LAMPIRAN A LISTINGPROGRAM
|
|
- Philomena Parks
- 6 years ago
- Views:
Transcription
1 LAMPIRAN A LISTINGPROGRAM 1. Form Utama (myprogram.fig) function varargout = myprogram(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT function myprogram_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; guidata(hobject, handles); function varargout = myprogram_outputfcn(hobject, eventdata, handles, varargin) frontimage = imread('image1.jpg'); axes(handles.axes2); imshow(frontimage); varargout{1} = handles.output; function help_btn_callback(hobject, eventdata, handles, varargin) open Help.fig; close(gcbf); function run_btn_callback(hobject, eventdata, handles) selection = questdlg(['what WOULD YOU LIKE TO DO?'],['MSA'],'ENCRYPT','DECRYPT','ENCRYPT'); if strcmp(selection,'encrypt') encrypt; close(gcbf); if strcmp(selection,'decrypt') decrypt; close(gcbf);
2 A2 function exit_btn_callback(hobject, eventdata, handles) selection = questdlg(['exit APPLICATION?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; close(gcbf); function about_btn_callback(hobject, eventdata, handles,varargin) open about.fig; close(gcbf); 2. Form Proses Penyisipan (encrypt.fig) function varargout = encrypt(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT function encrypt_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; guidata(hobject, handles); % --- Outputs from this function are returned to the command line. function varargout = encrypt_outputfcn(hobject, eventdata, handles) varargout{1} = handles.output; function n_key_callback(hobject, eventdata, handles) function n_key_createfcn(hobject, eventdata, handles)
3 A3 function m_key_callback(hobject, eventdata, handles) function m_key_createfcn(hobject, eventdata, handles) % --- Executes on button press in encrypt_btn. function encrypt_btn_callback(hobject, eventdata, handles, varargin) global mypublickey plaintext = get(handles.plaintext_edit,'string'); %convert into binary form plaintext = dec2bin(plaintext,7)'; plaintext = plaintext(:)'-'0'; %set(handles.plaintext_edit,'string',num2str(plaintext)); [linept plaintext_size] = size(plaintext); [linepk mypublickey_size] = size(mypublickey); %count how many blocks according to the size of public key blockt = plaintext_size/mypublickey_size; if (blockt<1) blockt = 1; block = blockt; mypublickey_size = plaintext_size; block = blockt; r = mod(plaintext_size,mypublickey_size); if (r~=0) block = block+1; global cipherdec %ciphertext in decimal form cipherdec=0; j=1; hasil=0; %result of multiplying binary digit of plaintext and key for k=1:1:block
4 for i=1:1:mypublickey_size temp = mypublickey(i)*plaintext(j); hasil = hasil + temp; temp = 0; j = j+1; if(j>plaintext_size) break; cipherdec(k) = hasil; hasil = 0; set(handles.cipher_edit,'string',num2str(cipherdec)); A4 global binmodcipher binresultcipher reshaperc reshapebmc [line sizecipherdec] = size(cipherdec); for ind=1:1:sizecipherdec modcipher(ind) = mod(cipherdec(ind),128); %ciphertext 7 bit {SISA} resultcipher(ind) = floor(cipherdec(ind)/128); binmodcipher = dec2bin(modcipher,7); reshapebmc = reshape(binmodcipher.',1,[]); binresultcipher = dec2bin(resultcipher,7); reshaperc = reshape(binresultcipher.',1,[]); function plaintext_edit_callback(hobject, eventdata, handles) function plaintext_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in open_btn. function open_btn_callback(hobject, eventdata, handles) global mypublickey global imagefile [filename,pathname] = uigetfile({'*.txt','file Text (*.txt)'},'browse File'); if isequal([filename,pathname],[0,0]) return; mypublickey = dlmread(fullfile(pathname,filename,'')); set(handles.publickey_edit,'string',num2str(mypublickey)); temp = mypublickey; [line sizepk] = size(temp); [b k c] = size(imagefile); sizechar = floor(b*k*c/2);
5 maxchar1 = floor(sizechar/7); bitchar = 7*maxChar1; global maxnew if(sizepk>=7) maxnew = maxchar1; if (sizepk<7) maxtrue = floor(bitchar/sizepk); if(mod(bitchar,sizepk)~=0) maxtrue = maxtrue+1; sisa = maxtrue-maxchar1; if(sisa>maxchar1) maxnew = sisa - maxchar1; maxnew = maxchar1 - sisa; set(handles.char_max,'string',maxnew); A5 function publickey_edit_callback(hobject, eventdata, handles) function publickey_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in browse_btn. function browse_btn_callback(hobject, eventdata, handles, varargin) global imagefile [filename,pathname] = uigetfile({'*.bmp','bitmap File (*.bmp)'},'open File'); imagefile = imread(fullfile(pathname,filename)); set(handles.filename_ed,'string',filename); [b k c] = size(imagefile); bitdepth = c*8; set(handles.bitfile,'string',bitdepth); ImageSize = round((b*k*c)/1024); set(handles.filesize,'string',imagesize); function cipher_edit_callback(hobject, eventdata, handles) function cipher_edit_createfcn(hobject, eventdata, handles)
6 % --- Executes on button press in embd_btn. function embd_btn_callback(hobject, eventdata, handles, varargin) global imagefile global reshapebmc %hasil ciphertext global reshaperc %sisa ciphertext %global binmodcipher binresultcipher [line1 sizebmc] = size(reshapebmc); %[line2 sizeresult] = size(reshaperc); temp = double(imagefile); A6 %convert to binary bintemp = dec2bin(temp); [b k] = size(bintemp); %bagian I berisi bit SISA ciphertext for j=1:1:sizebmc bintemp(j,8) = reshapebmc(j); %replace the last bit with sisa ciphertext split = floor(b/2); %bagian II berisi bit HASIL BAGI ciphertext idx = 1; for k=split+1:1:(split+sizebmc) bintemp(k,8) = reshaperc(idx); idx = idx+1; steganoimage = bin2dec(bintemp); [row col dep] = size(imagefile); %change into Image i = 1; for x=1:1:dep %layer / bitdepth for y=1:1:col %colom for z=1:1:row %row StegImg(z,y,x) = steganoimage(i); i = i+1; global SteganoImg SteganoImg = double(stegimg); SteganoImg = uint8(steganoimg); warndlg('embedding Proccess Success!','Information'); % --- Executes on button press in save_btn. function save_btn_callback(hobject, eventdata, handles, varargin)
7 global fullname global SteganoImg temp = SteganoImg; [filename1, pathname] = uiputfile('steganoimage.bmp','save'); fullname = fullfile(pathname,filename1); imwrite(temp,fullname); % --- Executes on button press in view_btn. function view_btn_callback(hobject, eventdata, handles, varargin) view; %close(gcbf); % --- Executes on button press in new_btn. function new_btn_callback(hobject, eventdata, handles, varargin) set(handles.filename_ed,'string',''); set(handles.bitfile,'string',''); set(handles.filesize,'string',''); set(handles.publickey_edit,'string',''); set(handles.plaintext_edit,'string',''); set(handles.cipher_edit,'string',''); A7 % --- Executes on button press in exit_btn. function exit_btn_callback(hobject, eventdata, handles, varargin) selection = questdlg(['exit APPLICATION?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; myprogram; close(gcbf); function filename_ed_callback(hobject, eventdata, handles) function filename_ed_createfcn(hobject, eventdata, handles) function filesize_ed_callback(hobject, eventdata, handles) function BitFile_CreateFcn(hObject, eventdata, handles) function totalframe_ed_callback(hobject, eventdata, handles)
8 function filesize_createfcn(hobject, eventdata, handles) function encrypt_btn_createfcn(hobject, eventdata, handles) % --- Executes on button press in check. function check_callback(hobject, eventdata, handles, varargin) global maxnew plaintext = get(handles.plaintext_edit,'string'); [line sizep] = size(plaintext); A8 if(sizep>maxnew) msgbox(['your Text Consists of ',num2str(sizep),' Letters, GREATER THAN MaxChar'],'MSA','error'); msgbox('valid: YOU CAN CONTINUE..','MSA','none'); set(handles.encrypt_btn,'enable','on'); set(handles.embd_btn,'enable','on'); set(handles.save_btn,'enable','on'); set(handles.view_btn,'enable','on'); 3. Form Proses Ekstraksi (decrypt.fig) function varargout = decrypt(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:});
9 % End initialization code - DO NOT EDIT A9 % --- Executes just before decrypt is made visible. function decrypt_openingfcn(hobject, eventdata, handles, varargin) % Choose default command line output for decrypt handles.output = hobject; % Update handles structure guidata(hobject, handles); % --- Outputs from this function are returned to the command line. function varargout = decrypt_outputfcn(hobject, eventdata, handles) varargout{1} = handles.output; % --- Executes on button press in steg_image_btn. function steg_image_btn_callback(hobject, eventdata, handles, varargin) global imagesteganofile [filename,pathname] = uigetfile({'*.bmp','bitmap File (*.bmp)'},'open File'); imagesteganofile = imread(fullfile(pathname,filename)); set(handles.filename_edit,'string',filename); set(handles.width_edit,'string',size(imagesteganofile,1)); set(handles.height_edit,'string',size(imagesteganofile,2)); A9 % --- Executes on button press in check_btn. function check_btn_callback(hobject, eventdata, handles) function plaintext_edit_callback(hobject, eventdata, handles) function plaintext_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in extract btn. function extract btn_callback(hobject, eventdata, handles, varargin) global imagesteganofile tempimage = double(imagesteganofile); %convert to binary
10 binimagefile = dec2bin(tempimage); [b k c] = size(imagesteganofile); split = floor(b*k*c/2); piksel = floor(split/7); piksel = piksel*7; d = mod(split,7); if(d~=0) %bagian I SISA cipher for i=1:1:piksel lastbit1(i) = binimagefile(i,8); in=1; ind2 = split+1; %bagian II HASIL cipher for j=ind2:1:(ind2+piksel-1) lastbit2(in) = binimagefile(j,8); in=in+1; if(d==0) %bagian I SISA cipher for i=1:1:split lastbit1(i) = binimagefile(i,8); in=1; %bagian II HASIL cipher for j=split+1:1:((b*k*c)) lastbit2(in) = binimagefile(j,8); in=in+1; A10 binvalues = [ ]; binmatriksmod = reshape(lastbit1,7,[]).'; [br kl] = size(binmatriksmod); binmatriksrest = reshape(lastbit2,7,[]).'; tempmod = 0; tempres = 0; for x=1:1:br for y=1:1:kl tempmod = tempmod + (binvalues(y)*str2num(binmatriksmod(x,y))); tempres = tempres + (binvalues(y)*str2num(binmatriksrest(x,y))); hasilmod(x)=tempmod; %hasilmodulo hasilres(x)=tempres; %hasilbagi tempmod=0; tempres=0; [line sizeall] = size(hasilres); for idx=1:1:sizeall
11 ciphers(idx) = 128*hasilRes(idx)+hasilMod(idx); set(handles.cipher_edit,'string',num2str(ciphers)); function cipher_edit_callback(hobject, eventdata, handles) function cipher_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in privatekey_btn. function privatekey_btn_callback(hobject, eventdata, handles) global mysecretkey [filename,pathname] = uigetfile({'*.txt','file Text (*.txt)'},'browse File'); if isequal([filename,pathname],[0,0]) return; mysecretkey = dlmread(fullfile(pathname,filename,'')); set(handles.nkey_edit,'string',num2str(mysecretkey(1))); set(handles.mkey_edit,'string',num2str(mysecretkey(2))); A11 function mkey_edit_callback(hobject, eventdata, handles) function mkey_edit_createfcn(hobject, eventdata, handles) function nkey_edit_callback(hobject, eventdata, handles) function nkey_edit_createfcn(hobject, eventdata, handles)
12 function privkey_edit_callback(hobject, eventdata, handles) function privkey_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in reset_btn. function reset_btn_callback(hobject, eventdata, handles, varargin) set(handles.filename_edit,'string',''); set(handles.width_edit,'string',''); set(handles.height_edit,'string',''); set(handles.nkey_edit,'string',''); set(handles.mkey_edit,'string',''); set(handles.privkey_edit,'string',''); set(handles.cipher_edit,'string',''); set(handles.plaintextkey_edit,'string',''); % --- Executes on button press in exit_btn. function exit_btn_callback(hobject, eventdata, handles) selection = questdlg(['back TO MAIN MENU?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; myprogram; close(gcbf); A12 % --- Executes on button press in generate_btn. function generate_btn_callback(hobject, eventdata, handles) selection = questdlg(['exit DECRYPT FORM?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; generate; close(gcbf); % --- Executes on button press in save_btn. function save_btn_callback(hobject, eventdata, handles, varargin) teks = get(handles.plaintext_edit,'string');
13 thedir='c:\users\user\desktop'; dlmwrite(fullfile(thedir, 'myplaintext.txt'), teks, ''); warndlg('plaintext has been saved as [myplaintext.txt] into your desktop!','information'); % --- Executes on button press in view_btn. function view_btn_callback(hobject, eventdata, handles) function width_edit_callback(hobject, eventdata, handles) function width_edit_createfcn(hobject, eventdata, handles) function height_edit_callback(hobject, eventdata, handles) function height_edit_createfcn(hobject, eventdata, handles) A13 function filename_edit_callback(hobject, eventdata, handles) function filename_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in viewpk_btn. function viewpk_btn_callback(hobject, eventdata, handles) global myprivatekey; global myprivatekey_size; global mysecretkey; global mysecretkey_size;
14 myprivatekey = 0; j = 3; [linepk mysecretkey_size] = size(mysecretkey); myprivatekey_size = mysecretkey_size - 2; for i=1:1:myprivatekey_size myprivatekey(i) = mysecretkey(j); j = j + 1; set(handles.privkey_edit,'string',num2str(myprivatekey)); % --- Executes on button press in dec_btn. function dec_btn_callback(hobject, eventdata, handles) %count the invers on nkey inversetemp = str2num(get(handles.nkey_edit,'string')); mtemp = str2num(get(handles.mkey_edit,'string')); k = 0; while k>=0 inversen = (1 + (double(k)*mtemp))/double(inversetemp); if (round(inversen)-inversen==0 && inversen>0) break; k = k + 1; %decryption process ciphertext = str2num(get(handles.cipher_edit,'string')); [linepk ciphertext_size] = size(ciphertext); for i=1:1:ciphertext_size ciphertransform(i) = mod((inversen*ciphertext(i)),mtemp); global myprivatekey global myprivatekey_size; A14 %solving the super increasing knapsack x=myprivatekey_size; ind = 1; for y = 1:ciphertext_size for z = myprivatekey_size:-1:1 if ciphertransform(y) >= myprivatekey(z) plaintextbin(ind,x) = 1; ciphertransform(y) = ciphertransform(y) - myprivatekey(z); plaintextbin(ind,x) = 0; x = x-1; if(y>ciphertext_size) break;
15 x = myprivatekey_size; ind = ind+1; if ciphertransform(y) ~= 0 warning = 'Cannot Decrypt, because its not a superincreasing Knapsack'; set(handles.plaintext_edit,'string',warning); break; a = reshape(plaintextbin.',1,[]); [line sizea] = size(a); j=mod(sizea,7); for i = 1:1:sizeA-j b(i) = a(i); k = bin2dec((reshape(char(b+'0'),7,[])')); k = char(k); k = reshape(k.',1,[]); set(handles.plaintext_edit,'string',k); % --- Executes on button press in pubkeytext. function pubkeytext_callback(hobject, eventdata, handles) 4. Form Proses Pembangkit Kunci (generate.fig) function varargout = generate(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); A15 if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT % --- Executes just before generatekey is made visible. function generate_openingfcn(hobject, eventdata, handles, varargin)
16 handles.output = hobject; % Update handles structure guidata(hobject, handles); % --- Outputs from this function are returned to the command line. function varargout = generate_outputfcn(hobject, eventdata, handles) % Get default command line output from handles structure varargout{1} = handles.output; function mkey_edit_callback(hobject, eventdata, handles) function mkey_edit_createfcn(hobject, eventdata, handles) function nkey_edit_callback(hobject, eventdata, handles) function nkey_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in val_btn. function val_btn_callback(hobject, eventdata, handles,varargin) global total_result mkey1 = str2num(get(handles.mkey_edit,'string')); nkey1 = str2num(get(handles.nkey_edit,'string')); A16 mkey = mkey1; nkey = nkey1; while nkey~=0 sisa=mod(mkey,nkey); mkey=nkey; nkey=sisa; result = mkey; %choice if (mkey1 > nkey1) && (result == 1) && (mkey1 > total_result)
17 msgbox('valid: YOU CAN CONTINUE..','MSA','none'); set(handles.reset_btn,'enable','on'); set(handles.save_btn,'enable','on'); set(handles.pubkey_btn,'enable','on'); msgbox(['not VALID: CHECK M > ',num2str(total_result),', M > N, M-N COPRIME..'],'MSA','error'); function pk1_edit_callback(hobject, eventdata, handles) function pk1_edit_createfcn(hobject, eventdata, handles) function pk2_edit_callback(hobject, eventdata, handles) function pk2_edit_createfcn(hobject, eventdata, handles) % --- Executes on selection change in inc. function inc_callback(hobject, eventdata, handles) function inc_createfcn(hobject, eventdata, handles) A17 % --- Executes on button press in generate_btn. function generate_btn_callback(hobject, eventdata, handles,varargin) global total_result; total_result = 0; pk1 = str2num(get(handles.pk1_edit,'string')); pk2 = str2num(get(handles.pk2_edit,'string')); increament = get(handles.inc,'value'); totalpk = str2num(get(handles.total,'string'));
18 if totalpk < 3 msgbox('total private key must be greater than 3 elements','msa','error'); A(1) = pk1; A(2) = pk2; temp = 0; for i = 3:1:totalPK for j = 1:1:i-1 temp = temp + A(j); A(i) = temp + increament; temp = 0; total_result = (A(totalPK)*2-increament); set(handles.privatekey_edit,'string',num2str(a)); set(handles.val_btn,'enable','on'); set(handles.mkey_edit,'enable','on'); set(handles.nkey_edit,'enable','on'); function privatekey_edit_callback(hobject, eventdata, handles) function privatekey_edit_createfcn(hobject, eventdata, handles) % --- Executes on button press in save_btn. function save_btn_callback(hobject, eventdata, handles, varargin) PK = str2num(get(handles.privatekey_edit,'string')); nkey = str2num(get(handles.nkey_edit,'string')); mkey = str2num(get(handles.mkey_edit,'string')); A(1) = nkey; A(2) = mkey; Key = [A,PK]; A18 thedir=uigetdir();%'c:\users\user\desktop'; dlmwrite(fullfile(thedir, 'mysecretkey.txt'), Key, ' '); warndlg('privatekey has been saved as [mysecretkey.txt]','information'); % --- Executes on button press in exit_btn. function exit_btn_callback(hobject, eventdata, handles)
19 selection = questdlg(['back TO MAIN MENU?'],['MSA'],'YES','NO','YES'); if strcmp(selection,'no') return; myprogram; close(gcbf); % --- Executes on button press in reset_btn. function reset_btn_callback(hobject, eventdata, handles, varargin) set(handles.privatekey_edit,'string',''); set(handles.nkey_edit,'string',''); set(handles.mkey_edit,'string',''); set(handles.pk1_edit,'string',''); set(handles.pk2_edit,'string',''); set(handles.total,'string',''); function val_btn_createfcn(hobject, eventdata, handles, varargin) % --- Executes on button press in pubkey_btn. function pubkey_btn_callback(hobject, eventdata, handles, varargin) PK = str2num(get(handles.privatekey_edit,'string')); nkey = str2num(get(handles.nkey_edit,'string')); mkey = str2num(get(handles.mkey_edit,'string')); [line sizepk] = size(pk); for i = 1:1:sizePK pubkey(i) = mod((pk(i)*nkey),mkey); thedir=uigetdir();%'c:\users\user\desktop'; dlmwrite(fullfile(thedir, 'mypublickey.txt'), pubkey, ' '); warndlg('publickey has been created as [mypublickey.txt]!','information'); function total_callback(hobject, eventdata, handles) function total_createfcn(hobject, eventdata, handles) A19
20 function generate_btn_createfcn(hobject, eventdata, handles) 5. FormView Image (view.fig) function varargout = view(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT % --- Executes just before view is made visible. function view_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; % Update handles structure guidata(hobject, handles); function varargout = view_outputfcn(hobject, eventdata, handles, varargin) global imagefile fullname axes(handles.before); imshow(imagefile); axes(handles.after); imshow(fullname); varargout{1} = handles.output; % --- Executes on button press in BACK. function BACK_Callback(hObject, eventdata, handles, varargin) %encrypt; close(gcbf); function asli_callback(hobject, eventdata, handles)
21 function asli_createfcn(hobject, eventdata, handles) A20 function hasil_callback(hobject, eventdata, handles) function hasil_createfcn(hobject, eventdata, handles) 6. FormHelp (help.fig) function varargout = help(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT % --- Executes just before Help is made visible. function help_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; % Update handles structure guidata(hobject, handles); % --- Outputs from this function are returned to the command line. function varargout = help_outputfcn(hobject, eventdata, handles) varargout{1} = handles.output;
22 function edit1_callback(hobject, eventdata, handles) % hobject handle to edit1 (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) A21 % Hints: get(hobject,'string') returns contents of edit1 as text % str2double(get(hobject,'string')) returns contents of edit1 as a double function edit1_createfcn(hobject, eventdata, handles) % --- Executes on button press in pushbutton2. function pushbutton2_callback(hobject, eventdata, handles) myprogram; close(gcbf); 7. FormAbout (about.fig) function varargout = about(varargin) % Begin initialization code - DO NOT EDIT gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1}); if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); gui_mainfcn(gui_state, varargin{:}); % End initialization code - DO NOT EDIT function about_openingfcn(hobject, eventdata, handles, varargin) handles.output = hobject; guidata(hobject, handles); function varargout = about_outputfcn(hobject, eventdata, handles)
23 varargout{1} = handles.output; % --- Executes on button press in pushbutton1. function pushbutton1_callback(hobject, eventdata, handles, varargin) myprogram; close(gcbf);
24 CURRICULUM VITAE Nama : Juwita Adelina Pasaribu Alamat Sekarang : Jl. Tuba II Gg. Tapanuli No. 11b Medan Alamat Orang Tua : Jl. Tuba II Gg. Tapanuli No. 11b Medan Telp/HP : wiezzard@gmail.com Riwayat Pidikan SDN Medan dari Tahun 1996 s/d Tahun 2002 SMPN 3 Medan dari Tahun 2002 s/d Tahun 2005 SMAN5 Medan dari Tahun 2005 s/d Tahun 2008 dari Tahun 2008 s/d Tahun 2012 Keahlian/Kursus yang diikuti 1. English Course at International Language Program 2. Office Application: Word, Excel, Powerpoint, Access 3. Programming: Delphi, MySQL
LAMPIRAN 1. Percobaan
LAMPIRAN 1 1. Larutan 15 ppm Polystyrene ENERGI Percobaan 1 2 3 PROBABILITY 0.07 0.116 0.113 0.152 0.127 0.15 0.256 0.143 0.212 0.203 0.22 0.24 0.234 0.23 0.234 0.3 0.239 0.35 0.201 0.263 0.37 0.389 0.382
More information% Edit the above text to modify the response to help Video_Player. % Last Modified by GUIDE v May :38:12
FILE NAME: Video_Player DESCRIPTION: Video Player Name Date Reason Sahariyaz 28-May-2015 Basic GUI concepts function varargout = Video_Player(varargin) VIDEO_PLAYER MATLAB code for Video_Player.fig VIDEO_PLAYER,
More informationLISTING PROGRAM. % Edit the above text to modify the response to help cover. % Last Modified by GUIDE v Jun :24:43
A1 LISTING PROGRAM 1. Form Cover function varargout = cover(varargin) COVER MATLAB code for cover.fig COVER, by itself, creates a new COVER or raises the existing singleton*. H = COVER returns the handle
More informationLISTING PROGRAM. % UIWAIT makes pertama wait for user response (see UIRESUME) % uiwait(handles.figure1);
LISTING PROGRAM FORM PERTAMA : function varargout = pertama(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_openingfcn', @pertama_openingfcn,...
More information1. Peralatan LAMPIRAN
1. Peralatan LAMPIRAN 2. Data Sampel a. Air murni 3ml Energy(mj) Probability Air Murni 0.07 0.001 0.15 0.003 0.22 0.006 0.3 0.028 0.37 0.045 0.39 0.049 0.82 0.053 0.89 0.065 1.28 0.065 1.42 0.106 1.7
More informationLISTING PROGRAM. if nargout [varargout{1:nargout}] = gui_mainfcn(gui_state, varargin{:}); else gui_mainfcn(gui_state, varargin{:}); end
A-1 LISTING PROGRAM 1. Form Cover function varargout = cover(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_openingfcn', @cover_openingfcn,...
More informationSignal and Systems. Matlab GUI based analysis. XpertSolver.com
Signal and Systems Matlab GUI based analysis Description: This Signal and Systems based Project takes a sound file in.wav format and performed a detailed analysis, as well as filtering of the signal. The
More informationLAMPIRAN LISTING PROGRAM
A1 LAMPIRAN LISTING PROGRAM Prototype.m function varargout = prototype(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_openingfcn', @prototype_openingfcn,...
More information% Edit the above text to modify the response to help Principal
function varargout = Principal(varargin) % OPFGUI MATLAB code for Principal.fig % OPFGUI, by itself, creates a new OPFGUI or raises the existing % singleton*. % % H = OPFGUI returns the handle to a new
More informationGUI code for different sections is in following sections
Software Listing The Graphical User Interface (GUI) and Fuzzy Inference System (FIS) are developed in MATLAB. Software code is developed for different sections like Weaving section, Motor Status, Environment,
More information% --- Executes on button press in btn_gsn. function btn_gsn_callback(hobject, eventdata, handles) GaussianSpeckleNoise close AiSoftware;
A-2 'gui_openingfcn', @AiSoftware_OpeningFcn,... 'gui_outputfcn', @AiSoftware_OutputFcn,... 'gui_layoutfcn', [],... 'gui_callback', []); if nargin && ischar(varargin{1}) gui_state.gui_callback = str2func(varargin{1});
More information1.Matlab Image Encryption Code
1.Matlab Image Encryption Code (URL: http://www.cheers4all.com/2012/04/matlab-image-encryption-code/) This project is Image Encryption & Decryption. The user will give an input and encryption factor. The
More informationMV 1:00 1:05 1:00 1:05
1 54 MV 1:00 1:05 1:00 1:05 55 DTW 56 function varargout = my_filter8(varargin) gui_singleton = 1; gui_state = struct('gui_name', mfilename,... 'gui_singleton', gui_singleton,... 'gui_openingfcn', @my_filter8_openingfcn,...
More informationHomeworks on FFT Instr. and Meas. for Communication Systems- Gianfranco Miele. Name Surname
Homeworks on FFT 90822- Instr. and Meas. for Communication Systems- Gianfranco Miele Name Surname October 15, 2014 1 Name Surname 90822 (Gianfranco Miele): Homeworks on FFT Contents Exercise 1 (Solution)............................................
More informationOMR Sheet Recognition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 8, Number 1 (2018), pp. 11-32 International Research Publications House http://www. irphouse.com OMR Sheet Recognition
More informationLAMPIRAN A PROGRAM PELATIHAN DAN PENGUJIAN
LAMPIRAN A PROGRAM PELATIHAN DAN PENGUJIAN Program Preprocessing Image clc; clear all; % Preprocessing Image -------------------------------------------- daniel{1}=imread('daniel1.bmp'); daniel{2}=imread('daniel2.bmp');
More informationSupplementary Information
Supplementary Information Retooling Laser Speckle Contrast Analysis Algorithm to Enhance Non-Invasive High Resolution Laser Speckle Functional Imaging of Cutaneous Microcirculation Surya C Gnyawali 1,
More informationEar Recognition. By: Zeyangyi Wang
Ear Recognition By: Zeyangyi Wang Ear Recognition By: Zeyangyi Wang Online: < http://cnx.org/content/col11604/1.3/ > C O N N E X I O N S Rice University, Houston, Texas This selection and arrangement
More informationLampiran 1. Script M-File Global Ridge
LAMPIRAN 67 Lampiran 1. Script M-File Global Ridge function [l, e, L, E] = globalridge(h, Y, l) [l, e, L, E] = globalridge(h, Y, l, options, U) Calculates the best global ridge regression parameter (l)
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,500 108,000 1.7 M Open access books available International authors and editors Downloads Our
More informationAkkad Bakad Bambai Bo
Akkad Bakad Bambai Bo The Josephus Problem Shivam Sharma, Rajat Saini and Natasha Sharma Cluster Innovation Center, University of Delhi Abstract We aim to give explanation of the recursive formula for
More informationA NEW MACHINING COST CALCULATOR (MC 2 )
A NEW MACHINING COST CALCULATOR (MC 2 ) By MATHEW RUSSELL JOHNSON A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER
More informationFinding a Minimum Covering Circle Based on Infinity Norms
Finding a Minimum Covering Circle Based on Infinity Norms by Andrew A. Thompson ARL-TR-4495 July 2008 Approved for public release; distribution is unlimited. NOTICES Disclaimers The findings in this report
More informationECE Fall 05. Undergraduate Research: Digital Signal Processing & Quantization Effects
ECE 491-153 Fall 05 Undergraduate Research: Digital Signal Processing & Quantization Effects Done By: Tanim Taher SID# 10370800 Date: December 19, 2005 DSP & Quantization 1 Tanim Taher ACKNOWLEDGEMENTS
More informationCOMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART
COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART 1 Varjith Anchuri, 2 K.Hanuman Krishna, 3 M.Gopi Chand, 4 S.Rishi, UG Scholar Dept Of CSE, SRM University,Chennai. Abstract A
More informationLithium-Ion Battery Data. Management
Lithium-Ion Battery Data Management Frank Ferrato Dr. Jung-Hyun Kim April 2018 Abstract: Lithium Ion Battery research is growing due to the need for renewable resources. Since the amount of research is
More informationGUI Signal Analysis and Filtering Design
i GUI Signal Analysis and Filtering Design Axel Daniela Campero Vega, Electrical Engineering Project Advisor: Dr. Dick Blandford April 26, 2018 Evansville, Indiana ii Acknowledgements I want to thank Dr.
More informationSolving Sudoku with MATLAB
Solving Sudoku with MATLAB Raluca Marinescu Andrea Garcia Ivan Castro Eduard Paul Enoiu Mälardalen University, Västerås, Sweden {rmu09001, aga09001, ico09002, eeu09001}@student.mdh.se March 25, 2011 Abstract
More informationMain Form visual Studio
Main Form visual Studio using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Linq; using System.Text; using System.Windows.Forms;
More information.., 7. References. [ 1] 1 mage Analysis and Mathematical Morphology:J.Serra. [2] Erosion, dilation and related operators,by Mariusz Jankowski
7. References [ 1] 1 mage Analysis and Mathematical Morphology:J.Serra [2] Erosion, dilation and related operators,by Mariusz Jankowski [3] Morphological Image Processing by Ranga Rodrigo [4] Application
More informationContents INTERFACING MATLAB WITH EMBEDDED SYSTEMS
Contents MATLAB INTRODUCTION:... 1 Why it is useful for prototyping AI projects??... 2 Using MATLAB as a calculator:... 3 How to use conditions... 8 Serial/Parallel communication:... 9 Color Detection
More informationAirfoil Boundary Layer Separation Prediction
Airfoil Boundary Layer Separation Prediction A project present to The Faculty of the Department of Aerospace Engineering San Jose State University in partial fulfillment of the requirements for the degree
More informationPROGRAMMING IN MATLAB
PROGRAMMING IN MATLAB Rohan D sa Rafael Love Todd Page OBJECTIVE: This document gives an overview of a few aspects related to programming in Matlab. With the help of a sample program, it goes through some
More informationParallel-connected solar arrays
Scholars' Mine Masters Theses Student Research & Creative Works Spring 2013 Parallel-connected solar arrays Majed Meshal Alabbass Follow this and additional works at: http://scholarsmine.mst.edu/masters_theses
More informationImplementation of a Motion Detection System
Implementation of a Motion Detection System Asif Ansari 1, T.C.Manjunath (Ph.D., IIT Bombay) 2, C.Ardil 3 Abstract In today s competitive environment, the security concerns have grown tremously. In the
More informationALGORITHMS AND INTERFACE FOR OCEAN ACOUSTIC RAY-TRACING (Developed in MATLAB)
ALGORITHMS AND INTERFACE FOR OCEAN ACOUSTIC RAY-TRACING (Developed in MATLAB) Technical Report No. NIO/TR 09/005 T.V.Ramana Murty M.M.Malleswara Rao S.Surya Prakash P.Chandramouli K.S.R.Murthy Regional
More informationLOK-Viewer : Graphical Interface Application for Geomagnetic Data in Observatory Geomagnetic Lombok
LOK-Viewer : Graphical Interface Application for Geomagnetic Data in Observatory Geomagnetic Lombok Giri W. Wiriasto, Teti Zubaidah, Bulkis Kanata Electrical Engineering Dept. Mataram University Lombok,
More informationIMAGE STEGANOGRAPHY USING DISCRETE COSINE TRNASFORM ALGORITHM
RCC Institute of Information Technology Canal South Road, Beliaghata, Kolkata 700 015 [Affiliated to West Bengal University of Technology] IMAGE STEGANOGRAPHY USING DISCRETE COSINE TRNASFORM ALGORITHM
More informationAccepted by... John H. Lienhard V
The Understanding, Characterization, and Implementation of a SICK LMS-291 Laser Scanner for Use in an Experimental Environment by Marcos Berrios Submitted to the Department of Mechanical Engineering in
More informationTREBALL FINAL DE GRAU
Estudi del procés constructiu de ponts atirantats construïts sobre suports provisionals. ANNEXOS Treball realitzat per: Joan Fraile Diana Dirigit per: José Turmo Coderque Jose Antonio Lozano Galant Grau
More informationMEASURING INTERFACIAL TENSION WITH THE PENDANT DROP METHOD
MEASURING INTERFACIAL TENSION WITH THE PENDANT DROP METHOD A Thesis Presented to The Academic Faculty by Kevin K. Mohan-Nair In Partial Fulfillment of the Requirements for the Degree Bachelor of Science
More informationReal-Time IIR Digital Filters
Real-Time IIR Digital Filters Chapter 8 Introduction Infinite impulse response (IIR) filter design has its roots in traditional analog filter design. One of the main issues in IIR digital filter design
More informationUNIVERSITÀ DEGLI STUDI DI PADOVA
UNIVERSITÀ DEGLI STUDI DI PADOVA FACOLTÀ DI INGEGNERIA CORSO DI LAUREA IN INGEGNERIA BIOMEDICA DESIGN OF NEUROPHYSIOLOGICAL SIGNAL ANAYSIS SOFTWARE GIACOMO BASSETTO SUPERVISOR: PROFESSOR STEFANO VASSANELLI
More informationLISTING PROGRAM. mainform.vb A-1. Universitas Sumatera Utara
A-1 LISTING PROGRAM mainform.vb Imports System.IO Public Class mainform Private Sub mainform_load(byval sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load enkripsirb.checked = True
More informationLAMPIRAN A LISTING PROGRAM
A-1 LAMPIRAN A LISTING PROGRAM FUNGSI public void StopWatchStart() stopwatch.reset(); stopwatch.start(); Cursor.Current = Cursors.WaitCursor; txtlog.text = ""; public void StopWatchStop(string Title) stopwatch.stop();
More informationListing Progam. Universitas Sumatera Utara
60 Listing Progam Listing Program Tabel Index
More informationGENDER ESTIMATION BASED ON FACIAL IMAGE AZLIN BT YAJID UNIVERSITI TEKNOLOGI MALAYSIA
GENDER ESTIMATION BASED ON FACIAL IMAGE AZLIN BT YAJID UNIVERSITI TEKNOLOGI MALAYSIA PSZ 19:16 (PIND. 1/97) UNIVERSITI TEKNOLOGI MALAYSIA BORANG PENGESAHAN STATUS TESIS JUDUL: GENDER ESTIMATION BASED ON
More informationDesign of Automated Digital Eye Palpation Exam for Intraocular Pressure Measurement
Design of Automated Digital Eye Palpation Exam for Intraocular Pressure Measurement Item Type text; Electronic Thesis Authors Luce, Alexander Vallejo Publisher The University of Arizona. Rights Copyright
More informationSandia National Laboratories: Implementation of and Experimenting with a Clustering Tool
Sandia National Laboratories: Implementation of and Experimenting with a Clustering Tool Team: Avani Gadani, Daniel Lowd, Brian Roney, Eric Wu Harvey Mudd College Dr. Belinda Thom (Advisor) Dr. Kevin Boyack
More informationLISTING PROGRAM. a = b; b = c; c = a + b; } fibs.reverse(); for (int i = 0; i < fibs.count; i++) { if (n >= fibs[i]) { n = n - fibs[i];
A-1 A LISTING PROGRAM 1. Fibonacci Code //membuat fungsi Fibonacci Code public static String GetFibonacciCode(int n) { StringBuilder fib = new StringBuilder("1"); int a, b, c; List fibs = new List();
More informationKeywords: Learning automata, Vertex multicoloring.
ISSN XXXX XXXX 2018 IJESC Research Article Volume 8 Issue No.4 Scheduling Algorithm for High Density MIMO Channels C.Elayaraja 1, P.Manju 2, I.Parsana Begam 3 Associate Professor 1, Student 2, 3 Department
More informationUsing Genetic Algorithm to Break Super-Pascal Knapsack Cipher
Cihan University, First International Scientific conference 204 Cihan University. All Rights Reserved. Research Article Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher Safaa S Omran, Ali
More informationBlock Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5)
Block Ciphers Tutorial c Eli Biham - May 3, 2005 146 Block Ciphers Tutorial (5) A Known Plaintext Attack on 1-Round DES After removing the permutations IP and FP we get: L R 48 K=? F L R c Eli Biham -
More informationIntel Quark microcontroller D2000 How to communicate with MATLAB over UART
Intel Quark microcontroller D2000 How to communicate with MATLAB over UART Introduction Intel System Studio 2016 for Microcontrollers is an integrated tool suite for developing, optimizing, and debugging
More informationRecap. Definition (Encryption: Caesar Cipher)
Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Definition (Encryption: Shift Cipher) + d = mod 26, d anumber Recap Definition (Encryption:
More informationS-DES Encryption template. Input:
Page 1 of 5 S-DES (simplified Data Encryption Standard) Assignment template: ENCRYPTION TEMPLATE To the input (plaintext), apply initial permutation IP: IP 2 6 3 1 4 8 5 7 In the next steps, we will develop
More informationLAMPIRAN A: LISTING PROGRAM
A-1 LAMPIRAN A: LISTING PROGRAM 1. Latih.m input = xlsread('ayam1.xlsx', 'Sheet1', 'B2:P49'); %memasukkan input dari excel file Ayam, sheet Sheet1, baris kolom 'B2:BJ17' input= input'; %transpose input
More informationFile text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et
More information1 Lab 3, Simulation of crank-piston system
1 Lab 3, Simulation of crank-piston system 1.1 Problem description Simulation 3 Slider-Crank Mechanism with a Piston In your text, the slider-crank kinematic mechanism is discussed and equations of motion
More informationCryptography. Andreas Hülsing. 6 September 2016
Cryptography Andreas Hülsing 6 September 2016 1 / 21 Announcements Homepage: http: //www.hyperelliptic.org/tanja/teaching/crypto16/ Lecture is recorded First row might be on recordings. Anything organizational:
More informationFundamentals of Python: First Programs. Chapter 4: Strings and Text Files
Fundamentals of Python: First Programs Chapter 4: Strings and Text Files Objectives After completing this chapter, you will be able to Access individual characters in a string Retrieve a substring from
More informationCIS 3362 Final Exam 12/4/2013. Name:
CIS 3362 Final Exam 12/4/2013 Name: 1) (10 pts) Since the use of letter frequencies was known to aid in breaking substitution ciphers, code makers in the Renaissance added "twists" to the standard substitution
More informationBlind to Change. More on Graphical User Interfaces. Exploring change blindness
Blind to Change More on Graphical User Interfaces CS112 Scientific Computation Department of Computer Science Wellesley College Exploring change blindness The human visual system can be blind to changes
More informationMATLAB. Creating Graphical User Interfaces Version 7. The Language of Technical Computing
MATLAB The Language of Technical Computing Note This revision of Creating Graphical User Interfaces, issued May 2006, adds three new chapters that provide more information for creating GUIs programmatically.
More informationModule 13 Network Security. Version 1 ECE, IIT Kharagpur
Module 13 Network Security Lesson 40 Network Security 13.1.1 INTRODUCTION Network Security assumes a great importance in the current age. In this chapter we shall look at some of the security measures
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationIntroduction to Cryptology. Lecture 2
Introduction to Cryptology Lecture 2 Announcements Access to Canvas? 2 nd Edition vs. 1 st Edition HW1 due on Tuesday, 2/7 Discrete Math Readings/Quizzes on Canvas due on Tuesday, 2/14 Agenda Last time:
More informationBlock Ciphers and Data Encryption Standard. CSS Security and Cryptography
Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationCryptography Part II Introduction to Computer Security. Chapter 8
Cryptography Part II Introduction to Computer Security Chapter 8 Vigènere Cipher Like Cæsar cipher, but use phrase Example Message: THE BOY HAS THE BALL Key: VIG Encipher using Cæsar cipher for each letter:
More informationFlow Control. Spring Flow Control Spring / 26
Flow Control Spring 2019 Flow Control Spring 2019 1 / 26 Relational Expressions Conditions in if statements use expressions that are conceptually either true or false. These expressions are called relational
More informationSankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List
1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the
More informationThis document contains additional questions; it is not intended to be treated as a complete paper.
1 AS COMPUTER SCIENCE Paper 2 Additional Questions These questions focus primarily on topics that were not covered by the AQA AS and A-level Computing specifications, introduced in 2009. It is hoped that
More informationComputer and Data Security. Lecture 3 Block cipher and DES
Computer and Data Security Lecture 3 Block cipher and DES Stream Ciphers l Encrypts a digital data stream one bit or one byte at a time l One time pad is example; but practical limitations l Typical approach
More informationDue: March 8, 11:59pm. Project 1
COS 433: Cryptography (Spring 2018) Project 1 Princeton University Due: March 8, 11:59pm Project 1 Introduction You are interning at the super secretive SLA (Three Letter Agency). The SLA has intercepted
More informationSecret Key Cryptography
Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:
More informationLISTING PROGRAM. 1. Module SkripsiUmri.py. import sys, operator, codecs, time. class Timer(object): def init (self): self.t1= time.
A1 LISTING PROGRAM 1. Module SkripsiUmri.py import sys, operator, codecs, time class Timer(object): def init (self): self.t1= time.time() def getelapsedltime(self): # gets total elapsed from class initialsation
More informationComputational Methods of Scientific Programming
12.010 Computational Methods of Scientific Programming Lecturers Thomas A Herring, Jim Elliot, Chris Hill, Summary of Today s class We will look at Matlab: History Getting help Variable definitions and
More informationA nice outline of the RSA algorithm and implementation can be found at:
Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.
More informationLAMPIRAN A : LISTING PROGRAM
LAMPIRAN A : LISTING PROGRAM 1. Form Utama (Cover) using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Linq; using System.Text;
More informationNature Sunday Academy Lesson Plan
Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns
More informationLecture 4: Symmetric Key Encryption
Lecture 4: Symmetric ey Encryption CS6903: Modern Cryptography Spring 2009 Nitesh Saxena Let s use the board, please take notes 2/20/2009 Lecture 1 - Introduction 2 Data Encryption Standard Encrypts by
More informationJordan University of Science and Technology
Jordan University of Science and Technology Cryptography and Network Security - CPE 542 Homework #III Handed to: Dr. Lo'ai Tawalbeh By: Ahmed Saleh Shatnawi 20012171020 On: 8/11/2005 Review Questions RQ3.3
More informationEncryption à la Mod Name
Rock Around the Clock Part Encryption à la Mod Let s call the integers,, 3,, 5, and the mod 7 encryption numbers and define a new mod 7 multiplication operation, denoted by, in the following manner: a
More informationECE 646 Fall 2008 Multiple-choice test
ECE 646 Fall 2008 Multiple-choice test 1. (1 pt) Arrange the following ciphers in the order of the increasing measure of roughness for the ciphertext obtained by encrypting 1000-letter message with a given
More informationSpecial Topics II: Graphical User Interfaces (GUIs)
Special Topics II: Graphical User Interfaces (GUIs) December 8, 2011 Structures Structures (structs, for short) are a way of managing and storing data in most programming languages, including MATLAB. Assuming
More informationAn Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security
Journal of Physics: Conference Series PAPER OPEN ACCESS An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security To cite this article: M A Budiman et al
More informationCS 556 Spring 2017 Project 3 Study of Cryptographic Techniques
CS 556 Spring 2017 Project 3 Study of Cryptographic Techniques Project Due Dates: Part A: Due before class on CANVAS by Thursday, March 23, 2017 Part B: Due before class on CANVAS by Thursday April 6,
More informationW1005 Intro to CS and Programming in MATLAB. Data Structures. Fall 2014 Instructor: Ilia Vovsha. hep://
W1005 Intro to CS and Programming in MATLAB Data Structures Fall 2014 Instructor: Ilia Vovsha hep://www.cs.columbia.edu/~vovsha/w1005 Outline Cell arrays FuncNons with variable arguments Structure arrays
More informationDicky Nofriansyah*, Ganefri, Sarjon Defit, Ridwan, Azanuddin, Haryo S Kuncoro 1,4,5. Departement of Information System, STMIK Triguna Dharma 1
International Journal of Artificial Intelegence Research Vol 1, No 2, December 2017, pp.40-49 ISSN:2579-7298 Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique
More informationChapter 6 User-Defined Functions. dr.dcd.h CS 101 /SJC 5th Edition 1
Chapter 6 User-Defined Functions dr.dcd.h CS 101 /SJC 5th Edition 1 MATLAB Functions M-files are collections of MATLAB statements that stored in a file, called a script file. Script files share the command
More informationBlock ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways of doing this
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 74 Block ciphers used to encode messages longer than block size Needs to be done correctly to preserve security Will look at five ways
More informationLECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)
Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationC = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n)
Substitutions ciphers (monoalphabetic) A substitution technique is one in which the characters of plaintext are replaced by other characters or by numbers or symbols. If the plaintext is viewed as a sequence
More informationCOMS 3101 Programming Languages: MATLAB. Lecture 2
COMS 3101 Programming Languages: MATLAB Lecture 2 Fall 2013 Instructor: Ilia Vovsha hbp://www.cs.columbia.edu/~vovsha/coms3101/matlab Lecture Outline Quick review of array manipulanon Control flow Simple
More informationTechnology Webinar. Integrating Spreadsheets into Core Curriculum. Part 1
Technology Webinar Integrating Spreadsheets into Core Curriculum Part 1 Online Workshop Adobe Connect overview Core curriculum TEKS Spreadsheet basics Cell cell name Column and row Entering data into a
More informationSubstitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.
Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard
More informationCHAPTER 17 INFORMATION SCIENCE. Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 =
Math 167 Ch 17 Review 1 (c) Janice Epstein, 2013 CHAPTER 17 INFORMATION SCIENCE Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 = Math 167
More informationLecture 3: Symmetric Key Encryption
Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07
More information18-642: Cryptography 11/15/ Philip Koopman
18-642: Cryptography 11/15/2017 Cryptography Overview Anti-Patterns for Cryptography Using a home-made cryptographic algorithm Using private key when public key is required Not considering key distribution
More information