Turkish Journal of Computer and Mathematics Education (TURCOMAT)
Not a member yet
9073 research outputs found
Sort by
AI-Powered Encryption Revolutionizing Cybersecurity with Adaptive Cryptographic Algorithms
This paper proposes a state-of-the-art encryption technique that integrates artificial intelligence into a dynamic, content-aware security system. We introduce an AI-powered encryption framework that automatically adjusts cryptographic parameters based on message sensitivity, effectively balancing security requirements and computational efficiency. The system combines a DistilBERT-based neural network for real-time content sensitivity analysis with a flexible encryption mechanism that adapts key lengths, iteration counts, and entropy levels on the fly.
Our implementation demonstrates significant adaptability, with a correlation of 0.974 between content sensitivity and security parameters. The system distinguishes between different security requirements, using 32-byte keys with millions of iteration rounds for high-sensitivity content (sensitivity score of 8.64) and 16-byte keys with reduced iterations for low-sensitivity messages (sensitivity score of 3.10). The processing time scales linearly with security requirements, ranging from 300 ms for low-sensitivity content to 732 ms for high-security encryption.
Performance evaluation was highly effective, with the system achieving an overall score of 8.64/10, including 9.87/10 for adaptability and 9.12/10 for performance efficiency. The security level rated high at 7.37/10 while maintaining manageable computational overhead. The framework effectively handled different types of content without sacrificing encryption-decryption accuracy across all levels of sensitivity.
This work signifies a significant leap forward in the field of adaptive cryptography, demonstrating the capabilities of AI-driven security systems that can automate and optimize encryption parameters without compromising security standards. These results suggest that this approach may well represent the future of encrypted communications, providing scaled security appropriately without human intervention
Mathematical Modelling and Argumentation: Designing a Task to Strengthen Variational Thinking by Integrating Data Science
This study explores the significance of task design in fostering variational thinking through the principles of PyLVar and task design in mathematics education, particularly in the incorporation of technological and scientific tools to enhance modelling and argumentation skills among secondary school students. To develop and implement interactive mathematical tasks based on the PyLVar principle and task design, incorporating data science tools and STEAM. A qualitative-descriptive approach was employed to design, implement, and analyse interactive tasks centred on the principles of variational thinking, argumentation, and modelling. The sample consisted of nine participants selected from a group of 11th-grade students at a state school, chosen for convenience. Data were gathered through experimental activities, processed using technological tools, and analysed with variational strategies. Students demonstrated a marked improvement in their abilities in mathematical modelling and argumentation. The tasks designed, structured around the PyLVar principles, enabled the identification of variation patterns and the development of critical and analytical skills. Contextualised interactive mathematical tasks not only bolster variational thinking but also equip students to address real-world problems by connecting abstract concepts to practical applications and encouraging the integration of technological tools and interdisciplinary approaches
Numerical method for simulating the model of using insecticide for the optimal control of mosquitoes for the eradication of malaria
In order to simulate the mathematical model of eliminating malaria by controlling the population of mosquitoes with insecticide and the insecticide's residual effects, the study developed a four points hybrid block algorithm. The convergence and stability qualities of the block method are established. The block approach is applied after the variable control problems are generated using Pontryagin's principle. The forward-backward sweep methods of the block method are applied. The method is then implemented using a computer code using MATLAB R2018a mathematical software. According to the findings of this study, the simulated result from this approach displayed a significantly lower number of mosquitoes while lessening the negative effects of the insecticide, which in turn will reduce the high rate of malaria spreading
Security and Privacy Challenges in IOT: A Global Perspective
The fast development of the Internet of Things (IoT) has delivered various open doors and advantages across different businesses. Nevertheless, this interconnected biological system of gadgets likewise presents critical security and protection moves that should be tended to on a worldwide scale. This paper looks at the security and protection challenges looked at by IoT frameworks according to a worldwide point of view. Security chances are one more huge worry in the IoT scene. The assortment, stockpiling, and handling of individual information by IoT gadgets bring up issues about individual security privileges. Unapproved admittance to this information can bring about private profiling, reconnaissance, and abuse. Executing securitysaving systems like information anonymization, encryption, and client-driven control is fundamental to protecting security in IoT conditions. Administrative systems and guidelines likewise assume a critical part in tending to IoT security and protection challenges. Guidelines like the Overall Information Assurance Guideline (GDPR) in the European Association assist with implementing information security measures and defending client privileges. Be that as it may, variations in guidelines across locales can introduce difficulties for worldwide IoT arrangements. Fitting guidelines and structures can advance consistency and work with worldwide participation. The paper likewise investigates the capability of arising advances in upgrading IoT security and protection. Advancements, for example, block chain, edge registering, and united learning offer promising arrangements. Block chain’s decentralized and alter safe nature can give secure information stockpiling and exchange the executives. Edge registering decreases dormancy and information openness by handling information nearer to the source. Combined learning empowers cooperative model preparation while protecting information security. Coordinating these innovations into IoT frameworks can add to a safer and protection-mindful worldwide IoT biological system
The Figurative Language of the Indigenous Semai People of Lembah Jelai, Malaysia
This study aims to examine aspects of the figurative language of a sub-group of the Orang Asli of Malaysia, namely the Semai people, living in Lembah Jelai, Pahang, Malaysia. This qualitative study was based on a semi-structured interview method involving five native speakers of the Semai language. The researchers used an adapted version of the cognitive-linguistic framework of Lakoff and Johnson (1980) to analyze the interview data. The findings showed that most of the figurative expressions used in their language were primarily based on natural and cultural elements that heavily influenced the way they led their lives. In particular, the findings showed that the Semai community used figurative expressions in their conversations not only to articulate their feelings and thoughts but also to serve as unwritten social guidelines. Overall, these findings indicate that indigenous communities living in far remote areas in jungles use figurative languages to guide their peoples in forging close kinships, in cementing strong societal bonds, and in dealing with the spiritual realm. The findings also provide greater insight into the understanding of the uniqueness of the figurative language of the Semai community, which is considered as a sub-language of the mainstream Malay language in the Malay Archipelago. Surely, such a language needs to be persevered to ensure it will continue to thrive among the younger generation of the Semai people, given its significant influence on the development of their emotions, thinking, and cultur
Practical Applications of Homogeneous Coordinates in Image Transformations Using MATLAB
Homogeneous coordinates offer a robust mathematical framework for representing and executing geometric transformations in image processing, computer vision, robotics, and computer graphics. By embedding Euclidean space into a higher-dimensional projective space, they provide a unified mechanism for handling affine transformations, such as translation, rotation, scaling, and shear, as well as projective transformations like perspective projection. This study explores the practical applications of homogeneous coordinates within the MATLAB environment, leveraging its matrix manipulation capabilities to implement these transformations efficiently. Homogeneous coordinates simplify complex transformation pipelines through matrix concatenation, enabling seamless execution of combined operations while preserving computational efficiency and accuracy. Key applications demonstrated include image registration, warping, rectification, 3D modeling, and camera calibration, emphasizing their critical role in medical imaging, virtual reality, and augmented reality. MATLAB's intuitive programming environment and advanced visualization tools further enhance the accessibility and applicability of these techniques. This article provides detailed explanations, MATLAB code implementations, and visual demonstrations to bridge the gap between theoretical foundations and real-world applications, making it an invaluable resource for researchers, practitioners, and students in the fields of image processing and computer vision
BUILDING A DYNAMIC CROPPING TREND VISUALIZATION SOFTWARE TO ASSESS FARMING PROGRESSIVENESS
This thesis presents a comprehensive study that unfolds in two key dimensions. Firstly, a novel cropping trend visualization software was developed, aiming to provide a dynamic and insightful tool for assessing farming progressiveness. This software, a product of meticulous design and implementation, serves as an innovative instrument for visualizing and analyzing cropping trends in agriculture. In the second part of the study, the software was utilized to gather descriptive and inferential statistical data from a sample of 111 farmers. The data analysis reveals noteworthy correlations between specific agricultural practices and farming progressiveness. Key findings indicate significant positive associations between technology adoption, climate adaptation, crop variety diversity, and environmentally sustainable practices with higher levels of farming progressiveness. While certain trends exhibit statistical significance, caution is advised in drawing robust conclusions for factors with limited statistical support. These empirical insights provide a valuable foundation for policymakers, agricultural extension services, and stakeholders to strategically promote practices that enhance the overall progressiveness of farmers. The dual contribution of the developed software and the derived insights from its application underscores the significance of integrating technology in advancing sustainable and progressive agricultural practices
TARIFFS, MARKET DYNAMICS, AND PROTECTING U.S. CONSUMERS: A CASE FOR STRATEGIC IMPORT POLICY
This article analyzes the effect of tariffs on U.S. consumers by examining the possibility that tariffs could be “absorbed” along the supply chain and not passed through to the consumer in the form of higher prices. Country manufacturing and us seafood importing Data from Chinese manufacturers and US importers make clear that both foreign manufacturers and domestic importers have significant price flexibility that can help blunt the effect of tariffs. The study shows that Chinese firms frequently practice discriminatory pricing among destinations, that is, prices are adjusted in response to local competition and tariffs, which implies they have room to absorb the costs deriving from tariffs. Moreover, U.S. importers are discovered to hold large profit margins, indicating they have plenty of margins to accommodate tariffs without passing them on to American consumers. But the study also shows that without proper regulation, importers will opt to keep or increase their mark-up, rather than lower prices. This paper will suggest that tariffs should not automatically mean higher consumer prices and will describe a strategic approach to imports. The framework tabled by the Opposition involves price benchmarking, mandatory reporting of profit margins as well as mechanism for the importers to be compensated for absorbing the costs of the tariffs. Through use of these measures, the U.S will be able to protect national interests, promote domestic production and reduce the inflationary repercussions of tariffs on consumers. The results in this paper provide insights into the general implications of tariff dynamics, and provide policy recommendations that can be utilized by policy-makers to soften the impact of tariffs on U.S. households
Design and Implementation of a Cost-Effective, Network-Based Clinic Management System for Small Healthcare Facilities in Iraq
Managing clinics efficiently requires a cost-effective and user-friendly system that simplifies daily operations while maintaining data security and accessibility. This paper proposes a clinic management system that does not require a dedicated server in order to minimize costs and ease the process of setup. The system is developed using SQLite, a lightweight database management system that enables easy data management on local machines and supports networked terminals. For the best performance, we divide the data into two SQLite files; the first for the basic activities of the clinic and the second for prescriptions and other attachments to enhance the processing and use of the system. The system is developed using C# and has a friendly graphical user interface for doctors and secretaries. It has role-based access control that provides secure user authentication and database is encryption to ensure that patient’s information is well protected. The system is deployed via Windows network sharing, which makes it very easy to connect multiple terminals simultaneously through LAN or Wi-Fi without the need of professional IT personnel. This system has been used in more than 50 clinics and has proven to be reliable, efficient and easy to use and is therefore suitable for small to medium size healthcare institutions. It improves the management of the patient’s records, the flow of work, and provides a cost-effective alternative to traditional clinic management solutions
A STUDY ON THE EMOTIONAL TRIGGERS OF TEACHERS IN TRAINING: MATHEMATICAL REDEMPTION
This article presents an exploratory study on the affective experiences of future teachers. It examines a population of primary school students who recount past negative emotions related to mathematics and either continue to experience negative emotions about teaching mathematics (absence of mathematical redemption) or develop positive emotions about teaching mathematics (mathematical redemption). The research aimed to identify the triggering situations that influence the desire for mathematical redemption, either fostering or hindering it. In this study, future teachers' responses to the Teachers’ Attitude Toward Mathematics and Its Teaching (TAMT) test were analyzed using the Theory of Cognitive Structure of Emotions (OCC Theory). The study first identified the presence or absence of mathematical redemption and then explored causal connections between triggering situations and the desire for mathematical redemption