-
281
The evolution of binary system from predynastic Egypt to Leibniz era
Published 2024-12-01“…The novelty of the present paper is the study of the evolution of the binary number system from the predynastic Egypt down to the Leibniz era who, by the benefit of Khwarazmi's "Indian Arithmetics," completed this evolution by representing integers in $0-1$ forms and performing the hybrid decimal/binary Egyptian arithmetic operations purely inside the $0-1$ system. …”
Get full text
Article -
282
Development of Environmentally Friendly Math Learning Media "Situng" First-Grade Elementary School
Published 2024-05-01“…The lack of student interest in mathematics is due to the absence of interesting learning media, especially in arithmetic operations. The objectives of this study are: 1) to increase students' interest in mathematics subjects, especially counting operations, 2) to test the effectiveness of environmentally friendly media "situng" in the learning process of grade 1 mathematics. …”
Get full text
Article -
283
Secret sharing in a special linear group
Published 2024-09-01“…Group theory, modular arithmetic and theory of secret sharing schemes are used.Results. …”
Get full text
Article -
284
Investigation of cultural beliefs of physical education teacher candidates with faculty of education
Published 2014-06-01“…While there is not encountered significant difference (p gt;05) between arithmetic averages that are in attitude levels for cultural beliefs in terms of grade variables (p gt;.05), there is a significant differences in belief subscale and total scale for egalitarianism according to gender (p lt;.05). …”
Get full text
Article -
285
An Embedded Reconfigurable IP Core with Variable Grain Logic Cell Architecture
Published 2008-01-01“…The key feature of the VGLC architecture is that the variable granularity is a tradeoff between coarse-grained and fine-grained types required for the implementation arithmetic and random logic, respectively. Finally, we evaluate the proposed logic cell using the newly developed technology mapping tool, which improves logic depth by 31% and reduces the number of configuration data by 55% on average, as compared to the Virtex-4 logic cell architecture.…”
Get full text
Article -
286
Genetic Diversity of Sangihe Nutmeg (Myristica fragrans Houtt.) Based on Morphological and ISSR Markers
Published 2024-01-01“…In total, 31 morphological characteristics were examined, and molecular data of ISSR markers using five primers were analysed based on numerical taxonomy using the unweighted pair group method with arithmetic mean (UPGMA) and principal component analysis (PCA) methods. …”
Get full text
Article -
287
Design of a Mathematical Unit in FPGA for the Implementation of the Control of a Magnetic Levitation System
Published 2008-01-01“…The core is designed to calculate trigonometric and arithmetic operations in such a way that each function is performed in a clock cycle. …”
Get full text
Article -
288
New operations on cubic intuitionistic fuzzy sets under P–order
Published 2024-12-01“…In this piece of work, few operators on the cubic intuitionistic fuzzy sets under P – order, such as arithmetic mean (@), geometric mean ($), multiplication operator (*), ‘#’ and necessity (□) and possibility (◇) operations on the cubic intuitionistic fuzzy sets under P – order, are defined. …”
Get full text
Article -
289
Private-preserving scientific computation of the rational numbers
Published 2022-06-01“…As a fundamental part of cryptography, secure multiparty computation (SMC) is a building block of various cryptographic protocols, and it is also a hot topic in the international cryptographic community.In recent years, many SMC problems, such as secret information comparison, secret set problems and secure multiparty computational geometry, have been widely studied.As many practical problems need to be described by rational numbers, it is both theoretically and practically important to study the SMC problems in the rational number field.However, most of the existing researches focus on integers and the studied data are mainly one-dimensional data.There are few researches on secure multiparty computation of multi-dimensional data in the rational number field, but they can’t be generalized.Based on the fractional representation of rational numbers, the new encoding schemes about rational numbers and rational number vectors were proposed, which could encode multi-dimensional data in the rational number field and provided new solutions for other SMC problems in the rational number field.Based on the encoding scheme and one-way hash function, some protocols were designed for equality problems and set problems in the rational number field.These protocols used basic arithmetic operation and hash operation to guarantee efficiency than existing related protocols.And these protocols didn’t limit the range of research data and they were more widely applicable.It proves that these protocols are secure in the semi-honest model using simulation paradigm, and demonstrates the efficiency and the applicability of these protocols by theoretical analysis and experiment.A practical example was also given to illustrate that approaches are more versatile, and they could also be directly used to solve some secure multiparty computational geometry problems in the rational number field.…”
Get full text
Article -
290
Test the Moderating and Mediating role of organizational culture in the relationship between servant leadership and employees performance (an analytical research of the views of a...
Published 2020-12-01“…To achieve the research objectives, many statistical methods were used, represented by (the arithmetic mean, standard deviation, coefficient of variation, Pearson correlation coefficient and multiple linear regression). …”
Get full text
Article -
291
Faculty Members' Perspectives on Organisational Identity: Digital Leadership of Universities of Nineveh Governorate
Published 2024-05-01“…Data were analysed for participants' responses in the form of percentages, arithmetic averages, and statistical data using SPSS version 21. …”
Get full text
Article -
292
An Easy-to-Use Method for Assessing Nitrate Contamination Susceptibility in Groundwater
Published 2018-01-01“…The map combination process is straightforward, being an algebraic combination: the output values are the arithmetic average of the input values. The final pollution susceptibility (RISK) map is obtained by combining the PNC map with the groundwater contamination vulnerability (GwVu) map. …”
Get full text
Article -
293
Analysis of Decision-Making Styles of Department of Sports Management Students
Published 2018-08-01“…Frequency (f) analysis was performed to represent the demographic information of students participating in the survey. The arithmetic mean and standard deviation values were determined to identify the decision-making styles of the students. …”
Get full text
Article -
294
Initial approach to Epidermal Growth Factor in SARS-CoV-2 infection
Published 2024-10-01“…Summary measures: absolute frequency, percentage, and the arithmetic mean were used. The statistical significance of observable differences between groups was explored with the chi-square test or Welch's t test with α= 0.05. …”
Get full text
Article -
295
Indicators of speed and strength abilities of young fencers 12-13 years old
Published 2022-12-01“…The computer program Excel was used: the indicators of arithmetic mean and standard deviation were determined. …”
Get full text
Article -
296
Multiplicative Attributes Derived from Graph Invariants for Saztec4 Diamond
Published 2022-01-01“…This study consists of developing some closed and updated formulas derived from multiplicative graph invariants such as general Randic index GRIRλ0ϰ for λ0=±1,±1/2, ordinary general geometric-arithmetic (OGA), general version of harmonic index (GHI), sum connectivity index (SI), general sum connectivity index (GSI), 1st and 2nd Gourava and hyper-Gourava indices, (ABC) index, Shegehalli and Kanabur indices, 1st generalised version of Zagreb index (GZI), and forgotten index (FI) for the subdivided Aztec diamond network. …”
Get full text
Article -
297
Design of Approximate Adder With Reconfigurable Accuracy
Published 2025-01-01“…Arithmetic circuits such as adders are fundamental components in implementing image processing applications. …”
Get full text
Article -
298
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
299
A Multiplier-Less Discrete Cosine Transform Architecture Using a Majority Logic-Based Approximate Full Adder
Published 2024-03-01“…The fundamental structure of the ML concept is a 3-input majority voter and is widely utilized in digital arithmetic cells. The ML-based proposed FA works at low power, small delay, and low power-delay-product (PDP). …”
Get full text
Article -
300
Clinical Phenotype of Fucosidosis in Cuba
Published 2024-07-01“…To describe the variables, the statisticians were used: absolute frequency, percentage, ratio and proportion. The arithmetic mean was used as a statistician of central tendency and as a statistician of dispersion: the standard deviation. …”
Get full text
Article