Showing 281 - 300 results of 419 for search '"arithmetic"', query time: 0.04s Refine Results
  1. 281

    The evolution of binary system from predynastic Egypt to Leibniz era by Z. Pourfereidouni, M. Radjabalipour

    Published 2024-12-01
    “…The novelty of the present paper is the study of the evolution of the binary number system from the predynastic Egypt down to the Leibniz era who, by the benefit of  Khwarazmi's  "Indian Arithmetics,"  completed this evolution by representing integers in $0-1$ forms and performing the hybrid decimal/binary Egyptian arithmetic operations purely inside the $0-1$ system. …”
    Get full text
    Article
  2. 282

    Development of Environmentally Friendly Math Learning Media "Situng" First-Grade Elementary School by Rizka Silvia Fatmawati, Wahdan Najib Habiby

    Published 2024-05-01
    “…The lack of student interest in mathematics is due to the absence of interesting learning media, especially in arithmetic operations. The objectives of this study are: 1) to increase students' interest in mathematics subjects, especially counting operations, 2) to test the effectiveness of environmentally friendly media "situng" in the learning process of grade 1 mathematics. …”
    Get full text
    Article
  3. 283

    Secret sharing in a special linear group by V. I. Yanchevskiĭ, I. A. Havarushka, G. V. Matveev

    Published 2024-09-01
    “…Group theory, modular arithmetic and theory of secret sharing schemes are used.Results. …”
    Get full text
    Article
  4. 284

    Investigation of cultural beliefs of physical education teacher candidates with faculty of education by Huseyin Unlu, Mustafa Erbas, Yaprak Kalemoglu Varol

    Published 2014-06-01
    “…While there is not encountered significant difference (p gt;05) between arithmetic averages that are in attitude levels for cultural beliefs in terms of grade variables (p gt;.05), there is a significant differences in belief subscale and total scale for egalitarianism according to gender (p lt;.05). …”
    Get full text
    Article
  5. 285

    An Embedded Reconfigurable IP Core with Variable Grain Logic Cell Architecture by Motoki Amagasaki, Ryoichi Yamaguchi, Masahiro Koga, Masahiro Iida, Toshinori Sueyoshi

    Published 2008-01-01
    “…The key feature of the VGLC architecture is that the variable granularity is a tradeoff between coarse-grained and fine-grained types required for the implementation arithmetic and random logic, respectively. Finally, we evaluate the proposed logic cell using the newly developed technology mapping tool, which improves logic depth by 31% and reduces the number of configuration data by 55% on average, as compared to the Virtex-4 logic cell architecture.…”
    Get full text
    Article
  6. 286

    Genetic Diversity of Sangihe Nutmeg (Myristica fragrans Houtt.) Based on Morphological and ISSR Markers by Tanti Agustina, Abdul Razaq Chasani, Budi Setiadi Daryono, Muhammad Said Rifqi

    Published 2024-01-01
    “…In total, 31 morphological characteristics were examined, and molecular data of ISSR markers using five primers were analysed based on numerical taxonomy using the unweighted pair group method with arithmetic mean (UPGMA) and principal component analysis (PCA) methods. …”
    Get full text
    Article
  7. 287

    Design of a Mathematical Unit in FPGA for the Implementation of the Control of a Magnetic Levitation System by Juan José Raygoza-Panduro, Susana Ortega-Cisneros, Jorge Rivera, Alberto de la Mora

    Published 2008-01-01
    “…The core is designed to calculate trigonometric and arithmetic operations in such a way that each function is performed in a clock cycle. …”
    Get full text
    Article
  8. 288

    New operations on cubic intuitionistic fuzzy sets under P–order by Priyadharshini Manoharan, Jayanthi Duraisamy, Saranya Manoharan

    Published 2024-12-01
    “…In this piece of work, few operators on the cubic intuitionistic fuzzy sets under P – order, such as arithmetic mean (@), geometric mean ($), multiplication operator (*), ‘#’ and necessity (□) and possibility (◇) operations on the cubic intuitionistic fuzzy sets under P – order, are defined. …”
    Get full text
    Article
  9. 289

    Private-preserving scientific computation of the rational numbers by Xuhong LIU, Chen SUN

    Published 2022-06-01
    “…As a fundamental part of cryptography, secure multiparty computation (SMC) is a building block of various cryptographic protocols, and it is also a hot topic in the international cryptographic community.In recent years, many SMC problems, such as secret information comparison, secret set problems and secure multiparty computational geometry, have been widely studied.As many practical problems need to be described by rational numbers, it is both theoretically and practically important to study the SMC problems in the rational number field.However, most of the existing researches focus on integers and the studied data are mainly one-dimensional data.There are few researches on secure multiparty computation of multi-dimensional data in the rational number field, but they can’t be generalized.Based on the fractional representation of rational numbers, the new encoding schemes about rational numbers and rational number vectors were proposed, which could encode multi-dimensional data in the rational number field and provided new solutions for other SMC problems in the rational number field.Based on the encoding scheme and one-way hash function, some protocols were designed for equality problems and set problems in the rational number field.These protocols used basic arithmetic operation and hash operation to guarantee efficiency than existing related protocols.And these protocols didn’t limit the range of research data and they were more widely applicable.It proves that these protocols are secure in the semi-honest model using simulation paradigm, and demonstrates the efficiency and the applicability of these protocols by theoretical analysis and experiment.A practical example was also given to illustrate that approaches are more versatile, and they could also be directly used to solve some secure multiparty computational geometry problems in the rational number field.…”
    Get full text
    Article
  10. 290

    Test the Moderating and Mediating role of organizational culture in the relationship between servant leadership and employees performance (an analytical research of the views of a... by Mustafa Hatwan Rhima, Mohammed Abd Ahmed

    Published 2020-12-01
    “…To achieve the research objectives, many statistical methods were used, represented by (the arithmetic mean, standard deviation, coefficient of variation, Pearson correlation coefficient and multiple linear regression). …”
    Get full text
    Article
  11. 291

    Faculty Members' Perspectives on Organisational Identity: Digital Leadership of Universities of Nineveh Governorate by Thabet Ihsan Ahmed, Ahmed Raad Ibrahim, Nour Fares Ahmed, Dhamiaa Ali Abdullah

    Published 2024-05-01
    “…Data were analysed for participants' responses in the form of percentages, arithmetic averages, and statistical data using SPSS version 21. …”
    Get full text
    Article
  12. 292

    An Easy-to-Use Method for Assessing Nitrate Contamination Susceptibility in Groundwater by Daniela Ducci

    Published 2018-01-01
    “…The map combination process is straightforward, being an algebraic combination: the output values are the arithmetic average of the input values. The final pollution susceptibility (RISK) map is obtained by combining the PNC map with the groundwater contamination vulnerability (GwVu) map. …”
    Get full text
    Article
  13. 293

    Analysis of Decision-Making Styles of Department of Sports Management Students by Barbaros Serdar Erdoğan, Gökhan Acar

    Published 2018-08-01
    “…Frequency (f) analysis was performed to represent the demographic information of students participating in the survey. The arithmetic mean and standard deviation values ​​were determined to identify the decision-making styles of the students. …”
    Get full text
    Article
  14. 294

    Initial approach to Epidermal Growth Factor in SARS-CoV-2 infection by Héctor José Pérez Hernández

    Published 2024-10-01
    “…Summary measures: absolute frequency, percentage, and the arithmetic mean were used. The statistical significance of observable differences between groups was explored with the chi-square test or Welch's t test with α= 0.05. …”
    Get full text
    Article
  15. 295

    Indicators of speed and strength abilities of young fencers 12-13 years old by Olena Nesen, Viktoriia Klimenchenko

    Published 2022-12-01
    “…The computer program Excel was used: the indicators of arithmetic mean and standard deviation were determined. …”
    Get full text
    Article
  16. 296

    Multiplicative Attributes Derived from Graph Invariants for Saztec4 Diamond by Muhammad Haroon Aftab, Imran Siddique, Joshua Kiddy K. Asamoah, Hamiden Abd El-Wahed Khalifa, Muhammad Hussain

    Published 2022-01-01
    “…This study consists of developing some closed and updated formulas derived from multiplicative graph invariants such as general Randic index GRIRλ0ϰ for λ0=±1,±1/2, ordinary general geometric-arithmetic (OGA), general version of harmonic index (GHI), sum connectivity index (SI), general sum connectivity index (GSI), 1st and 2nd Gourava and hyper-Gourava indices, (ABC) index, Shegehalli and Kanabur indices, 1st generalised version of Zagreb index (GZI), and forgotten index (FI) for the subdivided Aztec diamond network. …”
    Get full text
    Article
  17. 297

    Design of Approximate Adder With Reconfigurable Accuracy by Aalelai Vendhan, Syed Ershad Ahmed, S. Gurunarayanan

    Published 2025-01-01
    “…Arithmetic circuits such as adders are fundamental components in implementing image processing applications. …”
    Get full text
    Article
  18. 298

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  19. 299

    A Multiplier-Less Discrete Cosine Transform Architecture Using a Majority Logic-Based Approximate Full Adder by Elham Esmaeili, Farshad Pesaran, Nabiollah Shiri

    Published 2024-03-01
    “…The fundamental structure of the ML concept is a 3-input majority voter and is widely utilized in digital arithmetic cells. The ML-based proposed FA works at low power, small delay, and low power-delay-product (PDP). …”
    Get full text
    Article
  20. 300

    Clinical Phenotype of Fucosidosis in Cuba by Víctor Jesús Tamayo Chang, George Alberto Pérez Benítez

    Published 2024-07-01
    “…To describe the variables, the statisticians were used: absolute frequency, percentage, ratio and proportion. The arithmetic mean was used as a statistician of central tendency and as a statistician of dispersion: the standard deviation. …”
    Get full text
    Article