A Parallel Algorithm for Factorization of Big Odd Numbers
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2017, Vol 19, Issue 2
Abstract
The article puts forward an algorithm to factorize a big odd number by means of subdividing the searching interval into finite independent subintervals. A divisor of a big odd number can be found in one of the subintervals. Owing to the independency of the subintervals, the algorithm can be performed in either sequential computing or parallel computing. Experiment shows that the algorithm is valid and practically applicable.
Authors and Affiliations
Dongbo FU
Intrusion Detection system: A Review of the state of the art
Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this...
“WiMAX-WLAN Interface usingTORA, DSR and OLSR protocols with their evaluation under Wormhole Attack on VOICE and HTTP applications”
Abstract: We are in advanced world of internet with new technologies in now these days. So many new wireless networks technologies have been emerged. WiMAX is one of the advanced technologies from those. Due to adv...
MANCAFChat - An Application to Evaluate MANCAF Framework
Abstract: The collaborative application uses the MANET to exchange the information between the available nodes. The development of such kind of application takes too much time to implement the network communication servi...
Anti-spam Filter Based on Machine Learning Algorithm
We building one of the filter which help the user relief from the unwanted mails in his inbox of the mail account which is develop using the machine learning algorithm and which also contain the filter.In this we c...
Steganography Techniques Used To Hide the Information
Steganography is a technique for hiding data behind the file such as image, audio, video etc. and that data securely transfer from sender to receiver. It serves as a better way of securing message than cryptography which...