Showing 141 - 160 results of 740 for search '"Given name', query time: 0.06s Refine Results
  1. 141

    MOBILE LEARNING BERBASIS HTML 5 DALAM MATA PELAJARAN PENDIDIKAN AGAMA ISLAM by Irpan Nawawi

    Published 2019-06-01
    “…Before being given treatment, the experimental group was first given prestige, then given treatment with the application of HTML 5-based mobile learning and after that was given a post. …”
    Get full text
    Article
  2. 142

    Word order in utterances of direct speech in English: a subtle balance between conventions and innovation by Grégoire LACAZE

    Published 2013-12-01
    “…Even though word order differs from one language to another, a given person who speaks his/her own mother tongue is normally able to say whether a given utterance is grammatical or not. …”
    Get full text
    Article
  3. 143

    About Qualifications in the List of Specialties and Areas of Preparation for Higher Education by A. V. Bodrov

    Published 2021-09-01
    “…The article analyzes the draft order of the Ministry of Science and Higher Education of Russia «On the approval of the list of specialties and areas of training for higher education» for the names of qualifications given in the list of specialties and areas of training for higher education. …”
    Get full text
    Article
  4. 144
  5. 145

    Conjugacy Separability of Some One-Relator Groups by D. Tieudjo, D. I. Moldavanskii

    Published 2010-01-01
    “…The proof made used of theoretical combinatorial group methods, namely the structure of amalgamated free products and some properties of the subgroups and quotients of any group of the class of one-relator groups given above.…”
    Get full text
    Article
  6. 146

    A Note on Orthogonal Fuzzy Metric Space, Its Properties, and Fixed Point Theorems by Khalil Javed, Awais Asif, Ekrem Savas

    Published 2022-01-01
    “…However, this article outstretches the above-mentioned notion further into a newly defined concept, named as orthogonal picture fuzzy metric space. A detailed insight is given into the topic by presenting some fixed point results in the frame of the newly defined structure. …”
    Get full text
    Article
  7. 147

    Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher by Zezhou HOU, Jiongjiong REN, Shaozhen CHEN

    Published 2023-04-01
    “…The neural distinguisher is a new tool widely used in crypto analysis of some ciphers.For SIMON-like block ciphers, there are multiple choices for their parameters, but the reasons for designer’s selection remain unexplained.Using neural distinguishers, the security of the parameters (a,b,c) of the SIMON-like with a block size of 32 bits was researched, and good choices of parameters were given.Firstly, using the idea of affine equivalence class proposed by Kölbl et al.in CRYPTO2015, these parameters can be divided into 509 classes.And 240 classes which satisfied gcd(a-b,2)=1 were mainly researched.Then a SAT/SMT model was built to help searching differential characteristics for each equivalent class.From these models, the optimal differential characteristics of SIMON-like was obtained.Using these input differences of optimal differential characteristics, the neural distinguishers were trained for the representative of each equivalence class, and the accuracy of the distinguishers was saved.It was found that 20 optimal parameters given by Kölbl et al.cannot make the neural distinguishers the lowest accuracy.On the contrary, there were 4 parameters, whose accuracy exceeds 80%.Furthermore, the 4 parameters were bad while facing neural distinguishers.Finally, comprehensively considering the choice of Kölbl et al.and the accuracy of different neural distinguishers, three good parameters, namely (6,11,1),(1,8,3), and(6,7,5) were given.…”
    Get full text
    Article
  8. 148

    Comparing Motahari and Allameh Asgari's Views on the Meaning and Examples of ‘Affair’ by Masomeh Esmaeili

    Published 2024-05-01
    “…The word affair has not been given due attention in the books of advanced theologians, but its related topics have been discussed as the nature, benefit, philosophy, or necessity of prophecy and Imamate. …”
    Get full text
    Article
  9. 149
  10. 150

    Medical Jousting: Going for the kill! by Dr.Fuad Ahmed Khan Niazi

    Published 2023-01-01
    “…Or, maybe, remembering someone who used to grin, rather peculiarly, when a patient mentioned another colleague’s name, just enough to create sufficient doubt in their minds, will jolt up some sensitive recollections. …”
    Get full text
    Article
  11. 151

    Efficient multiplication for finite fields of p characteristic by LI Yin 1, CHEN Gong-liang1, LI Jian-hua1

    Published 2009-01-01
    “…Based on residue arithmetic,a new form of polynomial named PAPB in Fp[x] had been constructed.The amount and distribution of such irreducible polynomials had also been investigated.Then,an efficient algorithm for multiplication modulo PAPB had been proposed using residue arithmetic and Chinese remainder theorem.In the end,the result analysis was given.The theoretic analysis and simulation experiment show that for some finite field of medium prime characteristic,the given algorithm only costs O(k1.5) operations in Fp while the multiplication modulo irreducible binomial cost O(k2) operations,which shows a better performance.As a result,the work presents an interesting perspective for optimal extension field and elliptic curve cryptography.…”
    Get full text
    Article
  12. 152

    Comment on “Neutrino interaction with matter in a noninertial frame” by R. R. S. Oliveira

    Published 2025-01-01
    “…Abstract In this comment, we obtain the complete energy levels for Dvornikov’s paper [1], that is, the energy levels dependent on two quantum numbers, namely, the radial quantum number (given by N) and the angular quantum number (given by J z ). …”
    Get full text
    Article
  13. 153

    Pregnant Women's Knowledge and Attitudes About Pregnancy Care: The Effect of Using the Ebumil Android Application by Kartini, Farming, Fitriati Sabur

    Published 2025-01-01
    “…The sample was 120 pregnant women who were divided into two groups, namely the intervention group (which was given education through the ebumil application and the control group (which was not given education through the ebumil application) using a simple random sampling technique. …”
    Get full text
    Article
  14. 154

    Novel NFA engine construction method of regular expressions by Mao-hua JING, Yi-xian YANG, Tao WANG, Yang XIN

    Published 2014-10-01
    “…A novel method for constructing smaller non-deterministic finite automata (NFA) engine from given regular expressions named PFA was proposed.There are three main algorithms in PFA,the pretreatment algorithm,the coding parser tree algorithm and the NFA construction algorithm based on the coded binary tree.The smaller NFA named NFA<sub>p</sub> with only one start state and one final state can be obtained by using PFA construction method.NFA<sub>p</sub>have linear size in terms of the size of given regular expressions.It is the smallest NFA comparing with current methods like Thompson NFA,follow automata,position automata and partial derivatives automata.The size of NFA<sub>p</sub>is one third of Thompson’s and it is smaller than the size of follow automata whose size has nearly closed to optimal.…”
    Get full text
    Article
  15. 155

    δω-Continuity and some Results on δω-Closure Operator by Manjeet Singh, Asha Gupta, Kushal Singh

    Published 2022-01-01
    “…Al-Jarrah et al. defined a new topological operator, namely, δω-closure operator, and proved that it lies between the δ-closure operator and the usual closure operator. …”
    Get full text
    Article
  16. 156

    Modeling and Analysis of the Spread of Malware with the Influence of User Awareness by Qingyi Zhu, Xuhang Luo, Yuhang Liu

    Published 2021-01-01
    “…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
    Get full text
    Article
  17. 157

    PSYCHO-EMOTIONAL PECULIARITIES OF WORKERS FROM LEGAL FIELD by Melentieva Aliona

    Published 2023-02-01
    “…Workers of legal, justice field, daily confront situations of infringements of civil, criminal and administrative laws, as well as the violation of procedural-criminal order. In the given study we are going to determine the psycho-emotional peculiarities of specialists from justice/legal field, namely to research the level of manifestation of anxiety, aggressiveness, rigidity and frustration. …”
    Get full text
    Article
  18. 158

    Cryptanalysis of novel extended multivariate public key cryptosystem by Xu-yun NIE, Bo LIU, Gang LU, Ting ZHONG

    Published 2015-06-01
    “…The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the original multivariate public key cryptosystem to hide its weakness such as linearization equation.However,it is found that if there are many linearization equations satisfied by the original MPKC,there would be many quadratization equations (QE) satisfied by the improved scheme.Given a public key,after finding all QE,a valid cipheretext can be substituted into the QE to derive a set of quadratic equations on the plaintext variable.This exactly reduce the degree of the system wanted to solve.Then the corresponding plaintext can be recovered for a given valid ciphertext combining with Groebner basis method.…”
    Get full text
    Article
  19. 159

    THE EFFECT OF PICTURE CARD GAMES TO STUDENTS OF ELEMENTARY SCHOOL’S VOCABULARY MASTERY by Riky Oktavianus Depari, Azwandi Azwandi, Syahrial Syahrial

    Published 2018-10-01
    “…However, after giving the treatment, post-test was given and it found that there was a significant difference between the two groups. …”
    Get full text
    Article
  20. 160

    HYPERTENSION THERAPY USING ACUPUNCTURE AND HERBALS OF LEDS AND CARROTS by Ulfa Nur Khasanah, Ario Imandiri, Myrna Adianti

    Published 2019-01-01
    “…Results: Hypertension treatment with acupuncture therapy was given 12 times, 3 times a week. Herbs therapy was given for 4 weeks, taken once a day in the afternoon with a dose of 200 ml. …”
    Get full text
    Article