نتایج جستجو برای: apos
تعداد نتایج: 9212 فیلتر نتایج به سال:
This study aims to determine the improvement of students' ability understand mathematical concepts through application Modification-, Action, Process, Object, and Schema (M-APOS) learning model. The type research conducted is quantitative with a quasi-experimental method. uses design Randomized Pre-test Post-test Control Group Design. population in this was all class VIII at MTsN 2 Kerinci 2018...
Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One main issues that arise IOMT is how securely data can be transmitted clinical team. In this project, biometric Identity-based encryption was utilized using Fuzzy-IBE (Identity-based encryption) scheme uses face features clinicians create public key. Figure 1 shows testbed setup de...
The development in data mining technology brings serious threat to the individualinformation. The objective of privacy preserving data mining (PPDM) is to safeguard the sensitive information contained in the data. The unwanted disclosure of the sensitive information may happen during the process of data mining results. In this paper we identify four different types of users involved in mining a...
In today's economic environment, enterprises that solely rely on traditional technologies cannot meet dynamic customer demands. Several studies confirm that a nation's growth is dictated, to a large extent, by the performance of small businesses. However, the reality is that SMEs are constantly struggling to survive and maintain their schedule of activities. This is evident in the tra...
Davis, P. J. Interpolation and approximation, Blaisdell New York 1969 Dikshit,H. P. and Rana, S. S. Cubic Interpolatory splines with non uniform Meshes J. Approx. Theory Vol 45, no4(1985) C. A. Hall and Meyer, W. W. ; Optimal error bounds for cubic spline Interpolation J. Approx. Theory, 58 (1989), 59-67. Kopotun K. A. : Univariate spline equivalence of moduli of smoothness and application . Ma...
Security in mobile ad-hoc networks (MANET's) continues to draw in attention when years of analysis. Recent advances in identity-based cryptography (IBC) sheds light-weight on this drawback and has become widespread as an answer base. In this research it is presenting a comprehensive image and capture the state of the art of IBC security applications in MANET's supported a survey of pu...
Deadlock can occur wherever multiple processes interact. System deadlock is a serious problem in a multiprogramming environment. The approaches to this problem can be divided into three categories: (1) prevention, (2) detection and recovery, and (3) avoidance. This paper proposes a variation of the first approach, partially applying ideas developed in the second and third approaches. This is an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید