sakshi%20Singh">Sakshi Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Shampa%20Chakraverty"> Shampa Chakraverty</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the Blockchain. Moreover, one of the essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=proof%20of%20work" title="proof of work">proof of work</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=ganache" title=" ganache"> ganache</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contract" title=" smart contract"> smart contract</a> </p> <a href="https://publications.waset.org/abstracts/154576/implementation-of-proof-of-work-using-ganache" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154576.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9829</span> Digital Nudge, Social Proof Nudge and Trust on Brand loyalty</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirza%20Amin%20Ul%20Haq">Mirza Amin Ul Haq</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Purpose – the purpose of conducting this research is to check the impact of nudges constructs, whether they create an encouragement factor with consumer brand loyalty and relating of word-of-mouth power have some kind of effect with all independent variables. Desin/Methodology/Approach – this study adopted the four constructs (i.e., Digital Nudge, Social Proof Nudge, Trust, and the mediator Word of Mouth) and explore its effect and connection with Brand Loyalty. A total of 390 respondents were selected for self-administrated questionnaire to obtain the finding of the research. Findings – the impact and cause between the constructs were done through structural equation modeling. The findings show a positive impact of social proof nudge and word of mouth whereas, digital nudge and trust have the weaker influence on the consumer choices when talk about brand loyalty. Originality/Value – Further implication for research and its marketing strategies in the field of clothing industry creating brand loyalty with customer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nudge" title="nudge">nudge</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20nudge" title=" digital nudge"> digital nudge</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20proof" title=" social proof"> social proof</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20buying" title=" online buying"> online buying</a>, <a href="https://publications.waset.org/abstracts/search?q=brand%20loyalty" title=" brand loyalty"> brand loyalty</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a>, <a href="https://publications.waset.org/abstracts/search?q=word%20of%20mouth" title=" word of mouth"> word of mouth</a> </p> <a href="https://publications.waset.org/abstracts/146482/digital-nudge-social-proof-nudge-and-trust-on-brand-loyalty" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146482.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9828</span> Utilize 5G Mobile Connection as a Node in the Proof of Authority Blockchain Used for Microtransaction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Frode%20van%20der%20Laak">Frode van der Laak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper contributes to the feasibility of using a 5G mobile connection as a node for a Proof of Authority (PoA) blockchain, which is used for microtransactions at the same time. It uses the phone number identity of the users that are linked to the crypto wallet address. It also proposed a consensus protocol based on Proof-of-Authority (PoA) blockchain; PoA is a permission blockchain where consensus is achieved through a set of designated authority rather than through mining, as is the case with a Proof of Work (PoW) blockchain. This report will first explain the concept of a PoA blockchain and how it works. It will then discuss the potential benefits and challenges of using a 5G mobile connection as a node in such a blockchain, and finally, the main open problem statement and proposed solutions with the requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=5G" title="5G">5G</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile" title=" mobile"> mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=connection" title=" connection"> connection</a>, <a href="https://publications.waset.org/abstracts/search?q=node" title=" node"> node</a>, <a href="https://publications.waset.org/abstracts/search?q=PoA" title=" PoA"> PoA</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=microtransaction" title=" microtransaction"> microtransaction</a> </p> <a href="https://publications.waset.org/abstracts/158556/utilize-5g-mobile-connection-as-a-node-in-the-proof-of-authority-blockchain-used-for-microtransaction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158556.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">97</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9827</span> A Proof of the Fact that a Finite Morphism is Proper</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ying%20Yi%20Wu">Ying Yi Wu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a proof of the fact that a finite morphism is proper. We show that a finite morphism is universally closed and of finite type, which are the conditions for properness. Our proof is based on the theory of schemes and involves the use of the projection formula and the base change theorem. We first show that a finite morphism is of finite type and then proceed to show that it is universally closed. We use the fact that a finite morphism is also an affine morphism, which allows us to use the theory of coherent sheaves and their modules. We then show that the map induced by a finite morphism is flat and that the module it induces is of finite type. We use these facts to show that a finite morphism is universally closed. Our proof is constructive, and we provide details for each step of the argument. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=finite" title="finite">finite</a>, <a href="https://publications.waset.org/abstracts/search?q=morphism" title=" morphism"> morphism</a>, <a href="https://publications.waset.org/abstracts/search?q=schemes" title=" schemes"> schemes</a>, <a href="https://publications.waset.org/abstracts/search?q=projection." title=" projection."> projection.</a> </p> <a href="https://publications.waset.org/abstracts/163708/a-proof-of-the-fact-that-a-finite-morphism-is-proper" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163708.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">109</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9826</span> Judicial Analysis of the Burden of Proof on the Perpetrator of Corruption Criminal Act</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rahmayanti">Rahmayanti</a>, <a href="https://publications.waset.org/abstracts/search?q=Theresia%20Simatupang"> Theresia Simatupang</a>, <a href="https://publications.waset.org/abstracts/search?q=Ronald%20H.%20Sianturi"> Ronald H. Sianturi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corruption criminal act develops rapidly since in the transition era there is weakness in law. Consequently, there is an opportunity for a few people to do fraud and illegal acts and to misuse their positions and formal functions in order to make them rich, and the criminal acts are done systematically and sophisticatedly. Some people believe that legal provisions which specifically regulate the corruption criminal act; namely, Law No. 31/1999 in conjunction with Law No. 20/2001 on the Eradication of Corruption Criminal Act are not effective any more, especially in onus probandi (the burden of proof) on corruptors. The research was a descriptive analysis, a research method which is used to obtain description on a certain situation or condition by explaining the data, and the conclusion is drawn through some analyses. The research used judicial normative approach since it used secondary data as the main data by conducting library research. The system of the burden of proof, which follows the principles of reversal of the burden of proof stipulated in Article 12B, paragraph 1 a and b, Article 37A, and Article 38B of Law No. 20/2001 on the Amendment of Law No. 31/1999, is used only as supporting evidence when the principal case is proved. Meanwhile, how to maximize the implementation of the burden of proof on the perpetrators of corruption criminal act in which the public prosecutor brings a corruption case to Court, depends upon the nature of the case and the type of indictment. The system of burden of proof can be used to eradicate corruption in the Court if some policies and general principles of justice such as independency, impartiality, and legal certainty, are applied. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=burden%20of%20proof" title="burden of proof">burden of proof</a>, <a href="https://publications.waset.org/abstracts/search?q=perpetrator" title=" perpetrator"> perpetrator</a>, <a href="https://publications.waset.org/abstracts/search?q=corruption%20criminal%20act" title=" corruption criminal act"> corruption criminal act</a> </p> <a href="https://publications.waset.org/abstracts/15773/judicial-analysis-of-the-burden-of-proof-on-the-perpetrator-of-corruption-criminal-act" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15773.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9825</span> A Discovery on the Symmetrical Pattern of Mirror Primes in P²: Applications in the Formal Proof of the Goldbach Conjecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yingxu%20Wang">Yingxu Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The base 6 structure and properties of mirror primes are discovered in this work towards the proof of Goldbach Conjecture. This paper reveals a fundamental pattern on pairs of mirror primes adjacent to any even number nₑ > 2 with symmetrical distances on both sides determined by a methodology of Mirror Prime Decomposition (MPD). MPD leads to a formal proof of the Goldbach conjecture, which states that the conjecture holds because any pivot even number, nₑ > 2, is a sum of at least an adjacent pair of primes divided by 2. This work has not only revealed the analytic pattern of base 6 primes but also proven the infinitive validation of the Goldbach conjecture. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=number%20theory" title="number theory">number theory</a>, <a href="https://publications.waset.org/abstracts/search?q=primes" title=" primes"> primes</a>, <a href="https://publications.waset.org/abstracts/search?q=mirror%20primes" title=" mirror primes"> mirror primes</a>, <a href="https://publications.waset.org/abstracts/search?q=double%20recursive%20patterns" title=" double recursive patterns"> double recursive patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=Goldbach%20conjecture" title=" Goldbach conjecture"> Goldbach conjecture</a>, <a href="https://publications.waset.org/abstracts/search?q=formal%20proof" title=" formal proof"> formal proof</a>, <a href="https://publications.waset.org/abstracts/search?q=mirror-prime%20decomposition" title=" mirror-prime decomposition"> mirror-prime decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=applications" title=" applications"> applications</a> </p> <a href="https://publications.waset.org/abstracts/181850/a-discovery-on-the-symmetrical-pattern-of-mirror-primes-in-p2-applications-in-the-formal-proof-of-the-goldbach-conjecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181850.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">50</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9824</span> Numerical Study of a 6080HP Open Drip Proof (ODP) Motor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Feng-Hisang%20Lai">Feng-Hisang Lai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> CFD(Computational Fluid Dynamics) is conducted to numerically study the flow and heat transfer features of a two-pole, 6,080HP, 60Hz, 3,150V open drip-proof (ODP) motor. The stator and rotor cores in this high voltage induction motor are segmented with the use of spacers for cooling purposes, which leads to difficulties in meshing when the entire system is to be simulated. The system is divided into 4 parts, meshed separately and then combined using interfaces. The deviation between the CFD and experimental results in temperature and flow rate is less than 10%. The internal flow is further examined and a final design is proposed to reduce the winding temperature by 10 degrees. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CFD" title="CFD">CFD</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20drip%20proof" title=" open drip proof"> open drip proof</a>, <a href="https://publications.waset.org/abstracts/search?q=induction%20motor" title=" induction motor"> induction motor</a>, <a href="https://publications.waset.org/abstracts/search?q=cooling" title=" cooling"> cooling</a> </p> <a href="https://publications.waset.org/abstracts/142026/numerical-study-of-a-6080hp-open-drip-proof-odp-motor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142026.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">197</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9823</span> The Effect of Size, Thickness, and Type of the Bonding Interlayer on Bullet Proof Glass as per EN 1063</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rabinder%20Singh%20Bharj">Rabinder Singh Bharj</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandeep%20Kumar"> Sandeep Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This investigation presents preparation of sample and analysis of results of ballistic impact test as per EN 1063 on the size, thickness, number, position, and type of the bonding interlayer Polyvinyl Butyral, Poly Carbonate and Poly Urethane on bullet proof glass. It was observed that impact energy absorbed by bullet proof glass increases with the increase of the total thickness from 33mm to 42mm to 51mm for all the three samples respectively. Absorption impact energy is greater for samples with more number of bonding interlayers than with the number of glass layers for uniform increase in total sample thickness. There is no effect on the absorption impact energy with the change in position of the bonding interlayer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=absorbed%20energy" title="absorbed energy">absorbed energy</a>, <a href="https://publications.waset.org/abstracts/search?q=bullet%20proof%20glass" title=" bullet proof glass"> bullet proof glass</a>, <a href="https://publications.waset.org/abstracts/search?q=laminated%20glass" title=" laminated glass"> laminated glass</a>, <a href="https://publications.waset.org/abstracts/search?q=safety%20glass" title=" safety glass"> safety glass</a> </p> <a href="https://publications.waset.org/abstracts/6184/the-effect-of-size-thickness-and-type-of-the-bonding-interlayer-on-bullet-proof-glass-as-per-en-1063" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6184.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9822</span> Variants of Mathematical Induction as Strong Proof Techniques in Theory of Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Tarek">Ahmed Tarek</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Alveed"> Ahmed Alveed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the theory of computing, there are a wide variety of direct and indirect proof techniques. However, mathematical induction (MI) stands out to be one of the most powerful proof techniques for proving hypotheses, theorems, and new results. There are variations of mathematical induction-based proof techniques, which are broadly classified into three categories, such as structural induction (SI), weak induction (WI), and strong induction (SI). In this expository paper, several different variants of the mathematical induction techniques are explored, and the specific scenarios are discussed where a specific induction technique stands out to be more advantageous as compared to other induction strategies. Also, the essential difference among the variants of mathematical induction are explored. The points of separation among mathematical induction, recursion, and logical deduction are precisely analyzed, and the relationship among variations of recurrence relations, and mathematical induction are being explored. In this context, the application of recurrence relations, and mathematical inductions are considered together in a single framework for codewords over a given alphabet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alphabet" title="alphabet">alphabet</a>, <a href="https://publications.waset.org/abstracts/search?q=codeword" title=" codeword"> codeword</a>, <a href="https://publications.waset.org/abstracts/search?q=deduction" title=" deduction"> deduction</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematical" title=" mathematical"> mathematical</a>, <a href="https://publications.waset.org/abstracts/search?q=induction" title=" induction"> induction</a>, <a href="https://publications.waset.org/abstracts/search?q=recurrence%20relation" title=" recurrence relation"> recurrence relation</a>, <a href="https://publications.waset.org/abstracts/search?q=strong%20induction" title=" strong induction"> strong induction</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20induction" title=" structural induction"> structural induction</a>, <a href="https://publications.waset.org/abstracts/search?q=weak%20induction" title=" weak induction"> weak induction</a> </p> <a href="https://publications.waset.org/abstracts/116467/variants-of-mathematical-induction-as-strong-proof-techniques-in-theory-of-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/116467.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9821</span> Research on Development and Accuracy Improvement of an Explosion Proof Combustible Gas Leak Detector Using an IR Sensor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gyoutae%20Park">Gyoutae Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Seungho%20Han"> Seungho Han</a>, <a href="https://publications.waset.org/abstracts/search?q=Byungduk%20Kim"> Byungduk Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Youngdo%20Jo"> Youngdo Jo</a>, <a href="https://publications.waset.org/abstracts/search?q=Yongsop%20Shim"> Yongsop Shim</a>, <a href="https://publications.waset.org/abstracts/search?q=Yeonjae%20Lee"> Yeonjae Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Sangguk%20Ahn"> Sangguk Ahn</a>, <a href="https://publications.waset.org/abstracts/search?q=Hiesik%20Kim"> Hiesik Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jungil%20Park"> Jungil Park </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we presented not only development technology of an explosion proof type and portable combustible gas leak detector but also algorithm to improve accuracy for measuring gas concentrations. The presented techniques are to apply the flame-proof enclosure and intrinsic safe explosion proof to an infrared gas leak detector at first in Korea and to improve accuracy using linearization recursion equation and Lagrange interpolation polynomial. Together, we tested sensor characteristics and calibrated suitable input gases and output voltages. Then, we advanced the performances of combustible gaseous detectors through reflecting demands of gas safety management fields. To check performances of two company&#39;s detectors, we achieved the measurement tests with eight standard gases made by Korea Gas Safety Corporation. We demonstrated our instruments better in detecting accuracy other than detectors through experimental results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accuracy%20improvement" title="accuracy improvement">accuracy improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=IR%20gas%20sensor" title=" IR gas sensor"> IR gas sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=gas%20leak" title=" gas leak"> gas leak</a>, <a href="https://publications.waset.org/abstracts/search?q=detector" title=" detector"> detector</a> </p> <a href="https://publications.waset.org/abstracts/47808/research-on-development-and-accuracy-improvement-of-an-explosion-proof-combustible-gas-leak-detector-using-an-ir-sensor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47808.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">391</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9820</span> InfoMiracles in the Qur’an and a Mathematical Proof to the Existence of God</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Mahmoud%20Mandurah">Mohammad Mahmoud Mandurah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The existence of InfoMiracles in scripture is evidence that the scripture has a divine origin. It is also evidence to the existence of God. An InfoMiracle is an information-based miracle. The basic component of an InfoMiracle is a piece of information that could not be obtained by a human except through a divine channel. The existence of a sufficient number of convincing InfoMiracles in a scripture necessitates the existence of the divine source to these InfoMiracles. A mathematical equation is developed to prove that the Qur’an has a divine origin, and hence, prove the existence of God. The equation depends on a single variable only, which is the number of InfoMiracles in the Qur’an. The Qur’an is rich with InfoMiracles. It is shown that the existence of less than 30 InfoMiracles in the Qur’an is sufficient proof to the existence of God and that the Qur’an is a revelation from God. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=InfoMiracle" title="InfoMiracle">InfoMiracle</a>, <a href="https://publications.waset.org/abstracts/search?q=God" title=" God"> God</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematical%20proof" title=" mathematical proof"> mathematical proof</a>, <a href="https://publications.waset.org/abstracts/search?q=miracle" title=" miracle"> miracle</a>, <a href="https://publications.waset.org/abstracts/search?q=probability" title=" probability"> probability</a> </p> <a href="https://publications.waset.org/abstracts/142760/infomiracles-in-the-quran-and-a-mathematical-proof-to-the-existence-of-god" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142760.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9819</span> A Discovery of the Dual Sequential Pattern of Prime Numbers in P x P: Applications in a Formal Proof of the Twin-Prime Conjecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yingxu%20Wang">Yingxu Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work presents basic research on the recursive structures and dual sequential patterns of primes for the formal proof of the Twin-Prime Conjecture (TPC). A rigorous methodology of Twin-Prime Decomposition (TPD) is developed in MATLAB to inductively verify potential twins in the dual sequences of primes. The key finding of this basic study confirms that the dual sequences of twin primes are not only symmetric but also infinitive in the unique base 6 cycle, except a limited subset of potential pairs is eliminated by the lack of dual primality. Both theory and experiments have formally proven that the infinity of twin primes stated in TPC holds in the P x P space. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=number%20theory" title="number theory">number theory</a>, <a href="https://publications.waset.org/abstracts/search?q=primes" title=" primes"> primes</a>, <a href="https://publications.waset.org/abstracts/search?q=twin-prime%20conjecture" title=" twin-prime conjecture"> twin-prime conjecture</a>, <a href="https://publications.waset.org/abstracts/search?q=dual%20primes%20%28P%20x%20P%29" title=" dual primes (P x P)"> dual primes (P x P)</a>, <a href="https://publications.waset.org/abstracts/search?q=twin%20prime%20decomposition" title=" twin prime decomposition"> twin prime decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=formal%20proof" title=" formal proof"> formal proof</a>, <a href="https://publications.waset.org/abstracts/search?q=algorithm" title=" algorithm"> algorithm</a> </p> <a href="https://publications.waset.org/abstracts/182326/a-discovery-of-the-dual-sequential-pattern-of-prime-numbers-in-p-x-p-applications-in-a-formal-proof-of-the-twin-prime-conjecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182326.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9818</span> Optimality of Shapley Value Mechanism under Sybil Strategies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bruno%20Mazorra%20Roig">Bruno Mazorra Roig</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=game%20theory" title="game theory">game theory</a>, <a href="https://publications.waset.org/abstracts/search?q=mechanism%20design" title=" mechanism design"> mechanism design</a>, <a href="https://publications.waset.org/abstracts/search?q=cost%20sharing" title=" cost sharing"> cost sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=false-name%20proofness" title=" false-name proofness"> false-name proofness</a> </p> <a href="https://publications.waset.org/abstracts/179872/optimality-of-shapley-value-mechanism-under-sybil-strategies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179872.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9817</span> Developing Proof Demonstration Skills in Teaching Mathematics in the Secondary School</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Rodionov">M. Rodionov</a>, <a href="https://publications.waset.org/abstracts/search?q=Z.%20Dedovets"> Z. Dedovets</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article describes the theoretical concept of teaching secondary school students proof demonstration skills in mathematics. It describes in detail different levels of mastery of the concept of proof-which correspond to Piaget&rsquo;s idea of there being three distinct and progressively more complex stages in the development of human reflection. Lessons for each level contain a specific combination of the visual-figurative components and deductive reasoning. It is vital at the transition point between levels to carefully and rigorously recalibrate teaching to reflect the development of more complex reflective understanding. This can apply even within the same age range, since students will develop at different speeds and to different potential. The authors argue that this requires an aware and adaptive approach to lessons to reflect this complexity and variation. The authors also contend that effective teaching which enables students to properly understand the implementation of proof arguments must develop specific competences. These are: understanding of the importance of completeness and generality in making a valid argument; being task focused; having an internalised locus of control and being flexible in approach and evaluation. These criteria must be correlated with the systematic application of corresponding methodologies which are best likely to achieve success. The particular pedagogical decisions which are made to deliver this objective are illustrated by concrete examples from the existing secondary school mathematics courses. The proposed theoretical concept formed the basis of the development of methodological materials which have been tested in 47 secondary schools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=education" title="education">education</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching%20of%20mathematics" title=" teaching of mathematics"> teaching of mathematics</a>, <a href="https://publications.waset.org/abstracts/search?q=proof" title=" proof"> proof</a>, <a href="https://publications.waset.org/abstracts/search?q=deductive%20reasoning" title=" deductive reasoning"> deductive reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=secondary%20school" title=" secondary school"> secondary school</a> </p> <a href="https://publications.waset.org/abstracts/94718/developing-proof-demonstration-skills-in-teaching-mathematics-in-the-secondary-school" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9816</span> A Development of Portable Intrinsically Safe Explosion-Proof Type of Dual Gas Detector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sangguk%20Ahn">Sangguk Ahn</a>, <a href="https://publications.waset.org/abstracts/search?q=Youngyu%20Kim"> Youngyu Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaheon%20Gu"> Jaheon Gu</a>, <a href="https://publications.waset.org/abstracts/search?q=Gyoutae%20Park"> Gyoutae Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we developed a dual gas leak instrument to detect Hydrocarbon (HC) and Monoxide (CO) gases. To two kinds of gases, it is necessary to design compact structure for sensors. And then it is important to draw sensing circuits such as measuring, amplifying and filtering. After that, it should be well programmed with robust, systematic and module coding methods. In center of them, improvement of accuracy and initial response time are a matter of vital importance. To manufacture distinguished gas leak detector, we applied intrinsically safe explosion-proof structure to lithium ion battery, main circuits, a pump with motor, color LCD interfaces and sensing circuits. On software, to enhance measuring accuracy we used numerical analysis such as Lagrange and Neville interpolation. Performance test result is conducted by using standard Methane with seven different concentrations with three other products. We want raise risk prevention and efficiency of gas safe management through distributing to the field of gas safety. Acknowledgment: This study was supported by Small and Medium Business Administration under the research theme of ‘Commercialized Development of a portable intrinsically safe explosion-proof type dual gas leak detector’, (task number S2456036). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gas%20leak" title="gas leak">gas leak</a>, <a href="https://publications.waset.org/abstracts/search?q=dual%20gas%20detector" title=" dual gas detector"> dual gas detector</a>, <a href="https://publications.waset.org/abstracts/search?q=intrinsically%20safe" title=" intrinsically safe"> intrinsically safe</a>, <a href="https://publications.waset.org/abstracts/search?q=explosion%20proof" title=" explosion proof"> explosion proof</a> </p> <a href="https://publications.waset.org/abstracts/69836/a-development-of-portable-intrinsically-safe-explosion-proof-type-of-dual-gas-detector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69836.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">228</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9815</span> Transmission Loss Analysis for Panels Laminated with Felt and Film</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yoshio%20Kurosawa">Yoshio Kurosawa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To reduce the interior noise of cars in high-frequency region, sound proof materials are laminated with the body panels and the interior trims. Therefore, sound proof properties of the laminates play an important role for the efficient acoustical design. A program code which predicts both sound absorption properties and sound insulation properties of the laminates are developed. This program code is used for transfer matrix method by Biot theory. This report described the outline of this program code, and the calculation results almost agreed with the experimental results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=porous%20media" title="porous media">porous media</a>, <a href="https://publications.waset.org/abstracts/search?q=transmission%20loss" title=" transmission loss"> transmission loss</a>, <a href="https://publications.waset.org/abstracts/search?q=Biot%20theory" title=" Biot theory"> Biot theory</a>, <a href="https://publications.waset.org/abstracts/search?q=transfer%20matrix%20method" title=" transfer matrix method"> transfer matrix method</a> </p> <a href="https://publications.waset.org/abstracts/55769/transmission-loss-analysis-for-panels-laminated-with-felt-and-film" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55769.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">274</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9814</span> The Admissibility of Evidence Obtained in Contravention of the Right to Privacy in a Criminal Trial: A Comparative Study of Poland and Germany</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Konstancja%20Syller">Konstancja Syller</a> </p> <p class="card-text"><strong>Abstract:</strong></p> International law and European regulations remain hardly silent about the admissibility of evidence obtained illegally in a criminal trial. However, Article 6 of the European Convention on Human Rights guarantees the right to a fair trial, it does not normalise a proceeding status of specified sources or means of proof outright. Therefore, it is the preserve of national legislation and national law enforcement authorities to decide on this matter. In most countries, especially in Germany and Poland, a rather complex normative approach to the issue of proof obtained in violation of the right to privacy is evident, which pursues in practise to many interpretive doubts. In Germany the jurisprudence has a significant impact within the range of the matter mentioned above. The Constitutional Court and the Supreme Court of Germany protect the right to privacy quite firmly - they ruled on inadmissibility of obtaining a proof in the form of a diary or a journal as a protection measure of constitutional guaranteed right. At the same time, however, the Supreme Court is not very convinced with reference to the issue of whether materials collected as a result of an inspection, call recordings or listening to the premises, which were carried out in breach of law, can be used in a criminal trial. Generally speaking, German courts indicate a crucial importance of the principle of Truth and the principle of proportionality, which both enable a judgement to be made as to the possibility of using an evidence obtained unlawfully. Comparing, in Poland there is almost no jurisprudence of the Constitutional Tribunal relating directly to the issue of illegal evidence. It is somehow surprising, considering the doctrinal analysis of the admissibility of using such proof in a criminal trial is performed in relation to standards resulted from the Constitution. Moreover, a crucial de lega lata legal provision, which enables allowing a proof obtained in infringement of the provisions in respect of criminal proceedings or through a forbidden act, is widely criticised within the legal profession ant therefore many courts give it their own interpretation at odds with legislator’s intentions. The comparison of two civil law legal systems’ standards regarding to the admissibility of an evidence obtained in contravention of the right to privacy in a criminal trial, taking also into account EU legislation and judicature, is the conclusive aim of this article. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20trial" title="criminal trial">criminal trial</a>, <a href="https://publications.waset.org/abstracts/search?q=evidence" title=" evidence"> evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=Germany" title=" Germany"> Germany</a>, <a href="https://publications.waset.org/abstracts/search?q=right%20to%20privacy" title=" right to privacy"> right to privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=Poland" title=" Poland"> Poland</a> </p> <a href="https://publications.waset.org/abstracts/131119/the-admissibility-of-evidence-obtained-in-contravention-of-the-right-to-privacy-in-a-criminal-trial-a-comparative-study-of-poland-and-germany" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131119.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9813</span> Characteristics of Middle Grade Students&#039; Solution Strategies While Reasoning the Correctness of the Statements Related to Numbers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ay%C5%9Feg%C3%BCl%20%C3%87abuk">Ayşegül Çabuk</a>, <a href="https://publications.waset.org/abstracts/search?q=Mine%20I%C5%9F%C4%B1ksal"> Mine Işıksal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mathematics is a sense-making activity so that it requires meaningful learning. Hence based on this idea, meaningful mathematical connections are necessary to learn mathematics. At that point, the major question has become that which educational methods can provide opportunities to provide mathematical connections and to understand mathematics. The amalgam of reasoning and proof can be the one of the methods that creates opportunities to learn mathematics in a meaningful way. However, even if reasoning and proof should be included from prekindergarten to grade 12, studies in literature generally include secondary school students and pre-service mathematics teachers. With the light of the idea that the amalgam of reasoning and proof has significant effect on middle school students' mathematical learning, this study aims to investigate middle grade students' tendencies while reasoning the correctness of statements related to numbers. The sample included 272 middle grade students, specifically 69 of them were sixth grade students (25.4%), 101 of them were seventh grade students (37.1%) and 102 of them were eighth grade students (37.5%). Data was gathered through an achievement test including 2 essay types of problems about algebra. The answers of two items were analyzed both quantitatively and qualitatively in terms of students' solutions strategies while reasoning the correctness of the statements. Similar on the findings in the literature, most of the students, in all grade levels, used numerical examples to judge the statements. Moreover the results also showed that the majority of these students appear to believe that providing one or more selected examples is sufficient to show the correctness of the statement. Hence based on the findings of the study, even students in earlier ages have proving and reasoning abilities their reasoning's generally based on the empirical evidences. Therefore, it is suggested that examples and example-based reasoning can be a fundamental role on to generate systematical reasoning and proof insight in earlier ages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reasoning" title="reasoning">reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematics%20learning" title=" mathematics learning"> mathematics learning</a>, <a href="https://publications.waset.org/abstracts/search?q=middle%20grade%20students" title=" middle grade students"> middle grade students</a> </p> <a href="https://publications.waset.org/abstracts/17271/characteristics-of-middle-grade-students-solution-strategies-while-reasoning-the-correctness-of-the-statements-related-to-numbers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17271.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">423</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9812</span> Niche Authorities and Social Activism: Interrogating the Activities of Selected Bloggers in Ghana</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akosua%20Asantewaa%20Anane">Akosua Asantewaa Anane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media and its networking sites have become beneficial to society. With the advent of Web 2.0, many people are becoming technologically savvy and attracted to internet-based activities. With the click of a button, users are now sharing more information on topics, events and issues than before. A new phenomenon in the Ghanaian journalism sphere is the advent of blogger and citizen journalism, some of whom have become niche authorities. Niche authorities have emerged through the habitual and persistent curation of news on specific topics, resulting in the steady growth and emergence of valuable contributions to news sharing. Minimal studies have been conducted on niche authorities and their role in social activism in Ghana. This study, anchored on Cialdini’s Six Principles of Persuasion (reciprocation, consistency, social proof, liking, authority and scarcity), explores the features of niche authorities, their areas of expertise, as well as their authoritative voices in the curation of news stories. Using qualitative content analysis, cyber ethnography and thematic analysis of purposively sampled social media posts of five niche authorities, the study interrogates how these niche authorities employ the six principles of persuasion on their platforms to spark conversations on development, social inclusion and gender-based issues in the country. The study discusses how niche authorities deploy the principles in social activism and further recommends nurturing and mentoring communication strategies to progressively guide the youth to become future niche authorities in news curation and news sharing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20activism" title="social activism">social activism</a>, <a href="https://publications.waset.org/abstracts/search?q=cialdini%E2%80%99s%20six%20principles%20of%20persuasion" title=" cialdini’s six principles of persuasion"> cialdini’s six principles of persuasion</a>, <a href="https://publications.waset.org/abstracts/search?q=news%20curation" title=" news curation"> news curation</a>, <a href="https://publications.waset.org/abstracts/search?q=niche%20authorities" title=" niche authorities"> niche authorities</a> </p> <a href="https://publications.waset.org/abstracts/172275/niche-authorities-and-social-activism-interrogating-the-activities-of-selected-bloggers-in-ghana" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172275.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9811</span> Sustainable Urban Resilience and Climate-Proof Urban Planning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carmela%20Mariano">Carmela Mariano</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The literature, the scientific and disciplinary debate related to the impacts of climate change on the territory has highlighted, in recent years, the need for climate-proof and resilient tools of urban planning that adopt an integrated and inter-scalar approach for the construction of urban regeneration strategies by the objectives of the European Strategy on adaptation to climate change, the 2030 Agenda for Sustainable Development and the Climate Conference. This article addresses the operational implications of urban climate resilience in urban planning tools as a priority objective of policymakers (government bodies, institutions, etc.) to respond to the risks of climate change-related impacts on the environment. Within the general framework of the research activities carried out by the author, this article provides a critical synthesis of the analysis and evaluation of some case studies from the Italian national context, which enabled, through an inductive method, the assessment of the process of implementing the adaptation to climate change within the regional urban planning frameworks (regional urban laws), specific regional adaptation strategies or local adaptation plans and within the territorial and urban planning tools of a metropolitan or local scale. This study aims to identify theoretical–methodological, and operational references for the innovation and integration of planning tools concerning climate change that allow local planners to test these references in specific territorial contexts to practical adaptation strategies for local action. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=urban%20resilience" title="urban resilience">urban resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20regeneration" title=" urban regeneration"> urban regeneration</a>, <a href="https://publications.waset.org/abstracts/search?q=climate-proof-planning" title=" climate-proof-planning"> climate-proof-planning</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20planning" title=" urban planning"> urban planning</a> </p> <a href="https://publications.waset.org/abstracts/191774/sustainable-urban-resilience-and-climate-proof-urban-planning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">18</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9810</span> The Isolation and Performance Evaluation of Yeast (Saccharomyces cerevisiae) from Raffia Palm (Raphia hookeri) Wine Used at Different Concentrations for Proofing of Bread Dough</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elizabeth%20Chinyere%20Amadi">Elizabeth Chinyere Amadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Yeast (sacchoromyces cerevisiae) was isolated from the fermenting sap of raffia palm (Raphia hookeri) wine. Different concerntrations of the yeast isolate were used to produce bread samples – B, C, D, E, F containing (2, 3, 4, 5, 6) g of yeast isolate respectively, other ingredients were kept constant. Sample A, containing 2g of commercial baker yeast served as control. The proof heights, weights, volumes and specific volume of the dough and bread samples were determined. The bread samples were also subjected to sensory evaluation using a 9–point hedonic scale. Results showed that proof height increased with increased concentration of the yeast isolate; that is direct proportion. Sample B with the least concentration of the yeast isolate had the least loaf height and volume of 2.80c m and 200 cm³ respectively but exhibited the highest loaf weight of 205.50g. However, Sample A, (commercial bakers’ yeast) had the highest loaf height and volume of 5.00 cm and 400 cm³ respectively. The sensory evaluation results showed sample D compared favorably with sample A in all the organoleptic attributes-(appearance, taste, crumb texture, crust colour and overall acceptability) tested for (P< 0.05). It was recommended that 4g compressed yeast isolate per 100g flour could be used to proof dough as a substitute for commercial bakers’ yeast and produce acceptable bread loaves. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=isolation%20of%20yeast" title="isolation of yeast">isolation of yeast</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20evaluation%20of%20yeast" title=" performance evaluation of yeast"> performance evaluation of yeast</a>, <a href="https://publications.waset.org/abstracts/search?q=Raffia%20palm%20wine" title=" Raffia palm wine"> Raffia palm wine</a>, <a href="https://publications.waset.org/abstracts/search?q=used%20at%20different%20concentrations" title=" used at different concentrations"> used at different concentrations</a>, <a href="https://publications.waset.org/abstracts/search?q=proofing%20of%20bread%20dough" title=" proofing of bread dough"> proofing of bread dough</a> </p> <a href="https://publications.waset.org/abstracts/51506/the-isolation-and-performance-evaluation-of-yeast-saccharomyces-cerevisiae-from-raffia-palm-raphia-hookeri-wine-used-at-different-concentrations-for-proofing-of-bread-dough" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51506.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">318</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9809</span> Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sam%20Ng">Sam Ng</a>, <a href="https://publications.waset.org/abstracts/search?q=Lewis%20Leighton"> Lewis Leighton</a>, <a href="https://publications.waset.org/abstracts/search?q=Sam%20Atkinson"> Sam Atkinson</a>, <a href="https://publications.waset.org/abstracts/search?q=Carson%20Yan"> Carson Yan</a>, <a href="https://publications.waset.org/abstracts/search?q=Landan%20Hu"> Landan Hu</a>, <a href="https://publications.waset.org/abstracts/search?q=Leslie%20Cheung"> Leslie Cheung</a>, <a href="https://publications.waset.org/abstracts/search?q=Brian%20Yap"> Brian Yap</a>, <a href="https://publications.waset.org/abstracts/search?q=Kent%20Lung"> Kent Lung</a>, <a href="https://publications.waset.org/abstracts/search?q=Ketat%20Sarakune"> Ketat Sarakune</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=crypto-currency" title=" crypto-currency"> crypto-currency</a>, <a href="https://publications.waset.org/abstracts/search?q=proof-of-reserve" title=" proof-of-reserve"> proof-of-reserve</a>, <a href="https://publications.waset.org/abstracts/search?q=por" title=" por"> por</a>, <a href="https://publications.waset.org/abstracts/search?q=zero-knowledge" title=" zero-knowledge"> zero-knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=ZKP" title=" ZKP"> ZKP</a> </p> <a href="https://publications.waset.org/abstracts/173727/zero-knowledge-proof-of-reserve-a-confidential-approach-to-cryptocurrency-asset-verification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/173727.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9808</span> CSR Reporting, State Ownership, and Corporate Performance in China: Proof from Longitudinal Data of Publicly Traded Enterprises from 2006 to 2020</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wanda%20Luen-Wun%20Siu">Wanda Luen-Wun Siu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaowen%20Zhang"> Xiaowen Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper offered the primary methodical proof on how CSR reporting related to enterprise earnings in listed firms in China in light of most evidence focusing on cross-sectional data or data in a short span of time. Using full economic and business panel data on China’s publicly listed enterprise from 2006 to 2020 over two decades in the China Stock Market and Accounting Research database, we found initial evidence of significant direct relations between CSR reporting and firm corporate performance in both state-owned and privately owned firms over this period, supporting the stakeholder theory. Results also revealed that state-owned enterprises performed as well as private enterprises in the current period. But private enterprises performed better than state-owned enterprises in the subsequent years. Moreover, the release of social responsibility reports had a more significant impact on the financial performance of state-owned and private enterprises in the current period than in the subsequent periods. Specifically, CSR release was not significantly associated with the financial performance of state-owned enterprises on the lag of the first, second, and third periods. But it had an impact on the lag of the first, second, and third periods among private enterprises. Such findings suggested that CSR reporting helped improve the corporate financial performance of state-owned and private enterprises in the current period, but this kind of effect was more significant among private enterprises in the lag periods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=China%E2%80%99s%20listed%20firms" title="China’s listed firms">China’s listed firms</a>, <a href="https://publications.waset.org/abstracts/search?q=CSR%20reporting" title=" CSR reporting"> CSR reporting</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20performance" title=" financial performance"> financial performance</a>, <a href="https://publications.waset.org/abstracts/search?q=panel%20analysis" title=" panel analysis"> panel analysis</a> </p> <a href="https://publications.waset.org/abstracts/141247/csr-reporting-state-ownership-and-corporate-performance-in-china-proof-from-longitudinal-data-of-publicly-traded-enterprises-from-2006-to-2020" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141247.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">167</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9807</span> A Proof for Goldbach&#039;s Conjecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hashem%20Sazegar">Hashem Sazegar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In 1937, Vinograd of Russian Mathematician proved that each odd large number can be shown by three primes. In 1973, Chen Jingrun proved that each odd number can be shown by one prime plus a number that has maximum two primes. In this article, we state one proof for Goldbach’conjecture. Introduction: Bertrand’s postulate state for every positive integer n, there is always at least one prime p, such that n < p < 2n. This was first proved by Chebyshev in 1850, which is why postulate is also called the Bertrand-Chebyshev theorem. Legendre’s conjecture states that there is a prime between n2 and (n+1)2 for every positive integer n, which is one of the four Landau’s problems. The rest of these four basic problems are; (i) Twin prime conjecture: There are infinitely many primes p such that p+2 is a prime. (ii) Goldbach’s conjecture: Every even integer n > 2 can be written asthe sum of two primes. (iii) Are there infinitely many primes p such that p−1 is a perfect square? Problems (i), (ii), and (iii) are open till date. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bertrand-Chebyshev%20theorem" title="Bertrand-Chebyshev theorem">Bertrand-Chebyshev theorem</a>, <a href="https://publications.waset.org/abstracts/search?q=Landau%E2%80%99s%20problems" title=" Landau’s problems"> Landau’s problems</a>, <a href="https://publications.waset.org/abstracts/search?q=twin%20prime" title=" twin prime"> twin prime</a>, <a href="https://publications.waset.org/abstracts/search?q=Legendre%E2%80%99s%20conjecture" title=" Legendre’s conjecture"> Legendre’s conjecture</a>, <a href="https://publications.waset.org/abstracts/search?q=Oppermann%E2%80%99s%20conjecture" title=" Oppermann’s conjecture"> Oppermann’s conjecture</a> </p> <a href="https://publications.waset.org/abstracts/30678/a-proof-for-goldbachs-conjecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30678.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9806</span> Accelerated Expansion of a Matter-Antimatter Universe and Gravity as an Electromagnetic Force</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maarten%20J.%20Van%20der%20Burgt">Maarten J. Van der Burgt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A universe containing matter and antimatter can only exist when matter and antimatter repel each other. Such a system, where like attracts like and like repels unlike, will always expand. Calculations made for such a symmetric universe demonstrate that the expansion is consistent with Hubble’s law, the observed increase in the expansion velocity with time, the initial high acceleration and the foam structure of the universe. Conversely, these observations can be considered as proof for a symmetrical universe and for antimatter possessing a negative gravitational mass. A second proof can be found by reinterpreting the behavior of relativistic moving charged particles. Attributing their behavior to a charge defect of √(1-v2/c2) instead of to a mass defect of 1/√(1-v2/c2) makes it plausible that gravitation is an electromagnetic force, as already suggested by Feynman. This would automatically imply that antimatter has a negative gravitational mass. These proofs underpin the untenability of the Weak Equivalence Principle which states that in a gravitational field all structure less point-like particles follow the same path. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=celestial%20mechanics" title="celestial mechanics">celestial mechanics</a>, <a href="https://publications.waset.org/abstracts/search?q=cosmology" title=" cosmology"> cosmology</a>, <a href="https://publications.waset.org/abstracts/search?q=gravitation%20astrophysics" title=" gravitation astrophysics"> gravitation astrophysics</a>, <a href="https://publications.waset.org/abstracts/search?q=origin%20of%20structure" title=" origin of structure"> origin of structure</a>, <a href="https://publications.waset.org/abstracts/search?q=miscellaneous%20%28matter%20and%20antimatter%29" title=" miscellaneous (matter and antimatter)"> miscellaneous (matter and antimatter)</a> </p> <a href="https://publications.waset.org/abstracts/57939/accelerated-expansion-of-a-matter-antimatter-universe-and-gravity-as-an-electromagnetic-force" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57939.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">228</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9805</span> A Three-Dimensional Assessment Approach on Sustainable Development Process of Sportswear Products</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Y.%20N.%20Fung">Y. N. Fung</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Liu"> R. Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20M.%20Choi"> T. M. Choi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The life cycle assessment (LCA) is widely applied in the study of the sustainable fashion industry. Through the LCA, the social, environmental, and economic performances of the fashion industry can be assessed, which helps sustainable product developers (designers, retailers, and manufacturers) to address problems in product development. In prior studies, environmental impact, economic performance, and social responsibility are commonly considered separately. Inter-relations between dimensions of sustainability and LCA are rarely reported. The development process of sustainable sportswear products is complicated. Changes in the product components (e.g., materials, manufacturing methods, and product design) of sportswear will correspondingly influence supply chain activities and meanwhile affect environmental, economic, and social performances. In this study, the interrelations between different LCAs and how the interrelated LCAs can help product developers to strike a balance among environmental, economic, and social performances are explored. Based on the findings, a three-dimensional assessment framework on the sustainability life cycle is introduced. To examine the applicability of the developed framework, proof-of-concept sportswear legging products were developed. The developed sportswear legging products were assessed in terms of the interrelated dimensions of environmental, economic, and social performances. The results demonstrate the effects of shifting in desig¬n details and product functions on the environmental, social, and economic performances of sportswear products. The outcome of this study provides insights on the approach to balance sustainability and the development of cost-effective and sustainable sportswear products for sportswear developers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sustainable%20development" title="sustainable development">sustainable development</a>, <a href="https://publications.waset.org/abstracts/search?q=sports%20fashion" title=" sports fashion"> sports fashion</a>, <a href="https://publications.waset.org/abstracts/search?q=life%20cycle%20assessment" title=" life cycle assessment"> life cycle assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=indicators%20for%20sustainability" title=" indicators for sustainability"> indicators for sustainability</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainability%20impacts" title=" sustainability impacts"> sustainability impacts</a> </p> <a href="https://publications.waset.org/abstracts/134943/a-three-dimensional-assessment-approach-on-sustainable-development-process-of-sportswear-products" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134943.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9804</span> Remote Sensing of Aerated Flows at Large Dams: Proof of Concept</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20El%20Naggar">Ahmed El Naggar</a>, <a href="https://publications.waset.org/abstracts/search?q=Homyan%20Saleh"> Homyan Saleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Dams are crucial for flood control, water supply, and the creation of hydroelectric power. Every dam has a water conveyance system, such as a spillway, providing the safe discharge of catastrophic floods when necessary. Spillway design has historically been investigated in laboratory research owing to the absence of suitable full-scale flow monitoring equipment and safety problems. Prototype measurements of aerated flows are urgently needed to quantify projected scale effects and provide missing validation data for design guidelines and numerical simulations. In this work, an image-based investigation of free-surface flows on a tiered spillway was undertaken at the laboratory (fixed camera installation) and prototype size (drone video) (drone footage) (drone footage). The drone videos were generated using data from citizen science. Analyses permitted the measurement of the free-surface aeration inception point, air-water surface velocities, fluctuations, and residual energy at the chute's downstream end from a remote site. The prototype observations offered full-scale proof of concept, while laboratory results were efficiently confirmed against invasive phase-detection probe data. This paper stresses the efficacy of image-based analyses at prototype spillways. It highlights how citizen science data may enable academics better understand real-world air-water flow dynamics and offers a framework for a small collection of long-missing prototype data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=remote%20sensing" title="remote sensing">remote sensing</a>, <a href="https://publications.waset.org/abstracts/search?q=aerated%20flows" title=" aerated flows"> aerated flows</a>, <a href="https://publications.waset.org/abstracts/search?q=large%20dams" title=" large dams"> large dams</a>, <a href="https://publications.waset.org/abstracts/search?q=proof%20of%20concept" title=" proof of concept"> proof of concept</a>, <a href="https://publications.waset.org/abstracts/search?q=dam%20spillways" title=" dam spillways"> dam spillways</a>, <a href="https://publications.waset.org/abstracts/search?q=air-water%20flows" title=" air-water flows"> air-water flows</a>, <a href="https://publications.waset.org/abstracts/search?q=prototype%20operation" title=" prototype operation"> prototype operation</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20sensing" title=" remote sensing"> remote sensing</a>, <a href="https://publications.waset.org/abstracts/search?q=inception%20point" title=" inception point"> inception point</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20flow" title=" optical flow"> optical flow</a>, <a href="https://publications.waset.org/abstracts/search?q=turbulence" title=" turbulence"> turbulence</a>, <a href="https://publications.waset.org/abstracts/search?q=residual%20energy" title=" residual energy"> residual energy</a> </p> <a href="https://publications.waset.org/abstracts/166373/remote-sensing-of-aerated-flows-at-large-dams-proof-of-concept" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166373.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9803</span> On the Cyclic Property of Groups of Prime Order</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ying%20Yi%20Wu">Ying Yi Wu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study of finite groups is a central topic in algebraic structures, and one of the most fundamental questions in this field is the classification of finite groups up to isomorphism. In this paper, we investigate the cyclic property of groups of prime order, which is a crucial result in the classification of finite abelian groups. We prove the following statement: If p is a prime, then every group G of order p is cyclic. Our proof utilizes the properties of group actions and the class equation, which provide a powerful tool for studying the structure of finite groups. In particular, we first show that any non-identity element of G generates a cyclic subgroup of G. Then, we establish the existence of an element of order p, which implies that G is generated by a single element. Finally, we demonstrate that any two generators of G are conjugate, which shows that G is a cyclic group. Our result has significant implications in the classification of finite groups, as it implies that any group of prime order is isomorphic to the cyclic group of the same order. Moreover, it provides a useful tool for understanding the structure of more complicated finite groups, as any finite abelian group can be decomposed into a direct product of cyclic groups. Our proof technique can also be extended to other areas of group theory, such as the classification of finite p-groups, where p is a prime. Therefore, our work has implications beyond the specific result we prove and can contribute to further research in algebraic structures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=group%20theory" title="group theory">group theory</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20groups" title=" finite groups"> finite groups</a>, <a href="https://publications.waset.org/abstracts/search?q=cyclic%20groups" title=" cyclic groups"> cyclic groups</a>, <a href="https://publications.waset.org/abstracts/search?q=prime%20order" title=" prime order"> prime order</a>, <a href="https://publications.waset.org/abstracts/search?q=classification." title=" classification."> classification.</a> </p> <a href="https://publications.waset.org/abstracts/163778/on-the-cyclic-property-of-groups-of-prime-order" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163778.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">84</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9802</span> Formal Asymptotic Stability Guarantees, Analysis, and Evaluation of Nonlinear Controlled Unmanned Aerial Vehicle for Trajectory Tracking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Soheib%20Fergani">Soheib Fergani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper concerns with the formal asymptotic stability guarantees, analysis and evaluation of a nonlinear controlled unmanned aerial vehicles (uav) for trajectory tracking purpose. As the system has been recognised as an under-actuated non linear system, the control strategy has been oriented towards a hierarchical control. The dynamics of the system and the mission purpose make it mandatory to provide an absolute proof of the vehicle stability during the maneuvers. For this sake, this work establishes the complete theoretical proof for an implementable control oriented strategy that asymptotically stabilizes (GAS and LISS) the system and has never been provided in previous works. The considered model is reorganized into two partly decoupled sub-systems. The concidered control strategy is presented into two stages: the first sub-system is controlled by a nonlinear backstepping controller that generates the desired control inputs to stabilize the second sub-system. This methodology is then applied to a harware in the loop uav simulator (SiMoDrones) that reproduces the realistic behaviour of the uav in an indoor environment has been performed to show the efficiency of the proposed strategy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=UAV%20application" title="UAV application">UAV application</a>, <a href="https://publications.waset.org/abstracts/search?q=trajectory%20tracking" title=" trajectory tracking"> trajectory tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=backstepping" title=" backstepping"> backstepping</a>, <a href="https://publications.waset.org/abstracts/search?q=sliding%20mode%20control" title=" sliding mode control"> sliding mode control</a>, <a href="https://publications.waset.org/abstracts/search?q=input%20to%20state%20stability" title=" input to state stability"> input to state stability</a>, <a href="https://publications.waset.org/abstracts/search?q=stability%20evaluation" title=" stability evaluation"> stability evaluation</a> </p> <a href="https://publications.waset.org/abstracts/185079/formal-asymptotic-stability-guarantees-analysis-and-evaluation-of-nonlinear-controlled-unmanned-aerial-vehicle-for-trajectory-tracking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185079.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9801</span> Anti-Social Media: Implications of Social Media in the Form of Stressors on Our Daily Lives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aimen%20Batool%20Bint-E-Rashid">Aimen Batool Bint-E-Rashid</a>, <a href="https://publications.waset.org/abstracts/search?q=Huma%20Irfan"> Huma Irfan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research aims to investigate the role of social media (Snapchat, Facebook, Twitter, etc.) in our daily lives and its implication on our everyday routine in the form of stressors. The study has been validated by a social media survey with 150 social media users belonging to various age groups. The study explores how social media can make an individual anti-social in his or her life offline. To explain the phenomenon, we have proposed and evaluated a model based on social media usage and stressors including burnout and social overload. Results, through correlation and regression tests, have revealed that with increase in social media usage, social overload and burnout also increases. Evidence for the fact that excessive social media usage causes social overload and burnout has been provided in the study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=burnout" title="burnout">burnout</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20exhaustion" title=" emotional exhaustion"> emotional exhaustion</a>, <a href="https://publications.waset.org/abstracts/search?q=fatigue" title=" fatigue"> fatigue</a>, <a href="https://publications.waset.org/abstracts/search?q=stressors" title=" stressors"> stressors</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networking" title=" social networking"> social networking</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20overload" title=" social overload"> social overload</a> </p> <a href="https://publications.waset.org/abstracts/96607/anti-social-media-implications-of-social-media-in-the-form-of-stressors-on-our-daily-lives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96607.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">207</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=327">327</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=328">328</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=social%20proof&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10