نتایج جستجو برای: or proof
تعداد نتایج: 3619989 فیلتر نتایج به سال:
given the importance of intellect in inference, especially in new issues, it is befitting to study the jurists’ works, such as examining the jurisprudential mode of life (sīra) of fayḍ kāshānī as an influential jurist in the evolution of jurisprudence in proving the above issue. to this end, his various books have been examined on the basis of content analysis method and every one of his legal ...
in this paper, we give a complete proof of theorem 4.1(ii) and a new elementary proof of theorem 4.1(i) in [li and shen, on the intersection of the normalizers of the derived subgroups of all subgroups of a finite group, j. algebra, 323 (2010) 1349--1357]. in addition, we also give a generalization of baer's theorem.
In this paper, we give a complete proof of Theorem 4.1(ii) and a new elementary proof of Theorem 4.1(i) in [Li and Shen, On the intersection of the normalizers of the derived subgroups of all subgroups of a finite group, J. Algebra, 323 (2010) 1349--1357]. In addition, we also give a generalization of Baer's Theorem.
Let G be a finite group and let $GK(G)$ be the prime graph of G. We assume that $n$ is an odd number. In this paper, we show that if $GK(G)=GK(B_n(p))$, where $ngeq 9$ and $pin {3,5,7}$, then G has a unique nonabelian composition factor isomorphic to $B_n(p)$ or $C_n(p)$ . As consequences of our result, $B_n(p)$ is quasirecognizable by its spectrum and also by a new proof, the ...
مفهوم اثبات در چند دهۀ اخیر مناقشهآمیز شده است. به طوری که افراد نظریههای مختلفی دربارۀ چیستی اثبات ارائه دادهاند. لاکاتوش و هرش از جملۀ این افراد هستند. نظریههای این دو فیلسوف شباهتها و اختلافات قابل توجهی دارند. به نظر میرسد که با مقایسه و بررسی نقادانۀ این دو نظریه فهم بهتری از مفهوم اثبات ریاضیاتی به دست خواهد آمد. دو وجه شباهت مهم بین این دو نظریه عبارتند از: دوگانهانگاری در اثبات ...
The first step in the verification of cryptographic protocols is to decide the intruder deduction problem, that is the vulnerability to a so-called passive attacker. We extend the Dolev-Yao model in order to model this problem in presence of the equational theory of a commutative encryption operator which distributes over the exclusive-or operator. The interaction between the commutative distri...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید