LAMPIRAN A LISTINGPROGRAM

Size: px
Start display at page:

Download "LAMPIRAN A LISTINGPROGRAM"

Transcription

1 LAMPIRAN A LISTINGPROGRAM 1. Form Utama (myprogram.fig) function varargout = myprogram(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT function myprogram_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; guidata(hobject, handles); function varargout = myprogram_outputfcn(hobject, eventdata, handles, varargin) frontimage = imread('image1.jpg'); axes(handles.axes2); imshow(frontimage); varargout{1} = handles.output; function help_btn_callback(hobject, eventdata, handles, varargin) open Help.fig; close(gcbf); function run_btn_callback(hobject, eventdata, handles) selection = questdlg(['what WOULD YOU LIKE TO DO?'],['MSA'],'ENCRYPT','DECRYPT','ENCRYPT'); if strcmp(selection,'encrypt') encrypt; close(gcbf); if strcmp(selection,'decrypt') decrypt; close(gcbf);

2 A2 function exit_btn_callback(hobject, eventdata, handles) selection = questdlg(['exit APPLICATION?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; close(gcbf); function about_btn_callback(hobject, eventdata, handles,varargin) open about.fig; close(gcbf); 2. Form Proses Penyisipan (encrypt.fig) function varargout = encrypt(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT function encrypt_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; guidata(hobject, handles); % --- Outputs from this function are returned to the command line. function varargout = encrypt_outputfcn(hobject, eventdata, handles) varargout{1} = handles.output; function n_key_callback(hobject, eventdata, handles) function n_key_createfcn(hobject, eventdata, handles)

3 A3 function m_key_callback(hobject, eventdata, handles) function m_key_createfcn(hobject, eventdata, handles) % --- Executes on button press in encrypt_btn. function encrypt_btn_callback(hobject, eventdata, handles, varargin) global mypublickey plaintext = get(handles.plaintext_edit,'string'); %convert into binary form plaintext = dec2bin(plaintext,7)'; plaintext = plaintext(:)'-'0'; %set(handles.plaintext_edit,'string',num2str(plaintext)); [linept plaintext_size] = size(plaintext); [linepk mypublickey_size] = size(mypublickey); %count how many blocks according to the size of public key blockt = plaintext_size/mypublickey_size; if (blockt<1) blockt = 1; block = blockt; mypublickey_size = plaintext_size; block = blockt; r = mod(plaintext_size,mypublickey_size); if (r~=0) block = block+1; global cipherdec %ciphertext in decimal form cipherdec=0; j=1; hasil=0; %result of multiplying binary digit of plaintext and key for k=1:1:block

4 for i=1:1:mypublickey_size temp = mypublickey(i)*plaintext(j); hasil = hasil + temp; temp = 0; j = j+1; if(j>plaintext_size) break; cipherdec(k) = hasil; hasil = 0; set(handles.cipher_edit,'string',num2str(cipherdec)); A4 global binmodcipher binresultcipher reshaperc reshapebmc [line sizecipherdec] = size(cipherdec); for ind=1:1:sizecipherdec modcipher(ind) = mod(cipherdec(ind),128); %ciphertext 7 bit {SISA} resultcipher(ind) = floor(cipherdec(ind)/128); binmodcipher = dec2bin(modcipher,7); reshapebmc = reshape(binmodcipher.',1,[]); binresultcipher = dec2bin(resultcipher,7); reshaperc = reshape(binresultcipher.',1,[]); function plaintext_edit_callback(hobject, eventdata, handles) function plaintext_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in open_btn. function open_btn_callback(hobject, eventdata, handles) global mypublickey global imagefile [filename,pathname] = uigetfile({'*.txt','file Text (*.txt)'},'browse File'); if isequal([filename,pathname],[0,0]) return; mypublickey = dlmread(fullfile(pathname,filename,'')); set(handles.publickey_edit,'string',num2str(mypublickey)); temp = mypublickey; [line sizepk] = size(temp); [b k c] = size(imagefile); sizechar = floor(b*k*c/2);

5 maxchar1 = floor(sizechar/7); bitchar = 7*maxChar1; global maxnew if(sizepk>=7) maxnew = maxchar1; if (sizepk<7) maxtrue = floor(bitchar/sizepk); if(mod(bitchar,sizepk)~=0) maxtrue = maxtrue+1; sisa = maxtrue-maxchar1; if(sisa>maxchar1) maxnew = sisa - maxchar1; maxnew = maxchar1 - sisa; set(handles.char_max,'string',maxnew); A5 function publickey_edit_callback(hobject, eventdata, handles) function publickey_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in browse_btn. function browse_btn_callback(hobject, eventdata, handles, varargin) global imagefile [filename,pathname] = uigetfile({'*.bmp','bitmap File (*.bmp)'},'open File'); imagefile = imread(fullfile(pathname,filename)); set(handles.filename_ed,'string',filename); [b k c] = size(imagefile); bitdepth = c*8; set(handles.bitfile,'string',bitdepth); ImageSize = round((b*k*c)/1024); set(handles.filesize,'string',imagesize); function cipher_edit_callback(hobject, eventdata, handles) function cipher_edit_createfcn(hobject, eventdata, handles)

6 % --- Executes on button press in embd_btn. function embd_btn_callback(hobject, eventdata, handles, varargin) global imagefile global reshapebmc %hasil ciphertext global reshaperc %sisa ciphertext %global binmodcipher binresultcipher [line1 sizebmc] = size(reshapebmc); %[line2 sizeresult] = size(reshaperc); temp = double(imagefile); A6 %convert to binary bintemp = dec2bin(temp); [b k] = size(bintemp); %bagian I berisi bit SISA ciphertext for j=1:1:sizebmc bintemp(j,8) = reshapebmc(j); %replace the last bit with sisa ciphertext split = floor(b/2); %bagian II berisi bit HASIL BAGI ciphertext idx = 1; for k=split+1:1:(split+sizebmc) bintemp(k,8) = reshaperc(idx); idx = idx+1; steganoimage = bin2dec(bintemp); [row col dep] = size(imagefile); %change into Image i = 1; for x=1:1:dep %layer / bitdepth for y=1:1:col %colom for z=1:1:row %row StegImg(z,y,x) = steganoimage(i); i = i+1; global SteganoImg SteganoImg = double(stegimg); SteganoImg = uint8(steganoimg); warndlg('embedding Proccess Success!','Information'); % --- Executes on button press in save_btn. function save_btn_callback(hobject, eventdata, handles, varargin)

7 global fullname global SteganoImg temp = SteganoImg; [filename1, pathname] = uiputfile('steganoimage.bmp','save'); fullname = fullfile(pathname,filename1); imwrite(temp,fullname); % --- Executes on button press in view_btn. function view_btn_callback(hobject, eventdata, handles, varargin) view; %close(gcbf); % --- Executes on button press in new_btn. function new_btn_callback(hobject, eventdata, handles, varargin) set(handles.filename_ed,'string',''); set(handles.bitfile,'string',''); set(handles.filesize,'string',''); set(handles.publickey_edit,'string',''); set(handles.plaintext_edit,'string',''); set(handles.cipher_edit,'string',''); A7 % --- Executes on button press in exit_btn. function exit_btn_callback(hobject, eventdata, handles, varargin) selection = questdlg(['exit APPLICATION?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; myprogram; close(gcbf); function filename_ed_callback(hobject, eventdata, handles) function filename_ed_createfcn(hobject, eventdata, handles) function filesize_ed_callback(hobject, eventdata, handles) function BitFile_CreateFcn(hObject, eventdata, handles) function totalframe_ed_callback(hobject, eventdata, handles)

8 function filesize_createfcn(hobject, eventdata, handles) function encrypt_btn_createfcn(hobject, eventdata, handles) % --- Executes on button press in check. function check_callback(hobject, eventdata, handles, varargin) global maxnew plaintext = get(handles.plaintext_edit,'string'); [line sizep] = size(plaintext); A8 if(sizep>maxnew) msgbox(['your Text Consists of ',num2str(sizep),' Letters, GREATER THAN MaxChar'],'MSA','error'); msgbox('valid: YOU CAN CONTINUE..','MSA','none'); set(handles.encrypt_btn,'enable','on'); set(handles.embd_btn,'enable','on'); set(handles.save_btn,'enable','on'); set(handles.view_btn,'enable','on'); 3. Form Proses Ekstraksi (decrypt.fig) function varargout = decrypt(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:});

9 % End initialization code - DO NOT EDIT A9 % --- Executes just before decrypt is made visible. function decrypt_openingfcn(hobject, eventdata, handles, varargin) % Choose default command line output for decrypt handles.output = hobject; % Update handles structure guidata(hobject, handles); % --- Outputs from this function are returned to the command line. function varargout = decrypt_outputfcn(hobject, eventdata, handles) varargout{1} = handles.output; % --- Executes on button press in steg_image_btn. function steg_image_btn_callback(hobject, eventdata, handles, varargin) global imagesteganofile [filename,pathname] = uigetfile({'*.bmp','bitmap File (*.bmp)'},'open File'); imagesteganofile = imread(fullfile(pathname,filename)); set(handles.filename_edit,'string',filename); set(handles.width_edit,'string',size(imagesteganofile,1)); set(handles.height_edit,'string',size(imagesteganofile,2)); A9 % --- Executes on button press in check_btn. function check_btn_callback(hobject, eventdata, handles) function plaintext_edit_callback(hobject, eventdata, handles) function plaintext_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in extract btn. function extract btn_callback(hobject, eventdata, handles, varargin) global imagesteganofile tempimage = double(imagesteganofile); %convert to binary

10 binimagefile = dec2bin(tempimage); [b k c] = size(imagesteganofile); split = floor(b*k*c/2); piksel = floor(split/7); piksel = piksel*7; d = mod(split,7); if(d~=0) %bagian I SISA cipher for i=1:1:piksel lastbit1(i) = binimagefile(i,8); in=1; ind2 = split+1; %bagian II HASIL cipher for j=ind2:1:(ind2+piksel-1) lastbit2(in) = binimagefile(j,8); in=in+1; if(d==0) %bagian I SISA cipher for i=1:1:split lastbit1(i) = binimagefile(i,8); in=1; %bagian II HASIL cipher for j=split+1:1:((b*k*c)) lastbit2(in) = binimagefile(j,8); in=in+1; A10 binvalues = [ ]; binmatriksmod = reshape(lastbit1,7,[]).'; [br kl] = size(binmatriksmod); binmatriksrest = reshape(lastbit2,7,[]).'; tempmod = 0; tempres = 0; for x=1:1:br for y=1:1:kl tempmod = tempmod + (binvalues(y)*str2num(binmatriksmod(x,y))); tempres = tempres + (binvalues(y)*str2num(binmatriksrest(x,y))); hasilmod(x)=tempmod; %hasilmodulo hasilres(x)=tempres; %hasilbagi tempmod=0; tempres=0; [line sizeall] = size(hasilres); for idx=1:1:sizeall

11 ciphers(idx) = 128*hasilRes(idx)+hasilMod(idx); set(handles.cipher_edit,'string',num2str(ciphers)); function cipher_edit_callback(hobject, eventdata, handles) function cipher_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in privatekey_btn. function privatekey_btn_callback(hobject, eventdata, handles) global mysecretkey [filename,pathname] = uigetfile({'*.txt','file Text (*.txt)'},'browse File'); if isequal([filename,pathname],[0,0]) return; mysecretkey = dlmread(fullfile(pathname,filename,'')); set(handles.nkey_edit,'string',num2str(mysecretkey(1))); set(handles.mkey_edit,'string',num2str(mysecretkey(2))); A11 function mkey_edit_callback(hobject, eventdata, handles) function mkey_edit_createfcn(hobject, eventdata, handles) function nkey_edit_callback(hobject, eventdata, handles) function nkey_edit_createfcn(hobject, eventdata, handles)

12 function privkey_edit_callback(hobject, eventdata, handles) function privkey_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in reset_btn. function reset_btn_callback(hobject, eventdata, handles, varargin) set(handles.filename_edit,'string',''); set(handles.width_edit,'string',''); set(handles.height_edit,'string',''); set(handles.nkey_edit,'string',''); set(handles.mkey_edit,'string',''); set(handles.privkey_edit,'string',''); set(handles.cipher_edit,'string',''); set(handles.plaintextkey_edit,'string',''); % --- Executes on button press in exit_btn. function exit_btn_callback(hobject, eventdata, handles) selection = questdlg(['back TO MAIN MENU?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; myprogram; close(gcbf); A12 % --- Executes on button press in generate_btn. function generate_btn_callback(hobject, eventdata, handles) selection = questdlg(['exit DECRYPT FORM?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; generate; close(gcbf); % --- Executes on button press in save_btn. function save_btn_callback(hobject, eventdata, handles, varargin) teks = get(handles.plaintext_edit,'string');

13 thedir='c:\users\user\desktop'; dlmwrite(fullfile(thedir, 'myplaintext.txt'), teks, ''); warndlg('plaintext has been saved as [myplaintext.txt] into your desktop!','information'); % --- Executes on button press in view_btn. function view_btn_callback(hobject, eventdata, handles) function width_edit_callback(hobject, eventdata, handles) function width_edit_createfcn(hobject, eventdata, handles) function height_edit_callback(hobject, eventdata, handles) function height_edit_createfcn(hobject, eventdata, handles) A13 function filename_edit_callback(hobject, eventdata, handles) function filename_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in viewpk_btn. function viewpk_btn_callback(hobject, eventdata, handles) global myprivatekey; global myprivatekey_size; global mysecretkey; global mysecretkey_size;

14 myprivatekey = 0; j = 3; [linepk mysecretkey_size] = size(mysecretkey); myprivatekey_size = mysecretkey_size - 2; for i=1:1:myprivatekey_size myprivatekey(i) = mysecretkey(j); j = j + 1; set(handles.privkey_edit,'string',num2str(myprivatekey)); % --- Executes on button press in dec_btn. function dec_btn_callback(hobject, eventdata, handles) %count the invers on nkey inversetemp = str2num(get(handles.nkey_edit,'string')); mtemp = str2num(get(handles.mkey_edit,'string')); k = 0; while k>=0 inversen = (1 + (double(k)*mtemp))/double(inversetemp); if (round(inversen)-inversen==0 && inversen>0) break; k = k + 1; %decryption process ciphertext = str2num(get(handles.cipher_edit,'string')); [linepk ciphertext_size] = size(ciphertext); for i=1:1:ciphertext_size ciphertransform(i) = mod((inversen*ciphertext(i)),mtemp); global myprivatekey global myprivatekey_size; A14 %solving the super increasing knapsack x=myprivatekey_size; ind = 1; for y = 1:ciphertext_size for z = myprivatekey_size:-1:1 if ciphertransform(y) >= myprivatekey(z) plaintextbin(ind,x) = 1; ciphertransform(y) = ciphertransform(y) - myprivatekey(z); plaintextbin(ind,x) = 0; x = x-1; if(y>ciphertext_size) break;

15 x = myprivatekey_size; ind = ind+1; if ciphertransform(y) ~= 0 warning = 'Cannot Decrypt, because its not a superincreasing Knapsack'; set(handles.plaintext_edit,'string',warning); break; a = reshape(plaintextbin.',1,[]); [line sizea] = size(a); j=mod(sizea,7); for i = 1:1:sizeA-j b(i) = a(i); k = bin2dec((reshape(char(b+'0'),7,[])')); k = char(k); k = reshape(k.',1,[]); set(handles.plaintext_edit,'string',k); % --- Executes on button press in pubkeytext. function pubkeytext_callback(hobject, eventdata, handles) 4. Form Proses Pembangkit Kunci (generate.fig) function varargout = generate(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); A15 if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT % --- Executes just before generatekey is made visible. function generate_openingfcn(hobject, eventdata, handles, varargin)

16 handles.output = hobject; % Update handles structure guidata(hobject, handles); % --- Outputs from this function are returned to the command line. function varargout = generate_outputfcn(hobject, eventdata, handles) % Get default command line output from handles structure varargout{1} = handles.output; function mkey_edit_callback(hobject, eventdata, handles) function mkey_edit_createfcn(hobject, eventdata, handles) function nkey_edit_callback(hobject, eventdata, handles) function nkey_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in val_btn. function val_btn_callback(hobject, eventdata, handles,varargin) global total_result mkey1 = str2num(get(handles.mkey_edit,'string')); nkey1 = str2num(get(handles.nkey_edit,'string')); A16 mkey = mkey1; nkey = nkey1; while nkey~=0 sisa=mod(mkey,nkey); mkey=nkey; nkey=sisa; result = mkey; %choice if (mkey1 > nkey1) && (result == 1) && (mkey1 > total_result)

17 msgbox('valid: YOU CAN CONTINUE..','MSA','none'); set(handles.reset_btn,'enable','on'); set(handles.save_btn,'enable','on'); set(handles.pubkey_btn,'enable','on'); msgbox(['not VALID: CHECK M > ',num2str(total_result),', M > N, M-N COPRIME..'],'MSA','error'); function pk1_edit_callback(hobject, eventdata, handles) function pk1_edit_createfcn(hobject, eventdata, handles) function pk2_edit_callback(hobject, eventdata, handles) function pk2_edit_createfcn(hobject, eventdata, handles) % --- Executes on selection change in inc. function inc_callback(hobject, eventdata, handles) function inc_createfcn(hobject, eventdata, handles) A17 % --- Executes on button press in generate_btn. function generate_btn_callback(hobject, eventdata, handles,varargin) global total_result; total_result = 0; pk1 = str2num(get(handles.pk1_edit,'string')); pk2 = str2num(get(handles.pk2_edit,'string')); increament = get(handles.inc,'value'); totalpk = str2num(get(handles.total,'string'));

18 if totalpk < 3 msgbox('total private key must be greater than 3 elements','msa','error'); A(1) = pk1; A(2) = pk2; temp = 0; for i = 3:1:totalPK for j = 1:1:i-1 temp = temp + A(j); A(i) = temp + increament; temp = 0; total_result = (A(totalPK)*2-increament); set(handles.privatekey_edit,'string',num2str(a)); set(handles.val_btn,'enable','on'); set(handles.mkey_edit,'enable','on'); set(handles.nkey_edit,'enable','on'); function privatekey_edit_callback(hobject, eventdata, handles) function privatekey_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in save_btn. function save_btn_callback(hobject, eventdata, handles, varargin) PK = str2num(get(handles.privatekey_edit,'string')); nkey = str2num(get(handles.nkey_edit,'string')); mkey = str2num(get(handles.mkey_edit,'string')); A(1) = nkey; A(2) = mkey; Key = [A,PK]; A18 thedir=uigetdir();%'c:\users\user\desktop'; dlmwrite(fullfile(thedir, 'mysecretkey.txt'), Key, ' '); warndlg('privatekey has been saved as [mysecretkey.txt]','information'); % --- Executes on button press in exit_btn. function exit_btn_callback(hobject, eventdata, handles)

19 selection = questdlg(['back TO MAIN MENU?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; myprogram; close(gcbf); % --- Executes on button press in reset_btn. function reset_btn_callback(hobject, eventdata, handles, varargin) set(handles.privatekey_edit,'string',''); set(handles.nkey_edit,'string',''); set(handles.mkey_edit,'string',''); set(handles.pk1_edit,'string',''); set(handles.pk2_edit,'string',''); set(handles.total,'string',''); function val_btn_createfcn(hobject, eventdata, handles, varargin) % --- Executes on button press in pubkey_btn. function pubkey_btn_callback(hobject, eventdata, handles, varargin) PK = str2num(get(handles.privatekey_edit,'string')); nkey = str2num(get(handles.nkey_edit,'string')); mkey = str2num(get(handles.mkey_edit,'string')); [line sizepk] = size(pk); for i = 1:1:sizePK pubkey(i) = mod((pk(i)*nkey),mkey); thedir=uigetdir();%'c:\users\user\desktop'; dlmwrite(fullfile(thedir, 'mypublickey.txt'), pubkey, ' '); warndlg('publickey has been created as [mypublickey.txt]!','information'); function total_callback(hobject, eventdata, handles) function total_createfcn(hobject, eventdata, handles) A19

20 function generate_btn_createfcn(hobject, eventdata, handles) 5. FormView Image (view.fig) function varargout = view(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT % --- Executes just before view is made visible. function view_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; % Update handles structure guidata(hobject, handles); function varargout = view_outputfcn(hobject, eventdata, handles, varargin) global imagefile fullname axes(handles.before); imshow(imagefile); axes(handles.after); imshow(fullname); varargout{1} = handles.output; % --- Executes on button press in BACK. function BACK_Callback(hObject, eventdata, handles, varargin) %encrypt; close(gcbf); function asli_callback(hobject, eventdata, handles)

21 function asli_createfcn(hobject, eventdata, handles) A20 function hasil_callback(hobject, eventdata, handles) function hasil_createfcn(hobject, eventdata, handles) 6. FormHelp (help.fig) function varargout = help(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT % --- Executes just before Help is made visible. function help_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; % Update handles structure guidata(hobject, handles); % --- Outputs from this function are returned to the command line. function varargout = help_outputfcn(hobject, eventdata, handles) varargout{1} = handles.output;

22 function edit1_callback(hobject, eventdata, handles) % hobject handle to edit1 (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) A21 % Hints: get(hobject,'string') returns contents of edit1 as text % str2double(get(hobject,'string')) returns contents of edit1 as a double function edit1_createfcn(hobject, eventdata, handles) % --- Executes on button press in pushbutton2. function pushbutton2_callback(hobject, eventdata, handles) myprogram; close(gcbf); 7. FormAbout (about.fig) function varargout = about(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT function about_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; guidata(hobject, handles); function varargout = about_outputfcn(hobject, eventdata, handles)

23 varargout{1} = handles.output; % --- Executes on button press in pushbutton1. function pushbutton1_callback(hobject, eventdata, handles, varargin) myprogram; close(gcbf);

24 CURRICULUM VITAE Nama : Juwita Adelina Pasaribu Alamat Sekarang : Jl. Tuba II Gg. Tapanuli No. 11b Medan Alamat Orang Tua : Jl. Tuba II Gg. Tapanuli No. 11b Medan Telp/HP : wiezzard@gmail.com Riwayat Pidikan SDN Medan dari Tahun 1996 s/d Tahun 2002 SMPN 3 Medan dari Tahun 2002 s/d Tahun 2005 SMAN5 Medan dari Tahun 2005 s/d Tahun 2008 dari Tahun 2008 s/d Tahun 2012 Keahlian/Kursus yang diikuti 1. English Course at International Language Program 2. Office Application: Word, Excel, Powerpoint, Access 3. Programming: Delphi, MySQL

LAMPIRAN 1. Percobaan

LAMPIRAN 1. Percobaan LAMPIRAN 1 1. Larutan 15 ppm Polystyrene ENERGI Percobaan 1 2 3 PROBABILITY 0.07 0.116 0.113 0.152 0.127 0.15 0.256 0.143 0.212 0.203 0.22 0.24 0.234 0.23 0.234 0.3 0.239 0.35 0.201 0.263 0.37 0.389 0.382

More information

% Edit the above text to modify the response to help Video_Player. % Last Modified by GUIDE v May :38:12

% Edit the above text to modify the response to help Video_Player. % Last Modified by GUIDE v May :38:12 FILE NAME: Video_Player DESCRIPTION: Video Player Name Date Reason Sahariyaz 28-May-2015 Basic GUI concepts function varargout = Video_Player(varargin) VIDEO_PLAYER MATLAB code for Video_Player.fig VIDEO_PLAYER,

More information

LISTING PROGRAM. % Edit the above text to modify the response to help cover. % Last Modified by GUIDE v Jun :24:43

LISTING PROGRAM. % Edit the above text to modify the response to help cover. % Last Modified by GUIDE v Jun :24:43 A1 LISTING PROGRAM 1. Form Cover function varargout = cover(varargin) COVER MATLAB code for cover.fig COVER, by itself, creates a new COVER or raises the existing singleton*. H = COVER returns the handle

More information

LISTING PROGRAM. % UIWAIT makes pertama wait for user response (see UIRESUME) % uiwait(handles.figure1);

LISTING PROGRAM. % UIWAIT makes pertama wait for user response (see UIRESUME) % uiwait(handles.figure1); LISTING PROGRAM FORM PERTAMA : function varargout = pertama(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_openingfcn', @pertama_openingfcn,...

More information

1. Peralatan LAMPIRAN

1. Peralatan LAMPIRAN 1. Peralatan LAMPIRAN 2. Data Sampel a. Air murni 3ml Energy(mj) Probability Air Murni 0.07 0.001 0.15 0.003 0.22 0.006 0.3 0.028 0.37 0.045 0.39 0.049 0.82 0.053 0.89 0.065 1.28 0.065 1.42 0.106 1.7

More information

LISTING PROGRAM. if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); else gui_mainfcn(gui_state, varargin{:}); end

LISTING PROGRAM. if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); else gui_mainfcn(gui_state, varargin{:}); end A-1 LISTING PROGRAM 1. Form Cover function varargout = cover(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_openingfcn', @cover_openingfcn,...

More information

Signal and Systems. Matlab GUI based analysis. XpertSolver.com

Signal and Systems. Matlab GUI based analysis. XpertSolver.com Signal and Systems Matlab GUI based analysis Description: This Signal and Systems based Project takes a sound file in.wav format and performed a detailed analysis, as well as filtering of the signal. The

More information

LAMPIRAN LISTING PROGRAM

LAMPIRAN LISTING PROGRAM A1 LAMPIRAN LISTING PROGRAM Prototype.m function varargout = prototype(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_openingfcn', @prototype_openingfcn,...

More information

% Edit the above text to modify the response to help Principal

% Edit the above text to modify the response to help Principal function varargout = Principal(varargin) % OPFGUI MATLAB code for Principal.fig % OPFGUI, by itself, creates a new OPFGUI or raises the existing % singleton*. % % H = OPFGUI returns the handle to a new

More information

GUI code for different sections is in following sections

GUI code for different sections is in following sections Software Listing The Graphical User Interface (GUI) and Fuzzy Inference System (FIS) are developed in MATLAB. Software code is developed for different sections like Weaving section, Motor Status, Environment,

More information

% --- Executes on button press in btn_gsn. function btn_gsn_callback(hobject, eventdata, handles) GaussianSpeckleNoise close AiSoftware;

% --- Executes on button press in btn_gsn. function btn_gsn_callback(hobject, eventdata, handles) GaussianSpeckleNoise close AiSoftware; A-2 'gui_openingfcn', @AiSoftware_OpeningFcn,... 'gui_outputfcn', @AiSoftware_OutputFcn,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1});

More information

1.Matlab Image Encryption Code

1.Matlab Image Encryption Code 1.Matlab Image Encryption Code (URL: http://www.cheers4all.com/2012/04/matlab-image-encryption-code/) This project is Image Encryption & Decryption. The user will give an input and encryption factor. The

More information

MV 1:00 1:05 1:00 1:05

MV 1:00 1:05 1:00 1:05 1 54 MV 1:00 1:05 1:00 1:05 55 DTW 56 function varargout = my_filter8(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_openingfcn', @my_filter8_openingfcn,...

More information

Homeworks on FFT Instr. and Meas. for Communication Systems- Gianfranco Miele. Name Surname

Homeworks on FFT Instr. and Meas. for Communication Systems- Gianfranco Miele. Name Surname Homeworks on FFT 90822- Instr. and Meas. for Communication Systems- Gianfranco Miele Name Surname October 15, 2014 1 Name Surname 90822 (Gianfranco Miele): Homeworks on FFT Contents Exercise 1 (Solution)............................................

More information

OMR Sheet Recognition

OMR Sheet Recognition International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 8, Number 1 (2018), pp. 11-32 International Research Publications House http://www. irphouse.com OMR Sheet Recognition

More information

LAMPIRAN A PROGRAM PELATIHAN DAN PENGUJIAN

LAMPIRAN A PROGRAM PELATIHAN DAN PENGUJIAN LAMPIRAN A PROGRAM PELATIHAN DAN PENGUJIAN Program Preprocessing Image clc; clear all; % Preprocessing Image -------------------------------------------- daniel{1}=imread('daniel1.bmp'); daniel{2}=imread('daniel2.bmp');

More information

Supplementary Information

Supplementary Information Supplementary Information Retooling Laser Speckle Contrast Analysis Algorithm to Enhance Non-Invasive High Resolution Laser Speckle Functional Imaging of Cutaneous Microcirculation Surya C Gnyawali 1,

More information

Ear Recognition. By: Zeyangyi Wang

Ear Recognition. By: Zeyangyi Wang Ear Recognition By: Zeyangyi Wang Ear Recognition By: Zeyangyi Wang Online: < http://cnx.org/content/col11604/1.3/ > C O N N E X I O N S Rice University, Houston, Texas This selection and arrangement

More information

Lampiran 1. Script M-File Global Ridge

Lampiran 1. Script M-File Global Ridge LAMPIRAN 67 Lampiran 1. Script M-File Global Ridge function [l, e, L, E] = globalridge(h, Y, l) [l, e, L, E] = globalridge(h, Y, l, options, U) Calculates the best global ridge regression parameter (l)

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,500 108,000 1.7 M Open access books available International authors and editors Downloads Our

More information

Akkad Bakad Bambai Bo

Akkad Bakad Bambai Bo Akkad Bakad Bambai Bo The Josephus Problem Shivam Sharma, Rajat Saini and Natasha Sharma Cluster Innovation Center, University of Delhi Abstract We aim to give explanation of the recursive formula for

More information

A NEW MACHINING COST CALCULATOR (MC 2 )

A NEW MACHINING COST CALCULATOR (MC 2 ) A NEW MACHINING COST CALCULATOR (MC 2 ) By MATHEW RUSSELL JOHNSON A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER

More information

Finding a Minimum Covering Circle Based on Infinity Norms

Finding a Minimum Covering Circle Based on Infinity Norms Finding a Minimum Covering Circle Based on Infinity Norms by Andrew A. Thompson ARL-TR-4495 July 2008 Approved for public release; distribution is unlimited. NOTICES Disclaimers The findings in this report

More information

ECE Fall 05. Undergraduate Research: Digital Signal Processing & Quantization Effects

ECE Fall 05. Undergraduate Research: Digital Signal Processing & Quantization Effects ECE 491-153 Fall 05 Undergraduate Research: Digital Signal Processing & Quantization Effects Done By: Tanim Taher SID# 10370800 Date: December 19, 2005 DSP & Quantization 1 Tanim Taher ACKNOWLEDGEMENTS

More information

COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART

COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART 1 Varjith Anchuri, 2 K.Hanuman Krishna, 3 M.Gopi Chand, 4 S.Rishi, UG Scholar Dept Of CSE, SRM University,Chennai. Abstract A

More information

Lithium-Ion Battery Data. Management

Lithium-Ion Battery Data. Management Lithium-Ion Battery Data Management Frank Ferrato Dr. Jung-Hyun Kim April 2018 Abstract: Lithium Ion Battery research is growing due to the need for renewable resources. Since the amount of research is

More information

GUI Signal Analysis and Filtering Design

GUI Signal Analysis and Filtering Design i GUI Signal Analysis and Filtering Design Axel Daniela Campero Vega, Electrical Engineering Project Advisor: Dr. Dick Blandford April 26, 2018 Evansville, Indiana ii Acknowledgements I want to thank Dr.

More information

Solving Sudoku with MATLAB

Solving Sudoku with MATLAB Solving Sudoku with MATLAB Raluca Marinescu Andrea Garcia Ivan Castro Eduard Paul Enoiu Mälardalen University, Västerås, Sweden {rmu09001, aga09001, ico09002, eeu09001}@student.mdh.se March 25, 2011 Abstract

More information

Main Form visual Studio

Main Form visual Studio Main Form visual Studio using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Linq; using System.Text; using System.Windows.Forms;

More information

.., 7. References. [ 1] 1 mage Analysis and Mathematical Morphology:J.Serra. [2] Erosion, dilation and related operators,by Mariusz Jankowski

.., 7. References. [ 1] 1 mage Analysis and Mathematical Morphology:J.Serra. [2] Erosion, dilation and related operators,by Mariusz Jankowski 7. References [ 1] 1 mage Analysis and Mathematical Morphology:J.Serra [2] Erosion, dilation and related operators,by Mariusz Jankowski [3] Morphological Image Processing by Ranga Rodrigo [4] Application

More information

Contents INTERFACING MATLAB WITH EMBEDDED SYSTEMS

Contents INTERFACING MATLAB WITH EMBEDDED SYSTEMS Contents MATLAB INTRODUCTION:... 1 Why it is useful for prototyping AI projects??... 2 Using MATLAB as a calculator:... 3 How to use conditions... 8 Serial/Parallel communication:... 9 Color Detection

More information

Airfoil Boundary Layer Separation Prediction

Airfoil Boundary Layer Separation Prediction Airfoil Boundary Layer Separation Prediction A project present to The Faculty of the Department of Aerospace Engineering San Jose State University in partial fulfillment of the requirements for the degree

More information

PROGRAMMING IN MATLAB

PROGRAMMING IN MATLAB PROGRAMMING IN MATLAB Rohan D sa Rafael Love Todd Page OBJECTIVE: This document gives an overview of a few aspects related to programming in Matlab. With the help of a sample program, it goes through some

More information

Parallel-connected solar arrays

Parallel-connected solar arrays Scholars' Mine Masters Theses Student Research & Creative Works Spring 2013 Parallel-connected solar arrays Majed Meshal Alabbass Follow this and additional works at: http://scholarsmine.mst.edu/masters_theses

More information

Implementation of a Motion Detection System

Implementation of a Motion Detection System Implementation of a Motion Detection System Asif Ansari 1, T.C.Manjunath (Ph.D., IIT Bombay) 2, C.Ardil 3 Abstract In today s competitive environment, the security concerns have grown tremously. In the

More information

ALGORITHMS AND INTERFACE FOR OCEAN ACOUSTIC RAY-TRACING (Developed in MATLAB)

ALGORITHMS AND INTERFACE FOR OCEAN ACOUSTIC RAY-TRACING (Developed in MATLAB) ALGORITHMS AND INTERFACE FOR OCEAN ACOUSTIC RAY-TRACING (Developed in MATLAB) Technical Report No. NIO/TR 09/005 T.V.Ramana Murty M.M.Malleswara Rao S.Surya Prakash P.Chandramouli K.S.R.Murthy Regional

More information

LOK-Viewer : Graphical Interface Application for Geomagnetic Data in Observatory Geomagnetic Lombok

LOK-Viewer : Graphical Interface Application for Geomagnetic Data in Observatory Geomagnetic Lombok LOK-Viewer : Graphical Interface Application for Geomagnetic Data in Observatory Geomagnetic Lombok Giri W. Wiriasto, Teti Zubaidah, Bulkis Kanata Electrical Engineering Dept. Mataram University Lombok,

More information

IMAGE STEGANOGRAPHY USING DISCRETE COSINE TRNASFORM ALGORITHM

IMAGE STEGANOGRAPHY USING DISCRETE COSINE TRNASFORM ALGORITHM RCC Institute of Information Technology Canal South Road, Beliaghata, Kolkata 700 015 [Affiliated to West Bengal University of Technology] IMAGE STEGANOGRAPHY USING DISCRETE COSINE TRNASFORM ALGORITHM

More information

Accepted by... John H. Lienhard V

Accepted by... John H. Lienhard V The Understanding, Characterization, and Implementation of a SICK LMS-291 Laser Scanner for Use in an Experimental Environment by Marcos Berrios Submitted to the Department of Mechanical Engineering in

More information

TREBALL FINAL DE GRAU

TREBALL FINAL DE GRAU Estudi del procés constructiu de ponts atirantats construïts sobre suports provisionals. ANNEXOS Treball realitzat per: Joan Fraile Diana Dirigit per: José Turmo Coderque Jose Antonio Lozano Galant Grau

More information

MEASURING INTERFACIAL TENSION WITH THE PENDANT DROP METHOD

MEASURING INTERFACIAL TENSION WITH THE PENDANT DROP METHOD MEASURING INTERFACIAL TENSION WITH THE PENDANT DROP METHOD A Thesis Presented to The Academic Faculty by Kevin K. Mohan-Nair In Partial Fulfillment of the Requirements for the Degree Bachelor of Science

More information

Real-Time IIR Digital Filters

Real-Time IIR Digital Filters Real-Time IIR Digital Filters Chapter 8 Introduction Infinite impulse response (IIR) filter design has its roots in traditional analog filter design. One of the main issues in IIR digital filter design

More information

UNIVERSITÀ DEGLI STUDI DI PADOVA

UNIVERSITÀ DEGLI STUDI DI PADOVA UNIVERSITÀ DEGLI STUDI DI PADOVA FACOLTÀ DI INGEGNERIA CORSO DI LAUREA IN INGEGNERIA BIOMEDICA DESIGN OF NEUROPHYSIOLOGICAL SIGNAL ANAYSIS SOFTWARE GIACOMO BASSETTO SUPERVISOR: PROFESSOR STEFANO VASSANELLI

More information

LISTING PROGRAM. mainform.vb A-1. Universitas Sumatera Utara

LISTING PROGRAM. mainform.vb A-1. Universitas Sumatera Utara A-1 LISTING PROGRAM mainform.vb Imports System.IO Public Class mainform Private Sub mainform_load(byval sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load enkripsirb.checked = True

More information

LAMPIRAN A LISTING PROGRAM

LAMPIRAN A LISTING PROGRAM A-1 LAMPIRAN A LISTING PROGRAM FUNGSI public void StopWatchStart() stopwatch.reset(); stopwatch.start(); Cursor.Current = Cursors.WaitCursor; txtlog.text = ""; public void StopWatchStop(string Title) stopwatch.stop();

More information

Listing Progam. Universitas Sumatera Utara

Listing Progam. Universitas Sumatera Utara 60 Listing Progam Listing Program Tabel Index

More information

GENDER ESTIMATION BASED ON FACIAL IMAGE AZLIN BT YAJID UNIVERSITI TEKNOLOGI MALAYSIA

GENDER ESTIMATION BASED ON FACIAL IMAGE AZLIN BT YAJID UNIVERSITI TEKNOLOGI MALAYSIA GENDER ESTIMATION BASED ON FACIAL IMAGE AZLIN BT YAJID UNIVERSITI TEKNOLOGI MALAYSIA PSZ 19:16 (PIND. 1/97) UNIVERSITI TEKNOLOGI MALAYSIA BORANG PENGESAHAN STATUS TESIS JUDUL: GENDER ESTIMATION BASED ON

More information

Design of Automated Digital Eye Palpation Exam for Intraocular Pressure Measurement

Design of Automated Digital Eye Palpation Exam for Intraocular Pressure Measurement Design of Automated Digital Eye Palpation Exam for Intraocular Pressure Measurement Item Type text; Electronic Thesis Authors Luce, Alexander Vallejo Publisher The University of Arizona. Rights Copyright

More information

Sandia National Laboratories: Implementation of and Experimenting with a Clustering Tool

Sandia National Laboratories: Implementation of and Experimenting with a Clustering Tool Sandia National Laboratories: Implementation of and Experimenting with a Clustering Tool Team: Avani Gadani, Daniel Lowd, Brian Roney, Eric Wu Harvey Mudd College Dr. Belinda Thom (Advisor) Dr. Kevin Boyack

More information

LISTING PROGRAM. a = b; b = c; c = a + b; } fibs.reverse(); for (int i = 0; i < fibs.count; i++) { if (n >= fibs[i]) { n = n - fibs[i];

LISTING PROGRAM. a = b; b = c; c = a + b; } fibs.reverse(); for (int i = 0; i < fibs.count; i++) { if (n >= fibs[i]) { n = n - fibs[i]; A-1 A LISTING PROGRAM 1. Fibonacci Code //membuat fungsi Fibonacci Code public static String GetFibonacciCode(int n) { StringBuilder fib = new StringBuilder("1"); int a, b, c; List fibs = new List();

More information

Keywords: Learning automata, Vertex multicoloring.

Keywords: Learning automata, Vertex multicoloring. ISSN XXXX XXXX 2018 IJESC Research Article Volume 8 Issue No.4 Scheduling Algorithm for High Density MIMO Channels C.Elayaraja 1, P.Manju 2, I.Parsana Begam 3 Associate Professor 1, Student 2, 3 Department

More information

Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher

Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher Cihan University, First International Scientific conference 204 Cihan University. All Rights Reserved. Research Article Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher Safaa S Omran, Ali

More information

Block Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5)

Block Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5) Block Ciphers Tutorial c Eli Biham - May 3, 2005 146 Block Ciphers Tutorial (5) A Known Plaintext Attack on 1-Round DES After removing the permutations IP and FP we get: L R 48 K=? F L R c Eli Biham -

More information

Intel Quark microcontroller D2000 How to communicate with MATLAB over UART

Intel Quark microcontroller D2000 How to communicate with MATLAB over UART Intel Quark microcontroller D2000 How to communicate with MATLAB over UART Introduction Intel System Studio 2016 for Microcontrollers is an integrated tool suite for developing, optimizing, and debugging

More information

Recap. Definition (Encryption: Caesar Cipher)

Recap. Definition (Encryption: Caesar Cipher) Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Definition (Encryption: Shift Cipher) + d = mod 26, d anumber Recap Definition (Encryption:

More information

S-DES Encryption template. Input:

S-DES Encryption template. Input: Page 1 of 5 S-DES (simplified Data Encryption Standard) Assignment template: ENCRYPTION TEMPLATE To the input (plaintext), apply initial permutation IP: IP 2 6 3 1 4 8 5 7 In the next steps, we will develop

More information

LAMPIRAN A: LISTING PROGRAM

LAMPIRAN A: LISTING PROGRAM A-1 LAMPIRAN A: LISTING PROGRAM 1. Latih.m input = xlsread('ayam1.xlsx', 'Sheet1', 'B2:P49'); %memasukkan input dari excel file Ayam, sheet Sheet1, baris kolom 'B2:BJ17' input= input'; %transpose input

More information

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et

More information

1 Lab 3, Simulation of crank-piston system

1 Lab 3, Simulation of crank-piston system 1 Lab 3, Simulation of crank-piston system 1.1 Problem description Simulation 3 Slider-Crank Mechanism with a Piston In your text, the slider-crank kinematic mechanism is discussed and equations of motion

More information

Cryptography. Andreas Hülsing. 6 September 2016

Cryptography. Andreas Hülsing. 6 September 2016 Cryptography Andreas Hülsing 6 September 2016 1 / 21 Announcements Homepage: http: //www.hyperelliptic.org/tanja/teaching/crypto16/ Lecture is recorded First row might be on recordings. Anything organizational:

More information

Fundamentals of Python: First Programs. Chapter 4: Strings and Text Files

Fundamentals of Python: First Programs. Chapter 4: Strings and Text Files Fundamentals of Python: First Programs Chapter 4: Strings and Text Files Objectives After completing this chapter, you will be able to Access individual characters in a string Retrieve a substring from

More information

CIS 3362 Final Exam 12/4/2013. Name:

CIS 3362 Final Exam 12/4/2013. Name: CIS 3362 Final Exam 12/4/2013 Name: 1) (10 pts) Since the use of letter frequencies was known to aid in breaking substitution ciphers, code makers in the Renaissance added "twists" to the standard substitution

More information

Blind to Change. More on Graphical User Interfaces. Exploring change blindness

Blind to Change. More on Graphical User Interfaces. Exploring change blindness Blind to Change More on Graphical User Interfaces CS112 Scientific Computation Department of Computer Science Wellesley College Exploring change blindness The human visual system can be blind to changes

More information

MATLAB. Creating Graphical User Interfaces Version 7. The Language of Technical Computing

MATLAB. Creating Graphical User Interfaces Version 7. The Language of Technical Computing MATLAB The Language of Technical Computing Note This revision of Creating Graphical User Interfaces, issued May 2006, adds three new chapters that provide more information for creating GUIs programmatically.

More information

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Module 13 Network Security. Version 1 ECE, IIT Kharagpur Module 13 Network Security Lesson 40 Network Security 13.1.1 INTRODUCTION Network Security assumes a great importance in the current age. In this chapter we shall look at some of the security measures

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

Introduction to Cryptology. Lecture 2

Introduction to Cryptology. Lecture 2 Introduction to Cryptology Lecture 2 Announcements Access to Canvas? 2 nd Edition vs. 1 st Edition HW1 due on Tuesday, 2/7 Discrete Math Readings/Quizzes on Canvas due on Tuesday, 2/14 Agenda Last time:

More information

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322

More information

Encrypted Data Deduplication in Cloud Storage

Encrypted Data Deduplication in Cloud Storage Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline

More information

Cryptography Part II Introduction to Computer Security. Chapter 8

Cryptography Part II Introduction to Computer Security. Chapter 8 Cryptography Part II Introduction to Computer Security Chapter 8 Vigènere Cipher Like Cæsar cipher, but use phrase Example Message: THE BOY HAS THE BALL Key: VIG Encipher using Cæsar cipher for each letter:

More information

Flow Control. Spring Flow Control Spring / 26

Flow Control. Spring Flow Control Spring / 26 Flow Control Spring 2019 Flow Control Spring 2019 1 / 26 Relational Expressions Conditions in if statements use expressions that are conceptually either true or false. These expressions are called relational

More information

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List 1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the

More information

This document contains additional questions; it is not intended to be treated as a complete paper.

This document contains additional questions; it is not intended to be treated as a complete paper. 1 AS COMPUTER SCIENCE Paper 2 Additional Questions These questions focus primarily on topics that were not covered by the AQA AS and A-level Computing specifications, introduced in 2009. It is hoped that

More information

Computer and Data Security. Lecture 3 Block cipher and DES

Computer and Data Security. Lecture 3 Block cipher and DES Computer and Data Security Lecture 3 Block cipher and DES Stream Ciphers l Encrypts a digital data stream one bit or one byte at a time l One time pad is example; but practical limitations l Typical approach

More information

Due: March 8, 11:59pm. Project 1

Due: March 8, 11:59pm. Project 1 COS 433: Cryptography (Spring 2018) Project 1 Princeton University Due: March 8, 11:59pm Project 1 Introduction You are interning at the super secretive SLA (Three Letter Agency). The SLA has intercepted

More information

Secret Key Cryptography

Secret Key Cryptography Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:

More information

LISTING PROGRAM. 1. Module SkripsiUmri.py. import sys, operator, codecs, time. class Timer(object): def init (self): self.t1= time.

LISTING PROGRAM. 1. Module SkripsiUmri.py. import sys, operator, codecs, time. class Timer(object): def init (self): self.t1= time. A1 LISTING PROGRAM 1. Module SkripsiUmri.py import sys, operator, codecs, time class Timer(object): def init (self): self.t1= time.time() def getelapsedltime(self): # gets total elapsed from class initialsation

More information

Computational Methods of Scientific Programming

Computational Methods of Scientific Programming 12.010 Computational Methods of Scientific Programming Lecturers Thomas A Herring, Jim Elliot, Chris Hill, Summary of Today s class We will look at Matlab: History Getting help Variable definitions and

More information

A nice outline of the RSA algorithm and implementation can be found at:

A nice outline of the RSA algorithm and implementation can be found at: Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.

More information

LAMPIRAN A : LISTING PROGRAM

LAMPIRAN A : LISTING PROGRAM LAMPIRAN A : LISTING PROGRAM 1. Form Utama (Cover) using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Linq; using System.Text;

More information

Nature Sunday Academy Lesson Plan

Nature Sunday Academy Lesson Plan Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns

More information

Lecture 4: Symmetric Key Encryption

Lecture 4: Symmetric Key Encryption Lecture 4: Symmetric ey Encryption CS6903: Modern Cryptography Spring 2009 Nitesh Saxena Let s use the board, please take notes 2/20/2009 Lecture 1 - Introduction 2 Data Encryption Standard Encrypts by

More information

Jordan University of Science and Technology

Jordan University of Science and Technology Jordan University of Science and Technology Cryptography and Network Security - CPE 542 Homework #III Handed to: Dr. Lo'ai Tawalbeh By: Ahmed Saleh Shatnawi 20012171020 On: 8/11/2005 Review Questions RQ3.3

More information

Encryption à la Mod Name

Encryption à la Mod Name Rock Around the Clock Part Encryption à la Mod Let s call the integers,, 3,, 5, and the mod 7 encryption numbers and define a new mod 7 multiplication operation, denoted by, in the following manner: a

More information

ECE 646 Fall 2008 Multiple-choice test

ECE 646 Fall 2008 Multiple-choice test ECE 646 Fall 2008 Multiple-choice test 1. (1 pt) Arrange the following ciphers in the order of the increasing measure of roughness for the ciphertext obtained by encrypting 1000-letter message with a given

More information

Special Topics II: Graphical User Interfaces (GUIs)

Special Topics II: Graphical User Interfaces (GUIs) Special Topics II: Graphical User Interfaces (GUIs) December 8, 2011 Structures Structures (structs, for short) are a way of managing and storing data in most programming languages, including MATLAB. Assuming

More information

An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security Journal of Physics: Conference Series PAPER OPEN ACCESS An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security To cite this article: M A Budiman et al

More information

CS 556 Spring 2017 Project 3 Study of Cryptographic Techniques

CS 556 Spring 2017 Project 3 Study of Cryptographic Techniques CS 556 Spring 2017 Project 3 Study of Cryptographic Techniques Project Due Dates: Part A: Due before class on CANVAS by Thursday, March 23, 2017 Part B: Due before class on CANVAS by Thursday April 6,

More information

W1005 Intro to CS and Programming in MATLAB. Data Structures. Fall 2014 Instructor: Ilia Vovsha. hep://

W1005 Intro to CS and Programming in MATLAB. Data Structures. Fall 2014 Instructor: Ilia Vovsha. hep:// W1005 Intro to CS and Programming in MATLAB Data Structures Fall 2014 Instructor: Ilia Vovsha hep://www.cs.columbia.edu/~vovsha/w1005 Outline Cell arrays FuncNons with variable arguments Structure arrays

More information

Dicky Nofriansyah*, Ganefri, Sarjon Defit, Ridwan, Azanuddin, Haryo S Kuncoro 1,4,5. Departement of Information System, STMIK Triguna Dharma 1

Dicky Nofriansyah*, Ganefri, Sarjon Defit, Ridwan, Azanuddin, Haryo S Kuncoro 1,4,5. Departement of Information System, STMIK Triguna Dharma 1 International Journal of Artificial Intelegence Research Vol 1, No 2, December 2017, pp.40-49 ISSN:2579-7298 Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique

More information

Chapter 6 User-Defined Functions. dr.dcd.h CS 101 /SJC 5th Edition 1

Chapter 6 User-Defined Functions. dr.dcd.h CS 101 /SJC 5th Edition 1 Chapter 6 User-Defined Functions dr.dcd.h CS 101 /SJC 5th Edition 1 MATLAB Functions M-files are collections of MATLAB statements that stored in a file, called a script file. Script files share the command

More information

Block ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways of doing this

Block ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways of doing this Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 74 Block ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways

More information

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System) Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

C = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n)

C = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n) Substitutions ciphers (monoalphabetic) A substitution technique is one in which the characters of plaintext are replaced by other characters or by numbers or symbols. If the plaintext is viewed as a sequence

More information

COMS 3101 Programming Languages: MATLAB. Lecture 2

COMS 3101 Programming Languages: MATLAB. Lecture 2 COMS 3101 Programming Languages: MATLAB Lecture 2 Fall 2013 Instructor: Ilia Vovsha hbp://www.cs.columbia.edu/~vovsha/coms3101/matlab Lecture Outline Quick review of array manipulanon Control flow Simple

More information

Technology Webinar. Integrating Spreadsheets into Core Curriculum. Part 1

Technology Webinar. Integrating Spreadsheets into Core Curriculum. Part 1 Technology Webinar Integrating Spreadsheets into Core Curriculum Part 1 Online Workshop Adobe Connect overview Core curriculum TEKS Spreadsheet basics Cell cell name Column and row Entering data into a

More information

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard

More information

CHAPTER 17 INFORMATION SCIENCE. Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 =

CHAPTER 17 INFORMATION SCIENCE. Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 = Math 167 Ch 17 Review 1 (c) Janice Epstein, 2013 CHAPTER 17 INFORMATION SCIENCE Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 = Math 167

More information

Lecture 3: Symmetric Key Encryption

Lecture 3: Symmetric Key Encryption Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07

More information

18-642: Cryptography 11/15/ Philip Koopman

18-642: Cryptography 11/15/ Philip Koopman 18-642: Cryptography 11/15/2017 Cryptography Overview Anti-Patterns for Cryptography Using a home-made cryptographic algorithm Using private key when public key is required Not considering key distribution

More information