The Experts below are selected from a list of 60972 Experts worldwide ranked by ideXlab platform
Andrea Hopmeyer Gorman - One of the best experts on this subject based on the ideXlab platform.
-
community violence exposure and children s academic functioning
Journal of Educational Psychology, 2003Co-Authors: David Schwartz, Andrea Hopmeyer GormanAbstract:This study reports a cross-sectional investigation of the link between community violence exposure and academic difficulties for 237 urban elementary school children (mean age of 9.5 years). Children completed a self-report inventory assessing exposure to community violence. Their achievement test scores and GPAs were obtained from school Records, and other aspects of psychosocial adjustment were assessed with a multi-informant approach. Analyses indicated that community violence exposure was associated with poor academic performance. These relations appeared to be mediated by symptoms of depression and disruptive behavior and remained significant even after the prediction associated with bullying by peers was controlled. (PsycINFO Database Record (c) 2016 APA, all rights reserved)
Taronisokhi Zebua - One of the best experts on this subject based on the ideXlab platform.
-
Implementasi Algoritma Camellia Pada Penyandian Record Database
2020Co-Authors: Neti Rusri Yanti, Taronisokhi ZebuaAbstract:Database Records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of Database Records, it can be done by using cryptographic techniques. Cryptographic techniques can encode Database Records by encrypting them in the form of passwords that are not understood. The Camellia algorithm is one algorithm that can be relied upon to realize cryptographic techniques. This symmetry algorithm will produce a higher level of security against the Database Record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the Database. This research will use the 128 bit Camellia algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This algorithm requires 18 rounds where every six rounds must enter Function F and Function FL-1 and also require as many as 26 subkeys, namely kw, k and kl. This study describes the process of securing a Database Record by encoding it based on the Camellia algorithm, so that it produces a text Record Database in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of Database Records.
-
Implementasi Algoritma Mars Pada Penyandian Record Database
2020Co-Authors: Alimah Alimah, Nelly Astuti Hasibuan, Taronisokhi ZebuaAbstract:Database Records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of Database Records, it can be done by using cryptographic techniques. Cryptographic techniques can encode Database Records by encrypting them in the form of passwords that are not understood. The Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security against the Database Record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the image. This research uses the Mars Algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This research describes the process of securing a Database Record by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of Database Records
Gregg Henriques - One of the best experts on this subject based on the ideXlab platform.
-
achieving a unified clinical science requires a meta theoretical solution comment on melchert 2016
American Psychologist, 2017Co-Authors: Gregg HenriquesAbstract:: Timothy Melchert's vision for a unified clinical science that transcends the specific theoretical orientations and is grounded in the science of human psychology is a laudable goal. However, his solution to achieve this goal via reliance on evolutionary theory, neuroscience, and empirically verifiable research findings is not sufficient. The way forward is to recognize that the field of psychology is fragmented and lacks a clear meta-theoretical perspective. Conceptual work is needed to develop such a perspective, which can then allow for clearly defining the field and effectively integrating and assimilating the key concepts from the various theoretical orientations into a coherent whole. (PsycINFO Database Record
Sarah E. Macpherson - One of the best experts on this subject based on the ideXlab platform.
-
theory of mind and psychosocial characteristics in older men
Psychology and Aging, 2019Co-Authors: Melissa A Radecki, Sarah E. MacphersonAbstract:: The extent to which early-life cognitive ability shapes individuals' social functioning throughout life, in the context of later-life factors, is unknown. We investigated performance on the Faux Pas test (FP) in relation to psychosocial characteristics and childhood intelligence scores in 90 healthy older men. FP performance was associated with close social network size but not social contact, social support, or loneliness when accounting for both childhood and later-life intelligence, affect, personality, and sociodemography. We add to a growing literature on associations between theory of mind and intelligence, affect, and personality. (PsycINFO Database Record (c) 2019 APA, all rights reserved).
Valerie Magno - One of the best experts on this subject based on the ideXlab platform.
-
library home research help Database Record parts
2013Co-Authors: Valerie MagnoAbstract:For effective use of research and information resources, use this Research Strategy: Define, Find, Choose, Use
-
library resources home research help parts of a Database Record abstract full text citation
2013Co-Authors: Valerie MagnoAbstract:For effective use of research and information resources, use this Research Strategy: Define, Find, Choose, Use
-
Library Resources Home: Research Help: Parts of a Database Record: Abstract/Full-text/Citation
2013Co-Authors: Valerie MagnoAbstract:For effective use of research and information resources, use this Research Strategy: Define, Find, Choose, Use