Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm

Size: px
Start display at page:

Download "Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm"

Transcription

1 Journal of Physics: Conference Series PAPER OPEN ACCESS Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm To cite this article: D Abdullah et al 2018 J. Phys.: Conf. Ser View the article online for updates and enhancements. This content was downloaded from IP address on 13/07/2018 at 09:13

2 Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm D Abdullah 1, R Rahim 2, D Apdilah 3, S Efendi 4, T Tulus 5 and S Suwilo 5 1 Department of Informatics, Universitas Malikussaleh, Aceh, Indonesia 2 School of Computer and Communication Engineering, Universiti Malaysia Perlis, Malaysia 3 Department of Informatics Engineering, AMIK Intel Com Global Inda, Indonesia 4 Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Indonesia 5 Department of Mathematics, Universitas Sumatera Utara, Indonesia dahlan@unimal.ac.id Abstract. Prime numbers are numbers that have their appeal to researchers due to the complexity of these numbers, many algorithms that can be used to generate prime numbers ranging from simple to complex computations, Sieve of Eratosthenes and Sieve of Sundaram are two algorithm that can be used to generate Prime numbers of randomly generated or sequential numbered random numbers, testing in this study to find out which algorithm is better used for large primes in terms of time complexity, the test also assisted with applications designed using Java language with code optimization and Maximum memory usage so that the testing process can be simultaneously and the results obtained can be objective 1. Introduction Prime numbers are the unique numbers because this number cannot be divided by other positive integers, except 1 and itself [1]. In fact, it is also mentioned that prime numbers are universal languages that can understand by all beings with a high level of intelligence [1] [2] [3]. Prime numbers have several benefits, one of which is concerning disguise messages or often called cryptograph [2]. Determine the prime numbers can be determined manually of course by counting one by one and this takes a very long time or generated by using certain algorithms, such as Sieve of Eratosthenes and Sieve of Sundaram algorithms. Algorithm Sieve of Eratosthenes and Sieve of Sundaram is an algorithm used to eliminate numbers that do not prime from a collection of numbers that exist [4] [5], this process is quite good as an algorithm that could be applied to various processes of cryptographic algorithms [5], the research will be tested to compare the two algorithms In determining the prime of a large number and knowing which algorithm is safe for use on small and large numbers. Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by Ltd 1

3 2. Theory The basis of number theory is the number itself, and the core block of numbers is a prime number [6] [7], so prime numbers are often said to be central to number theory [6]. Prime numbers are numbers that have only two factors, namely the number one and the number itself. Numbers that have more than two factors are referred to as composite numbers. Numbers one has only one factor and is considered not prime and composite numbers [8]. When a composite number is written as the product of all the prime factors, it is said to be the main factorization of that number. Factorization of a number into its basic constituent element also called prime decomposition. Typically, factors are listed from the smallest to the largest [9] [10]. Sieve of Eratosthenes is a way to find all prime numbers between 1 and a number n. The algorithm discovered by Eratosthenes, an ancient Greek scientist. Sieve of Eratosthenes is the simplest way to find prime numbers [4]. Here is the step of the Sieve of Eratosthenes algorithm process [4] [5] [9]: 1. Determine the number to be tested it is primarily, from 2 to the largest desired number, call it this list as A list. 2. Mark the number two from list A and move it into another list that holds the primes to be searched. 3. Delete all numbers that are multiples of 2 in list A. 4. The next number found in list A is a prime number. Mark and move to list B. 5. Delete all numbers that are multiples of primes in list An earlier, numbers that have been removed from the list do not need to be in the process 6. Repeat process 4 and five until no numbers are left in list A. Sieve of Sundaram algorithm is an algorithm generating prime numbers that begin with the value after and conducted by n2 + 1, the function of determining prime numbers using the following formula: i. j N, 1 i j The above formula is used to process all numbers that are not primed in a set of values, to determine prime numbers using the following equation: i. + j + 2ij n 3. Result and Discussion The method of testing prime number generator using the Sieve of Eratosthenes algorithm based on the steps previously described, here is the test to determine the primes of the numbers First step show numbers 1 to 100 Table 1. Number 1 to 100 2

4 2. The second step, Removing the number 1 and multiples of 2 except the number 2 itself, the result show below Table 2. Remove number multiple of 2 3. Third step, removing multiples of 3 except the number 3 itself Table 3. Remove number multiple of 3 4. Fourth step, removing multiples of 5 except the number 5 itself Table 4. Remove number multiple of 5 3

5 5. Fifth step, removing multiples of 7 except the number 7 itself Table 5. Remove number multiple of 7 The end result of the Sieve of Eratosthenes algorithm process is as follows: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, and 97, for experiments using sieve of sundaram perform in a way that is similar to the sieve of Eratosthenes. The above test is performed to show the process of determining the primes of each algorithm, to find out which algorithm is faster in determining the prime number from small numbers to large is by testing using application that develops by using Java, see the figure below Figure 1. Prime Number Generator Java The above application is made to perform simultaneous testing to generate random numbers and determining the prime numbers from a random number produced by the algorithm Sieve of Eratosthenes and Sieve of Sundaram, for example, as follows: 4

6 Figure 2. Prime Number Result with Application The above test appears to display the primes of the numbers with the time displayed simultaneously, for a detailed test can be seen from the table below: Table 6. List Numbers No Number Sieve of Eratosthenes (Second) Sieve of Sundaram (Second) :0: :0: :0: :0: :0: :0: :0: :0: :0: :0: :0: :0: :2: :3: :5: :8: :11: :16: :23: :31: From the table above obtained graph of testing for the number of primes produced by using Sieve of Eratosthenes and Sieve of Sundaram algorithm as follows: Time Comparison 36:00,0 28:48,0 21:36,0 14:24,0 07:12,0 00:00, Sieve of Eratosthenes Sieve of Sundaram Figure 3. Time Graph Comparison 5

7 The graph (Figure 3) explains the greater the number of primes produced then the sieve of Eratosthenes is better than the Sieve of Sundaram algorithm. 4. Conclusion The experiment to compare prime generator with Sieve of Eratosthenes and Sieve of Sundaram algorithms has found that for small prime numbers Sieve of Sundaram is better than Sieve of Eratosthenes; but to display a large prime number Sieve of Eratosthenes is better, experiment do with the help of applications built using Java with the optimization of code and use buffer memory to optimize process prime generator. References [1] Kim YS, Shrestha S R and Jang JW 2011 Refined Algorithm for Prime Number Generation in Embedded Security Systems IEEE Asia-Pacific Services Computing Conference (APSCC) (South Korea: Jeju Island). [2] Qing Z and Zhihua H 2011 The large prime numbers generation of RSA algorithm based on genetic algorithm Int. Conf. on Intelligence Sc. and Information Eng. (China: Wuhan). [3] Igumnov V S 2004 Generation of the Large Random Prime Numbers Proc. 5th Annual Int. Siberian Workshop (Russia: Erlagol, Altai). [4] O'Neill M E 2009 The Genuine Sieve of Eratosthenes J. of Functional Programming 19 pp [5] Lambert M 2004 Calculating the Sieve of Eratosthenes J. of Functional Programming 14 pp [6] Sarukkai R R 1995 Prime Numbers and Output Codes IEEE Int. Conf. on Neural Networks (Australia: Perth, WA). [7] Dey S, Abraham A and Sanyal S 2007 An LSB Data Hiding Technique Using Prime Numbers Third Int. Symposium on Information Assurance and Security (UK: Manchester). [8] Liu D 2011 Iteration Distribution of Prime Numbers J. of Mathematics Research 3 pp [9] Jullien G A 1980 Implementation of Multiplication, Modulo a Prime Number, with Applications to Number Theoretic Transforms IEEE Transactions on Computers 29 pp [10] Fu Y and Xu S 2010 Generalized Fast Coding Steganographic Algorithm Based on Prime Number IEEE Int. Conf. on Information Theory and Information Security (ICITIS) (China: Beijing). 6

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et

More information

The recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function

The recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function Journal of Physics: Conference Series PAPER OPEN ACCESS The recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function

More information

Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process

Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process To cite this article: A Subandi

More information

Feature weighting using particle swarm optimization for learning vector quantization classifier

Feature weighting using particle swarm optimization for learning vector quantization classifier Journal of Physics: Conference Series PAPER OPEN ACCESS Feature weighting using particle swarm optimization for learning vector quantization classifier To cite this article: A Dongoran et al 2018 J. Phys.:

More information

Fast Learning for Big Data Using Dynamic Function

Fast Learning for Big Data Using Dynamic Function IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Fast Learning for Big Data Using Dynamic Function To cite this article: T Alwajeeh et al 2017 IOP Conf. Ser.: Mater. Sci. Eng.

More information

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android Journal of Physics: Conference Series PAPER OPEN ACCESS An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android To cite this article: M A Budiman et

More information

Implementation of pattern generation algorithm in forming Gilmore and Gomory model for two dimensional cutting stock problem

Implementation of pattern generation algorithm in forming Gilmore and Gomory model for two dimensional cutting stock problem IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Implementation of pattern generation algorithm in forming Gilmore and Gomory model for two dimensional cutting stock problem To

More information

Measuring the power consumption of social media applications on a mobile device

Measuring the power consumption of social media applications on a mobile device Journal of Physics: Conference Series PAPER OPEN ACCESS Measuring the power consumption of social media applications on a mobile device To cite this article: A I M Dunia et al 2018 J. Phys.: Conf. Ser.

More information

Comparative analyses for the performance of Rational Rose and Visio in software engineering teaching

Comparative analyses for the performance of Rational Rose and Visio in software engineering teaching Journal of Physics: Conference Series PAPER OPEN ACCESS Comparative analyses for the performance of Rational Rose and Visio in software engineering teaching To cite this article: Zhaojun Yu and Zhan Xiong

More information

Optimizing the hotspot performances by using load and resource balancing method

Optimizing the hotspot performances by using load and resource balancing method IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimizing the 802.11 hotspot performances by using load and resource balancing method To cite this article: C J Napitupulu et

More information

A comparative study of Message Digest 5(MD5) and SHA256 algorithm

A comparative study of Message Digest 5(MD5) and SHA256 algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS A comparative study of Message Digest 5(MD5) and SHA256 algorithm To cite this article: D Rachmawati et al 208 J. Phys.: Conf. Ser. 978 026 View

More information

SSL/TLS Vulnerability Detection Using Black Box Approach

SSL/TLS Vulnerability Detection Using Black Box Approach Journal of Physics: Conference Series PAPER OPEN ACCESS SSL/TLS Vulnerability Detection Using Black Box Approach To cite this article: D Gunawan et al 2018 J. Phys.: Conf. Ser. 978 012121 View the article

More information

Concept of Analysis and Implementation of Burst On Mikrotik Router

Concept of Analysis and Implementation of Burst On Mikrotik Router Journal of Physics: Conference Series PAPER OPEN ACCESS Concept of Analysis and Implementation of Burst On Mikrotik Router To cite this article: Guntur Maha Putra et al 2018 J. Phys.: Conf. Ser. 1114 012071

More information

Improving the accuracy of k-nearest neighbor using local mean based and distance weight

Improving the accuracy of k-nearest neighbor using local mean based and distance weight Journal of Physics: Conference Series PAPER OPEN ACCESS Improving the accuracy of k-nearest neighbor using local mean based and distance weight To cite this article: K U Syaliman et al 2018 J. Phys.: Conf.

More information

Analysis of labor employment assessment on production machine to minimize time production

Analysis of labor employment assessment on production machine to minimize time production IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Analysis of labor employment assessment on production machine to minimize time production To cite this article: Tri Hernawati et

More information

Energy consumption model on WiMAX subscriber station

Energy consumption model on WiMAX subscriber station IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Energy consumption model on WiMAX subscriber station To cite this article: N Mubarakah et al 2018 IOP Conf. Ser.: Mater. Sci.

More information

Conveyor Performance based on Motor DC 12 Volt Eg-530ad-2f using K-Means Clustering

Conveyor Performance based on Motor DC 12 Volt Eg-530ad-2f using K-Means Clustering IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Conveyor Performance based on Motor DC 12 Volt Eg-530ad-2f using K-Means Clustering To cite this article: Zaenal Arifin et al

More information

Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem

Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem To cite this article:

More information

The Observation of Bahasa Indonesia Official Computer Terms Implementation in Scientific Publication

The Observation of Bahasa Indonesia Official Computer Terms Implementation in Scientific Publication Journal of Physics: Conference Series PAPER OPEN ACCESS The Observation of Bahasa Indonesia Official Computer Terms Implementation in Scientific Publication To cite this article: D Gunawan et al 2018 J.

More information

Nearby Search Indekos Based Android Using A Star (A*) Algorithm

Nearby Search Indekos Based Android Using A Star (A*) Algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS Nearby Search Indekos Based Android Using A Star (A*) Algorithm To cite this article: B Siregar et al 2018 J. Phys.: Conf. Ser. 978 012084 View the

More information

An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security Journal of Physics: Conference Series PAPER OPEN ACCESS An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security To cite this article: M A Budiman et al

More information

Standalone Mobile Application for Shipping Services Based on Geographic Information System and A-Star Algorithm

Standalone Mobile Application for Shipping Services Based on Geographic Information System and A-Star Algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS Standalone Mobile Application for Shipping Services Based on Geographic Information System and A-Star Algorithm To cite this article: D Gunawan et

More information

Alternative Improving the Quality of Sub-Voltage Transmission System using Static Var Compensator

Alternative Improving the Quality of Sub-Voltage Transmission System using Static Var Compensator IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Alternative Improving the Quality of Sub-Voltage Transmission System using Static Var Compensator To cite this article: Hasbullah

More information

Implementation and evaluation of LMS mobile application: scele mobile based on user-centered design

Implementation and evaluation of LMS mobile application: scele mobile based on user-centered design Journal of Physics: Conference Series PAPER OPEN ACCESS Implementation and evaluation of LMS mobile application: scele mobile based on user-centered design To cite this article: R D Banimahendra and H

More information

Classification of stroke disease using convolutional neural network

Classification of stroke disease using convolutional neural network Journal of Physics: Conference Series PAPER OPEN ACCESS Classification of stroke disease using convolutional neural network To cite this article: J T Marbun et al 2018 J. Phys.: Conf. Ser. 978 012092 View

More information

Journal of Physics: Conference Series PAPER OPEN ACCESS. To cite this article: B E Zaiwani et al 2018 J. Phys.: Conf. Ser.

Journal of Physics: Conference Series PAPER OPEN ACCESS. To cite this article: B E Zaiwani et al 2018 J. Phys.: Conf. Ser. Journal of Physics: Conference Series PAPER OPEN ACCESS Improved hybridization of Fuzzy Analytic Hierarchy Process (FAHP) algorithm with Fuzzy Multiple Attribute Decision Making - Simple Additive Weighting

More information

A fuzzy mathematical model of West Java population with logistic growth model

A fuzzy mathematical model of West Java population with logistic growth model IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS A fuzzy mathematical model of West Java population with logistic growth model To cite this article: N S Nurkholipah et al 2018

More information

Attendance fingerprint identification system using arduino and single board computer

Attendance fingerprint identification system using arduino and single board computer Journal of Physics: Conference Series PAPER OPEN ACCESS Attendance fingerprint identification system using arduino and single board computer To cite this article: M A Muchtar et al 2018 J. Phys.: Conf.

More information

Design and Development of an Asynchronous Serial Communication Learning Media to Visualize the Bit Data

Design and Development of an Asynchronous Serial Communication Learning Media to Visualize the Bit Data Journal of Physics: Conference Series PAPER OPEN ACCESS Design and Development of an Asynchronous Serial Communication Learning Media to Visualize the Bit Data To cite this article: D Hariyanto et al 2018

More information

Two-Stage orders sequencing system for mixedmodel

Two-Stage orders sequencing system for mixedmodel IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Two-Stage orders sequencing system for mixedmodel assembly Recent citations - Damian Krenczyk et al To cite this article: M Zemczak

More information

Jacquard Control System of Warp Knitting Machine Based on Embedded System

Jacquard Control System of Warp Knitting Machine Based on Embedded System IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Control System of Warp Knitting Machine Based on Embedded System To cite this article: Li Ce et al 2018 IOP Conf. Ser.: Mater.

More information

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction Journal of Physics: Conference Series PAPER OPEN ACCESS Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction To cite this article: I Mardhiyah et al 2016 J. Phys.: Conf. Ser. 725

More information

Effect of suction pipe leaning angle and water level on the internal flow of pump sump

Effect of suction pipe leaning angle and water level on the internal flow of pump sump IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Effect of suction pipe leaning angle and water level on the internal flow of pump sump To cite this article: Z-M Chen et al 216

More information

User satisfaction analysis for service-now application

User satisfaction analysis for service-now application IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS User satisfaction analysis for service-now application To cite this article: Sfenrianto et al 2018 IOP Conf. Ser.: Mater. Sci.

More information

Load balancing factor using greedy algorithm in the routing protocol for improving internet access

Load balancing factor using greedy algorithm in the routing protocol for improving internet access IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Load balancing factor using greedy algorithm in the routing protocol for improving internet access To cite this article: Ady Satria

More information

The Design and Optimization of Database

The Design and Optimization of Database Journal of Physics: Conference Series PAPER OPEN ACCESS The Design and Optimization of Database To cite this article: Guo Feng 2018 J. Phys.: Conf. Ser. 1087 032006 View the article online for updates

More information

UDP-Lite Enhancement Through Checksum Protection

UDP-Lite Enhancement Through Checksum Protection IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS UDP-Lite Enhancement Through Checksum Protection To cite this article: Suherman et al 2017 IOP Conf. Ser.: Mater. Sci. Eng. 180

More information

Hole Feature on Conical Face Recognition for Turning Part Model

Hole Feature on Conical Face Recognition for Turning Part Model IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Hole Feature on Conical Face Recognition for Turning Part Model To cite this article: A F Zubair and M S Abu Mansor 2018 IOP Conf.

More information

The design and implementation of TPC encoder and decoder

The design and implementation of TPC encoder and decoder Journal of Physics: Conference Series PAPER OPEN ACCESS The design and implementation of TPC encoder and decoder To cite this article: L J Xiang et al 016 J. Phys.: Conf. Ser. 679 0103 Related content

More information

Comparasion of Password Generator between Coupled Linear Congruential Generator (CLCG) and Linear Congruential Generator (LCG)

Comparasion of Password Generator between Coupled Linear Congruential Generator (CLCG) and Linear Congruential Generator (LCG) Journal of Physics: Conference Series PAPER OPEN ACCESS Comparasion of Generator between Coupled Linear Congruential Generator (CLCG) and Linear Congruential Generator (LCG) To cite this article: Imamah

More information

Modeling of the optimal transmission spectrum of an interference contrast filter using simulated annealing

Modeling of the optimal transmission spectrum of an interference contrast filter using simulated annealing Journal of Physics: Conference Series PAPER OPEN ACCESS Modeling of the optimal transmission spectrum of an interference contrast filter using simulated annealing To cite this article: E Brick et al 018

More information

Comparison of segmentation using fast marching and geodesic active contours methods for bone

Comparison of segmentation using fast marching and geodesic active contours methods for bone Journal of Physics: Conference Series PAPER OPEN ACCESS Comparison of segmentation using fast marching and geodesic active contours methods for bone To cite this article: A Bilqis and R Widita 206 J. Phys.:

More information

Developing Control System of Electrical Devices with Operational Expense Prediction

Developing Control System of Electrical Devices with Operational Expense Prediction IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Developing Control System of Electrical Devices with Operational Expense Prediction To cite this article: Siti Sendari et al 2017

More information

Voice controller mobile android application

Voice controller mobile android application IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Voice controller mobile android application To cite this article: Pandapotan Siagian and Sindak Hutauruk 2018 IOP Conf. Ser.:

More information

Performance analysis of parallel de novo genome assembly in shared memory system

Performance analysis of parallel de novo genome assembly in shared memory system IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Performance analysis of parallel de novo genome assembly in shared memory system To cite this article: Syam Budi Iryanto et al 2018

More information

Principles of E-network modelling of heterogeneous systems

Principles of E-network modelling of heterogeneous systems IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Principles of E-network modelling of heterogeneous systems Related content - ON A CLASS OF OPERATORS IN VON NEUMANN ALGEBRAS WITH

More information

Study of Photovoltaic Cells Engineering Mathematical Model

Study of Photovoltaic Cells Engineering Mathematical Model OP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Study of Photovoltaic Cells Engineering Mathematical Model To cite this article: Jun Zhou et al 2016 OP Conf. Ser.: Mater. Sci.

More information

Altering Height Data by Using Natural Logarithm as 3D Modelling Function for Reverse Engineering Application

Altering Height Data by Using Natural Logarithm as 3D Modelling Function for Reverse Engineering Application IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Altering Height Data by Using Natural Logarithm as 3D Modelling Function for Reverse Engineering Application To cite this article:

More information

Implementation of 14 bits floating point numbers of calculating units for neural network hardware development

Implementation of 14 bits floating point numbers of calculating units for neural network hardware development International Conference on Recent Trends in Physics 206 (ICRTP206) Journal of Physics: Conference Series 755 (206) 000 doi:0.088/742-6596/755//000 Implementation of 4 bits floating numbers of calculating

More information

GRAPH-BASED MODELING AND DIJKSTRA ALGORITHM FOR SEARCHING VEHICLE ROUTES ON HIGHWAYS

GRAPH-BASED MODELING AND DIJKSTRA ALGORITHM FOR SEARCHING VEHICLE ROUTES ON HIGHWAYS International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 8, August 2018, pp. 1273 1280, Article ID: IJMET_09_08_137 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=8

More information

Distributed T-Way Test Suite Data Generation using Exhaustive Search Method with Map and Reduce Framework

Distributed T-Way Test Suite Data Generation using Exhaustive Search Method with Map and Reduce Framework 2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2010), October 3-5, 2010, Penang, Malaysia Distributed T-Way Test Suite Data using Exhaustive Search Method with Map and Reduce Framework

More information

Undercut feature recognition for core and cavity generation

Undercut feature recognition for core and cavity generation IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Undercut feature recognition for core and cavity generation To cite this article: Mursyidah Md Yusof and Mohd Salman Abu Mansor

More information

Human Identification at a Distance Using Body Shape Information

Human Identification at a Distance Using Body Shape Information IOP Conference Series: Materials Science and Engineering OPEN ACCESS Human Identification at a Distance Using Body Shape Information To cite this article: N K A M Rashid et al 2013 IOP Conf Ser: Mater

More information

An optical multiplier setup with dual digital micromirror

An optical multiplier setup with dual digital micromirror Journal of Physics: Conference Series PAPER OPEN ACCESS An optical multiplier setup with dual digital micromirror array devices To cite this article: Liu Hui-feng et al 2016 J. Phys.: Conf. Ser. 679 012044

More information

Pan-Tilt Modelling for Face Detection

Pan-Tilt Modelling for Face Detection IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Pan-Tilt Modelling for Face Detection To cite this article: A Latifah et al 2018 IOP Conf. Ser.: Mater. Sci. Eng. 434 012204 View

More information

Eye characteristic detection and gaze direction calculation in gaze tracking system

Eye characteristic detection and gaze direction calculation in gaze tracking system 24 9 Vol. 24 No. 9 Cont rol an d Decision 2009 9 Sep. 2009 : 100120920 (2009) 0921345206,,,, (, 100083) :., ;, ;., ;.. : ; ; ; : TP391. 41 : A Eye characteristic detection and gaze direction calculation

More information

Prime Generating Algorithms by Skipping Composite Divisors

Prime Generating Algorithms by Skipping Composite Divisors Prime Generating Algorithms by Skipping Composite Divisors Neeraj Anant Pande Assistant Professor Department of Mathematics & Statistics Yeshwant Mahavidyalaya (College), Nanded-431602 Maharashtra, INDIA

More information

Competency Assessment Parameters for System Analyst Using System Development Life Cycle

Competency Assessment Parameters for System Analyst Using System Development Life Cycle IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Competency Assessment Parameters for System Analyst Using System Development Life Cycle To cite this article: A Sugiandi and Y

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

Improved Information Retrieval Performance on SQL Database Using Data Adapter

Improved Information Retrieval Performance on SQL Database Using Data Adapter IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Improved Information Retrieval Performance on SQL Database Using Data Adapter To cite this article: M Husni et al 2018 IOP Conf.

More information

Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode

Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode Int. J. Nonlinear Anal. Appl. 5 (2014) No. 2, 60-66 ISSN: 2008-6822 (electronic) http://www.ijnaa.semnan.ac.ir Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode

More information

Monkey search algorithm for ECE components partitioning

Monkey search algorithm for ECE components partitioning Journal of Physics: Conference Series PAPER OPEN ACCESS Monkey search algorithm for ECE components partitioning To cite this article: Elmar Kuliev et al 2018 J. Phys.: Conf. Ser. 1015 042026 View the article

More information

Optimizing Libraries Content Findability Using Simple Object Access Protocol (SOAP) With Multi- Tier Architecture

Optimizing Libraries Content Findability Using Simple Object Access Protocol (SOAP) With Multi- Tier Architecture IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimizing Libraries Content Findability Using Simple Object Access Protocol (SOAP) With Multi- Tier Architecture To cite this

More information

Choice of C++ as Language

Choice of C++ as Language EECS 281: Data Structures and Algorithms Principles of Algorithm Analysis Choice of C++ as Language All algorithms implemented in this book are in C++, but principles are language independent That is,

More information

Applied Cryptography and Network Security

Applied Cryptography and Network Security Applied Cryptography and Network Security William Garrison bill@cs.pitt.edu 6311 Sennott Square Lecture #8: RSA Didn t we learn about RSA last time? During the last lecture, we saw what RSA does and learned

More information

Surveillance of muddy river flow by telemetry system

Surveillance of muddy river flow by telemetry system Journal of Physics: Conference Series PAPER OPEN ACCESS Surveillance of muddy river flow by telemetry system To cite this article: Motoki Takuno and Shigeru Takayama 2016 J. Phys.: Conf. Ser. 772 012058

More information

Design of Smart Home Systems Prototype Using MyRIO

Design of Smart Home Systems Prototype Using MyRIO IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Design of Smart Home Systems Prototype Using MyRIO To cite this article: Dwi Ann Ratna Wati and Dika Abadianto 2017 IOP Conf.

More information

Implementation of RS-485 Communication between PLC and PC of Distributed Control System Based on VB

Implementation of RS-485 Communication between PLC and PC of Distributed Control System Based on VB IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Implementation of RS-485 Communication between PLC and PC of Distributed Control System Based on VB To cite this article: Chuan

More information

Determination of Optimal Epsilon (Eps) Value on DBSCAN Algorithm to Clustering Data on Peatland Hotspots in Sumatra

Determination of Optimal Epsilon (Eps) Value on DBSCAN Algorithm to Clustering Data on Peatland Hotspots in Sumatra IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Determination of Optimal Epsilon (Eps) Value on DBSCAN Algorithm to Clustering Data on Peatland Hotspots in Sumatra Related content

More information

Multi-agent tasks scheduling system in software defined networks

Multi-agent tasks scheduling system in software defined networks Home Search Collections Journals About Contact us My IOPscience Multi-agent tasks scheduling system in software defined networks This content has been downloaded from IOPscience. Please scroll down to

More information

Availability measurement of grid services from the perspective of a scientific computing centre

Availability measurement of grid services from the perspective of a scientific computing centre Journal of Physics: Conference Series Availability measurement of grid services from the perspective of a scientific computing centre To cite this article: H Marten and T Koenig 2011 J. Phys.: Conf. Ser.

More information

Research on Reconfigurable Instrument Technology of Portable Test System of Missiles

Research on Reconfigurable Instrument Technology of Portable Test System of Missiles IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Research on Reconfigurable Instrument Technology of Portable Test System of Missiles To cite this article: Jianfeng Li et al 2018

More information

Implementation of Semantic Information Retrieval. System in Mobile Environment

Implementation of Semantic Information Retrieval. System in Mobile Environment Contemporary Engineering Sciences, Vol. 9, 2016, no. 13, 603-608 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2016.6447 Implementation of Semantic Information Retrieval System in Mobile

More information

Model of load balancing using reliable algorithm with multi-agent system

Model of load balancing using reliable algorithm with multi-agent system IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Model of load balancing using reliable algorithm with multi-agent system To cite this article: M F Afriansyah et al 2017 IOP Conf.

More information

Design of business simulation game database for managerial learning

Design of business simulation game database for managerial learning IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Design of business simulation game database for managerial learning To cite this article: Alam Santosa and Suci Annisa Anugrah

More information

Design of Electrical Engineer Profession Certification Model Based on Recognition of Prior Learning

Design of Electrical Engineer Profession Certification Model Based on Recognition of Prior Learning Journal of Physics: Conference Series PAPER OPEN ACCESS Design of Electrical Engineer Profession Certification Model Based on Recognition of Prior Learning To cite this article: M Ali et al 2018 J. Phys.:

More information

Spoofing detection on facial images recognition using LBP and GLCM combination

Spoofing detection on facial images recognition using LBP and GLCM combination Journal of Physics: Conference Series PAPER OPEN ACCESS Spoofing detection on facial images recognition using LBP and GLCM combination To cite this article: F Sthevanie and K N Ramadhani 2018 J. Phys.:

More information

File Access Optimization with the Lustre Filesystem at Florida CMS T2

File Access Optimization with the Lustre Filesystem at Florida CMS T2 Journal of Physics: Conference Series PAPER OPEN ACCESS File Access Optimization with the Lustre Filesystem at Florida CMS T2 To cite this article: P. Avery et al 215 J. Phys.: Conf. Ser. 664 4228 View

More information

Datasets Size: Effect on Clustering Results

Datasets Size: Effect on Clustering Results 1 Datasets Size: Effect on Clustering Results Adeleke Ajiboye 1, Ruzaini Abdullah Arshah 2, Hongwu Qin 3 Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang 1 {ajibraheem@live.com}

More information

Basima Ahmed Haroun Elshqeirat

Basima Ahmed Haroun Elshqeirat OBJECTIVE Basima Ahmed Haroun Elshqeirat PERSONAL INFORMATION Nationality: Jordanian Current Employer: Dept. of computer Science King Abdullah II School for Information Technology, The University of Jordan,

More information

ATLAS software configuration and build tool optimisation

ATLAS software configuration and build tool optimisation Journal of Physics: Conference Series OPEN ACCESS ATLAS software configuration and build tool optimisation To cite this article: Grigory Rybkin and the Atlas Collaboration 2014 J. Phys.: Conf. Ser. 513

More information

Information virtual indicator with combination of diffractive optical elements

Information virtual indicator with combination of diffractive optical elements Journal of Physics: Conference Series PAPER OPEN ACCESS Information virtual indicator with combination of diffractive optical elements To cite this article: Y A Grad et al 2016 J. Phys.: Conf. Ser. 737

More information

Fault detection with principal component pursuit method

Fault detection with principal component pursuit method Journal of Physics: Conference Series PAPER OPEN ACCESS Fault detection with principal component pursuit method Recent citations - Robust Principal Component Pursuit for Fault Detection in a Blast Furnace

More information

of Nebraska - Lincoln

of Nebraska - Lincoln University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln MAT Exam Expository Papers Math in the Middle Institute Partnership -007 The Polygon Game Kyla Hall Follow this and additional

More information

The comparison of performance by using alternative refrigerant R152a in automobile climate system with different artificial neural network models

The comparison of performance by using alternative refrigerant R152a in automobile climate system with different artificial neural network models Journal of Physics: Conference Series PAPER OPEN ACCESS The comparison of performance by using alternative refrigerant R152a in automobile climate system with different artificial neural network models

More information

The Number of Fuzzy Subgroups of Cuboid Group

The Number of Fuzzy Subgroups of Cuboid Group International Journal of Algebra, Vol. 9, 2015, no. 12, 521-526 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2015.5958 The Number of Fuzzy Subgroups of Cuboid Group Raden Sulaiman Department

More information

Research Article Regressive Structures for Computation of DST-II and Its Inverse

Research Article Regressive Structures for Computation of DST-II and Its Inverse International Scholarly Research etwork ISR Electronics Volume 01 Article ID 537469 4 pages doi:10.540/01/537469 Research Article Regressive Structures for Computation of DST-II and Its Inverse Priyanka

More information

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco

More information

Text Steganography Using Compression and Random Number Generators

Text Steganography Using Compression and Random Number Generators Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed

More information

Real-time monitoring system for elderly people in detecting falling movement using accelerometer and gyroscope

Real-time monitoring system for elderly people in detecting falling movement using accelerometer and gyroscope Journal of Physics: Conference Series PAPER OPEN ACCESS Real-time monitoring system for elderly people in detecting falling movement using accelerometer and gyroscope To cite this article: B Siregar et

More information

Proposal for Scrambled Method based on NTRU

Proposal for Scrambled Method based on NTRU Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,

More information

Creating a parameterized model of a CMOS transistor with a gate of enclosed layout

Creating a parameterized model of a CMOS transistor with a gate of enclosed layout Journal of Physics: Conference Series PAPER OPEN ACCESS Creating a parameterized model of a CMOS transistor with a gate of enclosed layout To cite this article: S M Vinogradov et al 2016 J. Phys.: Conf.

More information

Biomedical Digital Libraries

Biomedical Digital Libraries Biomedical Digital Libraries BioMed Central Resource review database: a review Judy F Burnham* Open Access Address: University of South Alabama Biomedical Library, 316 BLB, Mobile, AL 36688, USA Email:

More information

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. Numbers & Number Systems

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. Numbers & Number Systems SCHOOL OF ENGINEERING & BUILT ENVIRONMENT Mathematics Numbers & Number Systems Introduction Numbers and Their Properties Multiples and Factors The Division Algorithm Prime and Composite Numbers Prime Factors

More information

A hierarchical network model for network topology design using genetic algorithm

A hierarchical network model for network topology design using genetic algorithm A hierarchical network model for network topology design using genetic algorithm Chunlin Wang 1, Ning Huang 1,a, Shuo Zhang 2, Yue Zhang 1 and Weiqiang Wu 1 1 School of Reliability and Systems Engineering,

More information

Authentication and Authorization of End User in Microservice Architecture

Authentication and Authorization of End User in Microservice Architecture Journal of Physics: Conference Series PAPER OPEN ACCESS Authentication and Authorization of End User in Microservice Architecture To cite this article: Xiuyu He and Xudong Yang 2017 J. Phys.: Conf. Ser.

More information

Leaf Shape Recognition using Centroid Contour Distance

Leaf Shape Recognition using Centroid Contour Distance IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Leaf Shape Recognition using Centroid Contour Distance To cite this article: Abdurrasyid Hasim et al 216 IOP Conf. Ser.: Earth Environ.

More information

The Rack-Gear Tool Generation Modelling. Non-Analytical Method Developed in CATIA, Using the Relative Generating Trajectories Method

The Rack-Gear Tool Generation Modelling. Non-Analytical Method Developed in CATIA, Using the Relative Generating Trajectories Method IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS The Rack-Gear Tool Generation Modelling. Non-Analytical Method Developed in CATIA, Using the Relative Generating Trajectories

More information

Real Time Handwriting Recognition Techniques for Mathematical Notation in Interactive Teaching & Learning Applications

Real Time Handwriting Recognition Techniques for Mathematical Notation in Interactive Teaching & Learning Applications Real Time Handwriting Recognition Teciques for Mathematical Notation in Interactive Teaching & Learning Applications A. Chiou School of Engineering & Tecology, Central Queensland University, Rockhampton

More information

Analysis of the Coverage Area of the Access Point Using Netspot Simulation

Analysis of the Coverage Area of the Access Point Using Netspot Simulation IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Analysis of the Coverage Area of the Access Point Using Netspot Simulation To cite this article: A T Suryani and A B Pantjawati

More information