Turkish Journal of Computer and Mathematics Education (TURCOMAT)
https://turcomat.org/index.php/turkbilmat
<h2 class="py-3 bg-white text-dark" style="background-color: white; padding: 10px;">Turkish Journal of Computer and Mathematics Education (TURCOMAT) ISSN: 3048-4855</h2> <p style="background-color: white; padding: 10px;"><strong>Period</strong> Tri-annual | <strong> Starting Year: </strong> 2009 |<strong>Format:</strong> Online | <strong>Language:</strong> ENGLISH | <strong>ISSN</strong> <strong>:</strong> 3048-4855 | <strong>Publisher:</strong> <a href="https://nnpub.org" target="_blank" rel="noopener"><strong>NINETY NINE PUBLICATION</strong></a></p> <div class="row"> <div class="col-md-4"><img style="background-color: white; padding: 10px; display: block; margin-left: auto; margin-right: auto;" src="https://turcomat.org/public/site/images/admin_turcomat/black-and-white-simple-company-cover-journal.png" alt="" width="200" height="259" /><br /> <p style="background-color: white; padding: 10px;"><strong>Citation Analysis: </strong><br /><br /><a href="https://scholar.google.co.in/citations?hl=en&user=mELVS0AAAAAJ&view_op=list_works&sortby=pubdate" target="_blank" rel="noopener"><strong>Google Scholar</strong></a><br /><strong>Citations: 22264<br />h-index: 58<br />i10 -index: 577</strong></p> <p> </p> </div> <div class="col-md-8"> <p style="background-color: white; padding: 10px; text-align: justify;"><strong>Announcement:</strong>We are excited to announce that Turkish Journal of Computer and Mathematics Education (TURCOMAT) is now under the new management of <strong>Ninety Nine Publication</strong>, effective since November 2023. We are proud to launch our first issue with the new team, Volume 15, Issue 1, for the year 2024. This issue marks a new chapter in the journal's history and is now available on our website. For detailed information and to access the latest issue, please visit our <a href="https://turcomat.org/index.php/turkbilmat ">journal's website</a></p> <p style="background-color: white; padding: 10px; text-align: justify;">The Turkish Journal of Computer and Mathematics Education, known as TURCOMAT, is a globally acknowledged journal notable for its comprehensive peer-review process and open access availability. This journal publishes three issues a year, in the periods of January-April, May-August, and September-December. TURCOMAT primarily focuses on sharing scholarly research in the fields of mathematics education and computer science. For more detailed insights into its areas of interest, readers are encouraged to refer to the journal's focus and scope section.</p> </div> </div> <div class="row"> <div class="jumbotron" style="padding: 10px; margin-bottom: 5px;"> <p>Call for Papers: September-December 2024 Issue of TURCOMAT</p> <ul class="list-group"> <li class="list-group-item"> Submission Deadline: December 31, 2024</li> <li class="list-group-item">Publication Model: Continuous</li> <li class="list-group-item">Scope: Encourages exchange of ideas in mathematics and computer science, covering both theoretical and applied research.</li> <li class="list-group-item">Focus Areas: Mathematical theories, computational algorithms, data science, and their applications in various domains.</li> <li class="list-group-item">Submission Encouragement: Innovative, interdisciplinary research and comprehensive reviews contributing to mathematical and computational sciences.</li> <li class="list-group-item">Journal Characteristics: International, scholarly, refereed, and editor-organized.</li> <li class="list-group-item">TURCOMAT's Evolution: Dynamic, adapting to changes and developments in the field.</li> <li class="list-group-item">Participation Invitation: Enthusiastic call for manuscripts for future issues, highlighting enjoyment in engaging with new authors and their research.</li> </ul> <p>Please note due to Festive Celebrations, please expect a delay in response till 4th November 2024.</p> </div> </div>Ninety Nine Publicationen-USTurkish Journal of Computer and Mathematics Education (TURCOMAT)3048-4855<h2 id="rights">You are free to:</h2> <ol> <li><strong>Share </strong>— copy and redistribute the material in any medium or format for any purpose, even commercially.</li> <li><strong>Adapt </strong>— remix, transform, and build upon the material for any purpose, even commercially.</li> <li>The licensor cannot revoke these freedoms as long as you follow the license terms.</li> </ol> <h2 id="terms">Under the following terms:</h2> <ol> <li class="cc-by"><strong>Attribution </strong>— You must give <a id="src-appropriate-credit" href="https://creativecommons.org/licenses/by/4.0/deed.en#ref-appropriate-credit">appropriate credit </a>, provide a link to the license, and <a id="src-indicate-changes" href="https://creativecommons.org/licenses/by/4.0/deed.en#ref-indicate-changes">indicate if changes were made </a>. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.</li> <li><strong>No additional restrictions </strong>— You may not apply legal terms or <a id="src-technological-measures" href="https://creativecommons.org/licenses/by/4.0/deed.en#ref-technological-measures">technological measures </a>that legally restrict others from doing anything the license permits.</li> </ol> <h2 class="b-header has-text-black padding-bottom-big padding-top-normal">Notices:</h2> <p>You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable <a id="src-exception-or-limitation" href="https://creativecommons.org/licenses/by/4.0/deed.en#ref-exception-or-limitation">exception or limitation </a>.</p> <p>No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as <a id="src-publicity-privacy-or-moral-rights" href="https://creativecommons.org/licenses/by/4.0/deed.en#ref-publicity-privacy-or-moral-rights">publicity, privacy, or moral rights </a>may limit how you use the material.</p>A COMPREHENSIVE SURVEY OF MEMORY UPDATE MECHANISMS FOR CONTINUAL LEARNING ON TEXT DATASETS
https://turcomat.org/index.php/turkbilmat/article/view/15029
<p>Over the last several years, there has been a growing focus on the CL field in the context of machine learning and its goal to create models capable of learning new tasks step by step without loss of prior knowledge. Among these, catastrophic forgetting is especially challenging in real-world settings where the data experience changes over time. To this effect, what has become pivotal for models is mechanisms for memory update to enable the models to learn information as well as update what has been previously learned easily. This survey specifically investigates the memory update strategy in the continual learning setup wherein new categories and domains are continuously added in the text datasets including sentiment analysis, named entity recognition, text classification tasks etc. Moving on, three primary memory update strategies of memory replay, memory consolidation, and parameter isolation are discussed; this paper further addresses certain adaptations of the proposed methods for text-based applications. Memory replay means that part of previous data is stored to be replayed when new tasks are learned while memory consolidation strengthens only significant memories. Parameter isolation helps avoid masking previous tasks or overwriting the parameters when the machine learning algorithm is trained to accomplish new tasks. In this paper, we discuss the latest in these techniques and offer a thorough insight into their use in text datasets such as Amazon Reviews and Yelp Reviews. Further, we outline the primary drawbacks of existing solutions for memory updates such as capacity limitations, domain variation, and continually learning without having access to new task information. In addition, a summary table of literature review identifying the most relevant works within the field is offered. Lastly, we discuss the remaining issues and potential research directions where more focus and development should be given in CL for text data by noting the importance of efficient and adaptive update policies towards the memory.</p>J. RanjithSanthi Baskaran
Copyright (c) 2025 J. Ranjith, Dr. Santhi Baskaran
https://creativecommons.org/licenses/by/4.0/deed.en
2025-02-072025-02-0716110.61841/turcomat.v16i1.15029BUILDING A DYNAMIC CROPPING TREND VISUALIZATION SOFTWARE TO ASSESS FARMING PROGRESSIVENESS
https://turcomat.org/index.php/turkbilmat/article/view/14969
<p>This thesis presents a comprehensive study that unfolds in two key dimensions. Firstly, a novel cropping trend visualization software was developed, aiming to provide a dynamic and insightful tool for assessing farming progressiveness. This software, a product of meticulous design and implementation, serves as an innovative instrument for visualizing and analyzing cropping trends in agriculture. In the second part of the study, the software was utilized to gather descriptive and inferential statistical data from a sample of 111 farmers. The data analysis reveals noteworthy correlations between specific agricultural practices and farming progressiveness. Key findings indicate significant positive associations between technology adoption, climate adaptation, crop variety diversity, and environmentally sustainable practices with higher levels of farming progressiveness. While certain trends exhibit statistical significance, caution is advised in drawing robust conclusions for factors with limited statistical support. These empirical insights provide a valuable foundation for policymakers, agricultural extension services, and stakeholders to strategically promote practices that enhance the overall progressiveness of farmers. The dual contribution of the developed software and the derived insights from its application underscores the significance of integrating technology in advancing sustainable and progressive agricultural practices.</p>MUHAMMAD ABDUL MANNANMD. MUNTASEER AL MAMUNMD. NAZIUR ISLAM LEMONSHAMMI AKTER SIMAMD. ASHIKUR RAHMANMAHRUPA TASNIM
Copyright (c) 2025 Author
https://creativecommons.org/licenses/by/4.0/deed.en
2025-01-062025-01-06161011410.61841/turcomat.v16i1.14969Numerical method for simulating the model of using insecticide for the optimal control of mosquitoes for the eradication of malaria
https://turcomat.org/index.php/turkbilmat/article/view/14952
<p>In order to simulate the mathematical model of eliminating malaria by controlling the population of <br>mosquitoes with insecticide and the insecticide's residual effects, the study developed a four points hybrid block <br>algorithm. The convergence and stability qualities of the block method are established. The block approach is <br>applied after the variable control problems are generated using Pontryagin's principle. The forward-backward sweep <br>methods of the block method are applied. The method is then implemented using a computer code using MATLAB <br>R2018a mathematical software. According to the findings of this study, the simulated result from this approach <br>displayed a significantly lower number of mosquitoes while lessening the negative effects of the insecticide, which <br>in turn will reduce the high rate of malaria spreading.</p>Samuel AdamuOjo Olamiposi Aduroja
Copyright (c) 2025 Samuel Adamu, Ojo Olamiposi Aduroja
https://creativecommons.org/licenses/by/4.0/deed.en
2025-01-102025-01-10161152410.61841/turcomat.v16i1.14952Mathematical Modelling and Argumentation: Designing a Task to Strengthen Variational Thinking by Integrating Data Science
https://turcomat.org/index.php/turkbilmat/article/view/14975
<p>This study explores the significance of task design in fostering variational thinking through the principles of PyLVar and task design in mathematics education, particularly in the incorporation of technological and scientific tools to enhance modelling and argumentation skills among secondary school students. To develop and implement interactive mathematical tasks based on the PyLVar principle and task design, incorporating data science tools and STEAM. A qualitative-descriptive approach was employed to design, implement, and analyse interactive tasks centred on the principles of variational thinking, argumentation, and modelling. The sample consisted of nine participants selected from a group of 11th-grade students at a state school, chosen for convenience. Data were gathered through experimental activities, processed using technological tools, and analysed with variational strategies. Students demonstrated a marked improvement in their abilities in mathematical modelling and argumentation. The tasks designed, structured around the PyLVar principles, enabled the identification of variation patterns and the development of critical and analytical skills. Contextualised interactive mathematical tasks not only bolster variational thinking but also equip students to address real-world problems by connecting abstract concepts to practical applications and encouraging the integration of technological tools and interdisciplinary approaches.</p>Jonathan Alberto Cervantes-BarrazaShelsyn Johana Moreno CalvoKattia Lucia de Arce Polo
Copyright (c) 2025 Jonathan Alberto Cervantes-Barraza, Shelsyn Johana Moreno Calvo, Kattia Lucia de Arce Polo
https://creativecommons.org/licenses/by/4.0/deed.en
2025-01-212025-01-21161254310.61841/turcomat.v16i1.14975AI-Powered Encryption Revolutionizing Cybersecurity with Adaptive Cryptographic Algorithms
https://turcomat.org/index.php/turkbilmat/article/view/14976
<p>This paper proposes a state-of-the-art encryption technique that integrates artificial intelligence into a dynamic, content-aware security system. We introduce an AI-powered encryption framework that automatically adjusts cryptographic parameters based on message sensitivity, effectively balancing security requirements and computational efficiency. The system combines a DistilBERT-based neural network for real-time content sensitivity analysis with a flexible encryption mechanism that adapts key lengths, iteration counts, and entropy levels on the fly.</p> <p>Our implementation demonstrates significant adaptability, with a correlation of 0.974 between content sensitivity and security parameters. The system distinguishes between different security requirements, using 32-byte keys with millions of iteration rounds for high-sensitivity content (sensitivity score of 8.64) and 16-byte keys with reduced iterations for low-sensitivity messages (sensitivity score of 3.10). The processing time scales linearly with security requirements, ranging from 300 ms for low-sensitivity content to 732 ms for high-security encryption.</p> <p>Performance evaluation was highly effective, with the system achieving an overall score of 8.64/10, including 9.87/10 for adaptability and 9.12/10 for performance efficiency. The security level rated high at 7.37/10 while maintaining manageable computational overhead. The framework effectively handled different types of content without sacrificing encryption-decryption accuracy across all levels of sensitivity.</p> <p>This work signifies a significant leap forward in the field of adaptive cryptography, demonstrating the capabilities of AI-driven security systems that can automate and optimize encryption parameters without compromising security standards. These results suggest that this approach may well represent the future of encrypted communications, providing scaled security appropriately without human intervention.</p>Zainab Rustum Mohsin
Copyright (c) 2025 Zainab Rustum Mohsin
https://creativecommons.org/licenses/by/4.0/deed.en
2025-01-292025-01-29161446210.61841/turcomat.v16i1.14976