I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
25
,
No
.
3
,
Ma
r
ch
2
0
2
2
,
p
p
.
1
7
4
9
~
1
7
5
8
I
SS
N:
2
5
0
2
-
4
7
5
2
,
DOI
: 1
0
.
1
1
5
9
1
/ijeecs.v
25
.i
3
.
pp
174
9
-
1
7
5
8
1749
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs.ia
esco
r
e.
co
m
Ado
pting th
e
cy
b
ersecurity
co
ncep
ts int
o
c
urricul
u
m: t
h
e
po
tent
ia
l e
ff
ec
ts o
n
studen
ts’
cy
ber
security kno
wl
ed
g
e
M
o
ha
m
m
a
d A
zzeh
1
,
Ahm
a
d
M
o
us
a
Alt
a
m
im
i
2
,
M
a
hm
o
o
d Alba
s
ha
y
re
h
3
,
M
o
ha
m
m
a
d A
.
A
l
-
O
ud
a
t
3
1
D
e
p
a
r
t
me
n
t
o
f
D
a
t
a
S
c
i
e
n
c
e
,
K
i
n
g
H
u
sse
i
n
S
c
h
o
o
l
o
f
C
o
m
p
u
t
i
n
g
S
c
i
e
n
c
e
s
,
P
r
i
n
c
e
ss
S
u
ma
y
a
U
n
i
v
e
r
s
i
t
y
f
o
r
Te
c
h
n
o
l
o
g
y
,
A
mm
a
n
,
J
o
r
d
a
n
2
D
e
p
a
r
t
me
n
t
o
f
C
y
b
e
r
se
c
u
r
i
t
y
,
F
a
c
u
l
t
y
o
f
I
n
f
o
r
ma
t
i
o
n
Te
c
h
n
o
l
o
g
y
,
A
p
p
l
i
e
d
S
c
i
e
n
c
e
P
r
i
v
a
t
e
U
n
i
v
e
r
si
t
y
,
A
mm
a
n
,
Jo
r
d
a
n
3
D
e
p
a
r
t
me
n
t
o
f
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
F
a
c
u
l
t
y
o
f
I
n
f
o
r
ma
t
i
o
n
Te
c
h
n
o
l
o
g
y
,
A
p
p
l
i
e
d
S
c
i
e
n
c
e
P
r
i
v
a
t
e
U
n
i
v
e
r
si
t
y
,
A
m
man
,
J
o
r
d
a
n
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Au
g
12
,
2
0
2
1
R
ev
is
ed
Dec
15
,
2
0
2
1
Acc
ep
ted
J
an
11
,
2
0
2
2
Th
is
stu
d
y
e
x
a
m
in
e
s
th
e
e
ffe
c
t
o
f
a
d
o
p
ti
n
g
c
y
b
e
rse
c
u
rit
y
c
o
n
c
e
p
ts
o
n
t
h
e
in
fo
rm
a
ti
o
n
a
n
d
tec
h
n
o
lo
g
y
(
IT
)
c
u
rricu
lu
m
a
n
d
d
e
term
in
e
s
th
e
p
o
ten
ti
a
l
e
ffe
c
t
o
n
stu
d
e
n
ts'
k
n
o
wle
d
g
e
o
f
c
y
b
e
rse
c
u
rit
y
p
ra
c
ti
c
e
s
a
n
d
lev
e
l
o
f
a
wa
re
n
e
ss
.
To
th
is
e
n
d
,
a
p
i
lo
t
stu
d
y
wa
s
first
c
o
n
d
u
c
ted
t
o
m
e
a
su
re
th
e
c
u
rre
n
t
lev
e
l
o
f
c
y
b
e
rse
c
u
rit
y
a
wa
re
n
e
ss
.
Th
e
re
su
lt
s
re
v
e
a
led
th
a
t
stu
d
e
n
ts
d
o
n
o
t
h
a
v
e
m
u
c
h
k
n
o
wle
d
g
e
o
f
c
y
b
e
rse
c
u
rit
y
.
T
h
u
s,
a
f
o
u
r
-
ste
p
a
p
p
r
o
a
c
h
wa
s
p
ro
p
o
se
d
to
in
f
u
se
th
e
re
le
v
a
n
t
c
y
b
e
rse
c
u
rit
y
t
o
p
ics
in
fi
v
e
m
a
tch
e
d
co
u
rse
s
b
a
se
d
o
n
th
e
late
st
c
y
b
e
r
se
c
u
rit
y
c
u
rricu
lar
g
u
id
e
li
n
e
s
(CS
EC2
0
1
7
)
.
A
sa
m
p
le
o
f
4
2
stu
d
e
n
ts
wa
s
se
lec
ted
p
u
rp
o
siv
e
l
y
with
o
u
t
p
ri
o
r
k
n
o
wle
d
g
e
o
f
c
y
b
e
rse
c
u
rit
y
a
n
d
d
iv
i
d
e
d
i
d
e
n
ti
c
a
ll
y
i
n
to
e
x
p
e
rime
n
tal
a
n
d
c
o
n
tro
l
g
ro
u
p
s.
S
t
u
d
e
n
ts
in
th
e
e
x
p
e
rime
n
tal
g
ro
u
p
we
re
a
sk
e
d
to
tak
e
fiv
e
c
o
n
se
c
u
ti
v
e
c
o
u
rse
s
o
v
e
r
fi
v
e
se
m
e
ste
r
s.
In
e
a
c
h
c
o
u
rse
,
g
r
o
u
p
s
we
n
t
th
ro
u
g
h
a
p
re
-
tes
t
fo
r
t
h
e
in
f
u
se
d
to
p
ics
.
T
h
e
n
,
t
h
e
e
x
p
e
rime
n
tal
g
r
o
u
p
tau
g
h
t
th
e
c
o
rre
sp
o
n
d
in
g
in
f
u
se
d
t
o
p
ic
s.
A
p
o
st
-
tes
t
wa
s
a
d
m
in
istere
d
t
o
b
o
t
h
g
ro
u
p
s
a
t
th
e
e
n
d
o
f
e
a
c
h
c
o
u
rse
,
a
n
d
t
h
e
t
-
tes
t
wa
s
c
o
n
d
u
c
te
d
.
T
h
e
re
su
lt
s
fo
u
n
d
si
g
n
ifi
c
a
n
t
d
iffere
n
c
e
s
b
e
t
we
e
n
m
a
rk
s
o
f
p
rio
r
a
n
d
p
o
st
-
te
sts
fo
r
1
1
o
u
t
o
f
1
4
i
n
fu
se
d
to
p
ics
.
T
h
e
se
sa
ti
sfa
c
to
ry
re
su
lt
s
wo
u
ld
e
n
c
o
u
ra
g
e
u
n
i
v
e
rsiti
e
s to
in
f
u
se
c
y
b
e
rse
c
u
rit
y
c
o
n
c
e
p
t
s in
t
o
t
h
e
ir
c
u
rric
u
lu
m
.
K
ey
w
o
r
d
s
:
C
u
r
r
icu
lar
g
u
i
d
elin
es
C
y
b
er
s
ec
u
r
ity
C
y
b
er
s
ec
u
r
ity
awa
r
en
ess
Kn
o
wled
g
e
im
p
r
o
v
em
e
n
t
T
h
eo
r
ies o
f
lear
n
in
g
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ah
m
ad
Mo
u
s
a
Altam
im
i
Dep
ar
tm
en
t o
f
C
y
b
er
s
ec
u
r
ity
,
Facu
lty
o
f
I
n
f
o
r
m
atio
n
T
ec
h
n
o
lo
g
y
,
A
p
p
lied
Scien
ce
Priv
at
e
Un
iv
er
s
ity
Am
m
an
,
J
o
r
d
a
n
E
m
ail:
a_
altam
im
i@
asu
.
ed
u
.
jo
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
I
n
ter
n
et
h
as
d
ev
el
o
p
ed
i
m
m
en
s
ely
,
f
ac
ilit
atin
g
d
o
in
g
b
u
s
in
ess
an
d
p
r
o
v
id
in
g
in
d
iv
i
d
u
als
an
d
o
r
g
an
izatio
n
s
with
d
ig
ital
co
m
m
u
n
icatio
n
.
Ov
er
th
e
n
u
m
er
o
u
s
ad
v
an
tag
es
th
e
i
n
ter
n
et
o
f
f
er
s
,
it
is
co
n
s
tan
tly
th
r
ea
ten
ed
b
y
m
an
y
r
is
k
s
th
at
o
f
ten
h
a
v
e
s
er
io
u
s
ad
v
er
s
e
[
1
]
.
New
d
ig
ital
th
r
ea
ts
a
n
d
c
y
b
e
r
attac
k
s
ar
e
co
m
i
n
g
f
r
o
m
n
ew
an
d
u
n
e
x
p
ec
ted
s
o
u
r
ce
s
.
On
lin
e
p
h
is
h
in
g
,
s
o
cial
e
n
g
in
ee
r
in
g
,
an
d
m
alwa
r
e
a
r
e
j
u
s
t
a
f
ew
ex
am
p
les
o
f
cy
b
er
attac
k
s
[
2
]
.
T
h
ese
attac
k
s
n
eg
ativ
ely
af
f
ec
t
b
o
t
h
in
d
i
v
id
u
als
an
d
th
e
co
u
n
tr
ies'
ec
o
n
o
m
ies.
Acc
o
r
d
in
g
to
[
3
]
,
it
is
esti
m
ated
th
at
cy
b
er
attac
k
s
'
ec
o
n
o
m
ic
im
p
ac
t
wi
ll
in
cr
ea
s
e
b
y
ar
o
u
n
d
f
iv
e
tr
illi
o
n
d
o
llar
s
p
er
y
ea
r
in
th
e
n
e
x
t
f
iv
e
y
ea
r
s
.
C
y
b
e
r
attac
k
s
ar
e
g
ettin
g
m
o
r
e
s
o
p
h
is
ticated
in
th
e
way
th
ey
m
is
u
s
e
an
d
ex
p
l
o
it
tech
n
o
lo
g
ical
ad
v
an
ce
m
en
t
[
4
]
.
T
h
is
is
in
p
ar
t
b
ec
au
s
e
m
an
y
u
s
er
s
ar
e
u
n
awa
r
e
o
f
th
e
co
n
ce
p
t
o
f
cy
b
er
s
ec
u
r
ity
a
n
d
h
o
w
to
p
r
o
t
ec
t
th
eir
in
f
o
r
m
atio
n
.
User
s
o
f
ten
b
eh
a
v
e
in
a
n
in
s
ec
u
r
e
m
a
n
n
er
wh
ich
m
ak
es
th
em
ea
s
y
tar
g
ets
f
o
r
ex
p
lo
it
atio
n
[
5
]
.
Acc
o
r
d
in
g
to
W
illi
am
s
tallin
g
in
h
is
b
o
o
k
[
6
]
,
s
ec
u
r
ity
ed
u
ca
tio
n
p
r
o
v
id
es
u
s
er
s
with
th
e
n
ec
ess
ar
y
s
k
ills
to
p
er
f
o
r
m
t
h
eir
d
u
ties
.
E
d
u
ca
tio
n
allo
ws
u
s
er
s
t
o
k
n
o
w
ac
tio
n
s
th
at
co
u
ld
c
o
m
p
r
o
m
is
e
s
ec
u
r
ity
,
id
en
tify
p
o
s
s
ib
le
attac
k
v
ec
to
r
s
,
an
d
r
e
p
o
r
t
to
a
p
p
r
o
p
r
iate
p
er
s
o
n
n
el.
T
h
e
id
ea
o
f
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
25
,
No
.
3
,
Ma
r
ch
20
22
:
1
7
4
9
-
1
7
5
8
1750
th
is
ap
p
r
o
ac
h
was
i
d
en
tifie
d
i
n
th
e
ea
r
ly
2
0
0
0
s
[
7
]
,
[
8
]
.
Ho
wev
er
,
in
s
tead
o
f
p
r
o
p
o
s
in
g
n
ew
s
ec
u
r
ity
c
o
u
r
s
es,
ef
f
o
r
ts
h
av
e
b
ee
n
d
ev
o
ted
to
p
r
o
p
o
s
in
g
g
u
id
elin
es
f
o
r
ad
o
p
tin
g
cy
b
er
s
ec
u
r
ity
c
o
n
ce
p
ts
in
th
e
n
o
n
-
s
ec
u
r
it
y
co
u
r
s
es
to
en
h
an
c
e
th
e
ap
p
r
o
p
r
iaten
ess
o
f
p
r
ac
tice
an
d
g
et
b
etter
o
u
tco
m
es
[
9
]
–
[
1
1
]
.
T
h
e
m
o
s
t
n
o
tab
le
g
u
id
elin
e
C
SEC2
0
1
7
r
esu
lts
f
r
o
m
s
ev
er
al
co
m
p
u
tin
g
o
r
g
an
izatio
n
s
'
jo
in
t
f
o
r
ce
(
e.
g
.
,
Ass
o
ciatio
n
f
o
r
C
o
m
p
u
tin
g
Ma
ch
in
er
y
(
AC
M
)
,
I
n
s
titu
te
o
f
E
lectr
ical
a
n
d
E
lectr
o
n
ics
E
n
g
in
ee
r
s
(
IEEE
)
,
an
d
I
n
ter
n
atio
n
al
Fed
er
atio
n
f
o
r
I
n
f
o
r
m
atio
n
Pr
o
ce
s
s
in
g
(
I
FIP
)
)
an
d
was
p
r
o
p
o
s
ed
b
y
th
e
cy
b
er
s
ec
u
r
ity
c
o
m
m
u
n
ity
in
2
0
1
7
.
T
h
e
g
u
id
elin
e
d
ef
in
ed
th
e
c
y
b
er
s
ec
u
r
ity
d
is
cip
lin
e
an
d
o
u
t
lin
ed
th
e
co
n
ce
p
ts
th
at
in
clu
d
e
k
n
o
wled
g
e
ar
ea
s
an
d
cr
o
s
s
cu
ttin
g
co
n
ce
p
ts
to
p
r
o
v
id
e
t
h
e
b
asis
f
o
r
k
n
o
w
led
g
e
ar
ea
s
in
cy
b
er
s
ec
u
r
ity
.
Stu
d
en
ts
will
b
e
em
p
o
wer
ed
with
th
e
n
ec
ess
ar
y
k
n
o
wled
g
e
to
ac
t
r
ea
s
o
n
a
b
l
y
in
v
ar
io
u
s
cir
cu
m
s
tan
ce
s
a
n
d
d
ea
l
with
th
ei
r
s
o
cial
r
ea
lity
is
s
u
es
[
1
2
]
.
I
n
th
is
r
eg
ar
d
,
th
e
wo
r
k
o
f
[
8
]
in
teg
r
ate
d
s
ec
u
r
ity
co
n
ce
p
ts
in
to
ex
is
tin
g
co
m
p
u
te
r
co
u
r
s
es.
T
h
ey
em
p
h
asized
th
is
co
n
ce
p
t'
s
n
ec
ess
ity
an
d
p
r
o
v
id
ed
v
ital
s
u
g
g
esti
o
n
s
s
u
ch
as
s
ec
u
r
ity
is
s
u
es
th
at
s
h
o
u
ld
b
e
d
is
cu
s
s
ed
th
r
o
u
g
h
o
u
t
th
e
p
r
i
m
ar
y
a
n
d
n
o
n
-
m
ajo
r
co
u
r
s
es
in
th
e
co
m
p
u
ter
s
cien
ce
c
u
r
r
icu
lu
m
to
r
aise
awa
r
en
ess
o
f
v
u
ln
er
a
b
ilit
ies,
t
h
r
ea
ts
,
an
d
r
is
k
s
.
Oth
er
r
esear
ch
er
s
h
av
e
f
u
r
th
er
an
al
y
ze
d
t
h
is
in
teg
r
atio
n
an
d
p
r
o
p
o
s
ed
m
o
d
els
to
p
r
o
v
id
e
s
tu
d
en
ts
with
th
e
b
asic
c
o
m
p
u
ter
s
ec
u
r
ity
p
r
in
ci
p
les
with
o
u
t
th
e
n
ee
d
f
o
r
p
r
o
f
ess
io
n
al
in
s
tr
u
cto
r
s
in
s
ec
u
r
ity
[
1
3
]
.
R
esear
ch
er
s
r
ec
e
n
tly
f
o
cu
s
ed
o
n
p
r
o
p
o
s
in
g
s
y
s
tem
atic
f
r
am
ewo
r
k
s
f
o
r
p
r
o
p
er
in
teg
r
atio
n
[
1
4
]
,
[
1
5
]
.
I
n
th
e
p
ap
er
,
E
ze
n
wo
y
e
[
1
5
]
,
p
r
o
p
o
s
ed
a
f
r
am
ewo
r
k
with
th
r
ee
p
h
ases
s
tr
u
ctu
r
e
b
ased
o
n
ty
p
ical
c
u
r
r
icu
lu
m
d
ev
elo
p
m
en
t
c
y
cl
es
(
e.
g
.
,
g
u
id
elin
e
d
ev
elo
p
m
en
t,
p
lan
n
i
n
g
,
a
n
d
im
p
lem
en
tatio
n
)
.
R
ec
en
tly
,
au
th
o
r
s
o
f
[
1
6
]
p
r
o
p
o
s
ed
a
co
n
ce
p
tu
al
cy
b
e
r
s
ec
u
r
i
ty
awa
r
en
ess
f
r
am
ewo
r
k
to
im
p
r
o
v
e
t
h
e
cy
b
er
s
ec
u
r
ity
awa
r
en
ess
o
f
g
r
ad
u
ates
in
an
y
ac
ad
e
m
ic
in
s
titu
tio
n
.
T
h
e
awa
r
en
ess
l
ev
el
in
d
ev
elo
p
in
g
co
u
n
tr
ies
an
d
f
o
r
n
ew
th
r
ea
ts
h
av
e
also
b
ee
n
in
v
esti
g
ated
in
[
1
7
]
–
[
1
9
]
.
Oth
er
r
esear
ch
e
r
s
h
av
e
co
n
s
id
er
ed
s
ec
u
r
ity
in
o
th
er
d
o
m
ain
s
lik
e
co
m
m
er
cial
[
2
0
]
.
E
x
p
er
im
e
n
t
s
h
av
e
also
b
ee
n
co
n
d
u
cte
d
to
d
eter
m
in
e
t
h
e
s
tu
d
en
ts
'
ac
q
u
ir
ed
k
n
o
wled
g
e
[
2
1
]
,
[
2
2
]
.
I
n
th
e
p
ap
e
r
,
Sir
aj
et
a
l.
[
2
1
]
,
ex
p
e
r
im
en
ted
with
th
e
in
teg
r
atio
n
ac
r
o
s
s
lo
w
-
lev
el
co
u
r
s
es u
s
in
g
s
ec
u
r
ity
lab
o
r
ato
r
y
m
o
d
u
les.
R
esu
lts
s
h
o
w
a
p
o
s
itiv
e
im
p
ac
t th
at
is
r
ef
lecte
d
in
th
e
s
ec
u
r
ity
k
n
o
wled
g
e
g
ain
e
d
b
y
s
tu
d
en
ts
.
I
n
th
e
p
ap
er
,
W
h
itn
ey
et
a
l.
[
2
3
]
,
th
e
r
esear
ch
er
s
in
tr
o
d
u
ce
d
s
ec
u
r
ity
teac
h
in
g
with
Py
th
o
n
an
d
g
o
t
p
o
s
itiv
e
r
esu
lts
r
e
g
a
r
d
in
g
k
n
o
wled
g
e
a
n
d
awa
r
en
es
s
.
Un
f
o
r
tu
n
ately
,
th
e
wid
esp
r
ea
d
atten
tio
n
to
th
is
s
ec
u
r
ity
in
teg
r
atio
n
ap
p
r
o
ac
h
is
in
s
u
f
f
icien
t,
an
d
its
ad
o
p
tio
n
is
m
in
im
al
[
2
4
]
,
[
2
5
]
.
O
n
th
e
o
th
e
r
h
an
d
,
m
an
y
wo
r
k
s
h
av
e
b
ee
n
c
o
n
d
u
cted
in
th
e
ar
ea
o
f
e
d
u
ca
tio
n
al
d
a
ta
m
in
in
g
.
Mo
s
t
o
f
th
em
ar
e
d
esig
n
ed
t
o
f
o
r
ec
as
t
s
tu
d
en
ts
'
p
er
f
o
r
m
an
ce
to
p
r
ed
ict
th
eir
f
u
tu
r
e
o
u
tco
m
es
b
ased
o
n
s
tu
d
en
ts
’
h
is
to
r
ical
d
ata
[
2
6
]
–
[
2
8
]
.
T
h
e
g
r
ad
e
p
o
i
n
t
av
er
ag
e
(
GPA
)
was
r
ec
o
g
n
ized
as
th
e
m
o
s
t
cr
u
cial
attr
ib
u
te
u
s
ed
to
p
r
ed
ict
p
er
f
o
r
m
an
ce
in
m
an
y
wo
r
k
s
.
As
th
e
f
ir
s
t
s
tep
o
f
o
u
r
s
tu
d
y
,
a
p
ilo
t
s
tu
d
y
is
c
o
n
d
u
c
ted
o
n
4
0
s
tu
d
en
ts
atten
d
in
g
th
e
in
f
o
r
m
atio
n
s
ec
u
r
i
ty
co
u
r
s
e
to
ass
ess
th
e
cu
r
r
en
t
lev
el
o
f
cy
b
er
s
ec
u
r
ity
a
war
en
ess
.
T
h
e
p
ilo
t
s
tu
d
y
'
s
m
ain
o
b
jectiv
e
was
to
s
ee
h
o
w
m
u
ch
t
h
e
s
tu
d
en
ts
ar
e
awa
r
e
o
f
cy
b
er
-
attac
k
s
a
n
d
wh
at
th
e
y
d
o
to
p
r
o
tect
th
em
s
elv
es.
T
h
e
s
u
r
v
e
y
r
esu
lts
in
d
icate
d
th
at
s
tu
d
en
ts
d
o
n
o
t
h
av
e
m
u
ch
k
n
o
wled
g
e
o
f
C
y
b
er
s
ec
u
r
ity
;
th
is
lack
o
f
k
n
o
wled
g
e
r
ef
lec
ts
wh
en
u
s
in
g
th
e
I
n
ter
n
et
wh
ile
n
o
t
p
r
o
tectin
g
th
eir
d
ata,
ev
en
o
n
u
n
iv
e
r
s
ity
s
y
s
tem
s
.
T
h
ese
f
in
d
in
g
s
en
c
o
u
r
ag
e
u
s
to
ca
r
r
y
o
u
t
o
u
r
s
tu
d
y
.
T
h
u
s
,
a
f
o
u
r
-
s
tep
m
eth
o
d
o
l
o
g
y
is
p
r
o
p
o
s
ed
to
lev
er
ag
e
th
e
cy
b
e
r
s
ec
u
r
ity
c
o
n
ce
p
ts
in
to
n
o
n
-
s
ec
u
r
ity
c
o
m
p
u
ter
s
cien
ce
c
o
u
r
s
es
an
d
ass
es
s
th
e
p
o
ten
tial
ef
f
ec
ts
o
n
s
tu
d
en
ts
'
cy
b
er
s
e
cu
r
ity
k
n
o
wled
g
e
.
Firstl
y
,
f
iv
e
p
r
in
ci
p
les
h
av
e
b
ee
n
s
elec
ted
f
r
o
m
th
e
cy
b
er
s
ec
u
r
ity
C
o
m
m
u
n
ity
g
u
id
elin
e
(
C
SEC2
0
1
7
)
th
at
wo
r
k
ed
b
est
f
o
r
t
h
e
p
r
o
g
r
am
.
T
h
e
o
th
er
p
r
in
cip
les
ar
e
p
u
r
p
o
s
ef
u
lly
n
o
t
in
clu
d
ed
as
th
ey
ar
e
less
im
p
o
r
tan
t
an
d
ca
n
b
e
in
teg
r
ated
with
o
th
er
co
n
c
ep
ts
.
Seco
n
d
ly
,
th
e
ex
is
tin
g
cu
r
r
icu
lu
m
co
n
ten
t
i
s
m
ap
p
ed
to
th
e
s
elec
ted
p
r
i
n
cip
les.
T
h
ir
d
ly
,
t
h
e
g
ap
s
in
th
e
cu
r
r
icu
lu
m
ar
e
id
en
tifie
d
,
wh
e
r
e
th
ey
ar
e
f
il
led
b
y
i
n
f
u
s
in
g
n
ew
cy
b
er
s
e
cu
r
ity
to
p
ics.
Fin
ally
,
th
e
g
a
in
ed
cy
b
e
r
s
ec
u
r
ity
k
n
o
wled
g
e
is
m
ea
s
u
r
ed
t
o
d
et
er
m
in
e
th
e
e
f
f
ec
t
o
f
th
is
in
f
u
s
io
n
.
T
h
e
s
elec
ted
s
ec
u
r
ity
p
r
i
n
cip
les
ar
e
lis
ted
in
T
ab
le
1
alo
n
g
with
th
e
r
elate
d
co
u
r
s
es,
wh
ile
th
e
co
m
p
lete
lis
t
o
f
th
e
in
teg
r
ated
to
p
ics
is
m
en
tio
n
ed
in
T
ab
le
2
.
Acc
o
r
d
in
g
ly
,
th
e
f
o
llo
win
g
h
y
p
o
th
esis
p
r
o
p
o
s
ed
:
H
a
:
I
n
f
u
s
in
g
cy
b
er
s
ec
u
r
ity
p
r
i
n
cip
les
in
to
n
o
n
-
s
ec
u
r
ity
co
u
r
s
es
wi
ll
im
p
r
o
v
e
s
tu
d
en
ts
'
a
wa
r
en
ess
an
d
k
n
o
wled
g
e
o
f
C
y
b
e
r
s
ec
u
r
ity
.
T
ab
le
1
.
T
h
e
s
elec
ted
co
n
ce
p
ts
an
d
co
r
r
esp
o
n
d
in
g
co
u
r
s
es
P
r
i
n
c
i
p
l
e
s
C
o
u
r
se
SE
WP
D
C
N
DB
MP
F
a
u
l
t
t
o
l
e
r
a
n
c
e
X
C
r
y
p
t
o
g
r
a
p
h
y
a
l
g
o
r
i
t
h
ms
X
S
e
c
u
r
e
n
e
t
w
o
r
k
i
n
g
p
r
o
t
o
c
o
l
s
X
A
u
t
h
e
n
t
i
c
a
t
i
o
n
t
e
c
h
n
i
q
u
e
s
X
X
H
a
sh
f
u
n
c
t
i
o
n
s
X
S
E=
S
o
f
t
w
a
r
e
E
n
g
i
n
e
e
ri
n
g
,
WP
=
We
b
-
b
a
s
e
d
Pr
o
g
r
a
m
m
i
n
g
,
D
C
N
=
D
a
t
a
C
o
m
m
u
n
i
c
a
t
i
o
n
a
n
d
N
e
t
w
o
r
k
s,
D
S
=
D
a
t
a
b
a
se
S
y
s
t
e
m
s
,
M
P=M
o
b
i
l
e
Pro
g
ra
m
m
i
n
g
,
X=s
e
l
e
c
t
e
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
d
o
p
tin
g
th
e
cy
b
ers
ec
u
r
ity
co
n
ce
p
ts
in
to
cu
r
r
icu
lu
m:
th
e
p
o
ten
tia
l e
ffects o
n
… (
Mo
h
a
mm
a
d
A
z
z
eh
)
1751
T
ab
le
2
.
T
h
e
s
elec
ted
co
u
r
s
es
an
d
th
eir
to
p
ics
O
r
d
e
r
C
o
u
r
se
n
a
me
Le
v
e
l
To
p
i
c
s
1
S
o
f
t
w
a
r
e
E
n
g
i
n
e
e
r
i
n
g
(
S
E)
Y
e
a
r
2
/
S
e
m
e
st
e
r
1
S
E1
:
S
e
c
u
r
i
t
y
b
r
e
a
c
h
e
s
S
E2
:
S
o
f
t
w
a
r
e
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
S
E3
:
F
a
u
l
t
t
o
l
e
r
a
n
c
e
t
e
c
h
n
i
q
u
e
s
2
W
e
b
-
B
a
se
d
P
r
o
g
r
a
mm
i
n
g
(
W
P
)
Y
e
a
r
2
/
S
e
m
e
st
e
r
2
W
P
1
:
C
r
y
p
t
o
g
r
a
p
h
y
W
P
2
:
Ema
i
l
a
n
d
W
e
b
S
e
c
u
r
i
t
y
P
r
o
t
o
c
o
l
s
W
P
3
:
S
e
c
u
r
e
S
o
c
k
e
t
s
La
y
e
r
(
S
S
L)
P
r
o
t
o
c
o
l
3
D
a
t
a
C
o
mm
u
n
i
c
a
t
i
o
n
a
n
d
N
e
t
w
o
r
k
s (
D
C
N
)
Y
e
a
r
3
/
S
e
m
e
st
e
r
1
D
C
N
1
:
P
r
o
t
e
c
t
i
n
g
C
o
m
p
u
t
i
n
g
D
e
v
i
c
e
s
D
C
N
2
:
F
i
r
e
w
a
l
l
T
y
p
e
s
D
C
N
3
:
Tw
o
F
a
c
t
o
r
a
n
d
M
u
t
u
a
l
A
u
t
h
e
n
t
i
c
a
t
i
o
n
Te
c
h
n
i
q
u
e
s
4
D
a
t
a
b
a
s
e
S
y
st
e
ms (
D
B
)
Y
e
a
r
3
/
S
e
m
e
st
e
r
2
D
B
1
:
C
r
e
a
t
i
n
g
a
n
d
M
a
n
a
g
i
n
g
P
a
ssw
o
r
d
s
D
B
2
:
S
Q
L
i
n
j
e
c
t
i
o
n
A
t
t
a
c
k
D
B
3
:
H
a
s
h
F
u
n
c
t
i
o
n
s
5
M
o
b
i
l
e
P
r
o
g
r
a
mm
i
n
g
(
M
P
)
Y
e
a
r
4
/
S
e
m
e
st
e
r
1
M
P
1
:
M
o
b
i
l
e
B
r
e
a
c
h
e
s
M
P
2
:
I
mp
l
e
me
n
t
i
n
g
S
e
c
u
r
i
t
y
D
e
f
e
n
se
s
T
o
co
n
d
u
ct
th
e
ex
p
er
im
en
t,
a
s
am
p
le
o
f
4
2
I
T
s
tu
d
en
ts
h
av
e
b
ee
n
s
elec
ted
with
n
o
p
r
io
r
k
n
o
wled
g
e
in
cy
b
er
s
ec
u
r
ity
.
T
h
e
s
am
p
le
is
th
en
d
iv
id
ed
in
to
two
id
en
tic
al
g
r
o
u
p
s
,
2
1
s
tu
d
e
n
ts
in
th
e
ex
p
er
im
en
tal
g
r
o
u
p
(
E
)
an
d
2
1
s
tu
d
en
ts
in
th
e
c
o
n
tr
o
l
g
r
o
u
p
(
C
)
.
T
h
e
s
tu
d
en
ts
in
th
e
ex
p
er
im
e
n
tal
g
r
o
u
p
ag
r
ee
d
to
tak
e
th
e
f
iv
e
s
elec
ted
co
u
r
s
es.
I
n
ea
ch
co
u
r
s
e,
all
s
tu
d
en
ts
in
b
o
th
g
r
o
u
p
s
wer
e
ask
ed
to
u
n
d
er
g
o
p
r
e
-
e
v
alu
atio
n
ev
alu
atio
n
test
s
b
ef
o
r
e
en
r
o
llin
g
o
n
th
e
s
elec
ted
co
u
r
s
e.
I
n
co
n
tr
ast,
th
e
ex
p
er
im
en
tal
g
r
o
u
p
is
also
ad
m
in
is
tr
ated
to
an
o
th
er
p
o
s
t
-
ev
alu
atio
n
af
ter
th
e
en
d
o
f
th
at
co
u
r
s
e.
E
x
p
er
t
in
s
tr
u
cto
r
s
h
av
e
s
et
th
e
q
u
esti
o
n
s
o
f
b
o
th
test
s
in
th
e
f
ield
o
f
C
y
b
er
s
ec
u
r
ity
,
a
n
d
b
o
th
test
s
h
av
e
a
d
if
f
er
en
t sa
m
p
le
o
f
q
u
esti
o
n
s
.
T
o
s
tatis
tically
test
th
e
h
y
p
o
t
h
eses
H
a
,
two
co
m
p
ar
is
o
n
s
a
r
e
p
er
f
o
r
m
ed
:
with
in
th
e
e
x
p
er
im
en
tal
g
r
o
u
p
an
d
ac
r
o
s
s
d
if
f
er
e
n
t
g
r
o
u
p
s
.
C
o
n
ce
r
n
in
g
t
h
e
ex
p
er
im
e
n
tal
g
r
o
u
p
,
th
e
f
ir
s
t
co
m
p
a
r
is
o
n
was
co
n
d
u
cted
to
ex
am
in
e
th
e
s
ig
n
if
ican
t
d
if
f
er
en
ce
b
etwe
en
th
e
p
r
e
-
test
an
d
p
o
s
t
-
test
s
co
r
es
o
f
th
e
ex
p
er
im
en
tal
g
r
o
u
p
alo
n
e
an
d
th
e
c
o
n
tr
o
l
g
r
o
u
p
alo
n
e
u
s
in
g
p
air
e
d
t
-
test
.
T
h
e
s
ec
o
n
d
c
o
m
p
ar
is
o
n
was
co
n
d
u
c
ted
to
ex
am
i
n
e
th
e
s
ig
n
if
ican
t
d
if
f
er
en
ce
b
etwe
en
p
r
e
-
test
an
d
p
o
s
t
-
test
o
f
b
o
t
h
ex
p
er
im
en
tal
an
d
co
n
tr
o
l
g
r
o
u
p
s
,
u
s
in
g
th
e
two
-
s
am
p
le
t
-
test
.
T
h
e
p
u
r
p
o
s
e
o
f
b
o
th
test
s
is
to
en
s
u
r
e
th
at
t
h
e
ex
p
e
r
im
en
tal
g
r
o
u
p
s
tu
d
en
ts
ar
e
ac
q
u
ir
ed
th
e
r
eq
u
ir
ed
cy
b
e
r
s
ec
u
r
ity
k
n
o
wl
ed
g
e.
R
esu
lts
r
ev
ea
led
s
ig
n
if
i
ca
n
t
d
if
f
er
e
n
ce
s
b
etwe
en
m
a
r
k
s
o
f
p
r
e
-
ev
alu
atio
n
an
d
p
o
s
t
-
ev
alu
atio
n
test
s
f
o
r
m
o
s
t
in
f
u
s
ed
to
p
ics.
Mo
r
eo
v
e
r
,
r
esu
lts
s
h
o
w
th
at
th
e
p
o
s
tm
ar
k
s
ar
e
in
g
en
er
al
h
ig
h
er
th
an
p
r
e
m
ar
k
s
f
o
r
th
e
ex
p
er
im
en
tal
g
r
o
u
p
.
T
h
e
r
esu
lts
al
s
o
d
em
o
n
s
tr
ate
th
at
in
f
u
s
in
g
im
p
o
r
tan
t
cy
b
er
s
ec
u
r
ity
to
p
ics
with
in
o
t
h
er
co
m
p
u
ter
s
cien
ce
co
u
r
s
es
ca
n
in
cr
ea
s
e
s
tu
d
en
ts
'
a
war
en
ess
an
d
k
n
o
wled
g
e
r
eg
ar
d
in
g
cy
b
er
s
ec
u
r
ity
co
n
ce
p
ts
.
T
h
e
r
em
ain
d
er
o
f
th
is
p
ap
er
is
o
r
g
an
ized
as
f
o
llo
ws.
Se
ctio
n
2
p
r
esen
ts
th
e
r
esear
ch
m
eth
o
d
o
lo
g
y
an
d
t
h
e
ex
p
er
im
e
n
tal
wo
r
k
,
alo
n
g
with
th
e
ev
alu
atio
n
m
ea
s
u
r
es.
T
h
e
r
esu
lts
ar
e
d
is
cu
s
s
ed
th
en
in
s
ec
tio
n
3
.
Fin
ally
,
s
ec
tio
n
4
p
r
esen
t
s
th
e
co
n
clu
s
io
n
an
d
d
ir
ec
tio
n
s
f
o
r
f
u
t
u
r
e
r
esear
ch
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
T
h
e
r
esear
ch
m
et
h
o
d
o
l
o
g
y
o
f
o
u
r
s
tu
d
y
is
d
iv
id
ed
in
t
o
th
r
ee
p
h
ases
.
I
n
th
e
f
ir
s
t
p
h
ase,
a
p
ilo
t
s
tu
d
y
is
d
esig
n
ed
b
ased
o
n
d
ata
co
l
lecte
d
f
r
o
m
4
0
s
tu
d
en
ts
to
ex
am
in
e
th
eir
awa
r
en
ess
o
f
cy
b
er
s
ec
u
r
ity
co
n
ce
p
ts
.
T
h
e
s
u
r
v
e
y
'
s
f
ee
d
b
ac
k
e
n
ab
l
es
u
s
to
d
eter
m
i
n
e
s
ec
u
r
ity
a
war
en
ess
lev
els
th
at
u
n
iv
e
r
s
ity
s
tu
d
en
ts
alr
ea
d
y
h
av
e.
Ap
p
licab
le
p
r
in
cip
les
wer
e
s
et
an
d
in
teg
r
ated
in
to
f
iv
e
n
o
n
-
s
ec
u
r
ity
co
u
r
s
es
in
th
e
s
ec
o
n
d
p
h
ase,
f
o
llo
win
g
a
f
o
u
r
-
s
tep
m
eth
o
d
o
lo
g
y
.
Firstl
y
,
f
iv
e
ap
p
r
o
p
r
i
ate
p
r
in
cip
les
h
av
e
b
ee
n
s
el
ec
ted
b
as
ed
o
n
th
e
C
SEC2
0
1
7
g
u
id
elin
e:
f
au
lt
to
ler
an
ce
,
cr
y
p
to
g
r
ap
h
y
alg
o
r
ith
m
s
,
s
ec
u
r
e
n
etwo
r
k
in
g
p
r
o
to
c
o
ls
,
au
th
en
ticatio
n
tech
n
iq
u
es,
a
n
d
h
ash
f
u
n
ctio
n
s
.
Seco
n
d
ly
,
a
s
et
o
f
co
u
r
s
e
s
f
r
o
m
t
h
e
ex
is
tin
g
cu
r
r
ic
u
lu
m
is
m
ap
p
e
d
to
th
e
s
elec
ted
p
r
in
cip
les.
T
h
ir
d
ly
,
th
e
c
u
r
r
icu
l
u
m
g
a
p
s
ar
e
id
en
tif
ied
an
d
f
illed
.
Fin
ally
,
a
s
et
o
f
to
p
ics
is
p
r
o
p
o
s
e
d
to
th
ese
g
ap
s
.
I
n
th
e
th
ir
d
p
h
ase,
4
2
s
tu
d
en
ts
h
av
e
b
ee
n
ca
r
ef
u
lly
s
elec
ted
,
s
u
ch
th
at
th
e
y
h
av
e
n
o
p
r
io
r
k
n
o
wled
g
e
o
f
C
y
b
er
s
ec
u
r
ity
,
n
o
r
th
ey
h
av
e
tak
en
an
y
o
n
e
o
f
t
h
e
f
iv
e
co
u
r
s
es.
T
h
e
s
tu
d
en
ts
wer
e
d
iv
id
ed
in
to
two
id
en
tical
g
r
o
u
p
s
(
ex
p
er
im
en
tal
an
d
co
n
tr
o
l
g
r
o
u
p
s
)
.
T
h
e
s
tu
d
en
ts
in
th
e
ex
p
e
r
im
en
tal
g
r
o
u
p
ag
r
ee
d
to
tak
e
th
e
f
iv
e
s
elec
ted
co
u
r
s
es
in
co
n
s
e
cu
tiv
e
o
r
d
e
r
.
I
n
c
o
n
tr
ast,
th
e
o
th
er
s
tu
d
en
ts
in
th
e
co
n
tr
o
l
g
r
o
u
p
wer
e
s
e
lecte
d
f
r
o
m
t
h
e
r
e
g
is
ter
ed
s
tu
d
e
n
ts
in
th
at
c
o
u
r
s
e.
All
s
tu
d
en
ts
we
r
e
ask
ed
to
u
n
d
er
g
o
two
test
s
:
i
)
a
p
r
e
-
e
v
alu
atio
n
test
(
p
r
e
en
r
o
llin
g
o
n
th
e
s
elec
ted
co
u
r
s
e)
an
d
ii
)
a
p
o
s
t
-
test
(
af
ter
th
e
en
d
o
f
th
at
co
u
r
s
e)
o
n
th
e
cy
b
er
s
ec
u
r
ity
to
p
ics
th
at
th
ey
h
a
v
e
lear
n
ed
with
in
th
e
s
elec
ted
c
o
u
r
s
es.
I
n
b
o
t
h
test
s
,
th
e
q
u
esti
o
n
s
we
r
e
s
elec
ted
ca
r
ef
u
lly
b
y
ex
p
e
r
t
in
s
tr
u
cto
r
s
in
c
y
b
er
s
ec
u
r
ity
,
an
d
b
o
th
test
s
h
av
e
a
d
if
f
er
en
t
s
am
p
le
o
f
q
u
esti
o
n
s
.
A
p
air
ed
t
-
test
s
tatis
t
ical
test
is
th
en
p
er
f
o
r
m
ed
to
e
x
am
in
e
th
e
s
ig
n
if
i
c
an
t
d
if
f
er
e
n
ce
b
etwe
en
s
tu
d
en
ts
'
m
ar
k
s
in
th
e
ex
p
er
im
en
tal
g
r
o
u
p
f
o
r
t
h
e
p
r
e
-
ev
alu
atio
n
a
n
d
p
o
s
t
-
ev
alu
ati
o
n
.
I
n
ad
d
itio
n
to
u
s
in
g
th
e
t
wo
-
s
am
p
le
t
-
test
to
ex
am
in
e
th
e
d
if
f
er
en
ce
b
etwe
e
n
ex
p
er
im
e
n
tal
an
d
c
o
n
tr
o
l g
r
o
u
p
s
co
n
ce
r
n
in
g
p
r
e
a
n
d
p
o
s
t
-
test
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
25
,
No
.
3
,
Ma
r
ch
20
22
:
1
7
4
9
-
1
7
5
8
1752
3.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
3
.
1
.
Resul
t
s
o
f
pil
o
t
s
t
ud
y
T
h
e
g
en
er
al
k
n
o
wled
g
e
ab
o
u
t
cy
b
er
s
ec
u
r
ity
an
d
cy
b
er
-
a
ttack
s
,
p
ass
wo
r
d
,
au
th
en
ticatio
n
,
em
ail
s
ec
u
r
ity
,
f
ir
ewa
lls
,
an
d
m
o
b
ile
s
ec
u
r
ity
ar
e
in
v
esti
g
ated
.
T
h
e
r
esu
lts
o
f
th
e
s
tu
d
y
ar
e
s
u
m
m
ar
ized
in
T
ab
le
3
.
R
eg
ar
d
in
g
th
e
f
i
r
s
t
q
u
esti
o
n
a
b
o
u
t
th
e
g
en
er
al
k
n
o
wled
g
e
o
f
cy
b
er
s
ec
u
r
ity
an
d
s
ec
u
r
ity
attac
k
s
,
it
was
f
o
u
n
d
th
at
o
n
ly
1
0
%
ar
e
s
tr
o
n
g
ly
k
n
o
wled
g
ea
b
le.
T
h
e
o
th
er
q
u
esti
o
n
s
'
r
esu
lts
h
av
e
co
n
f
ir
m
ed
t
h
e
r
esp
o
n
s
es
to
th
is
s
elf
-
ev
alu
atio
n
.
C
o
n
s
id
er
in
g
t
h
is
r
esu
l
t
f
o
r
I
T
s
p
ec
ialis
ts
'
r
esp
o
n
d
en
ts
,
t
h
is
lack
o
f
k
n
o
wle
d
g
e
is
lik
ely
h
i
g
h
er
in
th
e
g
en
er
al
p
o
p
u
latio
n
.
T
h
e
s
ec
o
n
d
q
u
esti
o
n
ask
ed
ab
o
u
t
cr
ea
tin
g
s
tr
o
n
g
p
ass
wo
r
d
s
.
Su
r
p
r
is
in
g
ly
,
m
o
r
e
th
an
4
0
%
o
f
th
e
r
esp
o
n
d
en
ts
u
s
ed
th
e
s
am
e
p
ass
wo
r
d
f
o
r
o
t
h
er
s
er
v
ices,
an
d
a
n
o
th
er
2
0
%
p
r
ef
er
r
e
d
to
cr
ea
te
an
ea
s
y
p
ass
wo
r
d
.
T
h
is
m
ig
h
t
b
e
a
b
ad
i
n
d
icato
r
o
f
p
ass
wo
r
d
cr
ea
tin
g
k
n
o
wled
g
e.
Similar
ly
,
th
e
au
th
en
ticatio
n
tech
n
iq
u
es k
n
o
wled
g
e
is
n
o
t m
u
ch
b
etter
,
as seen
in
q
u
esti
o
n
3
.
Mo
s
t o
f
th
e
p
ar
ticip
an
ts
d
o
n
o
t
k
n
o
w
wh
at
two
-
f
ac
to
r
a
u
th
en
t
icatio
n
is
.
r
eg
a
r
d
in
g
th
e
web
s
ite
tr
u
s
t
in
q
u
esti
o
n
4
,
t
h
e
s
am
e
is
s
u
e
is
r
ev
ea
led
f
o
r
r
esp
o
n
d
en
ts
wh
o
co
n
s
id
er
th
e
em
ail
s
er
v
er
r
esp
o
n
s
ib
le
f
o
r
s
ca
n
n
in
g
th
e
em
ail
lin
k
s
,
wh
ich
is
n
o
t
th
e
ca
s
e
in
p
r
ac
tice.
T
h
is
awa
r
en
ess
lev
el
is
also
r
ef
lecte
d
in
q
u
esti
o
n
5
,
wh
e
r
e
ar
o
u
n
d
6
5
%
o
f
t
h
e
p
ar
ticip
an
ts
will
d
o
wn
lo
ad
a
n
d
in
s
tall a
p
r
o
g
r
a
m
s
u
g
g
ested
b
y
an
o
th
er
s
ite.
T
ab
le
3
.
R
esu
lts
o
f
p
ilo
t stu
d
y
Q
u
e
st
i
o
n
R
e
s
p
o
n
se
#
%
1
.
O
n
a
sc
a
l
e
o
f
o
n
e
t
o
f
i
v
e
(
f
i
v
e
b
e
i
n
g
t
h
e
m
o
st
c
o
n
f
i
d
e
n
t
)
,
r
a
n
k
y
o
u
r
k
n
o
w
l
e
d
g
e
a
b
o
u
t
c
y
b
e
r
se
c
u
r
i
t
y
a
n
d
a
t
t
a
c
k
s?
N
o
i
d
e
a
3
7
.
5
0
%
H
e
a
r
a
b
o
u
t
10
2
5
.
0
0
%
S
o
me
k
n
o
w
l
e
d
g
e
16
4
0
.
0
0
%
G
o
o
d
k
n
o
w
l
e
d
g
e
7
1
7
.
5
0
%
S
t
r
o
n
g
k
n
o
w
l
e
d
g
e
4
1
0
.
0
0
%
T
o
t
a
l
40
1
0
0
.
0
0
%
2
.
D
o
y
o
u
u
s
e
a
st
r
o
n
g
p
a
s
sw
o
r
d
t
o
a
c
c
e
ss
y
o
u
r
s
o
c
i
a
l
o
r
f
i
n
i
c
a
l
a
c
c
o
u
n
t
s?
Re
-
u
s
e
t
h
e
s
a
me
p
a
ssw
o
r
d
u
se
d
i
n
o
t
h
e
r
serv
i
c
e
s
16
4
0
.
0
0
%
C
r
e
a
t
e
a
p
a
ssw
o
r
d
t
h
a
t
i
s
a
s
e
a
s
y
a
s
p
o
ssi
b
l
e
t
o
r
e
mem
b
e
r
8
2
0
.
0
0
%
C
r
e
a
t
e
a
v
e
r
y
c
o
m
p
l
e
x
p
a
ssw
o
r
d
a
n
d
st
o
r
e
i
t
i
n
a
m
a
n
a
g
e
r
serv
i
c
e
10
2
5
.
0
0
%
C
r
e
a
t
e
a
n
e
w
p
a
s
sw
o
r
d
t
h
a
t
i
s s
i
mi
l
a
r
t
o
a
n
o
t
h
e
r
ser
v
i
c
e
4
1
0
.
0
0
%
C
r
e
a
t
e
a
n
e
n
t
i
r
e
l
y
n
e
w
st
r
o
n
g
p
a
ssw
o
r
d
2
5
.
0
0
%
T
o
t
a
l
40
1
0
0
.
0
0
%
3
.
D
o
y
o
u
k
n
o
w
w
h
a
t
Tw
o
-
F
a
c
t
o
r
A
u
t
h
e
n
t
i
c
a
t
i
o
n
(
2
F
A
)
i
s,
a
n
d
d
o
y
o
u
u
s
e
i
t
?
Y
e
s
7
1
7
.
5
0
%
No
33
8
2
.
5
0
%
T
o
t
a
l
40
1
0
0
.
0
0
%
4
.
W
h
a
t
w
o
u
l
d
y
o
u
d
o
i
f
y
o
u
r
e
c
e
i
v
e
d
a
n
e
m
a
i
l
w
i
t
h
l
i
n
k
s
t
o
o
t
h
e
r
si
t
e
s?
D
o
n
o
t
c
l
i
c
k
t
h
e
l
i
n
k
14
3
5
.
0
0
%
C
l
i
c
k
t
h
e
l
i
n
k
s
b
e
c
a
u
se
t
h
e
e
m
a
i
l
ser
v
e
r
h
a
s a
l
r
e
a
d
y
sca
n
n
e
d
t
h
e
e
ma
i
l
21
5
2
.
5
0
%
H
o
v
e
r
t
h
e
mo
u
s
e
o
n
l
i
n
k
s
t
o
v
e
r
i
f
y
t
h
e
d
e
st
i
n
a
t
i
o
n
U
R
L
b
e
f
o
r
e
c
l
i
c
k
i
n
g
5
1
2
.
5
0
%
T
o
t
a
l
40
1
0
0
.
0
0
%
5
.
W
h
a
t
w
o
u
l
d
y
o
u
d
o
w
h
e
n
a
p
o
p
-
u
p
w
i
n
d
o
w
i
s
d
i
s
p
l
a
y
e
d
st
a
t
e
s t
h
a
t
y
o
u
sh
o
u
l
d
d
o
w
n
l
o
a
d
a
n
d
i
n
st
a
l
l
a
d
i
a
g
n
o
st
i
c
s
p
r
o
g
r
a
m
t
o
p
r
o
t
e
c
t
y
o
u
r
c
o
mp
u
t
e
r
?
D
o
w
n
l
o
a
d
,
a
n
d
i
n
s
t
a
l
l
t
h
e
p
r
o
g
r
a
m
26
6
5
.
0
0
%
I
n
sp
e
c
t
t
h
e
p
o
p
-
u
p
w
i
n
d
o
w
s
t
o
v
e
r
i
f
y
t
h
e
i
r
v
a
l
i
d
i
t
y
8
2
0
.
0
0
%
I
g
n
o
r
e
t
h
e
m
e
ssa
g
e
a
n
d
c
l
o
s
e
t
h
e
w
e
b
si
t
e
6
1
5
.
0
0
%
T
o
t
a
l
40
1
0
0
.
0
0
%
6
.
W
h
a
t
a
c
t
i
o
n
d
o
y
o
u
t
a
k
e
i
f
y
o
u
n
e
e
d
t
o
c
o
n
n
e
c
t
t
o
t
h
e
I
n
t
e
r
n
e
t
v
i
a
a
n
o
p
e
n
W
i
-
F
i
h
o
t
s
p
o
t
,
b
u
t
i
t
a
sk
s
y
o
u
t
o
sw
i
t
c
h
o
f
f
t
h
e
f
i
r
e
w
a
l
l
?
C
o
n
n
e
c
t
a
n
d
sw
i
t
c
h
o
f
f
t
h
e
f
i
r
e
w
a
l
l
28
7
0
.
0
0
%
D
o
n
o
t
c
o
n
n
e
c
t
t
o
i
t
a
n
d
k
e
e
p
y
o
u
r
f
i
r
e
w
a
l
l
8
2
0
.
0
0
%
C
o
n
n
e
c
t
t
o
i
t
a
n
d
e
s
t
a
b
l
i
s
h
a
V
P
N
t
o
a
t
r
u
s
t
e
d
s
e
r
v
e
r
4
1
0
.
0
0
%
T
o
t
a
l
40
1
0
0
.
0
0
%
7
.
H
a
v
e
y
o
u
e
v
e
r
r
e
j
e
c
t
e
d
a
m
o
b
i
l
e
a
p
p
r
e
q
u
e
st
f
o
r
a
c
c
e
ssi
n
g
y
o
u
r
c
o
n
t
a
c
t
s,
c
a
m
e
r
a
,
o
r
l
o
c
a
t
i
o
n
?
Y
e
s
24
6
0
.
0
0
%
No
16
4
0
.
0
0
%
T
o
t
a
l
40
1
0
0
.
0
0
%
An
o
th
er
p
ar
am
eter
th
at
s
till
illu
s
tr
ates
lo
w
awa
r
en
ess
o
f
cy
b
er
s
ec
u
r
ity
is
s
h
o
wn
wh
en
7
0
%
o
f
r
esp
o
n
d
en
ts
ar
e
willin
g
to
s
witch
o
f
f
th
eir
f
ir
ewa
lls
f
o
r
a
f
r
ee
W
i
-
Fi
h
o
ts
p
o
t
g
iv
en
in
q
u
esti
o
n
6
.
I
t
is
also
im
p
o
r
tan
t
to
u
n
d
er
lin
e
th
at
th
e
awa
r
en
ess
ab
o
u
t
d
en
y
in
g
a
m
o
b
ile
a
p
p
r
eq
u
est
p
er
s
o
n
al
d
ata
p
o
s
itiv
ely
im
p
ac
ts
p
ar
ticip
an
ts
'
r
esp
o
n
s
es.
6
0
%
o
f
th
e
p
ar
ticip
a
n
ts
wi
ll
r
ejec
t
a
m
o
b
ile
ap
p
r
e
q
u
est
ac
ce
s
s
in
g
th
eir
co
n
tacts,
ca
m
er
a,
o
r
lo
ca
tio
n
s
f
o
r
th
e
last
q
u
esti
o
n
.
T
h
e
s
u
r
v
e
y
r
esu
lts
in
d
icate
d
t
h
at
s
tu
d
en
ts
d
o
n
o
t
h
a
v
e
m
u
c
h
k
n
o
wled
g
e
o
f
C
y
b
er
s
ec
u
r
ity
;
th
ey
n
ee
d
to
b
e
m
o
tiv
ated
to
s
ec
u
r
ity
p
r
ec
au
tio
n
s
an
d
b
e
ex
ce
p
tio
n
a
lly
th
e
r
is
k
s
o
f
o
n
lin
e
s
er
v
ices.
Als
o
,
it
ap
p
ea
r
s
th
at
ed
u
ca
tio
n
al
in
s
titu
tio
n
s
d
o
n
o
t
h
av
e
an
ac
tiv
e
ap
p
r
o
ac
h
to
i
m
p
r
o
v
i
n
g
awa
r
e
n
ess
am
o
n
g
s
tu
d
en
ts
.
I
t
is
wo
r
th
m
en
tio
n
in
g
h
e
r
e
th
at
o
u
r
p
ilo
t
r
esu
lts
ar
e
co
m
p
atib
le
with
r
ec
en
t
s
tu
d
ies.
On
e
ca
n
co
n
s
id
er
t
h
e
s
tu
d
y
in
[
2
9
]
,
wh
ich
an
aly
ze
d
c
y
b
er
s
ec
u
r
ity
awa
r
en
ess
am
o
n
g
ed
u
ca
tio
n
s
ec
to
r
m
em
b
er
s
in
th
e
Mid
d
l
e
E
ast
r
eg
io
n
.
T
h
e
r
esu
lts
r
ev
ea
l
th
at
th
e
p
ar
ticip
an
ts
d
o
n
o
t
h
a
v
e
th
e
r
eq
u
is
ite
k
n
o
wled
g
e
an
d
u
n
d
er
s
tan
d
in
g
o
f
th
e
im
p
o
r
tan
c
e
o
f
s
ec
u
r
ity
p
r
in
cip
les an
d
t
h
eir
p
r
ac
tical
ap
p
licatio
n
i
n
d
ay
-
to
-
d
ay
wo
r
k
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
d
o
p
tin
g
th
e
cy
b
ers
ec
u
r
ity
co
n
ce
p
ts
in
to
cu
r
r
icu
lu
m:
th
e
p
o
ten
tia
l e
ffects o
n
… (
Mo
h
a
mm
a
d
A
z
z
eh
)
1753
3
.
2
.
Resul
t
s
o
f
pre
-
ev
a
lua
t
io
n a
nd
po
s
t
-
ev
a
lua
t
io
n t
ests
3
.
2
.
1
.
Sta
t
is
t
ica
l
t
ests bet
wee
n pre
a
nd
po
s
t
ex
a
m
s
f
o
r
ex
perim
ent
a
l g
ro
up
I
n
th
ese
test
s
,
one
n
o
ticed
th
at
th
e
s
tu
d
en
ts
'
o
v
er
all
av
er
ag
e
m
ar
k
s
in
th
e
p
o
s
t
-
ev
alu
ati
o
n
test
ar
e
h
ig
h
er
th
a
n
th
e
p
r
e
-
ev
alu
atio
n
test
with
s
ig
n
if
ican
t
t
-
test
r
es
u
lts
f
o
r
two
to
p
ics
(
SE1
an
d
SE2
)
,
as
s
h
o
wn
in
T
ab
le
4
.
I
t
ca
n
also
n
o
tice
th
at
p
r
e
-
e
v
alu
atio
n
m
ar
k
s
'
s
tan
d
a
r
d
d
ev
iatio
n
is
clo
s
e
to
th
a
t
o
f
p
o
s
t
-
ev
alu
atio
n
m
ar
k
s
in
m
o
s
t
co
u
r
s
es.
T
h
e
C
o
h
en
'
s
d
m
ea
s
u
r
e
in
d
icate
s
th
at
th
e
ef
f
ec
t
s
ize
f
o
r
to
p
ics
(
SE1
an
d
SE2
)
is
g
r
ea
ter
th
an
0
.
5
,
wh
ich
m
ea
n
s
a
s
ig
n
if
ican
t d
if
f
er
e
n
ce
b
etwe
en
p
r
e
a
n
d
p
o
s
tm
ar
k
s
,
less
th
an
0
.
5
f
o
r
SE
1
.
T
ab
le
1
.
R
esu
lts
o
f
s
o
f
twar
e
e
n
g
in
ee
r
in
g
co
u
r
s
e
,
u
s
in
g
p
air
e
d
t
-
test
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
To
p
i
c
B
e
f
o
r
e
A
f
t
e
r
t
-
t
e
s
t
Ef
f
e
c
t
si
z
e
(
C
o
h
e
n
's
d
)
W
i
n
tie
l
o
s
e
S
E1
SB
4
6
.
7
±
1
1
.
4
6
6
.
4
±
1
2
.
8
t=
-
9
.
0
,
p
-
v
a
l
u
e
<
0
.
0
0
1
*
1
.
6
3
19
0
2
S
E2
SV
4
8
.
3
±
1
8
.
1
7
2
.
7
±
1
3
.
7
t=
-
8
.
5
,
p
-
v
a
l
u
e
<
0
.
0
0
1
*
1
.
5
3
17
0
4
S
E3
M
TS
6
1
.
0
±
1
5
.
6
6
5
.
7
±
1
3
.
4
t=
-
1
.
8
,
p
-
v
a
l
u
e
=
0
.
0
8
0
.
3
2
12
1
8
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%
.
S
B=
se
c
u
ri
t
y
b
re
a
c
h
e
s
,
S
V=
s
o
f
t
w
a
re
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
,
MTS
=
m
a
l
w
a
r
e
t
y
p
e
s
a
n
d
sym
p
t
o
m
s
T
h
e
s
am
e
f
in
d
in
g
s
ca
n
b
e
s
ee
n
f
o
r
th
e
web
p
r
o
g
r
am
m
in
g
c
o
u
r
s
e
,
as
s
h
o
wn
in
T
a
b
le
5
.
Su
r
p
r
is
in
g
ly
,
th
e
w
eb
p
r
o
g
r
am
m
in
g
co
u
r
s
e'
s
av
er
ag
e
m
ar
k
s
ar
e
less
th
a
n
th
at
o
f
th
e
s
o
f
twar
e
en
g
in
e
er
in
g
co
u
r
s
e.
T
h
e
p
air
ed
t
-
test
b
etwe
en
th
e
two
ev
alu
atio
n
s
s
h
o
ws
s
ig
n
if
ica
n
t
d
if
f
er
en
ce
s
b
etwe
en
th
e
two
m
ar
k
s
f
o
r
all
to
p
ics.
T
h
e
C
o
h
en
'
s
d
ef
f
ec
t
s
ize
c
o
n
f
ir
m
s
th
e
o
b
tain
ed
s
tatis
tical
d
if
f
er
e
n
ce
s
with
an
e
f
f
ec
t
s
ize
g
r
ea
ter
t
h
an
0
.
5
.
Als
o
,
th
e
n
u
m
b
e
r
o
f
win
s
is
s
ig
n
if
ican
tly
g
r
e
ater
th
an
th
e
n
u
m
b
er
o
f
lo
s
s
es,
wh
ich
r
ev
ea
l
ed
t
h
at
th
e
n
u
m
b
er
o
f
s
tu
d
en
ts
wh
o
im
p
r
o
v
ed
th
ei
r
m
ar
k
s
is
lar
g
er
t
h
an
th
o
s
e
wh
o
f
ailed
to
im
p
r
o
v
e.
T
ab
le
5
.
R
esu
lts
o
f
web
p
r
o
g
r
am
m
in
g
co
u
r
s
e
,
u
s
in
g
p
air
ed
t
-
test
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
To
p
i
c
B
e
f
o
r
e
A
f
t
e
r
t
-
t
e
s
t
Ef
f
e
c
t
si
z
e
(
C
o
h
e
n
's
d
)
w
i
n
tie
l
o
s
e
WP1
CRP
4
1
.
1
±
1
4
.
5
5
2
.
5
±
9
.
4
t=
-
5
.
2
3
9
4
,
p
-
v
a
l
u
e
<
0
.
0
0
1
*
0
.
9
5
14
0
7
WP2
EWS
4
4
.
8
±
1
1
.
9
5
7
.
6
±
1
5
.
9
t=
-
5
.
0
8
4
8
,
p
-
v
a
l
u
e
<
0
.
0
0
1
*
0
.
9
2
15
0
6
WP3
SSL
3
0
.
4
±
1
5
.
3
4
6
.
5
±
1
3
.
7
t=
-
6
.
1
8
7
5
,
p
-
v
a
l
u
e
<
0
.
0
0
1
*
1
.
1
1
15
1
5
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%
.
C
RP=
c
ry
p
t
o
g
ra
p
h
y
,
EW
S
=
e
m
a
i
l
a
n
d
w
e
b
s
e
c
u
ri
t
y
,
S
S
L
=
sec
u
re
s
o
c
k
e
t
s
l
a
y
e
r
(
S
S
L
)
T
h
e
r
esu
lts
in
T
ab
le
6
d
e
m
o
n
s
tr
ate
th
at
ad
o
p
tin
g
th
r
ee
cy
b
e
r
s
ec
u
r
ity
to
p
ics
wo
u
l
d
p
ar
tiall
y
en
h
a
n
ce
s
tu
d
en
t
awa
r
en
ess
r
eg
ar
d
in
g
th
e
Data
co
m
m
u
n
icatio
n
an
d
n
etwo
r
k
in
g
c
o
u
r
s
e.
Ho
wev
e
r
,
o
n
ly
two
to
p
ics
(
DC
N2
an
d
DC
N3
)
s
h
o
w
s
ig
n
if
ican
t
im
p
r
o
v
em
en
ts
,
as
co
n
f
ir
m
ed
b
y
th
e
t
-
test
.
Su
r
p
r
is
in
g
ly
,
th
e
av
er
ag
e
o
f
p
r
e
an
d
p
o
s
tm
ar
k
s
f
o
r
DC
N1
ar
e
s
im
ilar
with
in
s
ig
n
if
ican
t
d
if
f
er
en
ce
s
b
etwe
en
th
em
.
I
n
co
n
tr
ast,
th
e
o
v
er
all
av
er
ag
e
o
f
p
o
s
t
-
ev
alu
atio
n
m
ar
k
s
is
h
ig
h
er
th
an
t
h
e
av
e
r
ag
e
o
f
p
r
e
-
ev
al
u
atio
n
m
a
r
k
s
f
o
r
DC
N1
an
d
DC
N
2
.
T
h
u
s
,
s
atis
f
ac
to
r
y
im
p
r
o
v
e
m
e
n
ts
in
s
tu
d
en
t
k
n
o
wled
g
e
in
th
e
DC
N
co
u
r
s
e
ar
e
g
en
er
ally
s
h
o
wn
,
b
u
t
th
is
im
p
r
o
v
em
e
n
t d
id
n
o
t sh
o
w
t
h
e
ex
p
ec
ted
lev
el.
T
ab
le
6
.
R
esu
lts
o
f
d
ata
co
m
m
u
n
icatio
n
an
d
n
etwo
r
k
in
g
c
o
u
r
s
e,
u
s
in
g
p
air
ed
t
-
test
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
To
p
i
c
B
e
f
o
r
e
A
f
t
e
r
t
-
t
e
s
t
Ef
f
e
c
t
si
z
e
(
C
o
h
e
n
's
d
)
w
i
n
tie
l
o
s
e
D
C
N
1
P
C
D
5
4
.
1
±
1
5
.
1
5
4
.
8
±
1
7
.
5
t=
-
0
.
2
4
,
p
-
v
a
l
u
e
=
0
.
8
1
4
0
.
0
4
11
0
10
D
C
N
2
FT
5
0
.
0
±
1
9
.
1
5
7
.
3
±
1
3
.
6
t=
-
2
.
4
0
,
p
-
v
a
l
u
e
=
0
.
0
1
9
*
0
.
4
4
13
0
8
D
C
N
3
TFM
A
4
2
.
4
±
1
6
.
0
4
8
.
6
±
1
8
.
3
t=
-
2
.
0
1
,
p
-
v
a
l
u
e
=
0
.
0
4
7
*
0
.
3
6
12
1
8
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%
.
P
C
D
=
p
r
o
t
e
c
t
i
n
g
c
o
m
p
u
t
i
n
g
d
e
v
i
c
e
s,
FT =
f
i
r
e
w
a
l
l
t
y
p
e
s,
T
FM
A
=
t
w
o
f
a
c
t
o
rs
,
a
n
d
m
u
t
u
a
l
a
u
t
h
e
n
t
i
c
a
t
i
o
n
T
h
e
r
esu
lts
o
f
s
ig
n
if
ican
ce
t
ests
f
o
r
th
e
d
ata
b
ase
co
u
r
s
e
ar
e
a
litt
le
b
it
d
if
f
er
e
n
t
th
a
n
p
r
e
v
io
u
s
co
u
r
s
es.
T
h
r
e
e
cy
b
er
s
ec
u
r
ity
t
o
p
ics
wer
e
a
d
o
p
te
d
,
as
m
en
ti
o
n
ed
in
T
a
b
le
7
.
T
h
e
a
v
er
ag
e
o
f
m
ar
k
s
f
o
r
p
o
s
t
-
test
is
lar
g
er
in
g
en
er
al
th
a
n
th
e
p
r
e
-
ev
al
u
atio
n
test
,
s
u
g
g
esti
n
g
g
o
o
d
im
p
r
o
v
em
en
ts
in
s
tu
d
en
ts
'
awa
r
e
n
ess
.
T
h
e
p
air
e
d
t
-
test
r
esu
lts
d
em
o
n
s
tr
ate
a
s
ig
n
if
ican
t
d
if
f
e
r
e
n
ce
b
etwe
en
p
r
e
-
e
v
alu
atio
n
an
d
p
o
s
t
-
ev
alu
atio
n
m
ar
k
s
f
o
r
t
h
r
ee
cy
b
er
s
ec
u
r
ity
t
o
p
ics:
C
r
ea
tin
g
an
d
m
a
n
ag
in
g
p
ass
wo
r
d
s
an
d
h
ash
f
u
n
ctio
n
s
.
T
ab
le
7
.
R
esu
lts
o
f
d
atab
ase
s
y
s
tem
s
co
u
r
s
e,
u
s
in
g
p
air
e
d
t
-
t
est
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
To
p
i
c
B
e
f
o
r
e
A
f
t
e
r
t
-
t
e
s
t
Ef
f
e
c
t
si
z
e
(
C
o
h
e
n
's
d
)
w
i
n
tie
l
o
s
e
D
B
1
C
M
P
6
0
.
7
±
1
1
.
9
6
6
.
3
±
1
2
.
6
t=
-
2
.
6
,
p
-
v
a
l
u
e
=
0
.
0
1
*
0
.
4
6
13
1
7
D
B
2
S
I
A
4
9
.
8
±
1
6
.
4
6
4
.
8
±
8
.
8
0
t=
-
6
.
4
,
p
-
v
a
l
u
e
<
0
.
0
0
1
*
1
.
1
9
16
0
5
D
B
3
HF
3
8
.
6
±
1
5
.
4
4
5
.
4
±
1
0
.
1
t=
-
2
.
9
,
p
-
v
a
l
u
e
=
0
.
0
0
4
*
0
.
5
4
14
0
7
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%.
C
M
P:
c
r
e
a
t
i
n
g
a
n
d
m
a
n
a
g
i
n
g
p
a
ss
w
o
rd
s
,
S
I
A:
S
Q
L
i
n
j
e
c
t
i
o
n
a
t
t
a
c
k
,
H
F:
h
a
s
h
f
u
n
c
t
i
o
n
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
25
,
No
.
3
,
Ma
r
ch
20
22
:
1
7
4
9
-
1
7
5
8
1754
T
h
is
r
esu
lt
s
u
g
g
ests
th
at
th
e
s
tu
d
en
t
awa
r
en
ess
s
ig
n
if
ican
tly
im
p
r
o
v
ed
wh
ile
ta
k
in
g
th
ese
to
p
ics
with
in
th
e
d
atab
ase
co
u
r
s
e.
Ho
wev
er
,
th
e
e
f
f
ec
t size
r
ev
ea
le
d
a
s
tr
o
n
g
ju
s
tific
atio
n
to
ju
d
g
e
th
at
th
e
d
if
f
er
e
n
ce
b
etwe
en
two
ev
alu
atio
n
m
ar
k
s
is
s
ig
n
if
ican
t
f
o
r
o
n
ly
two
t
o
p
ics
(
DB
2
an
d
DB
3
)
with
C
o
h
en
'
s
d
o
v
er
0
.
5
.
C
o
n
ce
r
n
in
g
t
h
e
m
o
b
ile
p
r
o
g
r
am
m
in
g
co
u
r
s
e,
T
ab
le
8
s
h
o
ws
s
ig
n
if
ican
t
d
if
f
er
en
ce
s
b
etwe
en
p
r
e
-
e
v
alu
atio
n
an
d
p
o
s
t
-
ev
al
u
atio
n
test
s
f
o
r
o
n
ly
MP2
to
p
ics,
co
n
f
ir
m
i
n
g
th
at
ad
o
p
tin
g
th
ese
cy
b
er
s
ec
u
r
ity
to
p
ics
in
a
p
r
o
g
r
a
m
m
in
g
c
o
u
r
s
e
wo
u
ld
e
n
h
an
ce
s
tu
d
en
t a
war
en
ess
ab
o
u
t th
r
ea
ts
th
at
ca
n
af
f
ec
t th
e
m
o
b
ile
ap
p
licatio
n
.
I
n
co
n
tr
ast,
a
s
ig
n
if
ican
t
d
if
f
er
e
n
ce
f
o
r
MP1
was
n
o
t
f
o
u
n
d
.
B
o
th
f
in
d
in
g
s
ar
e
co
n
f
ir
m
ed
b
y
C
o
h
en
'
s
d
ef
f
ec
t
s
ize,
wh
ich
is
less
th
an
0
.
5
f
o
r
MP1
an
d
g
r
ea
ter
t
h
an
0
.
5
f
o
r
MP2
.
I
t
ca
n
also
n
o
tice
th
at
t
h
e
av
er
ag
e
m
ar
k
s
o
f
p
r
e
-
ev
alu
atio
n
test
s
f
o
r
b
o
th
en
g
ag
ed
cy
b
er
s
ec
u
r
ity
to
p
ics ar
e
q
u
ite
ac
ce
p
tab
le,
d
em
o
n
s
tr
at
in
g
th
at
th
e
s
tu
d
en
t
in
th
is
co
u
r
s
e
is
f
am
iliar
with
th
is
k
in
d
o
f
th
r
ea
t.
Als
o
,
s
ig
n
i
f
ican
t
im
p
r
o
v
em
en
ts
in
th
ei
r
m
ar
k
s
af
ter
ad
o
p
tin
g
MP1
w
er
e
n
o
t n
o
ticed
,
wh
ich
is
co
n
f
ir
m
ed
b
y
th
e
n
u
m
b
er
o
f
win
s
an
d
lo
s
s
es f
o
r
MP1
th
at
is
s
o
clo
s
e.
T
ab
le
8
.
R
esu
lts
o
f
m
o
b
ile
p
r
o
g
r
am
m
in
g
co
u
r
s
e
,
u
s
in
g
p
air
e
d
t
-
test
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
To
p
i
c
B
e
f
o
r
e
A
f
t
e
r
t
-
t
e
s
t
Ef
f
e
c
t
si
z
e
(
C
o
h
e
n
's
d
)
w
i
n
tie
l
o
s
e
M
P
1
MB
6
7
.
1
±
1
1
.
2
7
0
.
2
±
1
5
.
4
t=
-
1
.
3
,
p
-
v
a
l
u
e
=
0
.
2
0
0
.
2
3
12
0
9
M
P
2
I
S
D
5
3
.
5
±
1
2
.
7
7
3
.
7
±
1
3
.
4
t=
-
8
.
6
,
p
-
v
a
l
u
e
<
0
.
0
0
1
*
1
.
5
4
19
0
2
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%
.
M
B=
m
o
b
i
l
e
b
r
e
a
c
h
e
s
,
I
S
D
=
i
m
p
l
e
m
e
n
t
i
n
g
sec
u
r
i
t
y
d
e
f
e
n
s
e
s
3
.
2
.
2
.
Sta
t
is
t
ica
l t
est
bet
wee
n
ex
perim
ent
a
l a
nd
co
ntr
o
l
g
r
o
up
s
T
h
e
p
r
e
an
d
p
o
s
t
-
test
m
ar
k
s
f
o
r
b
o
th
co
n
tr
o
l
an
d
e
x
p
er
im
e
n
tal
g
r
o
u
p
s
f
o
r
ea
ch
co
u
r
s
e
a
r
e
in
f
u
s
ed
cy
b
er
s
ec
u
r
ity
t
o
p
ic
s
in
th
ese
test
s
wer
e
co
m
p
ar
ed
.
T
h
e
a
v
er
ag
e
o
f
m
a
r
k
s
f
o
r
ea
ch
c
y
b
er
s
ec
u
r
ity
to
p
ic
is
co
n
v
er
ted
to
a
s
ca
le
f
r
o
m
0
to
1
0
0
.
T
ab
le
9
s
h
o
ws th
e
s
tatis
ti
ca
l a
n
aly
s
is
u
s
in
g
th
e
T
wo
-
s
a
m
p
le
t
-
test
b
etwe
en
th
e
ex
p
er
im
en
tal
an
d
co
n
t
r
o
l
g
r
o
u
p
f
o
r
s
o
f
twar
e
e
n
g
in
ee
r
in
g
co
u
r
s
e.
R
esu
lts
s
h
o
w
n
o
s
ig
n
if
ican
t
d
if
f
er
e
n
ce
b
etwe
en
th
e
ex
p
er
im
en
tal
a
n
d
co
n
tr
o
l
g
r
o
u
p
s
in
th
e
p
r
e
-
test
o
f
all
s
o
f
twar
e
e
n
g
in
ee
r
i
n
g
to
p
ics.
T
h
is
co
n
f
ir
m
s
th
at
s
tu
d
en
ts
'
k
n
o
wled
g
e
in
b
o
th
g
r
o
u
p
s
is
r
elativ
ely
s
im
ilar
with
n
o
s
ig
n
if
ican
t
d
if
f
er
e
n
ce
.
I
n
c
o
n
tr
ast,
we
n
o
ticed
p
o
s
itiv
e
s
ig
n
if
ican
ce
f
o
r
th
e
p
o
s
t
-
test
b
et
wee
n
th
e
ex
p
er
im
en
tal
an
d
co
n
tr
o
l
g
r
o
u
p
with
a
lar
g
e
ef
f
ec
t
s
ize.
T
h
ese
f
in
d
in
g
s
ar
e
co
n
s
i
s
ten
t
with
o
u
r
b
asic
a
s
s
u
m
p
ti
o
n
s
th
at
p
r
esu
m
e
th
at
th
e
s
tu
d
en
t'
s
m
ar
k
s
in
th
e
ex
p
er
im
en
tal
an
d
c
o
n
tr
o
l
g
r
o
u
p
m
u
s
t
b
e
r
elativ
ely
s
im
ilar
to
th
e
p
r
e
-
test
b
ec
au
s
e
th
ey
h
av
e
n
o
p
r
io
r
k
n
o
wled
g
e
an
d
a
r
e
s
ig
n
if
ican
t
ly
d
if
f
er
e
n
t in
ter
m
s
o
f
p
o
s
t
-
te
s
ts
.
T
ab
le
9
.
C
o
m
p
a
r
is
o
n
b
etwe
en
ex
p
er
im
en
tal
an
d
co
n
tr
o
l g
r
o
u
p
f
o
r
s
o
f
twar
e
en
g
i
n
ee
r
in
g
co
u
r
s
e,
u
s
in
g
two
-
s
am
p
le
t
-
test
Te
st
Ty
p
e
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
t
o
p
i
c
Ex
p
e
r
i
m
e
n
t
a
l
g
r
o
u
p
C
o
n
t
r
o
l
g
r
o
u
p
t
-
t
e
s
t
Ef
f
e
c
t
si
z
e
(
c
o
h
e
n
's
d)
Pre
-
Te
st
S
E1
SB
4
6
.
7
±
1
1
.
4
5
1
.
6
±
1
2
.
3
t=
-
1
.
4
4
,
p
-
v
a
l
u
e
=
0
.
1
9
0
.
4
1
S
E2
SV
4
8
.
3
±
1
8
.
1
4
6
.
7
±
1
1
.
8
t
=
0
.
3
4
,
p
-
v
a
l
u
e
=
0
.
7
4
0
.
1
0
S
E3
M
TS
6
1
.
0
±
1
5
.
6
5
7
.
7
±
1
4
.
6
t
=
0
.
7
1
,
p
-
v
a
l
u
e
=
0
.
4
8
0
.
2
1
P
o
st
-
T
e
st
S
E1
SB
6
6
.
4
±
1
2
.
8
5
2
.
4
±
1
2
.
9
t
=
3
.
5
3
,
p
-
v
a
l
u
e
=
0
.
0
0
1
*
1
.
0
9
S
E2
SV
7
2
.
7
±
1
3
.
7
4
8
.
3
±
1
0
.
2
t
=
6
.
5
4
,
p
-
v
a
l
u
e
<
0
.
0
0
1
*
2
.
0
2
S
E3
M
TS
6
5
.
7
±
1
3
.
4
5
5
.
5
±
1
5
.
2
t
=
2
.
3
1
,
p
-
v
a
l
u
e
=
0
.
0
2
*
0
.
7
1
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%
.
S
B=
se
c
u
ri
t
y
b
re
a
c
h
e
s
,
S
V=
s
o
f
t
w
a
re
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
,
MTS
=
m
a
l
w
a
r
e
t
y
p
e
s
a
n
d
sym
p
t
o
m
T
ab
le
1
0
s
h
o
ws
th
e
r
esu
lts
f
o
r
th
e
web
p
r
o
g
r
am
m
i
n
g
c
o
u
r
s
e
.
Her
e,
a
s
ig
n
if
ican
t
d
if
f
er
e
n
c
e
b
etwe
en
b
o
th
g
r
o
u
p
s
r
eg
a
r
d
in
g
th
e
p
r
e
-
test
f
o
r
th
e
s
ec
u
r
e
s
o
ck
ets
lay
er
(
SS
L
)
to
p
ic
is
s
h
o
w
n
.
Ho
wev
er
,
n
o
d
if
f
er
e
n
ce
was
s
h
o
wn
f
o
r
th
e
r
e
m
ain
in
g
to
p
ics
b
etwe
en
th
e
two
g
r
o
u
p
s
.
I
n
ter
m
s
o
f
p
o
s
t
-
test
,
n
o
s
ig
n
if
ican
t
d
if
f
e
r
en
c
e
was
s
h
o
wn
b
etwe
en
th
e
two
g
r
o
u
p
s
f
o
r
th
e
cr
y
p
to
g
r
ap
h
y
to
p
ic.
T
h
is
is
d
u
e
to
th
e
d
if
f
ic
u
lty
o
f
th
is
to
p
ic
as
it
d
ep
en
d
s
o
n
co
m
p
lex
m
ath
t
h
e
o
r
y
.
Ho
wev
e
r
,
a
s
ig
n
if
ica
n
t d
if
f
er
en
ce
was sh
o
wn
f
o
r
th
e
r
e
m
ain
in
g
to
p
ics (
e.
g
.
,
em
ail
an
d
web
s
ec
u
r
ity
an
d
s
e
cu
r
e
s
o
ck
ets lay
er
)
.
T
ab
le
1
0
.
C
o
m
p
ar
is
o
n
b
etwe
en
ex
p
er
im
e
n
tal
an
d
c
o
n
tr
o
l g
r
o
u
p
f
o
r
web
p
r
o
g
r
am
m
in
g
co
u
r
s
e,
u
s
in
g
two
-
s
am
p
le
t
-
test
Te
st
Ty
p
e
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
t
o
p
i
c
Ex
p
e
r
i
m
e
n
t
a
l
g
r
o
u
p
C
o
n
t
r
o
l
g
r
o
u
p
t
-
t
e
s
t
E
f
f
e
c
t
s
i
z
e
(
c
o
h
e
n
'
s
d
)
Pre
-
Te
st
WP1
CRP
4
1
.
1
±
1
4
.
5
4
6
.
3
±
1
1
.
2
t=
-
1
.
3
0
,
p
-
v
a
l
u
e
=
0
.
2
0
0
.
4
0
WP2
EWS
4
4
.
8
±
1
1
.
9
4
3
.
6
±
1
0
.
5
t
=
0
.
3
4
7
,
p
-
v
a
l
u
e
=
0
.
7
3
0
.
1
1
WP3
SSL
3
0
.
4
±
1
5
.
3
4
0
.
7
±
1
6
.
7
t=
-
2
.
0
8
,
p
-
v
a
l
u
e
=
0
.
0
4
4
*
0
.
6
4
P
o
st
-
T
e
st
WP1
CRP
5
2
.
5
±
9
.
4
4
8
.
6
±
1
1
.
7
t
=
1
.
2
,
p
-
v
a
l
u
e
=
0
.
2
4
0
.
4
1
WP2
EWS
5
7
.
6
±
1
5
.
9
4
7
.
3
±
1
2
.
3
t
=
2
.
3
5
,
p
-
v
a
l
u
e
=
0
.
0
2
5
*
0
.
7
2
WP3
SSL
4
6
.
5
±
1
3
.
7
3
8
.
2
±
1
0
.
1
t
=
2
.
2
3
,
p
-
v
a
l
u
e
=
0
.
0
3
2
*
0
.
6
9
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%.
C
RP=
c
ry
p
t
o
g
r
a
p
h
y
,
EW
=
e
m
a
i
l
a
n
d
w
e
b
sec
u
r
i
t
y
,
S
S
=
sec
u
re
s
o
c
k
e
t
s
l
a
y
e
r (
S
S
L
)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
d
o
p
tin
g
th
e
cy
b
ers
ec
u
r
ity
co
n
ce
p
ts
in
to
cu
r
r
icu
lu
m:
th
e
p
o
ten
tia
l e
ffects o
n
… (
Mo
h
a
mm
a
d
A
z
z
eh
)
1755
T
ab
le
1
1
s
h
o
ws
th
e
r
esu
lts
f
o
r
th
e
d
ata
co
m
m
u
n
icatio
n
a
n
d
n
etwo
r
k
in
g
co
u
r
s
e
.
Fo
r
t
h
e
p
r
e
-
test
m
ar
k
s
,
n
o
s
ig
n
if
ican
t
d
if
f
e
r
e
n
ce
was
s
h
o
wn
b
etwe
en
b
o
th
g
r
o
u
p
s
f
o
r
all
to
p
ics.
Ho
wev
er
,
a
s
ig
n
if
ican
t
d
if
f
er
en
ce
was
s
h
o
wn
in
th
e
p
o
s
t
-
test
m
ar
k
s
f
o
r
two
to
p
ics
(
e.
g
.
,
p
r
o
tectin
g
co
m
p
u
tin
g
d
ev
ices
an
d
f
ir
ewa
ll
ty
p
es).
On
th
e
o
th
er
h
an
d
,
s
tu
d
en
ts
d
id
n
o
t p
er
f
o
r
m
well
in
t
h
e
two
f
ac
to
r
an
d
m
u
tu
al
au
t
h
en
ticatio
n
to
p
ic.
T
ab
le
1
1
.
C
o
m
p
ar
is
o
n
b
etwe
en
ex
p
er
im
e
n
tal
an
d
c
o
n
tr
o
l g
r
o
u
p
f
o
r
d
ata
co
m
m
u
n
icatio
n
a
n
d
n
etwo
r
k
in
g
co
u
r
s
e,
u
s
in
g
two
-
s
am
p
le
t
-
test
Te
st
Ty
p
e
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
t
o
p
i
c
Ex
p
e
r
i
m
e
n
t
a
l
g
r
o
u
p
C
o
n
t
r
o
l
g
r
o
u
p
t
-
t
e
s
t
E
f
f
e
c
t
s
i
z
e
(
c
o
h
e
n
'
s
d
)
Pre
-
Te
st
D
C
N
1
P
C
D
5
4
.
1
±
1
5
.
1
5
2
.
3
±
1
2
.
4
t
=
0
.
4
2
,
p
-
v
a
l
u
e
=
0
.
6
8
0
.
1
3
D
C
N
2
FT
5
0
.
0
±
1
9
.
1
5
1
.
7
±
1
6
.
3
t=
-
0
.
3
1
,
p
-
v
a
l
u
e
=
0
.
7
6
0
.
1
0
D
C
N
3
TFM
A
4
2
.
4
±
1
6
.
0
4
6
.
1
±
1
3
.
4
t=
-
0
.
8
1
,
p
-
v
a
l
u
e
=
0
.
4
2
0
.
2
5
P
o
st
-
T
e
st
D
C
N
1
P
C
D
5
4
.
8
±
1
7
.
5
4
5
.
0
±
1
2
.
2
t
=
2
.
1
1
,
p
-
v
a
l
u
e
=
0
.
0
4
*
0
.
6
5
D
C
N
2
FT
5
7
.
3
±
1
3
.
6
4
6
.
9
±
1
2
.
1
t
=
2
.
6
2
,
p
-
v
a
l
u
e
=
0
.
0
1
*
0
.
8
1
D
C
N
3
TFM
A
4
8
.
6
±
1
8
.
3
4
1
.
1
±
1
3
.
4
t
=
1
.
5
2
,
p
-
v
a
l
u
e
=
0
.
1
3
0
.
4
7
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%.
PC
D
=
p
ro
t
e
c
t
i
n
g
c
o
m
p
u
t
i
n
g
d
e
v
i
c
e
s,
FT=
f
i
rew
a
l
l
t
y
p
e
s,
T
F
MA
=
t
w
o
f
a
c
t
o
r,
a
n
d
m
u
t
u
a
l
a
u
t
h
e
n
t
i
c
a
t
i
o
n
T
ab
le
1
2
s
h
o
ws
th
e
r
esu
lts
f
o
r
th
e
d
atab
ase
s
y
s
tem
s
co
u
r
s
e.
T
h
e
g
ain
ed
r
esu
lts
o
f
th
is
co
u
r
s
e
ar
e
s
im
ilar
to
th
e
p
r
ev
io
u
s
c
o
u
r
s
e
(
e.
g
.
,
d
ata
c
o
m
m
u
n
icatio
n
an
d
n
et
wo
r
k
in
g
)
.
Sp
ec
if
ically
,
r
esu
lts
s
h
o
w
n
o
s
ig
n
if
ican
t
d
if
f
e
r
en
ce
b
etwe
e
n
b
o
th
g
r
o
u
p
s
r
e
g
ar
d
in
g
th
e
p
r
e
-
test
f
o
r
all
to
p
ics.
I
n
ad
d
itio
n
,
a
s
ig
n
if
ican
t
d
if
f
er
en
ce
was
s
h
o
wn
b
etwe
en
th
e
two
g
r
o
u
p
s
f
o
r
all
to
p
ics
in
ter
m
s
o
f
p
o
s
t
-
test
.
T
h
is
is
d
u
e
to
t
h
e
p
o
p
u
lar
ity
o
f
th
ese
to
p
ics,
as
m
o
s
t
s
tu
d
en
ts
u
s
ed
th
e
to
p
ics'
tech
n
iq
u
es
d
aily
(
e.
g
.
,
cr
ea
tin
g
an
d
m
a
n
ag
in
g
p
ass
wo
r
d
s
,
SQL
in
jectio
n
attac
k
,
an
d
h
ash
f
u
n
c
tio
n
s
)
.
T
ab
le
1
2
.
C
o
m
p
ar
is
o
n
b
etwe
en
ex
p
er
im
e
n
tal
an
d
c
o
n
tr
o
l g
r
o
u
p
f
o
r
d
ata
b
ase
s
y
s
tem
s
co
u
r
s
e,
u
s
in
g
two
-
s
am
p
le
t
-
test
Te
st
Ty
p
e
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
t
o
p
i
c
Ex
p
e
r
i
m
e
n
t
a
l
g
r
o
u
p
C
o
n
t
r
o
l
g
r
o
u
p
t
-
t
e
s
t
E
f
f
e
c
t
s
i
z
e
(
c
o
h
e
n
'
s
d
)
Pre
-
Te
st
D
B
1
C
M
P
6
0
.
7
±
1
1
.
9
6
4
.
9
±
1
3
.
3
t=
-
1
.
1
,
p
-
v
a
l
u
e
=
0
.
2
9
0
.
3
3
D
B
2
S
I
A
4
9
.
8
±
1
6
.
4
5
1
.
4
±
1
1
.
8
t=
-
0
.
3
6
,
p
-
v
a
l
u
e
=
0
.
7
2
0
.
1
1
D
B
3
HF
3
8
.
6
±
1
5
.
4
4
2
.
6
±
1
2
.
1
t=
-
0
.
9
4
,
p
-
v
a
l
u
e
=
0
.
3
6
0
.
2
9
P
o
st
-
T
e
st
D
B
1
C
M
P
6
6
.
3
±
1
2
.
6
5
7
.
1
±
1
2
.
4
t
=
2
.
3
8
,
p
-
v
a
l
u
e
=
0
.
0
2
*
0
.
7
4
D
B
2
S
I
A
6
4
.
8
±
8
.
8
0
5
2
.
3
±
1
4
.
6
t
=
3
.
3
6
,
p
-
v
a
l
u
e
=
0
.
0
0
2
*
1
.
0
4
D
B
3
HF
4
5
.
4
±
1
0
.
1
3
8
.
7
±
9
.
5
t
=
2
.
2
1
,
p
-
v
a
l
u
e
=
0
.
0
3
*
0
.
6
8
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%.
C
M
P
=
c
r
e
a
t
i
n
g
a
n
d
m
a
n
a
g
i
n
g
p
a
ss
w
o
rd
s
,
S
I
A
=
S
Q
L
i
n
j
e
c
t
i
o
n
a
t
t
a
c
k
,
H
F
=
h
a
s
h
f
u
n
c
t
i
o
n
s
T
ab
le
1
3
s
h
o
ws th
e
r
esu
lts
f
o
r
th
e
m
o
b
ile
p
r
o
g
r
am
m
in
g
c
o
u
r
s
e.
Du
e
to
th
e
to
p
ic
n
o
v
elty
,
m
o
s
t o
f
th
e
to
p
ics
d
id
n
o
t
s
ig
n
if
ican
tly
d
if
f
er
b
etwe
en
t
h
e
ex
p
er
im
en
t
al
an
d
co
n
tr
o
l
g
r
o
u
p
s
.
Fo
r
in
s
tan
ce
,
th
e
m
o
b
ile
b
r
ea
ch
es
an
d
im
p
lem
e
n
tin
g
s
ec
u
r
ity
d
ef
en
s
es
to
p
ics
h
av
e
n
o
s
ig
n
if
ican
t
d
if
f
er
en
ce
b
etwe
e
n
g
r
o
u
p
s
in
p
r
e
-
test
m
ar
k
s
.
T
h
e
s
am
e
ca
s
e
f
o
r
im
p
lem
en
tin
g
s
ec
u
r
ity
d
ef
e
n
s
es
p
o
s
t
-
test
m
ar
k
s
wer
e
n
o
ticed
,
wh
er
e
n
o
s
ig
n
if
ican
t
d
if
f
er
en
ce
was
n
o
ticed
b
etw
ee
n
g
r
o
u
p
s
.
Ho
wev
er
,
a
s
ig
n
if
ican
t
d
if
f
er
e
n
ce
was
s
h
o
wn
f
o
r
th
e
M
o
b
ile
B
r
ea
ch
es to
p
ics,
wh
er
e
s
tu
d
en
ts
g
ain
k
n
o
wled
g
e
af
ter
I
n
f
u
s
i
n
g
th
is
p
r
in
ci
p
le.
T
ab
le
1
3
.
C
o
m
p
ar
is
o
n
b
etwe
en
ex
p
er
im
e
n
tal
an
d
c
o
n
tr
o
l g
r
o
u
p
f
o
r
m
o
b
ile
p
r
o
g
r
a
m
m
in
g
co
u
r
s
e
,
u
s
in
g
two
-
s
am
p
le
t
-
test
Te
st
Ty
p
e
ID
C
y
b
e
r
s
e
c
u
r
i
t
y
t
o
p
i
c
Ex
p
e
r
i
m
e
n
t
a
l
g
r
o
u
p
C
o
n
t
r
o
l
g
r
o
u
p
t
-
t
e
s
t
E
f
f
e
c
t
s
i
z
e
(
c
o
h
e
n
'
s
d
)
Pre
-
Te
st
M
P
1
MB
6
7
.
1
±
1
1
.
2
6
4
.
3
±
1
2
.
4
t
=
0
.
7
7
,
p
-
v
a
l
u
e
=
0
.
4
4
0
.
2
4
M
P
2
I
S
D
5
3
.
5
±
1
2
.
7
5
6
.
7
±
1
1
.
9
t=
-
0
.
8
4
,
p
-
v
a
l
u
e
=
0
.
4
0
0
.
2
6
P
o
st
-
T
e
st
M
P
1
MB
7
0
.
2
±
1
5
.
4
6
1
.
5
±
1
0
.
3
t
=
2
.
1
5
,
p
-
v
a
l
u
e
=
0
.
0
4
*
0
.
6
6
M
P
2
I
S
D
7
3
.
7
±
1
3
.
4
5
9
.
9
±
1
2
.
1
t
=
3
.
5
,
p
-
v
a
l
u
e
=
0
.
0
0
1
1
.
0
8
*
S
i
g
n
i
f
i
c
a
n
t
a
t
9
5
%.
MB
=
m
o
b
i
l
e
b
re
a
c
h
e
s
,
I
S
D
=
i
m
p
l
e
m
e
n
t
i
n
g
sec
u
r
i
t
y
d
e
f
e
n
s
e
s
I
n
d
ee
d
,
f
r
o
m
th
e
ab
o
v
e
s
tatis
tical
te
s
t
r
esu
lt
s
,
a
co
n
clu
s
i
o
n
ca
n
b
e
d
r
awn
th
at,
in
g
e
n
er
al,
th
e
s
tu
d
en
ts
h
av
e
a
q
u
ite
lo
w
lev
el
o
f
cy
b
er
s
ec
u
r
ity
awa
r
en
e
s
s
,
as
co
n
f
ir
m
ed
in
th
e
av
er
ag
es
an
d
s
tan
d
ar
d
d
ev
iatio
n
s
o
f
p
r
e
-
e
v
alu
atio
n
m
ar
k
s
.
B
u
t
th
ese
m
ar
k
s
ar
e
s
ig
n
if
ican
tly
im
p
r
o
v
ed
in
alm
o
s
t
a
ll
to
p
ics
ex
ce
p
t
f
o
r
th
r
ee
to
p
ics,
n
am
ely
,
SE3
,
D
C
N1
,
MP1
.
T
o
test
th
is
h
y
p
o
th
esis
,
th
e
av
er
ag
e
m
ar
k
s
f
o
r
all
p
r
e
m
a
r
k
s
o
f
all
to
p
ics
(
Say
b
ef
o
r
e)
an
d
av
er
a
g
e
p
o
s
tm
ar
k
s
f
o
r
all
to
p
ics
(
s
ay
af
ter
)
f
o
r
th
e
e
x
p
er
im
e
n
tal
g
r
o
u
p
o
n
l
y
we
re
co
m
p
u
te
d
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
25
,
No
.
3
,
Ma
r
ch
20
22
:
1
7
4
9
-
1
7
5
8
1756
T
h
e
p
air
e
d
t
-
test
r
esu
lts
(
t=
-
1
7
.
3
,
p
-
v
alu
e<
0
.
0
0
1
)
b
etwe
en
th
e
b
ef
o
r
e
an
d
af
ter
g
r
o
u
p
s
c
o
n
f
ir
m
e
d
H
a
's
h
y
p
o
th
esis
an
d
r
ev
ea
led
a
s
ig
n
if
ican
t
d
if
f
er
en
ce
b
etwe
en
s
tu
d
en
ts
'
av
er
ag
e
m
ar
k
s
in
all
to
p
ics.
Fu
r
th
er
m
o
r
e
,
av
er
ag
e
m
a
r
k
s
f
o
r
all
p
o
s
tm
ar
k
s
o
f
all
to
p
i
cs
f
o
r
th
e
ex
p
er
im
en
tal
g
r
o
u
p
(
E
)
an
d
av
e
r
ag
e
p
o
s
tm
ar
k
s
f
o
r
th
e
co
n
tr
o
l
g
r
o
u
p
(
C
)
ar
e
co
m
p
u
te
d
.
T
h
en
t
wo
-
s
am
p
le
t
-
test
r
esu
lts
(
t=2
.
1
6
,
p
-
v
al
u
e=
0
.
0
3
1
)
b
etwe
en
th
em
we
re
ap
p
lied
.
T
h
e
o
b
tain
ed
r
esu
lts
co
n
f
ir
m
ed
H
a
'
s
h
y
p
o
th
esis
an
d
r
ev
ea
led
a
s
ig
n
if
ican
t
d
if
f
er
en
ce
b
etwe
en
s
tu
d
en
ts
'
av
er
ag
e
m
a
r
k
s
.
Fig
u
r
e
1
s
u
m
m
ar
izes th
ese
f
in
d
in
g
s
.
Fig
u
r
e
1
.
C
o
u
r
s
es r
esu
lts
b
ef
o
r
e
an
d
a
f
ter
th
e
in
f
u
s
io
n
4.
CO
NCLU
SI
O
N
T
h
is
p
ap
er
p
r
o
p
o
s
es
a
d
eta
iled
ap
p
r
o
ac
h
f
o
r
ex
am
i
n
in
g
th
e
e
f
f
ec
t
o
f
i
n
f
u
s
in
g
cy
b
er
s
ec
u
r
ity
p
r
in
cip
les
in
th
e
I
T
c
u
r
r
icu
l
u
m
'
s
n
o
n
-
s
ec
u
r
ity
co
u
r
s
es
o
n
s
tu
d
en
ts
'
awa
r
en
ess
an
d
C
y
b
er
s
ec
u
r
ity
k
n
o
wled
g
e.
Ho
wev
er
,
b
ef
o
r
e
d
eter
m
in
in
g
th
at,
o
u
r
s
tu
d
y
is
s
tar
ted
with
a
p
ilo
t
s
tu
d
y
co
n
d
u
cted
o
n
4
0
I
T
s
tu
d
en
ts
to
s
ee
h
o
w
m
u
c
h
s
tu
d
en
ts
ar
e
awa
r
e
o
f
7
p
r
in
ci
p
les
r
elate
d
to
C
y
b
e
r
s
ec
u
r
ity
an
d
wh
at
th
e
y
d
o
to
p
r
o
tect
th
em
s
elv
es
f
r
o
m
cy
b
er
-
attac
k
s
.
T
h
e
o
b
tain
ed
r
esu
lts
in
d
icate
d
th
at
s
tu
d
en
ts
d
o
n
o
t
h
av
e
m
u
ch
k
n
o
wled
g
e
o
f
C
y
b
er
s
ec
u
r
ity
an
d
n
ee
d
to
b
e
awa
r
e
o
f
s
ec
u
r
ity
p
r
ec
au
tio
n
s
an
d
o
n
lin
e
s
er
v
ices
r
is
k
s
.
Als
o
,
r
esu
lts
r
ev
ea
led
th
at
ed
u
ca
tio
n
al
in
s
titu
tio
n
s
d
o
n
o
t
ac
tiv
ely
ap
p
r
o
ac
h
c
y
b
er
s
ec
u
r
ity
awa
r
en
ess
am
o
n
g
s
tu
d
en
ts
.
B
ased
o
n
th
is
f
in
d
in
g
,
t
h
e
s
tu
d
y
r
elied
o
n
th
e
r
em
ar
k
ab
le
g
u
id
elin
e
(
C
SE
C
2
0
1
7
)
an
d
d
is
till
ed
th
e
m
ain
s
ec
u
r
ity
p
r
in
cip
les
th
at
th
e
c
u
r
r
icu
l
u
m
m
u
s
t
in
c
lu
d
e.
Acc
o
r
d
in
g
ly
,
th
ese
p
r
i
n
cip
les
ar
e
m
ap
p
e
d
to
th
e
r
elev
an
t
cu
r
r
icu
lu
m
co
u
r
s
es a
n
d
p
r
o
p
o
s
ed
a
s
et
o
f
t
o
p
ics th
at
will r
ef
lect
th
e
s
elec
ted
p
r
in
cip
les.
T
o
d
eter
m
in
e
t
h
e
ef
f
ec
ts
o
f
in
f
u
s
in
g
p
r
in
cip
les,
th
e
d
e
g
r
ee
o
f
im
p
r
o
v
em
en
ts
in
th
e
ac
q
u
ir
e
d
k
n
o
wled
g
e
f
o
r
4
2
s
tu
d
en
ts
th
r
o
u
g
h
p
r
e
an
d
p
o
s
t
-
ev
alu
atio
n
test
s
we
re
ass
ess
ed
.
T
h
e
s
tu
d
en
ts
wer
e
d
iv
id
ed
in
to
two
id
en
tical
g
r
o
u
p
s
(
ex
p
er
im
en
tal
an
d
co
n
tr
o
l
g
r
o
u
p
s
)
.
All
s
tu
d
en
ts
wer
e
ask
ed
to
u
n
d
er
g
o
two
test
s
,
a
p
r
e
-
ev
alu
atio
n
test
(
p
r
e
e
n
r
o
ll
in
g
o
n
th
e
s
elec
ted
co
u
r
s
e)
an
d
a
p
o
s
t
-
test
(
af
ter
t
h
e
en
d
o
f
th
at
co
u
r
s
e)
o
n
th
e
cy
b
er
s
ec
u
r
ity
t
o
p
ics.
A
p
ai
r
e
d
t
-
test
s
tatis
tical
te
s
t
is
th
en
p
er
f
o
r
m
ed
to
e
x
am
in
e
th
e
s
ig
n
if
ican
t
d
i
f
f
er
en
ce
b
etwe
en
ex
p
er
im
e
n
tal
g
r
o
u
p
s
tu
d
en
ts
'
m
ar
k
s
in
th
e
p
r
e
-
e
v
al
u
atio
n
an
d
p
o
s
t
-
ev
al
u
atio
n
.
I
n
a
d
d
i
t
i
o
n
,
t
h
e
t
wo
-
s
a
m
p
l
e
t
-
t
e
s
t
i
s
u
s
e
d
t
o
ex
a
m
in
e
t
h
e
d
if
f
er
e
n
ce
b
e
t
w
e
en
e
x
p
e
r
im
e
n
t
a
l
a
n
d
c
o
n
tr
o
l
g
r
o
u
p
s
f
o
r
p
r
e
an
d
p
o
s
t
-
t
e
s
t
s
.
W
e
n
o
t
i
c
ed
th
a
t
t
h
e
s
t
u
d
en
t
s
o
f
t
en
h
a
v
e
a
q
u
i
t
e
lo
w
l
ev
e
l
o
f
c
y
b
er
s
e
c
u
r
i
t
y
a
wa
r
en
e
s
s
,
a
s
c
o
n
f
i
r
m
e
d
in
t
h
e
av
e
r
a
g
e
s
an
d
s
t
a
n
d
a
r
d
d
e
v
i
a
t
io
n
s
o
f
p
r
e
-
e
v
a
lu
a
t
io
n
m
a
r
k
s
.
M
o
r
eo
v
er
,
r
e
s
u
l
t
s
s
h
o
w
t
h
a
t
t
h
e
p
o
s
tm
a
r
k
s
ar
e
i
n
g
e
n
er
a
l
h
i
g
h
e
r
t
h
a
n
p
r
e
m
ar
k
s
.
T
h
e
r
e
s
u
l
t
s
d
e
m
o
n
s
t
r
a
te
t
h
a
t
e
n
g
ag
i
n
g
i
m
p
o
r
ta
n
t
cy
b
er
s
e
c
u
r
i
ty
to
p
i
c
s
w
i
th
i
n
o
t
h
er
c
o
m
p
u
t
er
s
c
i
e
n
ce
c
o
u
r
s
e
s
c
an
i
n
cr
e
a
s
e
s
t
u
d
e
n
t
s
'
a
w
a
r
e
n
e
s
s
a
n
d
k
n
o
w
le
d
g
e
r
e
g
a
r
d
i
n
g
c
y
b
e
r
s
e
cu
r
i
ty
c
o
n
ce
p
t
s
.
I
t
i
s
h
ig
h
ly
e
n
co
u
r
a
g
e
d
t
h
a
t
ed
u
ca
t
i
o
n
i
n
s
t
i
t
u
t
e
s
i
n
t
eg
r
a
te
s
o
m
e
i
m
p
o
r
ta
n
t
cy
b
er
s
e
c
u
r
i
t
y
to
p
i
c
s
w
i
t
h
i
n
ex
i
s
t
i
n
g
co
u
r
s
e
s
b
a
s
ed
o
n
th
e
o
b
t
a
i
n
e
d
r
e
s
u
l
t
s
.
ACK
NO
WL
E
DG
E
M
E
NT
S
T
h
e
au
th
o
r
s
ar
e
g
r
atef
u
l
to
t
h
e
Ap
p
lied
Scien
ce
Priv
ate
Un
iv
er
s
ity
,
Am
m
an
-
J
o
r
d
a
n
,
f
o
r
th
e
f
u
ll
f
in
an
cial
s
u
p
p
o
r
t g
r
a
n
ted
to
c
o
v
er
th
e
p
u
b
licatio
n
f
ee
o
f
t
h
is
r
esear
ch
ar
ticle.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
d
o
p
tin
g
th
e
cy
b
ers
ec
u
r
ity
co
n
ce
p
ts
in
to
cu
r
r
icu
lu
m:
th
e
p
o
ten
tia
l e
ffects o
n
… (
Mo
h
a
mm
a
d
A
z
z
eh
)
1757
RE
F
E
R
E
NC
E
S
[
1
]
J.
M
.
M
a
c
h
i
mb
a
r
r
e
n
a
,
E.
C
a
l
v
e
t
e
,
L.
F
e
r
n
á
n
d
e
z
-
G
o
n
z
á
l
e
z
,
A
.
Á
l
v
a
r
e
z
-
B
a
r
d
ó
n
,
L
.
Á
l
v
a
r
e
z
-
F
e
r
n
á
n
d
e
z
,
a
n
d
J.
G
o
n
z
á
l
e
z
-
C
a
b
r
e
r
a
,
“
I
n
t
e
r
n
e
t
r
i
sk
s:
A
n
o
v
e
r
v
i
e
w
o
f
v
i
c
t
i
mi
z
a
t
i
o
n
i
n
c
y
b
e
r
b
u
l
l
y
i
n
g
,
c
y
b
e
r
d
a
t
i
n
g
a
b
u
s
e
,
se
x
t
i
n
g
,
o
n
l
i
n
e
g
r
o
o
m
i
n
g
a
n
d
p
r
o
b
l
e
ma
t
i
c
i
n
t
e
r
n
e
t
u
se
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
v
i
r
o
n
m
e
n
t
a
l
Re
s
e
a
r
c
h
a
n
d
P
u
b
l
i
c
H
e
a
l
t
h
,
v
o
l
.
1
5
,
n
o
.
1
1
,
p
.
2
4
7
1
,
N
o
v
.
2
0
1
8
,
d
o
i
:
1
0
.
3
3
9
0
/
i
j
e
r
p
h
1
5
1
1
2
4
7
1
.
[
2
]
H
.
S
.
La
l
l
i
e
e
t
a
l
.
,
“
C
y
b
e
r
sec
u
r
i
t
y
i
n
t
h
e
a
g
e
o
f
C
O
V
I
D
-
1
9
:
A
t
i
m
e
l
i
n
e
a
n
d
a
n
a
l
y
s
i
s
o
f
c
y
b
e
r
-
c
r
i
me
a
n
d
c
y
b
e
r
-
a
t
t
a
c
k
s
d
u
r
i
n
g
t
h
e
p
a
n
d
e
mi
c
,
”
C
o
m
p
u
t
e
rs
a
n
d
S
e
c
u
r
i
t
y
,
v
o
l
.
1
0
5
.
a
r
X
i
v
,
J
u
n
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
se.
2
0
2
1
.
1
0
2
2
4
8
.
[
3
]
S
.
R
.
I
y
e
r
,
B
.
J.
S
i
m
k
i
n
s
,
a
n
d
H
.
W
a
n
g
,
“
C
y
b
e
r
a
t
t
a
c
k
s
a
n
d
i
m
p
a
c
t
o
n
b
o
n
d
v
a
l
u
a
t
i
o
n
,
”
F
i
n
a
n
c
e
Re
se
a
r
c
h
L
e
t
t
e
rs
,
v
o
l
.
3
3
,
p
.
1
0
1
2
1
5
,
M
a
r
.
2
0
2
0
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
f
r
l
.
2
0
1
9
.
0
6
.
0
1
3
.
[
4
]
W
.
P
r
i
m
o
f
f
a
n
d
S
.
K
e
ss,
“
Th
e
Eq
u
i
f
a
x
d
a
t
a
b
r
e
a
c
h
:
W
h
a
t
C
P
A
s
a
n
d
f
i
r
ms
n
e
e
d
t
o
k
n
o
w
,
”
T
h
e
C
P
A
J
o
u
r
n
a
l
,
v
o
l
.
8
7
,
n
o
.
1
2
,
p
p
.
14
–
1
7
,
2
0
1
7
,
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
s:
/
/
w
w
w
.
f
t
c
.
g
o
v
/
e
q
u
i
f
a
x
-
d
a
t
a
-
b
r
e
a
c
h
[
5
]
A
.
W
i
l
e
y
,
A
.
M
c
C
o
r
mac
,
a
n
d
D
.
C
a
l
i
c
,
“
M
o
r
e
t
h
a
n
t
h
e
i
n
d
i
v
i
d
u
a
l
:
E
x
a
mi
n
i
n
g
t
h
e
r
e
l
a
t
i
o
n
s
h
i
p
b
e
t
w
e
e
n
c
u
l
t
u
r
e
a
n
d
I
n
f
o
r
m
a
t
i
o
n
S
e
c
u
r
i
t
y
A
w
a
r
e
n
e
ss,”
C
o
m
p
u
t
e
rs
a
n
d
S
e
c
u
r
i
t
y
,
v
o
l
.
8
8
,
p
.
1
0
1
6
4
0
,
Ja
n
.
2
0
2
0
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
se.
2
0
1
9
.
1
0
1
6
4
0
.
[
6
]
Q
.
Z
h
u
,
S
.
R
a
ss,
a
n
d
P
.
S
c
h
a
r
t
n
e
r
,
“
C
o
mm
u
n
i
t
y
-
b
a
se
d
s
e
c
u
r
i
t
y
f
o
r
t
h
e
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s,
”
S
m
a
rt
C
i
t
i
e
s
C
y
b
e
rs
e
c
u
ri
t
y
a
n
d
Pri
v
a
c
y
,
v
o
l
.
S
P
EC
I
A
L
I
S
,
p
p
.
1
1
–
1
9
,
2
0
1
8
,
d
o
i
:
1
0
.
1
0
1
6
/
B
9
7
8
-
0
-
12
-
8
1
5
0
3
2
-
0
.
0
0
0
0
2
-
0.
[
7
]
R
.
B
.
V
a
u
g
h
n
,
“
A
p
p
l
i
c
a
t
i
o
n
o
f
se
c
u
r
i
t
y
t
o
t
h
e
c
o
m
p
u
t
i
n
g
s
c
i
e
n
c
e
c
l
a
ssr
o
o
m
,
”
S
I
G
C
S
E
B
u
l
l
e
t
i
n
(
Asso
c
i
a
t
i
o
n
f
o
r
C
o
m
p
u
t
i
n
g
Ma
c
h
i
n
e
ry
,
S
p
e
c
i
a
l
I
n
t
e
res
t
G
r
o
u
p
o
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
E
d
u
c
a
t
i
o
n
)
,
v
o
l
.
3
2
,
n
o
.
1
,
p
p
.
9
0
–
9
4
,
2
0
0
0
,
d
o
i
:
1
0
.
1
1
4
5
/
3
3
1
7
9
5
.
3
3
1
8
2
2
.
[
8
]
P
.
M
u
l
l
i
n
s
e
t
a
l
.
,
“
P
a
n
e
l
o
n
i
n
t
e
g
r
a
t
i
n
g
s
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
i
n
t
o
e
x
i
s
t
i
n
g
c
o
mp
u
t
e
r
c
o
u
r
ses,
”
i
n
S
I
G
C
S
E
Bu
l
l
e
t
i
n
(
Asso
c
i
a
t
i
o
n
f
o
r
C
o
m
p
u
t
i
n
g
M
a
c
h
i
n
e
ry,
S
p
e
c
i
a
l
I
n
t
e
r
e
st
G
ro
u
p
o
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
E
d
u
c
a
t
i
o
n
)
,
2
0
0
2
,
p
p
.
3
6
5
–
3
6
6
,
d
o
i
:
1
0
.
1
1
4
5
/
5
6
3
5
1
7
.
5
6
3
4
8
0
.
[
9
]
D
.
B
u
r
l
e
y
,
M
.
B
i
s
h
o
p
,
S
.
K
a
z
a
,
D
.
S
.
G
i
b
s
o
n
,
E.
H
a
w
t
h
o
r
n
e
,
a
n
d
S
.
B
u
c
k
,
“
A
C
M
J
o
i
n
t
T
a
s
k
F
o
r
c
e
o
n
C
y
b
e
r
se
c
u
r
i
t
y
E
d
u
c
a
t
i
o
n
,
”
i
n
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
2
0
1
7
A
C
M
S
I
G
C
S
E
T
e
c
h
n
i
c
a
l
S
y
m
p
o
si
u
m
o
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
E
d
u
c
a
t
i
o
n
,
M
a
r
.
2
0
1
7
,
p
p
.
6
8
3
–
6
8
4
,
d
o
i
:
1
0
.
1
1
4
5
/
3
0
1
7
6
8
0
.
3
0
1
7
8
1
1
.
[
1
0
]
J.
R
.
S
.
B
l
a
i
r
,
C
.
M
.
C
h
e
w
a
r
,
R
.
K
.
R
a
j
,
a
n
d
E
.
S
o
b
i
e
s
k
,
“
I
n
f
u
si
n
g
P
r
i
n
c
i
p
l
e
s
a
n
d
P
r
a
c
t
i
c
e
s
f
o
r
S
e
c
u
r
e
C
o
m
p
u
t
i
n
g
T
h
r
o
u
g
h
o
u
t
a
n
U
n
d
e
r
g
r
a
d
u
a
t
e
C
o
mp
u
t
e
r
S
c
i
e
n
c
e
C
u
r
r
i
c
u
l
u
m,
”
i
n
A
n
n
u
a
l
C
o
n
f
e
re
n
c
e
o
n
I
n
n
o
v
a
t
i
o
n
a
n
d
T
e
c
h
n
o
l
o
g
y
i
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
Ed
u
c
a
t
i
o
n
,
I
T
i
C
S
E
,
J
u
n
.
2
0
2
0
,
p
p
.
8
2
–
8
8
,
d
o
i
:
1
0
.
1
1
4
5
/
3
3
4
1
5
2
5
.
3
3
8
7
4
2
6
.
[
1
1
]
H
.
T
o
p
i
e
t
a
l
.
,
“
I
S
2
0
1
0
:
C
u
r
r
i
c
u
l
u
m
g
u
i
d
e
l
i
n
e
s
f
o
r
u
n
d
e
r
g
r
a
d
u
a
t
e
d
e
g
r
e
e
p
r
o
g
r
a
m
s
i
n
i
n
f
o
r
m
a
t
i
o
n
s
y
s
t
e
ms
,
”
C
o
m
m
u
n
i
c
a
t
i
o
n
s
o
f
t
h
e
Ass
o
c
i
a
t
i
o
n
f
o
r
I
n
f
o
rm
a
t
i
o
n
S
y
st
e
m
s
,
v
o
l
.
2
6
,
n
o
.
1
,
p
p
.
3
5
9
–
4
2
8
,
2
0
1
0
,
d
o
i
:
1
0
.
1
7
7
0
5
/
1
c
a
i
s
.
0
2
6
1
8
.
[
1
2
]
I
.
M
.
V
e
n
t
e
r
,
R
.
J.
B
l
i
g
n
a
u
t
,
K
.
R
e
n
a
u
d
,
a
n
d
M
.
A
.
V
e
n
t
e
r
,
“
C
y
b
e
r
s
e
c
u
r
i
t
y
e
d
u
c
a
t
i
o
n
i
s
a
s
e
sse
n
t
i
a
l
a
s
‘
t
h
e
t
h
r
e
e
R
’
s,’”
H
e
l
i
y
o
n
,
v
o
l
.
5
,
n
o
.
1
2
,
p
.
e
0
2
8
5
5
,
D
e
c
.
2
0
1
9
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
h
e
l
i
y
o
n
.
2
0
1
9
.
e
0
2
8
5
5
.
[
1
3
]
L.
N
u
l
l
,
“
I
n
t
e
g
r
a
t
i
n
g
se
c
u
r
i
t
y
a
c
r
o
ss t
h
e
c
o
m
p
u
t
e
r
sc
i
e
n
c
e
c
u
r
r
i
c
u
l
u
m
,
”
J
o
u
rn
a
l
o
f
C
o
m
p
u
t
i
n
g
S
c
i
e
n
c
e
s i
n
C
o
l
l
e
g
e
s
,
v
o
l
.
1
9
,
n
o
.
5
,
2
0
0
4
.
[
1
4
]
“
I
S
TE
2
0
1
8
R
e
s
o
u
r
c
e
s
|
T
h
e
I
n
st
i
t
u
t
e
o
f
P
r
o
g
r
e
ss
i
v
e
E
d
u
c
a
t
i
o
n
a
n
d
L
e
a
r
n
i
n
g
.
”
h
t
t
p
:
/
/
i
n
st
i
t
u
t
e
-
of
-
p
r
o
g
r
e
ssi
v
e
-
e
d
u
c
a
t
i
o
n
-
a
n
d
-
le
a
r
n
i
n
g
.
o
r
g
/
h
o
me
/
r
e
s
o
u
r
c
e
s
/
i
s
t
e
-
2
0
1
8
/
[
1
5
]
O
.
Ez
e
n
w
o
y
e
,
“
I
n
t
e
g
r
a
t
i
n
g
S
e
c
u
r
i
t
y
i
n
t
o
C
o
mp
u
t
e
r
S
c
i
e
n
c
e
C
u
r
r
i
c
u
l
u
m,”
i
n
Pr
o
c
e
e
d
i
n
g
s
-
Fr
o
n
t
i
e
rs
i
n
E
d
u
c
a
t
i
o
n
C
o
n
f
e
re
n
c
e
,
FI
E
,
O
c
t
.
2
0
1
9
,
v
o
l
.
2
0
1
9
-
O
c
t
o
b
e
r
,
d
o
i
:
1
0
.
1
1
0
9
/
F
I
E4
3
9
9
9
.
2
0
1
9
.
9
0
2
8
5
2
3
.
[
1
6
]
M
.
K
h
a
d
e
r
,
M
.
K
a
r
a
m
,
a
n
d
H
.
F
a
r
e
s
,
“
C
y
b
e
r
sec
u
r
i
t
y
a
w
a
r
e
n
e
ss
f
r
a
mew
o
r
k
f
o
r
a
c
a
d
e
m
i
a
,
”
I
n
f
o
rm
a
t
i
o
n
(
S
w
i
t
z
e
rl
a
n
d
)
,
v
o
l
.
1
2
,
n
o
.
1
0
,
p
.
4
1
7
,
O
c
t
.
2
0
2
1
,
d
o
i
:
1
0
.
3
3
9
0
/
i
n
f
o
1
2
1
0
0
4
1
7
.
[
1
7
]
T.
A
l
h
a
r
b
i
a
n
d
A
.
T
a
ssa
d
d
i
q
,
“
A
ss
e
s
smen
t
o
f
c
y
b
e
r
se
c
u
r
i
t
y
a
w
a
r
e
n
e
s
s
a
m
o
n
g
st
u
d
e
n
t
s
o
f
M
a
j
ma
a
h
U
n
i
v
e
r
s
i
t
y
,
”
B
i
g
D
a
t
a
a
n
d
C
o
g
n
i
t
i
v
e
C
o
m
p
u
t
i
n
g
,
v
o
l
.
5
,
n
o
.
2
,
M
a
y
2
0
2
1
,
d
o
i
:
1
0
.
3
3
9
0
/
b
d
c
c
5
0
2
0
0
2
3
.
[
1
8
]
A
.
G
a
r
b
a
,
M
a
h
e
y
z
a
h
B
i
n
t
i
S
i
r
a
t
,
S
i
t
i
H
a
j
a
r
,
a
n
d
I
b
r
a
h
i
m
B
u
k
a
r
D
a
u
d
a
,
“
C
y
b
e
r
S
e
c
u
r
i
t
y
A
w
a
r
e
n
e
ss
A
mo
n
g
U
n
i
v
e
r
si
t
y
S
t
u
d
e
n
t
s:
A
C
a
s
e
S
t
u
d
y
,
”
S
c
i
e
n
c
e
Pr
o
c
e
e
d
i
n
g
s
S
e
r
i
e
s
,
v
o
l
.
2
,
n
o
.
1
,
p
p
.
8
2
–
8
6
,
A
p
r
.
2
0
2
0
,
d
o
i
:
1
0
.
3
1
5
8
0
/
sp
s
.
v
2
i
1
.
1
3
2
0
.
[
1
9
]
I
.
A
l
sh
o
u
r
b
a
j
i
e
t
a
l
.
,
“
A
n
A
p
p
r
o
a
c
h
T
o
W
e
i
g
h
C
y
b
e
r
sec
u
r
i
t
y
A
w
a
r
e
n
e
ss
Q
u
e
s
t
i
o
n
s
I
n
A
c
a
d
e
m
i
c
I
n
st
i
t
u
t
i
o
n
s
B
a
sed
O
n
P
r
i
n
c
i
p
l
e
C
o
m
p
o
n
e
n
t
A
n
a
l
y
s
i
s:
A
C
a
se
S
t
u
d
y
O
f
S
a
u
d
i
A
r
a
b
i
a
,
”
I
n
d
e
p
e
n
d
e
n
t
Re
s
e
a
rch
e
r
i
n
S
o
c
i
a
l
M
e
d
i
a
.
Ar
e
a
s
i
n
c
l
u
d
e
rese
a
rc
h
e
t
h
i
c
s
,
2
0
2
1
,
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
w
w
w
.
i
j
st
r
.
o
r
g
[
2
0
]
Q
.
H
a
mm
o
u
r
i
,
e
r
M
a
j
a
l
i
,
D
.
A
l
ma
j
a
l
i
,
A
.
A
l
o
q
o
o
l
,
a
n
d
J
.
A
h
m
a
d
A
l
-
G
a
sawn
e
h
,
“
E
x
p
l
o
r
e
t
h
e
R
e
l
a
t
i
o
n
s
h
i
p
b
e
t
w
e
e
n
S
e
c
u
r
i
t
y
M
e
c
h
a
n
i
sms
a
n
d
Tr
u
st
i
n
E
-
B
a
n
k
i
n
g
:
A
S
y
s
t
e
m
a
t
i
c
R
e
v
i
e
w
,
”
An
n
a
l
s
o
f
T
h
e
R
o
m
a
n
i
a
n
S
o
c
i
e
t
y
f
o
r
C
e
l
l
B
i
o
l
o
g
y
,
v
o
l
.
2
5
,
p
p
.
1
7
0
8
3
–
1
7
0
9
3
,
2
0
2
1
,
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
:
/
/
a
n
n
a
l
so
f
r
sc
b
.
r
o
[
2
1
]
A
.
S
i
r
a
j
,
S
.
G
h
a
f
o
o
r
,
J
.
T
o
w
e
r
,
a
n
d
A
.
H
a
y
n
e
s,
“
Em
p
o
w
e
r
i
n
g
f
a
c
u
l
t
y
t
o
e
m
b
e
d
s
e
c
u
r
i
t
y
t
o
p
i
c
s
i
n
t
o
c
o
m
p
u
t
e
r
sc
i
e
n
c
e
c
o
u
r
ses,
”
i
n
I
T
I
C
S
E
2
0
1
4
-
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
2
0
1
4
I
n
n
o
v
a
t
i
o
n
a
n
d
T
e
c
h
n
o
l
o
g
y
i
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
Ed
u
c
a
t
i
o
n
C
o
n
f
e
re
n
c
e
,
2
0
1
4
,
p
p
.
9
9
–
1
0
4
,
d
o
i
:
1
0
.
1
1
4
5
/
2
5
9
1
7
0
8
.
2
5
9
1
7
4
1
.
[
2
2
]
S
.
K
a
z
a
,
B
.
T
a
y
l
o
r
,
H
.
H
o
c
h
h
e
i
ser,
S
.
A
z
a
d
e
g
a
n
,
M
.
O
’
Le
a
r
y
,
a
n
d
C
.
F
.
T
u
r
n
e
r
,
“
I
n
j
e
c
t
i
n
g
S
e
c
u
r
i
t
y
i
n
t
h
e
C
u
r
r
i
c
u
l
u
m
–
Ex
p
e
r
i
e
n
c
e
s
i
n
Ef
f
e
c
t
i
v
e
D
i
sse
mi
n
a
t
i
o
n
a
n
d
A
ssessm
e
n
t
D
e
si
g
n
,
”
i
n
T
h
e
C
o
l
l
o
q
u
i
u
m
f
o
r
I
n
f
o
rm
a
t
i
o
n
S
y
st
e
m
s
S
e
c
u
r
i
t
y
Ed
u
c
a
t
i
o
n
(
C
I
S
S
E)
,
2
0
1
0
,
p
.
8
,
[
O
n
l
i
n
e
]
.
A
v
a
i
l
a
b
l
e
:
h
t
t
p
:
/
/
sc
h
o
l
a
r
.
g
o
o
g
l
e
.
c
o
m/
s
c
h
o
l
a
r
?
h
l
=
e
n
&
b
t
n
G
=
S
e
a
r
c
h
&
q
=
i
n
t
i
t
l
e
:
I
n
j
e
c
t
i
n
g
+
S
e
c
u
r
i
t
y
+
i
n
+
t
h
e
+
C
u
r
r
i
c
u
l
u
m+
?
+
E
x
p
e
r
i
e
n
c
e
s
+
i
n
+
Ef
f
e
c
t
i
v
e
+
D
i
ssem
i
n
a
t
i
o
n
+
a
n
d
+
A
ssessm
e
n
t
+
D
e
si
g
n
#
0
[
2
3
]
M
.
W
h
i
t
n
e
y
,
H
.
L
.
R
i
c
h
t
e
r
,
B
.
C
h
u
,
a
n
d
J
.
Z
h
u
,
“
E
mb
e
d
d
i
n
g
se
c
u
r
e
c
o
d
i
n
g
i
n
s
t
r
u
c
t
i
o
n
i
n
t
o
t
h
e
I
D
E:
A
f
i
e
l
d
st
u
d
y
i
n
a
n
a
d
v
a
n
c
e
d
C
S
c
o
u
r
s
e
,
”
i
n
S
I
G
C
S
E
2
0
1
5
-
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
4
6
t
h
A
C
M
T
e
c
h
n
i
c
a
l
S
y
m
p
o
s
i
u
m
o
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
E
d
u
c
a
t
i
o
n
,
F
e
b
.
2
0
1
5
,
p
p
.
6
0
–
6
5
,
d
o
i
:
1
0
.
1
1
4
5
/
2
6
7
6
7
2
3
.
2
6
7
7
2
8
0
.
[
2
4
]
C
.
Y
u
e
,
“
T
e
a
c
h
i
n
g
c
o
mp
u
t
e
r
s
c
i
e
n
c
e
w
i
t
h
c
y
b
e
r
se
c
u
r
i
t
y
e
d
u
c
a
t
i
o
n
b
u
i
l
t
-
i
n
,
”
2
0
1
6
.
[
2
5
]
D
.
A
.
A
l
maj
a
l
i
a
n
d
R
.
M
a
sa’
d
e
h
,
“
A
n
t
e
c
e
d
e
n
t
s o
f
s
t
u
d
e
n
t
s’
p
e
r
c
e
p
t
i
o
n
s o
f
o
n
l
i
n
e
l
e
a
r
n
i
n
g
t
h
r
o
u
g
h
c
o
v
i
d
-
1
9
p
a
n
d
e
m
i
c
i
n
J
o
r
d
a
n
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
D
a
t
a
a
n
d
N
e
t
w
o
r
k
S
c
i
e
n
c
e
,
v
o
l
.
5
,
n
o
.
4
,
p
p
.
5
8
7
–
5
9
2
,
2
0
2
1
,
d
o
i
:
1
0
.
5
2
6
7
/
j
.
i
j
d
n
s.
2
0
2
1
.
8
.
0
0
9
.
[
2
6
]
W
.
F
.
W
.
Y
a
a
c
o
b
,
S
.
A
.
M
.
N
a
s
i
r
,
W
.
F
.
W
.
Y
a
a
c
o
b
,
a
n
d
N
.
M
.
S
o
b
r
i
,
“
S
u
p
e
r
v
i
se
d
d
a
t
a
mi
n
i
n
g
a
p
p
r
o
a
c
h
f
o
r
p
r
e
d
i
c
t
i
n
g
st
u
d
e
n
t
p
e
r
f
o
r
m
a
n
c
e
,
”
I
n
d
o
n
e
s
i
a
n
J
o
u
r
n
a
l
o
f
El
e
c
t
r
i
c
a
l
E
n
g
i
n
e
e
r
i
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
1
6
,
n
o
.
3
,
p
p
.
1
5
8
4
–
1
5
9
2
,
D
e
c
.
2
0
1
9
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s
.
v
1
6
.
i
3
.
p
p
1
5
8
4
-
1
5
9
2
.
[
2
7
]
I
.
D
.
S
h
e
t
t
y
,
D
.
S
h
e
t
t
y
,
a
n
d
S
.
R
o
u
n
d
h
a
l
,
“
S
t
u
d
e
n
t
P
e
r
f
o
r
ma
n
c
e
P
r
e
d
i
c
t
i
o
n
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
C
o
m
p
u
t
e
r
Ap
p
l
i
c
a
t
i
o
n
s
T
e
c
h
n
o
l
o
g
y
a
n
d
Re
s
e
a
r
c
h
,
v
o
l
.
8
,
n
o
.
5
,
p
p
.
1
5
7
–
1
6
0
,
A
p
r
.
2
0
1
9
,
d
o
i
:
1
0
.
7
7
5
3
/
i
j
c
a
t
r
0
8
0
5
.
1
0
0
3
.
[
2
8
]
N
.
T
o
mas
e
v
i
c
,
N
.
G
v
o
z
d
e
n
o
v
i
c
,
a
n
d
S
.
V
r
a
n
e
s,
“
A
n
o
v
e
r
v
i
e
w
a
n
d
c
o
m
p
a
r
i
so
n
o
f
su
p
e
r
v
i
s
e
d
d
a
t
a
mi
n
i
n
g
t
e
c
h
n
i
q
u
e
s
f
o
r
s
t
u
d
e
n
t
e
x
a
m
p
e
r
f
o
r
m
a
n
c
e
p
r
e
d
i
c
t
i
o
n
,
”
C
o
m
p
u
t
e
rs
a
n
d
Ed
u
c
a
t
i
o
n
,
v
o
l
.
1
4
3
,
p
.
1
0
3
6
7
6
,
Ja
n
.
2
0
2
0
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
m
p
e
d
u
.
2
0
1
9
.
1
0
3
6
7
6
.
[2
9]
S
.
A
l
-
Ja
n
a
b
i
a
n
d
I
.
A
l
-
S
h
o
u
r
b
a
j
i
,
“
A
S
t
u
d
y
o
f
C
y
b
e
r
S
e
c
u
r
i
t
y
A
w
a
r
e
n
e
ss
i
n
E
d
u
c
a
t
i
o
n
a
l
E
n
v
i
r
o
n
m
e
n
t
i
n
t
h
e
M
i
d
d
l
e
E
a
st
,
”
J
o
u
rn
a
l
o
f
I
n
f
o
rm
a
t
i
o
n
a
n
d
K
n
o
w
l
e
d
g
e
M
a
n
a
g
e
m
e
n
t
,
v
o
l
.
1
5
,
n
o
.
1
,
M
a
r
.
2
0
1
6
,
d
o
i
:
1
0
.
1
1
4
2
/
S
0
2
1
9
6
4
9
2
1
6
5
0
0
0
7
6
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
25
,
No
.
3
,
Ma
r
ch
20
22
:
1
7
4
9
-
1
7
5
8
1758
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
Mo
h
a
m
m
a
d
Az
z
e
h
is
a
p
r
o
f
e
ss
o
r
o
f
C
o
m
p
u
ti
n
g
a
t
P
ri
n
c
e
ss
S
u
m
a
y
a
Un
iv
e
rsit
y
fo
r
Tec
h
n
o
lo
g
y
.
He
h
o
ld
s
P
h
D
in
c
o
m
p
u
ti
n
g
fro
m
th
e
Un
i
v
e
r
sity
o
f
Bra
d
f
o
rd
,
UK
.
His
re
se
a
rc
h
in
tere
sts
fo
c
u
s
o
n
Da
ta
S
c
ien
c
e
,
M
in
in
g
S
o
ftwa
re
Re
p
o
sit
o
ries
,
M
a
c
h
in
e
Lea
rn
in
g
fo
r
S
o
ftwa
re
E
n
g
i
n
e
e
rin
g
P
r
o
b
lem
s,
a
n
d
S
o
ftwa
re
C
o
st
Esti
m
a
ti
o
n
.
Dr
.
Az
z
e
h
is
a
n
i
n
v
it
e
d
re
fe
re
e
fo
r
h
ig
h
-
q
u
a
li
t
y
j
o
u
r
n
a
ls
a
n
d
P
C
m
e
m
b
e
r
o
f
i
n
tern
a
ti
o
n
a
l
c
o
n
fe
re
n
c
e
s.
He
wa
s
a
g
u
e
st
e
d
it
o
r
i
n
th
e
Jo
u
r
n
a
l
o
f
Ne
u
ra
l
C
o
m
p
u
ti
n
g
a
n
d
A
p
p
li
c
a
ti
o
n
s
(S
p
ri
n
g
e
r)
a
n
d
p
u
b
li
sh
e
d
o
v
e
r
4
0
re
se
a
rc
h
a
rti
c
les
in
re
p
u
tab
le
j
o
u
r
n
a
ls
a
n
d
c
o
n
fe
re
n
c
e
s.
He
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
m
.
a
z
z
e
h
@p
su
t.
e
d
u
.
j
o
.
Ahm
a
d
Alta
m
im
i
is
a
n
a
ss
o
c
iate
p
ro
fe
ss
o
r
o
f
C
y
b
e
rse
c
u
rit
y
a
n
d
Cl
o
u
d
Co
m
p
u
ti
n
g
a
t
Ap
p
li
e
d
S
c
ien
c
e
P
riv
a
te
Un
i
v
e
rsity
.
He
h
a
s
b
e
e
n
re
c
e
iv
e
d
h
is
P
h
D
d
e
g
re
e
fro
m
Co
n
c
o
r
d
ia
Un
iv
e
rsity
–
M
o
n
trea
l,
Ca
n
a
d
a
,
i
n
2
0
1
4
.
His
re
se
a
rc
h
in
tere
sts
a
re
p
r
ima
ril
y
i
n
Cy
b
e
rse
c
u
rit
y
,
On
li
n
e
E
d
u
c
a
ti
o
n
,
a
n
d
M
a
c
h
i
n
e
lea
rn
i
n
g
.
Dr
A
lt
a
m
imi
p
a
rti
c
ip
a
ted
i
n
t
h
e
o
rg
a
n
iza
ti
o
n
o
f
m
a
n
y
c
o
n
fe
re
n
c
e
s
a
n
d
b
e
a
re
v
iew
e
r
fo
r
d
iffere
n
t
jo
u
rn
a
ls.
He
h
a
s
m
a
n
y
p
u
b
li
c
a
ti
o
n
s
in
re
p
u
ta
b
le
jo
u
rn
a
ls
a
n
d
in
ter
n
a
ti
o
n
a
l
c
o
n
fe
re
n
c
e
s.
H
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
a
_
a
lt
a
m
imi@a
su
.
e
d
u
.
jo
.
Ma
h
m
o
o
d
AlBa
sh
a
y
r
e
h
is
a
n
a
ss
istan
t
p
ro
fe
ss
o
r
o
f
c
o
m
p
u
ter
sc
ien
c
e
a
t
Ap
p
li
e
d
S
c
ien
c
e
P
riv
a
te
Un
iv
e
rsit
y
.
He
h
o
ld
s
a
P
h
.
D.
i
n
S
o
f
twa
re
En
g
i
n
e
e
rin
g
fro
m
U
n
iv
e
rsit
y
Uta
ra
M
a
lay
sia
sin
c
e
2
0
1
4
.
His
re
se
a
rc
h
i
n
tere
sts
in
c
lu
d
e
re
u
se
-
b
a
se
d
s
o
ftwa
re
e
n
g
in
e
e
rin
g
,
c
o
n
te
x
t
-
a
wa
re
c
o
m
p
u
ti
n
g
,
m
o
b
il
e
p
a
ti
e
n
t
m
o
n
it
o
r
in
g
sy
ste
m
s,
a
n
d
c
o
n
c
e
p
t
u
a
l
m
o
d
e
li
n
g
o
f
i
n
fo
rm
a
ti
o
n
sy
ste
m
s.
Dr.
M
a
h
m
o
u
d
h
a
s
re
c
e
n
tl
y
fo
c
u
se
d
o
n
u
si
n
g
m
a
c
h
in
e
lea
rn
in
g
a
n
d
d
e
e
p
lea
rn
i
n
g
tec
h
n
iq
u
e
s
fo
r
Na
tu
ra
l
Lan
g
u
a
g
e
P
ro
c
e
ss
in
g
(NLP
).
He
h
a
s
p
a
rti
c
i
p
a
ted
in
th
e
o
rg
a
n
iza
ti
o
n
o
f
m
a
n
y
c
o
n
fe
re
n
c
e
s.
He
h
a
s
m
a
n
y
p
u
b
l
ica
ti
o
n
s
i
n
re
p
u
tab
le
jo
u
r
n
a
ls
a
n
d
in
tern
a
ti
o
n
a
l
c
o
n
fe
re
n
c
e
s.
He
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
m
_
a
lb
a
sh
a
y
re
h
@a
su
.
e
d
u
.
jo
.
Mo
h
a
m
m
a
d
A.
AL
-
O
u
d
a
t
re
c
e
iv
e
d
th
e
B
S
d
e
g
re
e
in
Co
m
p
u
ter
S
c
ien
c
e
fr
o
m
Ya
rm
o
u
k
U
n
iv
e
rsit
y
,
J
o
rd
a
n
,
i
n
2
0
0
4
,
a
n
d
t
h
e
M
S
d
e
g
re
e
in
In
f
o
rm
a
ti
o
n
Tec
h
n
o
lo
g
y
fro
m
Un
iv
e
rsiti
Uta
ra
M
a
lay
sia
,
M
a
lay
sia
in
2
0
0
8
,
a
n
d
P
h
.
D.
d
e
g
re
e
h
o
l
d
e
r
in
c
o
m
p
u
ter
sc
ien
c
e
a
n
d
e
n
g
in
e
e
rin
g
a
t
t
h
e
Un
i
v
e
rsity
o
f
Brid
g
e
p
o
rt,
Br
id
g
e
p
o
rt
,
CT,
USA
.
He
is
c
u
rre
n
tl
y
wo
rk
in
g
a
t
Ap
p
li
e
d
S
c
ien
c
e
P
riv
a
te
Un
i
v
e
rsity
(ASU),
Am
m
a
n
,
Jo
r
d
a
n
a
s
a
n
a
ss
istan
t
p
ro
fe
ss
o
r
i
n
t
h
e
c
o
m
p
u
ter
sc
ien
c
e
d
e
p
t.
a
t
t
h
e
fa
c
u
lt
y
o
f
i
n
fo
rm
a
ti
o
n
tec
h
n
o
l
o
g
y
.
H
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
m
.
a
lo
u
d
a
t@a
su
.
e
d
u
.
j
o
.
Evaluation Warning : The document was created with Spire.PDF for Python.