Results 1 to 10 of about 2,101,045 (186)

A New Kind of Aesthetics —The Mathematical Structure of the Aesthetic

open access: yesPhilosophies, 2017
This paper proposes a new approach to the investigation into aesthetics. Specifically, it~argues that it is possible to explain the aesthetic and its underlying dynamic relations with an~axiomatic structure (the octahedral axiom-derived category) based ...
Akihiro Kubota   +3 more
doaj   +3 more sources

Examining the learning process of simple mathematical structures [PDF]

open access: yesYıldız Journal of Educational Research, 2023
A structure is a construction block that is formed under some specific rule, theory, axiom, etc. Mathematical structures, on the other hand, consist of elements and with these elements acting together, the structure gains integrity. Especially in teacher
Özlem ÇEZİKTÜRK   +8 more
doaj   +1 more source

Characterizing mathematical discourse according to teacher and student interactions: The core of mathematical discourse [PDF]

open access: yesJournal of Pedagogical Research, 2023
The discussion on the development of mathematical discourse plays a key role in the determination of the in-classroom interactions in mathematics learning and instruction.
Sedef Çelik Demirci, Adnan Baki
doaj   +1 more source

Factoring the Modulus of Type N = p2q by Finding Small Solutions of the Equation er − (Ns + t) = αp2 + βq2

open access: yesMathematics, 2021
The modulus of type N=p2q is often used in many variants of factoring-based cryptosystems due to its ability to fasten the decryption process. Faster decryption is suitable for securing small devices in the Internet of Things (IoT) environment or ...
Muhammad Asyraf Asbullah   +3 more
doaj   +1 more source

The mathematics of thin structures

open access: yesQuarterly of Applied Mathematics, 2022
This article offers various mathematical contributions to the behavior of thin films. The common thread is to view thin film behavior as the variational limit of a three-dimensional domain with a related behavior when the thickness of that domain vanishes.
Babadjian J. -F.   +5 more
openaire   +6 more sources

Perceptual and Number Effects on Students’ Initial Solution Strategies in an Interactive Online Mathematics Game

open access: yesJournal of Numerical Cognition, 2022
This study investigated the effects of 1) proximal grouping of numbers, 2) problem-solving goals to make 100, and 3) prior knowledge on students’ initial solution strategies in an interactive online mathematics game. In this game, students transformed an
Ji-Eun Lee   +3 more
doaj   +1 more source

Systematic Review on Local Ancestor Inference From a Mathematical and Algorithmic Perspective

open access: yesFrontiers in Genetics, 2021
Genotypic data provide deep insights into the population history and medical genetics. The local ancestry inference (LAI) (also termed local ancestry deconvolution) method uses the hidden Markov model (HMM) to solve the mathematical problem of ancestry ...
Jie Wu   +3 more
doaj   +1 more source

Square Integer Matrix with a Single Non-Integer Entry in Its Inverse

open access: yesMathematics, 2021
Matrix inversion is one of the most significant operations on a matrix. For any non-singular matrix A∈Zn×n, the inverse of this matrix may contain countless numbers of non-integer entries. These entries could be endless floating-point numbers.
Arif Mandangan   +2 more
doaj   +1 more source

Microscopic theory of light-induced ultrafast skyrmion excitation in transition metal films

open access: yesnpj Computational Materials, 2022
Magnetic skyrmions are topological excitations of great promise for compact and efficient memory storage. However, to interface skyrmionics with electronic devices requires efficient and reliable ways of creating and destroying such excitations.
Emil Viñas Boström   +2 more
doaj   +1 more source

Findings Annihilator(s) via Fault Injection Attack (FIA) on Boolean Function of Grain v0 [PDF]

open access: yesITM Web of Conferences, 2019
In developing stream cipher algorithms, Boolean function is one of vital elements. Attacks on LFSR-based stream cipher is the challenge for the cryptanalyst to get low-degree annihilator(s).
Ariffin Muhammad Rezal Kamel   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy