• 제목/요약/키워드: Proofs

검색결과 343건 처리시간 0.027초

GENERALIZED SET-VALUED MIXED NONLINEAR QUASI VARLIATIONAL INEQUALITIES

  • H, M-U
    • Journal of applied mathematics & informatics
    • /
    • 제5권1호
    • /
    • pp.73-90
    • /
    • 1998
  • In this paper we introduce and study a number of new classes of quasi variational inequalities. using essentially the projection technique and its variant forms we prove that the gen-eralized set-valued mixed quasivariational inequalities are equivalent to the fixed point problem and the Wiener-Hopf equations(normal maps). This equivalence enables us to suggest a number of iterative algorithms solving the generalized variational inequalities. As a special case of the generalized set-valued mixed quasi variational in-equalities we obtain a class of quasi variational inequalities studied by Siddiqi Husain and Kazmi [35] but there are several inaccuracies in their formulation of the problem the statement and the proofs of the problem the statement and the proofs of their results. We have removed these inaccuracies. The correct formulation of thir results can be obtained as special cases from our main results.

THE FROBENIUS PROBLEM FOR NUMERICAL SEMIGROUPS GENERATED BY THE THABIT NUMBERS OF THE FIRST, SECOND KIND BASE b AND THE CUNNINGHAM NUMBERS

  • Song, Kyunghwan
    • 대한수학회보
    • /
    • 제57권3호
    • /
    • pp.623-647
    • /
    • 2020
  • The greatest integer that does not belong to a numerical semigroup S is called the Frobenius number of S. The Frobenius problem, which is also called the coin problem or the money changing problem, is a mathematical problem of finding the Frobenius number. In this paper, we introduce the Frobenius problem for two kinds of numerical semigroups generated by the Thabit numbers of the first kind, and the second kind base b, and by the Cunningham numbers. We provide detailed proofs for the Thabit numbers of the second kind base b and omit the proofs for the Thabit numbers of the first kind base b and Cunningham numbers.

ERRATUM: “A FIXED POINT METHOD FOR PERTURBATION OF BIMULTIPLIERS AND JORDAN BIMULTIPLIERS IN C*-TERNARY ALGEBRAS” [J. MATH. PHYS. 51, 103508 (2010)]

  • YUN, SUNGSIK;GORDJI, MADJID ESHAGHI;SEO, JEONG PIL
    • 한국수학교육학회지시리즈B:순수및응용수학
    • /
    • 제23권3호
    • /
    • pp.237-246
    • /
    • 2016
  • Ebadian et al. proved the Hyers-Ulam stability of bimultipliers and Jordan bimultipliers in C*-ternary algebras by using the fixed point method. Under the conditions in the main theorems for bimultipliers, we can show that the related mappings must be zero. Moreover, there are some mathematical errors in the statements and the proofs of the results. In this paper, we correct the statements and the proofs of the results, and prove the corrected theorems by using the direct method.

동양문고소장 중간본 "주제군징"에 대하여 -특히 판본과 그 자료적 가치를 중심으로- (A Study of the Chuchih $Ch'unch\hat{e}ng$, or 'Proofs of Providence,' with Emphasis on Its Impression and Value)

  • 심우준
    • 한국문헌정보학회지
    • /
    • 제1권
    • /
    • pp.77-102
    • /
    • 1970
  • The writer discusses about the value of the two-volume Chuchih $Ch'unch\hat{e}ng$ in the Toyo Bunko in terms of its history and contents. The book is an incomplete reprint without preface. However, it has no error in its contents through the three elaborate revisions. The writer defines the book as a scientific and religious work. The author shows in the first volume his hypothesis, analysis, and conclusion, of the order of the things in the universe and in the second volume tries to prove the God's existence and Divine Providence. The proofs presented are related to the scientific thoughts of the West in the 17th century.

  • PDF

라카토스의 보조정리 합체법을 적용한 교수-학습 자료 개발 (Development of teaching-learning materials in lemma-incorporation method of Lakatos)

  • 조열제;류수정;유익승;김태호
    • 한국수학교육학회지시리즈E:수학교육논문집
    • /
    • 제20권3호
    • /
    • pp.361-372
    • /
    • 2006
  • 본 연구에서는 Lakatos의 보조정리 합체법을 바탕으로, 이등변삼각형의 성질 중의 1가지를 추측-증명-반박-개선을 통해 n각형으로 확장시키고, 중 고등학생들을 대상으로 하는 심화활동 시간에 활용할 수 있는 교수-학습 자료를 개발하였다.

  • PDF

무한강하법을 이용한 증명지도의 연구 (A Study on the Teaching of Proofs using the Method of Infinite Descent)

  • 이동원;김부윤;정영우
    • East Asian mathematical journal
    • /
    • 제32권2호
    • /
    • pp.193-215
    • /
    • 2016
  • There are three subjects in the study. First, after investigating the development process of the method of infinite descent and the reduction to absurdity, we prove them to be equivalent each other. Second, we apply the method of infinite descent to some problems in textbook and compare it with the reduction to absurdity. Finally, we discuss on teaching proofs with the method of infinite descent.

등주문제에서 해의 존재성 고찰 (A Study on the Existence of the Solution in the Isoperimetric Problem)

  • 이호수;최근배
    • East Asian mathematical journal
    • /
    • 제36권2호
    • /
    • pp.131-146
    • /
    • 2020
  • The isoperimetric problem is a well-known optimization problem from ancient Greek. Among plane figures with the same perimeter, which is the largest area surrounded? The answer to the question is circle. Zenodorus and Steiner's pure geometric proofs, which left a lot of achievements in this matter, looked beautiful with ideas at that time. But there was a fatal flaw in the proof. The weakness is related to the existence of the solution. In this paper, from a view of the existence of the solution, we investigate proofs of Zenodorus and Steiner and get educational implications.

출력장치의 인쇄특성을 고려한 모니텅상의 컬러교정 (A Studyt on the soft-proofing method on Monitor using characteristics of printing device)

  • 송경철;강상훈
    • 한국인쇄학회:학술대회논문집
    • /
    • 한국인쇄학회 2000년도 춘계 학술발표회 논문집
    • /
    • pp.45-55
    • /
    • 2000
  • Recently, as the prepress mainstream is changed to the digital wolkflow, various digital proofing systems such as high price dye sublimation printers and low price ink jet printers are widely used in printing industry. Generally, CRT monitors are also often used as a soft proofing device for hard-copy image output. However, displayed color image on CRT monitor does not match to the actual color printing sheets. Because, the color space of CRT monitor used RGB color space, and it is differ with printing device color space, CMY. Therefore, proper color compensations are needed to match the colors between hard-copy proofs on the printing device and soft copy proofs on the monitor. For the proper compensation, we used LUT and gamut mapping method for color space transformation between device dependent color space and device independent color space, vis a vis. This paper shows the application method and the usefulness of CRT monitor for the soft-copy proofing using the output characteristics of printing device.

출력장치의 인쇄특성을 고려한 디지털 컬러교정에 관한 연구 (A Study on digital color proofing method considering the printing characteristics of output device)

  • 송경철;강상훈
    • 한국인쇄학회지
    • /
    • 제18권2호
    • /
    • pp.69-82
    • /
    • 2000
  • Recently, as the prepress mainstream is changed to the digital workflow, various digital proofing systems such as high price dye sublimation printers and low price ink jet printers are widely used in printing industry. CRT monitors are also often used as a soft proofing device. However, it is very difficult to match the color image displayed on CRT monitors to the actual images printed on papers, because the color space of CRT monitors is RGB color system, and it is different with the CMY color system of the printing devices. Therefore, proper color compensations are needed to match the colors between hard-copy proofs on the printing device and soft copy proofs on CRT monitors. This paper shows the LUT and gamut mapping method considering the printing characteristics of output device is useful for the compensation.

  • PDF

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • 제11권1호
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.