Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Antonius Cahya P."'
Autor:
Rafiantika Megahniah Prihandini, Nabilah Ayu Az-Zahra, Dafik, Antonius Cahya Prihandoko, Robiatul Adawiyah
Publikováno v:
Contemporary Mathematics and Applications (ConMathA), Vol 5, Iss 2, Pp 64-78 (2023)
Resolving independent dominating set is the development of metric dimension and independent dominating set. Resolving independent dominating sets is a concept which discusses about determining the minimum vertex on a graph provided that the vertex th
Externí odkaz:
https://doaj.org/article/96c78830dd0f443c96d7f4e048b72770
Publikováno v:
Aksioma: Jurnal Program Studi Pendidikan Matematika, Vol 11, Iss 2, Pp 1282-1296 (2022)
This study aims to develop a mathematics learning tool consisting of a Learning Implementation Plan (RPP), Student Worksheet (LKS), and a Computational Thinking Test (CT Test) using the Search, Solve, Create, and Share (SSCS) learning model with a Re
Externí odkaz:
https://doaj.org/article/2013e625d34146818fe7f50650296d52
Publikováno v:
Jurnal Teknologi dan Sistem Komputer, Vol 9, Iss 2, Pp 106-112 (2021)
Penelitian ini bertujuan mengembangkan alternatif otentikasi dengan menerapkan metode steganografi Histogram shifting. Media yang digunakan untuk otentikasi adalah media citra. Histogram shifting memanfaatkan histogram suatu citra untuk menyisipkan p
Externí odkaz:
https://doaj.org/article/356bff59db0b480da4d1129df24ae7e7
Publikováno v:
Berkala Sainstek, Vol 8, Iss 3, Pp 65-74 (2020)
Serpent dan Twofish merupakan algoritma kriptografi yang menduduki peringkat kedua dan ketiga dalam kompetisi Advanced Encryption Standard (AES). Penelitian ini bertujuan untuk mengetahui algoritma mana yang lebih unggul dalam proses enkripsi dan dek
Externí odkaz:
https://doaj.org/article/7ecac015f9314a2ebf0d66c71f9306b6
Publikováno v:
Indonesian Journal of Combinatorics, Vol 4, Iss 1, Pp 21-26 (2020)
SuperH-antimagic total labeling (SHATL) can be utilized to generate encryption keys. The keys are then used to establish the improved block and stream ciphers. In these ciphers, different blocks were encrypted by the different keys, but all block key
Externí odkaz:
https://doaj.org/article/57e2858e2a40454299abbbeb8acff0a9
Autor:
Auliya, Yudha Alif, Prihandoko, Antonius Cahya, Retnani, Diah Ayu, Ruhminat, Qurrota A’Yuni Ar, Zarkasi, Mohammad, Firmansyah, Diksi Media, Slamin
Publikováno v:
AIP Conference Proceedings Online; July 2024, Vol. 3176 Issue: 1 p030049-30059, 11p
Publikováno v:
Indonesian Journal of Combinatorics, Vol 3, Iss 1, Pp 14-23 (2019)
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of su
Externí odkaz:
https://doaj.org/article/b4e01c71b530475fb73f76fd63fe3b43
Publikováno v:
MATHEMATICS EDUCATION AND LEARNING.