S M Nazmuz Sakib
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Group Revision is Better Than Self-Revision in Case of Mathermatics S M Nazmuz Sakib
Noumerico: Journal of Technology in Mathematics Education Vol. 3 No. 1 (2025): Noumerico, March 2025
Publisher : Universitas Islam Tribakti Lirboyo Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33367/jtme.v3i1.5192

Abstract

One of the most common dilemmas faced by students studying mathematics is whether to opt for group revision or self-revision. Given the increasing perception of mathematics as a challenging and less engaging subject, selecting the most effective revision strategy is crucial. This study systematically reviews existing literature to analyze the comparative benefits and drawbacks of group and self-revision in mathematics education. The research employs a systematic literature review methodology, synthesizing findings from academic studies that explore the cognitive, motivational, and pedagogical aspects of both revision methods. The analysis reveals that while individual preferences and learning styles play a role, group revision generally yields better academic performance, increased motivation, and enhanced conceptual understanding compared to self-revision. The findings have implications for students, educators, and administrators in optimizing pedagogical strategies to enhance mathematics learning outcomes
Analysis of Fundamental Algebraic Concepts and Information Security System S M Nazmuz Sakib
Noumerico: Journal of Technology in Mathematics Education Vol. 2 No. 1 (2024): Noumerico, March 2024
Publisher : Universitas Islam Tribakti Lirboyo Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33367/jtme.v2i1.5187

Abstract

Cryptography plays a crucial role in protecting the data from unauthorized access. Nowadays, various cryptographic algorithms are used. It is not meant for information technology to secure the proposed work's primary target to achieve these tasks and goals. Using a literature review, we study security information systems using S-Boxes. In the research, we discuss two different techniques to generate the new S-boxes and then discuss their other properties to improve the strength of encryption. This chapter is further divided into sections that comprehensively explain the various concepts.