-
141
MOBILE LEARNING BERBASIS HTML 5 DALAM MATA PELAJARAN PENDIDIKAN AGAMA ISLAM
Published 2019-06-01“…Before being given treatment, the experimental group was first given prestige, then given treatment with the application of HTML 5-based mobile learning and after that was given a post. …”
Get full text
Article -
142
Word order in utterances of direct speech in English: a subtle balance between conventions and innovation
Published 2013-12-01“…Even though word order differs from one language to another, a given person who speaks his/her own mother tongue is normally able to say whether a given utterance is grammatical or not. …”
Get full text
Article -
143
About Qualifications in the List of Specialties and Areas of Preparation for Higher Education
Published 2021-09-01“…The article analyzes the draft order of the Ministry of Science and Higher Education of Russia «On the approval of the list of specialties and areas of training for higher education» for the names of qualifications given in the list of specialties and areas of training for higher education. …”
Get full text
Article -
144
ANALYSIS OF CONTROL METHODS FOR LED BACKLIGHTING OF DISPLAY DEVICES
Published 2018-08-01Get full text
Article -
145
Conjugacy Separability of Some One-Relator Groups
Published 2010-01-01“…The proof made used of theoretical combinatorial group methods, namely the structure of amalgamated free products and some properties of the subgroups and quotients of any group of the class of one-relator groups given above.…”
Get full text
Article -
146
A Note on Orthogonal Fuzzy Metric Space, Its Properties, and Fixed Point Theorems
Published 2022-01-01“…However, this article outstretches the above-mentioned notion further into a newly defined concept, named as orthogonal picture fuzzy metric space. A detailed insight is given into the topic by presenting some fixed point results in the frame of the newly defined structure. …”
Get full text
Article -
147
Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher
Published 2023-04-01“…The neural distinguisher is a new tool widely used in crypto analysis of some ciphers.For SIMON-like block ciphers, there are multiple choices for their parameters, but the reasons for designer’s selection remain unexplained.Using neural distinguishers, the security of the parameters (a,b,c) of the SIMON-like with a block size of 32 bits was researched, and good choices of parameters were given.Firstly, using the idea of affine equivalence class proposed by Kölbl et al.in CRYPTO2015, these parameters can be divided into 509 classes.And 240 classes which satisfied gcd(a-b,2)=1 were mainly researched.Then a SAT/SMT model was built to help searching differential characteristics for each equivalent class.From these models, the optimal differential characteristics of SIMON-like was obtained.Using these input differences of optimal differential characteristics, the neural distinguishers were trained for the representative of each equivalence class, and the accuracy of the distinguishers was saved.It was found that 20 optimal parameters given by Kölbl et al.cannot make the neural distinguishers the lowest accuracy.On the contrary, there were 4 parameters, whose accuracy exceeds 80%.Furthermore, the 4 parameters were bad while facing neural distinguishers.Finally, comprehensively considering the choice of Kölbl et al.and the accuracy of different neural distinguishers, three good parameters, namely (6,11,1),(1,8,3), and(6,7,5) were given.…”
Get full text
Article -
148
Comparing Motahari and Allameh Asgari's Views on the Meaning and Examples of ‘Affair’
Published 2024-05-01“…The word affair has not been given due attention in the books of advanced theologians, but its related topics have been discussed as the nature, benefit, philosophy, or necessity of prophecy and Imamate. …”
Get full text
Article -
149
Diversity in the medical research ecosystem: a descriptive scientometric analysis of over 49 000 studies and 150 000 authors published in high-impact medical journals between 2007...
Published 2025-01-01“…On average, approximately one-third (33.1%) of the authors of a given paper were inferred to be women; this result was consistent across the journals we studied. …”
Get full text
Article -
150
Medical Jousting: Going for the kill!
Published 2023-01-01“…Or, maybe, remembering someone who used to grin, rather peculiarly, when a patient mentioned another colleague’s name, just enough to create sufficient doubt in their minds, will jolt up some sensitive recollections. …”
Get full text
Article -
151
Efficient multiplication for finite fields of p characteristic
Published 2009-01-01“…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
Get full text
Article -
152
Comment on “Neutrino interaction with matter in a noninertial frame”
Published 2025-01-01“…Abstract In this comment, we obtain the complete energy levels for Dvornikov’s paper [1], that is, the energy levels dependent on two quantum numbers, namely, the radial quantum number (given by N) and the angular quantum number (given by J z ). …”
Get full text
Article -
153
Pregnant Women's Knowledge and Attitudes About Pregnancy Care: The Effect of Using the Ebumil Android Application
Published 2025-01-01“…The sample was 120 pregnant women who were divided into two groups, namely the intervention group (which was given education through the ebumil application and the control group (which was not given education through the ebumil application) using a simple random sampling technique. …”
Get full text
Article -
154
Novel NFA engine construction method of regular expressions
Published 2014-10-01“…A novel method for constructing smaller non-deterministic finite automata (NFA) engine from given regular expressions named PFA was proposed.There are three main algorithms in PFA,the pretreatment algorithm,the coding parser tree algorithm and the NFA construction algorithm based on the coded binary tree.The smaller NFA named NFA<sub>p</sub> with only one start state and one final state can be obtained by using PFA construction method.NFA<sub>p</sub>have linear size in terms of the size of given regular expressions.It is the smallest NFA comparing with current methods like Thompson NFA,follow automata,position automata and partial derivatives automata.The size of NFA<sub>p</sub>is one third of Thompson’s and it is smaller than the size of follow automata whose size has nearly closed to optimal.…”
Get full text
Article -
155
δω-Continuity and some Results on δω-Closure Operator
Published 2022-01-01“…Al-Jarrah et al. defined a new topological operator, namely, δω-closure operator, and proved that it lies between the δ-closure operator and the usual closure operator. …”
Get full text
Article -
156
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01“…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
Get full text
Article -
157
PSYCHO-EMOTIONAL PECULIARITIES OF WORKERS FROM LEGAL FIELD
Published 2023-02-01“…Workers of legal, justice field, daily confront situations of infringements of civil, criminal and administrative laws, as well as the violation of procedural-criminal order. In the given study we are going to determine the psycho-emotional peculiarities of specialists from justice/legal field, namely to research the level of manifestation of anxiety, aggressiveness, rigidity and frustration. …”
Get full text
Article -
158
Cryptanalysis of novel extended multivariate public key cryptosystem
Published 2015-06-01“…The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the original multivariate public key cryptosystem to hide its weakness such as linearization equation.However,it is found that if there are many linearization equations satisfied by the original MPKC,there would be many quadratization equations (QE) satisfied by the improved scheme.Given a public key,after finding all QE,a valid cipheretext can be substituted into the QE to derive a set of quadratic equations on the plaintext variable.This exactly reduce the degree of the system wanted to solve.Then the corresponding plaintext can be recovered for a given valid ciphertext combining with Groebner basis method.…”
Get full text
Article -
159
THE EFFECT OF PICTURE CARD GAMES TO STUDENTS OF ELEMENTARY SCHOOL’S VOCABULARY MASTERY
Published 2018-10-01“…However, after giving the treatment, post-test was given and it found that there was a significant difference between the two groups. …”
Get full text
Article -
160
HYPERTENSION THERAPY USING ACUPUNCTURE AND HERBALS OF LEDS AND CARROTS
Published 2019-01-01“…Results: Hypertension treatment with acupuncture therapy was given 12 times, 3 times a week. Herbs therapy was given for 4 weeks, taken once a day in the afternoon with a dose of 200 ml. …”
Get full text
Article