-
14321
-
14322
Making at a Distance: Teaching Hands-on Courses During the Pandemic
Published 2022Get full text
Article -
14323
-
14324
SOSYAL BİLGİLER ÖĞRETMENLERİNİN ‘OKUL DIŞI TARİH ÖĞRETİMİ’NE İLİŞKİN GÖRÜŞLERİNİN İNCELENMESİ
Published 2015-02-01“…Bolu, Antalya, Düzce, Aydın, Trabzon, Bitlis and İstanbul). The data was analysed and interpreted according to the variables such as gender, city, school type and outdoor activities.According to the findings, female teachers do more outdoor teaching than male teachers. …”
Get full text
Article -
14325
Estructura trófica de la asociación de peces intermareales de la costa rocosa del norte de Chile
Published 2004-03-01“…Los peces carnívoros Cheilodactylus variegatus, Helcogrammoides chilensis y Labrisomus philippii y el omnívoro Oplegnatus insignis registraron una tendencia a la eurifágia (H >2.0 bits), sin embargo la mayor superposicion trófica (>0.90) se observó entre los peces herbívoros y omnívoros. …”
Get full text
Article -
14326
A Study of Two Periodogram Algorithms for Improving the Detection of Small Transiting Planets
Published 2023-01-01Get full text
Article -
14327
A Communication-Efficient Local Differentially Private Algorithm in Federated Optimization
Published 2023-01-01“…The algorithm incurs very little communication overhead; for <inline-formula> <tex-math notation="LaTeX">$m$ </tex-math></inline-formula> heterogeneous resources in the system, the asymptotic upper bound on the communication complexity is <inline-formula> <tex-math notation="LaTeX">$\mathcal {O}(m)$ </tex-math></inline-formula> bits at a time step. Furthermore, if the algorithm converges in <inline-formula> <tex-math notation="LaTeX">$K$ </tex-math></inline-formula> time steps, then the upper bound communication complexity will be <inline-formula> <tex-math notation="LaTeX">$\mathcal {O}(mK)$ </tex-math></inline-formula> bits. …”
Get full text
Article -
14328
Multi-Source Multi-Destination Hybrid Infrastructure-Aided Traffic Aware Routing in V2V/I Networks
Published 2022-01-01Get full text
Article -
14329
Energy-efficient algorithms for lossless data compression schemes in wireless sensor networks
Published 2024-03-01“…ALDC and FELACS algorithms encode differences between consecutive data readings, thereby reducing the number of bits required for encoding. ALDC employs Huffman coding, while FELACS leverages the Golomb-Rice coding method. …”
Get full text
Article -
14330
-
14331
-
14332
-
14333
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Published 2024-03-01“…However, the security of HERA with 80 and 128 bits of security is not affected by our attacks due to the high cost to find multiple collisions. …”
Get full text
Article -
14334
Predictors of pregnancy stress and psychological birth trauma in women undergoing vaginal delivery: a cross-sectional study in China
Published 2023-08-01“…Results The median (IQR) of PSRS and City BiTS scores were 10.00 (14.00) and 3.00 (9.00), respectively. …”
Get full text
Article -
14335
İŞGÖRENLER TARAFINDAN ALGILANAN AÇIK LİDERLİĞİN YENİLİKÇİ İŞ DAVRANIŞINA ETKİSİNDE YÖNETİCİ DESTEK ALGISININ ARACILIK ROLÜ
Published 2023-06-01“…Oluşturulan araştırma hipotezlerini test etmek için gerekli olan veri Bitlis ili kamu ve özel sektör çalışanlarından sağlanmıştır. …”
Get full text
Article -
14336
-
14337
-
14338
Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin
Published 2023“…Based on the core concepts of Power Projection Theory, the author inductively reasons that proof-of-work technologies like Bitcoin could not only function as monetary technology, but could also (and perhaps more importantly) function as a new form of electro-cyber power projection technology which could empower nations to secure their most precious bits of information (including but not limited to financial bits of information) against belligerent actors by giving them the ability to impose severe physical costs on other nations in, from, and through cyberspace. …”
Get full text
Thesis -
14339
-
14340