Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm
|
|
- Austen Watkins
- 5 years ago
- Views:
Transcription
1 Journal of Physics: Conference Series PAPER OPEN ACCESS Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm To cite this article: D Abdullah et al 2018 J. Phys.: Conf. Ser View the article online for updates and enhancements. This content was downloaded from IP address on 13/07/2018 at 09:13
2 Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm D Abdullah 1, R Rahim 2, D Apdilah 3, S Efendi 4, T Tulus 5 and S Suwilo 5 1 Department of Informatics, Universitas Malikussaleh, Aceh, Indonesia 2 School of Computer and Communication Engineering, Universiti Malaysia Perlis, Malaysia 3 Department of Informatics Engineering, AMIK Intel Com Global Inda, Indonesia 4 Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Indonesia 5 Department of Mathematics, Universitas Sumatera Utara, Indonesia dahlan@unimal.ac.id Abstract. Prime numbers are numbers that have their appeal to researchers due to the complexity of these numbers, many algorithms that can be used to generate prime numbers ranging from simple to complex computations, Sieve of Eratosthenes and Sieve of Sundaram are two algorithm that can be used to generate Prime numbers of randomly generated or sequential numbered random numbers, testing in this study to find out which algorithm is better used for large primes in terms of time complexity, the test also assisted with applications designed using Java language with code optimization and Maximum memory usage so that the testing process can be simultaneously and the results obtained can be objective 1. Introduction Prime numbers are the unique numbers because this number cannot be divided by other positive integers, except 1 and itself [1]. In fact, it is also mentioned that prime numbers are universal languages that can understand by all beings with a high level of intelligence [1] [2] [3]. Prime numbers have several benefits, one of which is concerning disguise messages or often called cryptograph [2]. Determine the prime numbers can be determined manually of course by counting one by one and this takes a very long time or generated by using certain algorithms, such as Sieve of Eratosthenes and Sieve of Sundaram algorithms. Algorithm Sieve of Eratosthenes and Sieve of Sundaram is an algorithm used to eliminate numbers that do not prime from a collection of numbers that exist [4] [5], this process is quite good as an algorithm that could be applied to various processes of cryptographic algorithms [5], the research will be tested to compare the two algorithms In determining the prime of a large number and knowing which algorithm is safe for use on small and large numbers. Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by Ltd 1
3 2. Theory The basis of number theory is the number itself, and the core block of numbers is a prime number [6] [7], so prime numbers are often said to be central to number theory [6]. Prime numbers are numbers that have only two factors, namely the number one and the number itself. Numbers that have more than two factors are referred to as composite numbers. Numbers one has only one factor and is considered not prime and composite numbers [8]. When a composite number is written as the product of all the prime factors, it is said to be the main factorization of that number. Factorization of a number into its basic constituent element also called prime decomposition. Typically, factors are listed from the smallest to the largest [9] [10]. Sieve of Eratosthenes is a way to find all prime numbers between 1 and a number n. The algorithm discovered by Eratosthenes, an ancient Greek scientist. Sieve of Eratosthenes is the simplest way to find prime numbers [4]. Here is the step of the Sieve of Eratosthenes algorithm process [4] [5] [9]: 1. Determine the number to be tested it is primarily, from 2 to the largest desired number, call it this list as A list. 2. Mark the number two from list A and move it into another list that holds the primes to be searched. 3. Delete all numbers that are multiples of 2 in list A. 4. The next number found in list A is a prime number. Mark and move to list B. 5. Delete all numbers that are multiples of primes in list An earlier, numbers that have been removed from the list do not need to be in the process 6. Repeat process 4 and five until no numbers are left in list A. Sieve of Sundaram algorithm is an algorithm generating prime numbers that begin with the value after and conducted by n2 + 1, the function of determining prime numbers using the following formula: i. j N, 1 i j The above formula is used to process all numbers that are not primed in a set of values, to determine prime numbers using the following equation: i. + j + 2ij n 3. Result and Discussion The method of testing prime number generator using the Sieve of Eratosthenes algorithm based on the steps previously described, here is the test to determine the primes of the numbers First step show numbers 1 to 100 Table 1. Number 1 to 100 2
4 2. The second step, Removing the number 1 and multiples of 2 except the number 2 itself, the result show below Table 2. Remove number multiple of 2 3. Third step, removing multiples of 3 except the number 3 itself Table 3. Remove number multiple of 3 4. Fourth step, removing multiples of 5 except the number 5 itself Table 4. Remove number multiple of 5 3
5 5. Fifth step, removing multiples of 7 except the number 7 itself Table 5. Remove number multiple of 7 The end result of the Sieve of Eratosthenes algorithm process is as follows: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, and 97, for experiments using sieve of sundaram perform in a way that is similar to the sieve of Eratosthenes. The above test is performed to show the process of determining the primes of each algorithm, to find out which algorithm is faster in determining the prime number from small numbers to large is by testing using application that develops by using Java, see the figure below Figure 1. Prime Number Generator Java The above application is made to perform simultaneous testing to generate random numbers and determining the prime numbers from a random number produced by the algorithm Sieve of Eratosthenes and Sieve of Sundaram, for example, as follows: 4
6 Figure 2. Prime Number Result with Application The above test appears to display the primes of the numbers with the time displayed simultaneously, for a detailed test can be seen from the table below: Table 6. List Numbers No Number Sieve of Eratosthenes (Second) Sieve of Sundaram (Second) :0: :0: :0: :0: :0: :0: :0: :0: :0: :0: :0: :0: :2: :3: :5: :8: :11: :16: :23: :31: From the table above obtained graph of testing for the number of primes produced by using Sieve of Eratosthenes and Sieve of Sundaram algorithm as follows: Time Comparison 36:00,0 28:48,0 21:36,0 14:24,0 07:12,0 00:00, Sieve of Eratosthenes Sieve of Sundaram Figure 3. Time Graph Comparison 5
7 The graph (Figure 3) explains the greater the number of primes produced then the sieve of Eratosthenes is better than the Sieve of Sundaram algorithm. 4. Conclusion The experiment to compare prime generator with Sieve of Eratosthenes and Sieve of Sundaram algorithms has found that for small prime numbers Sieve of Sundaram is better than Sieve of Eratosthenes; but to display a large prime number Sieve of Eratosthenes is better, experiment do with the help of applications built using Java with the optimization of code and use buffer memory to optimize process prime generator. References [1] Kim YS, Shrestha S R and Jang JW 2011 Refined Algorithm for Prime Number Generation in Embedded Security Systems IEEE Asia-Pacific Services Computing Conference (APSCC) (South Korea: Jeju Island). [2] Qing Z and Zhihua H 2011 The large prime numbers generation of RSA algorithm based on genetic algorithm Int. Conf. on Intelligence Sc. and Information Eng. (China: Wuhan). [3] Igumnov V S 2004 Generation of the Large Random Prime Numbers Proc. 5th Annual Int. Siberian Workshop (Russia: Erlagol, Altai). [4] O'Neill M E 2009 The Genuine Sieve of Eratosthenes J. of Functional Programming 19 pp [5] Lambert M 2004 Calculating the Sieve of Eratosthenes J. of Functional Programming 14 pp [6] Sarukkai R R 1995 Prime Numbers and Output Codes IEEE Int. Conf. on Neural Networks (Australia: Perth, WA). [7] Dey S, Abraham A and Sanyal S 2007 An LSB Data Hiding Technique Using Prime Numbers Third Int. Symposium on Information Assurance and Security (UK: Manchester). [8] Liu D 2011 Iteration Distribution of Prime Numbers J. of Mathematics Research 3 pp [9] Jullien G A 1980 Implementation of Multiplication, Modulo a Prime Number, with Applications to Number Theoretic Transforms IEEE Transactions on Computers 29 pp [10] Fu Y and Xu S 2010 Generalized Fast Coding Steganographic Algorithm Based on Prime Number IEEE Int. Conf. on Information Theory and Information Security (ICITIS) (China: Beijing). 6
File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et
More informationThe recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function
Journal of Physics: Conference Series PAPER OPEN ACCESS The recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function
More informationVigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process To cite this article: A Subandi
More informationFeature weighting using particle swarm optimization for learning vector quantization classifier
Journal of Physics: Conference Series PAPER OPEN ACCESS Feature weighting using particle swarm optimization for learning vector quantization classifier To cite this article: A Dongoran et al 2018 J. Phys.:
More informationFast Learning for Big Data Using Dynamic Function
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Fast Learning for Big Data Using Dynamic Function To cite this article: T Alwajeeh et al 2017 IOP Conf. Ser.: Mater. Sci. Eng.
More informationAn implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android
Journal of Physics: Conference Series PAPER OPEN ACCESS An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android To cite this article: M A Budiman et
More informationImplementation of pattern generation algorithm in forming Gilmore and Gomory model for two dimensional cutting stock problem
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Implementation of pattern generation algorithm in forming Gilmore and Gomory model for two dimensional cutting stock problem To
More informationMeasuring the power consumption of social media applications on a mobile device
Journal of Physics: Conference Series PAPER OPEN ACCESS Measuring the power consumption of social media applications on a mobile device To cite this article: A I M Dunia et al 2018 J. Phys.: Conf. Ser.
More informationComparative analyses for the performance of Rational Rose and Visio in software engineering teaching
Journal of Physics: Conference Series PAPER OPEN ACCESS Comparative analyses for the performance of Rational Rose and Visio in software engineering teaching To cite this article: Zhaojun Yu and Zhan Xiong
More informationOptimizing the hotspot performances by using load and resource balancing method
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimizing the 802.11 hotspot performances by using load and resource balancing method To cite this article: C J Napitupulu et
More informationA comparative study of Message Digest 5(MD5) and SHA256 algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS A comparative study of Message Digest 5(MD5) and SHA256 algorithm To cite this article: D Rachmawati et al 208 J. Phys.: Conf. Ser. 978 026 View
More informationSSL/TLS Vulnerability Detection Using Black Box Approach
Journal of Physics: Conference Series PAPER OPEN ACCESS SSL/TLS Vulnerability Detection Using Black Box Approach To cite this article: D Gunawan et al 2018 J. Phys.: Conf. Ser. 978 012121 View the article
More informationConcept of Analysis and Implementation of Burst On Mikrotik Router
Journal of Physics: Conference Series PAPER OPEN ACCESS Concept of Analysis and Implementation of Burst On Mikrotik Router To cite this article: Guntur Maha Putra et al 2018 J. Phys.: Conf. Ser. 1114 012071
More informationImproving the accuracy of k-nearest neighbor using local mean based and distance weight
Journal of Physics: Conference Series PAPER OPEN ACCESS Improving the accuracy of k-nearest neighbor using local mean based and distance weight To cite this article: K U Syaliman et al 2018 J. Phys.: Conf.
More informationAnalysis of labor employment assessment on production machine to minimize time production
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Analysis of labor employment assessment on production machine to minimize time production To cite this article: Tri Hernawati et
More informationEnergy consumption model on WiMAX subscriber station
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Energy consumption model on WiMAX subscriber station To cite this article: N Mubarakah et al 2018 IOP Conf. Ser.: Mater. Sci.
More informationConveyor Performance based on Motor DC 12 Volt Eg-530ad-2f using K-Means Clustering
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Conveyor Performance based on Motor DC 12 Volt Eg-530ad-2f using K-Means Clustering To cite this article: Zaenal Arifin et al
More informationOptimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem To cite this article:
More informationThe Observation of Bahasa Indonesia Official Computer Terms Implementation in Scientific Publication
Journal of Physics: Conference Series PAPER OPEN ACCESS The Observation of Bahasa Indonesia Official Computer Terms Implementation in Scientific Publication To cite this article: D Gunawan et al 2018 J.
More informationNearby Search Indekos Based Android Using A Star (A*) Algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS Nearby Search Indekos Based Android Using A Star (A*) Algorithm To cite this article: B Siregar et al 2018 J. Phys.: Conf. Ser. 978 012084 View the
More informationAn Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security
Journal of Physics: Conference Series PAPER OPEN ACCESS An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security To cite this article: M A Budiman et al
More informationStandalone Mobile Application for Shipping Services Based on Geographic Information System and A-Star Algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS Standalone Mobile Application for Shipping Services Based on Geographic Information System and A-Star Algorithm To cite this article: D Gunawan et
More informationAlternative Improving the Quality of Sub-Voltage Transmission System using Static Var Compensator
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Alternative Improving the Quality of Sub-Voltage Transmission System using Static Var Compensator To cite this article: Hasbullah
More informationImplementation and evaluation of LMS mobile application: scele mobile based on user-centered design
Journal of Physics: Conference Series PAPER OPEN ACCESS Implementation and evaluation of LMS mobile application: scele mobile based on user-centered design To cite this article: R D Banimahendra and H
More informationClassification of stroke disease using convolutional neural network
Journal of Physics: Conference Series PAPER OPEN ACCESS Classification of stroke disease using convolutional neural network To cite this article: J T Marbun et al 2018 J. Phys.: Conf. Ser. 978 012092 View
More informationJournal of Physics: Conference Series PAPER OPEN ACCESS. To cite this article: B E Zaiwani et al 2018 J. Phys.: Conf. Ser.
Journal of Physics: Conference Series PAPER OPEN ACCESS Improved hybridization of Fuzzy Analytic Hierarchy Process (FAHP) algorithm with Fuzzy Multiple Attribute Decision Making - Simple Additive Weighting
More informationA fuzzy mathematical model of West Java population with logistic growth model
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS A fuzzy mathematical model of West Java population with logistic growth model To cite this article: N S Nurkholipah et al 2018
More informationAttendance fingerprint identification system using arduino and single board computer
Journal of Physics: Conference Series PAPER OPEN ACCESS Attendance fingerprint identification system using arduino and single board computer To cite this article: M A Muchtar et al 2018 J. Phys.: Conf.
More informationDesign and Development of an Asynchronous Serial Communication Learning Media to Visualize the Bit Data
Journal of Physics: Conference Series PAPER OPEN ACCESS Design and Development of an Asynchronous Serial Communication Learning Media to Visualize the Bit Data To cite this article: D Hariyanto et al 2018
More informationTwo-Stage orders sequencing system for mixedmodel
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Two-Stage orders sequencing system for mixedmodel assembly Recent citations - Damian Krenczyk et al To cite this article: M Zemczak
More informationJacquard Control System of Warp Knitting Machine Based on Embedded System
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Control System of Warp Knitting Machine Based on Embedded System To cite this article: Li Ce et al 2018 IOP Conf. Ser.: Mater.
More informationDimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction
Journal of Physics: Conference Series PAPER OPEN ACCESS Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction To cite this article: I Mardhiyah et al 2016 J. Phys.: Conf. Ser. 725
More informationEffect of suction pipe leaning angle and water level on the internal flow of pump sump
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Effect of suction pipe leaning angle and water level on the internal flow of pump sump To cite this article: Z-M Chen et al 216
More informationUser satisfaction analysis for service-now application
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS User satisfaction analysis for service-now application To cite this article: Sfenrianto et al 2018 IOP Conf. Ser.: Mater. Sci.
More informationLoad balancing factor using greedy algorithm in the routing protocol for improving internet access
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Load balancing factor using greedy algorithm in the routing protocol for improving internet access To cite this article: Ady Satria
More informationThe Design and Optimization of Database
Journal of Physics: Conference Series PAPER OPEN ACCESS The Design and Optimization of Database To cite this article: Guo Feng 2018 J. Phys.: Conf. Ser. 1087 032006 View the article online for updates
More informationUDP-Lite Enhancement Through Checksum Protection
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS UDP-Lite Enhancement Through Checksum Protection To cite this article: Suherman et al 2017 IOP Conf. Ser.: Mater. Sci. Eng. 180
More informationHole Feature on Conical Face Recognition for Turning Part Model
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Hole Feature on Conical Face Recognition for Turning Part Model To cite this article: A F Zubair and M S Abu Mansor 2018 IOP Conf.
More informationThe design and implementation of TPC encoder and decoder
Journal of Physics: Conference Series PAPER OPEN ACCESS The design and implementation of TPC encoder and decoder To cite this article: L J Xiang et al 016 J. Phys.: Conf. Ser. 679 0103 Related content
More informationComparasion of Password Generator between Coupled Linear Congruential Generator (CLCG) and Linear Congruential Generator (LCG)
Journal of Physics: Conference Series PAPER OPEN ACCESS Comparasion of Generator between Coupled Linear Congruential Generator (CLCG) and Linear Congruential Generator (LCG) To cite this article: Imamah
More informationModeling of the optimal transmission spectrum of an interference contrast filter using simulated annealing
Journal of Physics: Conference Series PAPER OPEN ACCESS Modeling of the optimal transmission spectrum of an interference contrast filter using simulated annealing To cite this article: E Brick et al 018
More informationComparison of segmentation using fast marching and geodesic active contours methods for bone
Journal of Physics: Conference Series PAPER OPEN ACCESS Comparison of segmentation using fast marching and geodesic active contours methods for bone To cite this article: A Bilqis and R Widita 206 J. Phys.:
More informationDeveloping Control System of Electrical Devices with Operational Expense Prediction
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Developing Control System of Electrical Devices with Operational Expense Prediction To cite this article: Siti Sendari et al 2017
More informationVoice controller mobile android application
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Voice controller mobile android application To cite this article: Pandapotan Siagian and Sindak Hutauruk 2018 IOP Conf. Ser.:
More informationPerformance analysis of parallel de novo genome assembly in shared memory system
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Performance analysis of parallel de novo genome assembly in shared memory system To cite this article: Syam Budi Iryanto et al 2018
More informationPrinciples of E-network modelling of heterogeneous systems
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Principles of E-network modelling of heterogeneous systems Related content - ON A CLASS OF OPERATORS IN VON NEUMANN ALGEBRAS WITH
More informationStudy of Photovoltaic Cells Engineering Mathematical Model
OP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Study of Photovoltaic Cells Engineering Mathematical Model To cite this article: Jun Zhou et al 2016 OP Conf. Ser.: Mater. Sci.
More informationAltering Height Data by Using Natural Logarithm as 3D Modelling Function for Reverse Engineering Application
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Altering Height Data by Using Natural Logarithm as 3D Modelling Function for Reverse Engineering Application To cite this article:
More informationImplementation of 14 bits floating point numbers of calculating units for neural network hardware development
International Conference on Recent Trends in Physics 206 (ICRTP206) Journal of Physics: Conference Series 755 (206) 000 doi:0.088/742-6596/755//000 Implementation of 4 bits floating numbers of calculating
More informationGRAPH-BASED MODELING AND DIJKSTRA ALGORITHM FOR SEARCHING VEHICLE ROUTES ON HIGHWAYS
International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 8, August 2018, pp. 1273 1280, Article ID: IJMET_09_08_137 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=8
More informationDistributed T-Way Test Suite Data Generation using Exhaustive Search Method with Map and Reduce Framework
2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2010), October 3-5, 2010, Penang, Malaysia Distributed T-Way Test Suite Data using Exhaustive Search Method with Map and Reduce Framework
More informationUndercut feature recognition for core and cavity generation
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Undercut feature recognition for core and cavity generation To cite this article: Mursyidah Md Yusof and Mohd Salman Abu Mansor
More informationHuman Identification at a Distance Using Body Shape Information
IOP Conference Series: Materials Science and Engineering OPEN ACCESS Human Identification at a Distance Using Body Shape Information To cite this article: N K A M Rashid et al 2013 IOP Conf Ser: Mater
More informationAn optical multiplier setup with dual digital micromirror
Journal of Physics: Conference Series PAPER OPEN ACCESS An optical multiplier setup with dual digital micromirror array devices To cite this article: Liu Hui-feng et al 2016 J. Phys.: Conf. Ser. 679 012044
More informationPan-Tilt Modelling for Face Detection
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Pan-Tilt Modelling for Face Detection To cite this article: A Latifah et al 2018 IOP Conf. Ser.: Mater. Sci. Eng. 434 012204 View
More informationEye characteristic detection and gaze direction calculation in gaze tracking system
24 9 Vol. 24 No. 9 Cont rol an d Decision 2009 9 Sep. 2009 : 100120920 (2009) 0921345206,,,, (, 100083) :., ;, ;., ;.. : ; ; ; : TP391. 41 : A Eye characteristic detection and gaze direction calculation
More informationPrime Generating Algorithms by Skipping Composite Divisors
Prime Generating Algorithms by Skipping Composite Divisors Neeraj Anant Pande Assistant Professor Department of Mathematics & Statistics Yeshwant Mahavidyalaya (College), Nanded-431602 Maharashtra, INDIA
More informationCompetency Assessment Parameters for System Analyst Using System Development Life Cycle
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Competency Assessment Parameters for System Analyst Using System Development Life Cycle To cite this article: A Sugiandi and Y
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationImproved Information Retrieval Performance on SQL Database Using Data Adapter
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Improved Information Retrieval Performance on SQL Database Using Data Adapter To cite this article: M Husni et al 2018 IOP Conf.
More informationSharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode
Int. J. Nonlinear Anal. Appl. 5 (2014) No. 2, 60-66 ISSN: 2008-6822 (electronic) http://www.ijnaa.semnan.ac.ir Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode
More informationMonkey search algorithm for ECE components partitioning
Journal of Physics: Conference Series PAPER OPEN ACCESS Monkey search algorithm for ECE components partitioning To cite this article: Elmar Kuliev et al 2018 J. Phys.: Conf. Ser. 1015 042026 View the article
More informationOptimizing Libraries Content Findability Using Simple Object Access Protocol (SOAP) With Multi- Tier Architecture
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimizing Libraries Content Findability Using Simple Object Access Protocol (SOAP) With Multi- Tier Architecture To cite this
More informationChoice of C++ as Language
EECS 281: Data Structures and Algorithms Principles of Algorithm Analysis Choice of C++ as Language All algorithms implemented in this book are in C++, but principles are language independent That is,
More informationApplied Cryptography and Network Security
Applied Cryptography and Network Security William Garrison bill@cs.pitt.edu 6311 Sennott Square Lecture #8: RSA Didn t we learn about RSA last time? During the last lecture, we saw what RSA does and learned
More informationSurveillance of muddy river flow by telemetry system
Journal of Physics: Conference Series PAPER OPEN ACCESS Surveillance of muddy river flow by telemetry system To cite this article: Motoki Takuno and Shigeru Takayama 2016 J. Phys.: Conf. Ser. 772 012058
More informationDesign of Smart Home Systems Prototype Using MyRIO
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Design of Smart Home Systems Prototype Using MyRIO To cite this article: Dwi Ann Ratna Wati and Dika Abadianto 2017 IOP Conf.
More informationImplementation of RS-485 Communication between PLC and PC of Distributed Control System Based on VB
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Implementation of RS-485 Communication between PLC and PC of Distributed Control System Based on VB To cite this article: Chuan
More informationDetermination of Optimal Epsilon (Eps) Value on DBSCAN Algorithm to Clustering Data on Peatland Hotspots in Sumatra
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Determination of Optimal Epsilon (Eps) Value on DBSCAN Algorithm to Clustering Data on Peatland Hotspots in Sumatra Related content
More informationMulti-agent tasks scheduling system in software defined networks
Home Search Collections Journals About Contact us My IOPscience Multi-agent tasks scheduling system in software defined networks This content has been downloaded from IOPscience. Please scroll down to
More informationAvailability measurement of grid services from the perspective of a scientific computing centre
Journal of Physics: Conference Series Availability measurement of grid services from the perspective of a scientific computing centre To cite this article: H Marten and T Koenig 2011 J. Phys.: Conf. Ser.
More informationResearch on Reconfigurable Instrument Technology of Portable Test System of Missiles
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Research on Reconfigurable Instrument Technology of Portable Test System of Missiles To cite this article: Jianfeng Li et al 2018
More informationImplementation of Semantic Information Retrieval. System in Mobile Environment
Contemporary Engineering Sciences, Vol. 9, 2016, no. 13, 603-608 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2016.6447 Implementation of Semantic Information Retrieval System in Mobile
More informationModel of load balancing using reliable algorithm with multi-agent system
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Model of load balancing using reliable algorithm with multi-agent system To cite this article: M F Afriansyah et al 2017 IOP Conf.
More informationDesign of business simulation game database for managerial learning
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Design of business simulation game database for managerial learning To cite this article: Alam Santosa and Suci Annisa Anugrah
More informationDesign of Electrical Engineer Profession Certification Model Based on Recognition of Prior Learning
Journal of Physics: Conference Series PAPER OPEN ACCESS Design of Electrical Engineer Profession Certification Model Based on Recognition of Prior Learning To cite this article: M Ali et al 2018 J. Phys.:
More informationSpoofing detection on facial images recognition using LBP and GLCM combination
Journal of Physics: Conference Series PAPER OPEN ACCESS Spoofing detection on facial images recognition using LBP and GLCM combination To cite this article: F Sthevanie and K N Ramadhani 2018 J. Phys.:
More informationFile Access Optimization with the Lustre Filesystem at Florida CMS T2
Journal of Physics: Conference Series PAPER OPEN ACCESS File Access Optimization with the Lustre Filesystem at Florida CMS T2 To cite this article: P. Avery et al 215 J. Phys.: Conf. Ser. 664 4228 View
More informationDatasets Size: Effect on Clustering Results
1 Datasets Size: Effect on Clustering Results Adeleke Ajiboye 1, Ruzaini Abdullah Arshah 2, Hongwu Qin 3 Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang 1 {ajibraheem@live.com}
More informationBasima Ahmed Haroun Elshqeirat
OBJECTIVE Basima Ahmed Haroun Elshqeirat PERSONAL INFORMATION Nationality: Jordanian Current Employer: Dept. of computer Science King Abdullah II School for Information Technology, The University of Jordan,
More informationATLAS software configuration and build tool optimisation
Journal of Physics: Conference Series OPEN ACCESS ATLAS software configuration and build tool optimisation To cite this article: Grigory Rybkin and the Atlas Collaboration 2014 J. Phys.: Conf. Ser. 513
More informationInformation virtual indicator with combination of diffractive optical elements
Journal of Physics: Conference Series PAPER OPEN ACCESS Information virtual indicator with combination of diffractive optical elements To cite this article: Y A Grad et al 2016 J. Phys.: Conf. Ser. 737
More informationFault detection with principal component pursuit method
Journal of Physics: Conference Series PAPER OPEN ACCESS Fault detection with principal component pursuit method Recent citations - Robust Principal Component Pursuit for Fault Detection in a Blast Furnace
More informationof Nebraska - Lincoln
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln MAT Exam Expository Papers Math in the Middle Institute Partnership -007 The Polygon Game Kyla Hall Follow this and additional
More informationThe comparison of performance by using alternative refrigerant R152a in automobile climate system with different artificial neural network models
Journal of Physics: Conference Series PAPER OPEN ACCESS The comparison of performance by using alternative refrigerant R152a in automobile climate system with different artificial neural network models
More informationThe Number of Fuzzy Subgroups of Cuboid Group
International Journal of Algebra, Vol. 9, 2015, no. 12, 521-526 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2015.5958 The Number of Fuzzy Subgroups of Cuboid Group Raden Sulaiman Department
More informationResearch Article Regressive Structures for Computation of DST-II and Its Inverse
International Scholarly Research etwork ISR Electronics Volume 01 Article ID 537469 4 pages doi:10.540/01/537469 Research Article Regressive Structures for Computation of DST-II and Its Inverse Priyanka
More informationA SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS
A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco
More informationText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed
More informationReal-time monitoring system for elderly people in detecting falling movement using accelerometer and gyroscope
Journal of Physics: Conference Series PAPER OPEN ACCESS Real-time monitoring system for elderly people in detecting falling movement using accelerometer and gyroscope To cite this article: B Siregar et
More informationProposal for Scrambled Method based on NTRU
Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,
More informationCreating a parameterized model of a CMOS transistor with a gate of enclosed layout
Journal of Physics: Conference Series PAPER OPEN ACCESS Creating a parameterized model of a CMOS transistor with a gate of enclosed layout To cite this article: S M Vinogradov et al 2016 J. Phys.: Conf.
More informationBiomedical Digital Libraries
Biomedical Digital Libraries BioMed Central Resource review database: a review Judy F Burnham* Open Access Address: University of South Alabama Biomedical Library, 316 BLB, Mobile, AL 36688, USA Email:
More informationSCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. Numbers & Number Systems
SCHOOL OF ENGINEERING & BUILT ENVIRONMENT Mathematics Numbers & Number Systems Introduction Numbers and Their Properties Multiples and Factors The Division Algorithm Prime and Composite Numbers Prime Factors
More informationA hierarchical network model for network topology design using genetic algorithm
A hierarchical network model for network topology design using genetic algorithm Chunlin Wang 1, Ning Huang 1,a, Shuo Zhang 2, Yue Zhang 1 and Weiqiang Wu 1 1 School of Reliability and Systems Engineering,
More informationAuthentication and Authorization of End User in Microservice Architecture
Journal of Physics: Conference Series PAPER OPEN ACCESS Authentication and Authorization of End User in Microservice Architecture To cite this article: Xiuyu He and Xudong Yang 2017 J. Phys.: Conf. Ser.
More informationLeaf Shape Recognition using Centroid Contour Distance
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Leaf Shape Recognition using Centroid Contour Distance To cite this article: Abdurrasyid Hasim et al 216 IOP Conf. Ser.: Earth Environ.
More informationThe Rack-Gear Tool Generation Modelling. Non-Analytical Method Developed in CATIA, Using the Relative Generating Trajectories Method
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS The Rack-Gear Tool Generation Modelling. Non-Analytical Method Developed in CATIA, Using the Relative Generating Trajectories
More informationReal Time Handwriting Recognition Techniques for Mathematical Notation in Interactive Teaching & Learning Applications
Real Time Handwriting Recognition Teciques for Mathematical Notation in Interactive Teaching & Learning Applications A. Chiou School of Engineering & Tecology, Central Queensland University, Rockhampton
More informationAnalysis of the Coverage Area of the Access Point Using Netspot Simulation
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Analysis of the Coverage Area of the Access Point Using Netspot Simulation To cite this article: A T Suryani and A B Pantjawati
More information