Maple Programming: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=211
en-us2016 Maplesoft, A Division of Waterloo Maple Inc.Maplesoft Document SystemThu, 08 Dec 2016 02:03:45 GMTThu, 08 Dec 2016 02:03:45 GMTNew applications in the Maple Programming categoryhttp://www.mapleprimes.com/images/mapleapps.gifMaple Programming: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=211
Aplicativo de Ecuaciones en primer orden
http://www.maplesoft.com/applications/view.aspx?SID=154139&ref=Feed
With this application you can develop your equations without the need to worry about the difficult calculation. Save calculation time and you will increase the time in interpreting the results. It was developed in Maple 2016 and can be executed in maple player.
In Spanish.<img src="/view.aspx?si=154139/appec.png" alt="Aplicativo de Ecuaciones en primer orden" align="left"/>With this application you can develop your equations without the need to worry about the difficult calculation. Save calculation time and you will increase the time in interpreting the results. It was developed in Maple 2016 and can be executed in maple player.
In Spanish.154139Sun, 07 Aug 2016 04:00:00 ZProf. Lenin Araujo CastilloProf. Lenin Araujo CastilloCryptographic Protection of E-Mail Attachment with Filename Extensions `txt`, `doc`, `docx`, `rtf` or `mw` Using the Secret Key of Length 1980 Bits
http://www.maplesoft.com/applications/view.aspx?SID=154109&ref=Feed
This worksheet contains an easy-to-use applications for encrypting and decrypting email attachments to ensure the security of confidential information. It can be used with Word, text, RTF, and Maple documents. The key space used by the algorithms is huge (1980 bits), therefore, the encrypted contents of the file is in practice unbreakable.<img src="/view.aspx?si=154109/tk1980b64.jpg" alt="Cryptographic Protection of E-Mail Attachment with Filename Extensions `txt`, `doc`, `docx`, `rtf` or `mw` Using the Secret Key of Length 1980 Bits" align="left"/>This worksheet contains an easy-to-use applications for encrypting and decrypting email attachments to ensure the security of confidential information. It can be used with Word, text, RTF, and Maple documents. The key space used by the algorithms is huge (1980 bits), therefore, the encrypted contents of the file is in practice unbreakable.154109Mon, 23 May 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyStatically Indeterminate Structure
http://www.maplesoft.com/applications/view.aspx?SID=153940&ref=Feed
The application allows you to determine the constraint reactions, build diagrams of the normal forces N, shear forces Q and bending moments M for beams and frames with any number of sections and degree of static indefinability.
The application calculates the deformation (displacements) of the structure in millimeters and displays the displacements of nodes in the horizontal and vertical. It is also possible to calculate the displacement of any point of the structure.<img src="/view.aspx?si=153940/391e24e981ea8d11454375def604a185.gif" alt="Statically Indeterminate Structure" align="left"/>The application allows you to determine the constraint reactions, build diagrams of the normal forces N, shear forces Q and bending moments M for beams and frames with any number of sections and degree of static indefinability.
The application calculates the deformation (displacements) of the structure in millimeters and displays the displacements of nodes in the horizontal and vertical. It is also possible to calculate the displacement of any point of the structure.153940Wed, 09 Mar 2016 05:00:00 ZDr. Aleksey ShirkoDr. Aleksey ShirkoByte Frequency Analyzer
http://www.maplesoft.com/applications/view.aspx?SID=153920&ref=Feed
In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.<img src="/view.aspx?si=153920/bytefreq.png" alt="Byte Frequency Analyzer" align="left"/>In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.153920Thu, 12 Nov 2015 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnySending Emails from the Maple Command Line
http://www.maplesoft.com/applications/view.aspx?SID=153912&ref=Feed
You can send emails from the Maple command line via Mailgun (http://mailgun.com) a free email delivery service with an web-based API. The code in this application communicates with this API to send an email; you'll need to replace certain parts with details from your own Mailgun account.<img src="/applications/images/app_image_blank_lg.jpg" alt="Sending Emails from the Maple Command Line" align="left"/>You can send emails from the Maple command line via Mailgun (http://mailgun.com) a free email delivery service with an web-based API. The code in this application communicates with this API to send an email; you'll need to replace certain parts with details from your own Mailgun account.153912Fri, 30 Oct 2015 04:00:00 ZSamir KhanSamir KhanThe SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions
http://www.maplesoft.com/applications/view.aspx?SID=153903&ref=Feed
The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.<img src="/view.aspx?si=153903/keccak.jpg" alt="The SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions" align="left"/>The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.153903Fri, 16 Oct 2015 04:00:00 ZJosé Luis Gómez PardoJosé Luis Gómez PardoMaple Implementation of the Secure Transport Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153863&ref=Feed
An easy-to-use interactive Maple implementation of transport encryption scheme has been presented. It allows to encrypt any file with arbitrary extension stored in the used computer system and in portable memory devices. The encrypted file may contain all 7-bit characters. Therefore, the encrypted file can be securely transmitted over the internet as an e-mail enclosure. The application encrypts also the name of the plaintext file: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. On encryption/decryption in the GUI Text Area the user will see an exhaustive information about the performed task. On decryption, the encrypted file is removed. The presented applications sm128b.mw must have permission to save and remove the processed files. It is worth to know that the secret key in the application is embedded. Thus, any user can embed his own secret key in the application in many ways.<img src="/view.aspx?si=153863/transport.png" alt="Maple Implementation of the Secure Transport Encryption Scheme" align="left"/>An easy-to-use interactive Maple implementation of transport encryption scheme has been presented. It allows to encrypt any file with arbitrary extension stored in the used computer system and in portable memory devices. The encrypted file may contain all 7-bit characters. Therefore, the encrypted file can be securely transmitted over the internet as an e-mail enclosure. The application encrypts also the name of the plaintext file: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. On encryption/decryption in the GUI Text Area the user will see an exhaustive information about the performed task. On decryption, the encrypted file is removed. The presented applications sm128b.mw must have permission to save and remove the processed files. It is worth to know that the secret key in the application is embedded. Thus, any user can embed his own secret key in the application in many ways.153863Wed, 09 Sep 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encryption Scheme Using the Secret Key of Length 479 Bits
http://www.maplesoft.com/applications/view.aspx?SID=153841&ref=Feed
An easy-to-use Maple implementation of transport encryption has been presented. It allows encrypting any file with arbitrary extension stored in the used computer system. The encrypted file contains space, alphabetic and decimal digit characters and the following special characters !#$%&'()*+,-./:;<=>?@[]^_`{|}~. These 93 printable characters can be defined by the set {32, 33, 35, seq(i, i=36 .. 91), seq(i, i=93 .. 126)} of byte values. Therefore, the encrypted file can be not only securely transmitted over the internet as an e-mail enclosure, but also protected effectively against unauthorized access. The application encrypts the name of the plaintext file as well: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. The size of the encrypted file is about 22.3% greater than the size of the plaintext file. On encryption/decryption in the GUI Text Area the user will see exhaustive information about the performed task. On decryption, the encrypted file is removed. It is worth knowing that the secret key in the application is embedded. Thus, any user can install his own secret key in the application in many ways. For example, he can change the value of the variable skc and the value of the variable seed in the procedures fne and fnd. The presented applications fed479k.mw must have permission to save and to remove the processed files. For security reason the application worksheet fed479k.mw ought to be stored in the meticulously watched over pen drive.<img src="/view.aspx?si=153841/im.jpg" alt="Maple Implementation of Transport Encryption Scheme Using the Secret Key of Length 479 Bits" align="left"/>An easy-to-use Maple implementation of transport encryption has been presented. It allows encrypting any file with arbitrary extension stored in the used computer system. The encrypted file contains space, alphabetic and decimal digit characters and the following special characters !#$%&'()*+,-./:;<=>?@[]^_`{|}~. These 93 printable characters can be defined by the set {32, 33, 35, seq(i, i=36 .. 91), seq(i, i=93 .. 126)} of byte values. Therefore, the encrypted file can be not only securely transmitted over the internet as an e-mail enclosure, but also protected effectively against unauthorized access. The application encrypts the name of the plaintext file as well: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. The size of the encrypted file is about 22.3% greater than the size of the plaintext file. On encryption/decryption in the GUI Text Area the user will see exhaustive information about the performed task. On decryption, the encrypted file is removed. It is worth knowing that the secret key in the application is embedded. Thus, any user can install his own secret key in the application in many ways. For example, he can change the value of the variable skc and the value of the variable seed in the procedures fne and fnd. The presented applications fed479k.mw must have permission to save and to remove the processed files. For security reason the application worksheet fed479k.mw ought to be stored in the meticulously watched over pen drive.153841Thu, 13 Aug 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encoding Scheme Using the Base Value Equal to 93
http://www.maplesoft.com/applications/view.aspx?SID=153817&ref=Feed
In the `RFC 4648` document (http://www.rfc-base.org/rfc-4648.html) the commonly used base 64, base 32, and base 16 encoding schemes are decribed. The output file, encoded according to this document, is about 33%, 60% and 100% greater than the input file, respectively. The presented application uses the base value equal to 93, and now the encoded file is only about 22% greater than the input file. The application must have a permission to save and to remove the files processed. It is easy to use - the reader is informed which tasks are being performed for any selected option, namely, he will know the input file size and name, the output file size and name, the encoding/decoding rates.In the `RFC 4648` document (http://www.rfc-base.org/rfc-4648.html) the commonly used base 64, base 32, and base 16 encoding schemes are decribed. The output file, encoded according to this document, is about 33%, 60% and 100% greater than the input file, respectively. The presented application uses the base value equal to 93, and now the encoded file is only about 22% greater than the input file. The application must have a permission to save and to remove the files processed. It is easy to use - the reader is informed which tasks are being performed for any selected option, namely, he will know the input file size and name, the output file size and name, the encoding/decoding rates.153817Thu, 25 Jun 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyComputational Performance with evalhf and Compile: A Newton Fractal Case Study
http://www.maplesoft.com/applications/view.aspx?SID=153683&ref=Feed
<p>This Tips and Techniques article focuses on the relative performance of Maple's various modes for floating-point computations. The example used here is the computation of a particular Newton fractal, which is easily parallelizable. We compute an image representation for this fractal under several computational modes, using both serial and multithreaded computation schemes.</p>
<p>This article is a follow up to a previous Tips and Techniques, <a href="http://www.maplesoft.com/applications/view.aspx?SID=153645">evalhf, Compile, hfloat and all that</a>, which discusses functionality differences amongst Maple's the different floating-point computation modes available in Maple.</p><img src="/view.aspx?si=153683/thumb.jpg" alt="Computational Performance with evalhf and Compile: A Newton Fractal Case Study" align="left"/><p>This Tips and Techniques article focuses on the relative performance of Maple's various modes for floating-point computations. The example used here is the computation of a particular Newton fractal, which is easily parallelizable. We compute an image representation for this fractal under several computational modes, using both serial and multithreaded computation schemes.</p>
<p>This article is a follow up to a previous Tips and Techniques, <a href="http://www.maplesoft.com/applications/view.aspx?SID=153645">evalhf, Compile, hfloat and all that</a>, which discusses functionality differences amongst Maple's the different floating-point computation modes available in Maple.</p>153683Fri, 26 Sep 2014 04:00:00 ZDave LinderDave LinderGenerating random numbers efficiently
http://www.maplesoft.com/applications/view.aspx?SID=153662&ref=Feed
Generating (pseudo-)random values is a frequent task in simulations and other programs. For some situations, you want to generate some combinatorial or algebraic values, such as a list or a polynomial; in other situations, you need random numbers, from a distribution that is uniform or more complicated. In this article I'll talk about all of these situations.<img src="/view.aspx?si=153662/thumb.jpg" alt="Generating random numbers efficiently" align="left"/>Generating (pseudo-)random values is a frequent task in simulations and other programs. For some situations, you want to generate some combinatorial or algebraic values, such as a list or a polynomial; in other situations, you need random numbers, from a distribution that is uniform or more complicated. In this article I'll talk about all of these situations.153662Mon, 18 Aug 2014 04:00:00 ZDr. Erik PostmaDr. Erik Postmaevalhf, Compile, hfloat and all that
http://www.maplesoft.com/applications/view.aspx?SID=153645&ref=Feed
Users sometimes ask how to make their floating-point (numeric) computations perform faster in Maple. The answers often include references to special terms such as evalhf, the Compiler, and option hfloat. A difficulty for the non-expert lies in knowing which of these can be used, and when. This Tips and Techniques attempts to clear up some of the mystery of these terms, by discussion and functionality comparison.<img src="/applications/images/app_image_blank_lg.jpg" alt="evalhf, Compile, hfloat and all that" align="left"/>Users sometimes ask how to make their floating-point (numeric) computations perform faster in Maple. The answers often include references to special terms such as evalhf, the Compiler, and option hfloat. A difficulty for the non-expert lies in knowing which of these can be used, and when. This Tips and Techniques attempts to clear up some of the mystery of these terms, by discussion and functionality comparison.153645Tue, 22 Jul 2014 04:00:00 ZDave LinderDave LinderElGamal E-mail Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153538&ref=Feed
<p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p><img src="/view.aspx?si=153538/image.PNG" alt="ElGamal E-mail Encryption Scheme" align="left"/><p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p>153538Wed, 02 Apr 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnySimon Tatham's 5 Puzzle Games
http://www.maplesoft.com/applications/view.aspx?SID=152142&ref=Feed
<p>It has been shown how to implement one-worksheet application containing six *.exe files. The files, embedded in the presented statham5mp.mw Maple worksheet, allow the Maple user to play Simon Tatham's five one-player puzzle games</p>
<p>(<a href="http://www.chiark.greenend.org.uk/~sgtatham/puzzles/">http://www.chiark.greenend.org.uk/~sgtatham/puzzles/</a>).</p>
<p>Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\games.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Simon Tatham's 5 Puzzle Games" align="left"/><p>It has been shown how to implement one-worksheet application containing six *.exe files. The files, embedded in the presented statham5mp.mw Maple worksheet, allow the Maple user to play Simon Tatham's five one-player puzzle games</p>
<p>(<a href="http://www.chiark.greenend.org.uk/~sgtatham/puzzles/">http://www.chiark.greenend.org.uk/~sgtatham/puzzles/</a>).</p>
<p>Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\games.</p>152142Tue, 24 Sep 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyHohmann Elliptic Transfer Orbit with Animation
http://www.maplesoft.com/applications/view.aspx?SID=151351&ref=Feed
<p>Abstract<br /><br />The main purpose of this article is to show how to use Hohmann elliptic transfer in two situations:<br />a- When one manned spaceship is trying to catch up with an other one <br />on the same circular orbit around Earth.<br />b- When delivering a payload from Earth to a space station on a circular <br />orbit around Earth using 2-stage rocket .<br /><br />The way we set up the problem is as follows:<br />Consider two manned spaceships with astronauts Sally & Igor , the latter<br />lagging behind Sally by a given angle = 4.5 degrees while both are on the same<br />circular orbit C2 about Earth. A 2d lower circular orbit C1 is given. <br />Find the Hohmann elliptic orbit that is tangent to both orbits which allows<br />Sally to maneuver on C1 then to get back to the circular orbit C2 alongside Igor.<br /><br />Though the math was correct , however the final result we found was not !! <br />It was somehow tricky to find the culprit!<br />We have to restate the problem to get the correct answer. <br />The animation was then set up using the correct data. <br />The animation is a good teaching help for two reasons:<br />1- it gives a 'hand on' experience for anyone who wants to fully understand it,<br />2- it is a good lesson in Maple programming with many loops of the type 'if..then'.<br /><br />Warning<br /><br />This particular animation is a hog for the CPU memory since data accumulated <br />for plotting reached 20 MB! This is the size of this article when animation is <br />executed. For this reason and to be able to upload it I left the animation <br />procedure non executed which drops the size of the article to 300KB.<br /><br />Conclusion<br /><br />If I can get someone interested in the subject of this article in such away that he or <br />she would seek further information for learning from other sources, my efforts<br />would be well rewarded.</p><img src="/view.aspx?si=151351/24030360191a26b4d767de35f843bbd8.gif" alt="Hohmann Elliptic Transfer Orbit with Animation" align="left"/><p>Abstract<br /><br />The main purpose of this article is to show how to use Hohmann elliptic transfer in two situations:<br />a- When one manned spaceship is trying to catch up with an other one <br />on the same circular orbit around Earth.<br />b- When delivering a payload from Earth to a space station on a circular <br />orbit around Earth using 2-stage rocket .<br /><br />The way we set up the problem is as follows:<br />Consider two manned spaceships with astronauts Sally & Igor , the latter<br />lagging behind Sally by a given angle = 4.5 degrees while both are on the same<br />circular orbit C2 about Earth. A 2d lower circular orbit C1 is given. <br />Find the Hohmann elliptic orbit that is tangent to both orbits which allows<br />Sally to maneuver on C1 then to get back to the circular orbit C2 alongside Igor.<br /><br />Though the math was correct , however the final result we found was not !! <br />It was somehow tricky to find the culprit!<br />We have to restate the problem to get the correct answer. <br />The animation was then set up using the correct data. <br />The animation is a good teaching help for two reasons:<br />1- it gives a 'hand on' experience for anyone who wants to fully understand it,<br />2- it is a good lesson in Maple programming with many loops of the type 'if..then'.<br /><br />Warning<br /><br />This particular animation is a hog for the CPU memory since data accumulated <br />for plotting reached 20 MB! This is the size of this article when animation is <br />executed. For this reason and to be able to upload it I left the animation <br />procedure non executed which drops the size of the article to 300KB.<br /><br />Conclusion<br /><br />If I can get someone interested in the subject of this article in such away that he or <br />she would seek further information for learning from other sources, my efforts<br />would be well rewarded.</p>151351Wed, 04 Sep 2013 04:00:00 ZDr. Ahmed BaroudyDr. Ahmed BaroudyBase 128 Encoding Scheme
http://www.maplesoft.com/applications/view.aspx?SID=147458&ref=Feed
<p>In the submission a new encoding/decoding method of files, which is not described in RFC documents, named base 128 encoding scheme, has been presented. The size of the file, encoded using the presented method, equals to 1.1428 of the size of original file, while the commonly used base 64 encoding generates encoded file having the size 33% greater than the size of original file. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="Base 128 Encoding Scheme" align="left"/><p>In the submission a new encoding/decoding method of files, which is not described in RFC documents, named base 128 encoding scheme, has been presented. The size of the file, encoded using the presented method, equals to 1.1428 of the size of original file, while the commonly used base 64 encoding generates encoded file having the size 33% greater than the size of original file. </p>147458Fri, 31 May 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyC64K366 "Keyless" File Encryption
http://www.maplesoft.com/applications/view.aspx?SID=147752&ref=Feed
<p>This maplet application fulfilling the role of the secret key uses base 64 encoding scheme non-linear transformations for encrypting or decrypting e-mailed files. The encrypted files with extension ".e64" contain only 64 characters belonging to the set of base 64 encoding scheme alphabet and 23 characters "()<>[]{}|-*^_!?@#$%&,:;". The application uses original encryption tool named C64K366. The number following the letter "C" means that any encrypted file contains only 64 characters with ASCII decimals belonging to the set {33, 35 .. 38, 40 .. 45, 47 .. 60, 62 .. 91, 93 .. 95, 97 .. 125}. K366 means that the secret key length equals to 366 bits. For proper functioning of the application, the c64k366.maplet must be saved in a location with no spaces in the path name. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="C64K366 "Keyless" File Encryption" align="left"/><p>This maplet application fulfilling the role of the secret key uses base 64 encoding scheme non-linear transformations for encrypting or decrypting e-mailed files. The encrypted files with extension ".e64" contain only 64 characters belonging to the set of base 64 encoding scheme alphabet and 23 characters "()<>[]{}|-*^_!?@#$%&,:;". The application uses original encryption tool named C64K366. The number following the letter "C" means that any encrypted file contains only 64 characters with ASCII decimals belonging to the set {33, 35 .. 38, 40 .. 45, 47 .. 60, 62 .. 91, 93 .. 95, 97 .. 125}. K366 means that the secret key length equals to 366 bits. For proper functioning of the application, the c64k366.maplet must be saved in a location with no spaces in the path name. </p>147752Mon, 27 May 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyBase 32 and Base 32 Extended Hex Encoding Schemes
http://www.maplesoft.com/applications/view.aspx?SID=147431&ref=Feed
<p>Two one-maplet applications performing base 32 and base 32 extended hex selected file encoding and decoding according to RFC 4648 are presented. The encoded file does not contain 'line breaks' control characters.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Base 32 and Base 32 Extended Hex Encoding Schemes" align="left"/><p>Two one-maplet applications performing base 32 and base 32 extended hex selected file encoding and decoding according to RFC 4648 are presented. The encoded file does not contain 'line breaks' control characters.</p>147431Tue, 21 May 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyBase 64 "Keyless" File Encryption
http://www.maplesoft.com/applications/view.aspx?SID=145918&ref=Feed
Abstract: A "keyless" cipher not using complex mathematical formulas but applying non-linear transformations of base 64 encoding scheme has been described. The word "keyless" means that the encrypting/decrypting application itself fulfills the role of the secret key and should be carefully watched and stored. Presented tool is mainly suitable for cryptographic protection of e-mail enclosures.<BR>
<P>
Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\keyless.<img src="/applications/images/app_image_blank_lg.jpg" alt="Base 64 "Keyless" File Encryption" align="left"/>Abstract: A "keyless" cipher not using complex mathematical formulas but applying non-linear transformations of base 64 encoding scheme has been described. The word "keyless" means that the encrypting/decrypting application itself fulfills the role of the secret key and should be carefully watched and stored. Presented tool is mainly suitable for cryptographic protection of e-mail enclosures.<BR>
<P>
Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\keyless.145918Mon, 15 Apr 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyCar Loan Calculator
http://www.maplesoft.com/applications/view.aspx?SID=145174&ref=Feed
<p>This loan calculator facilitates the life of a borrower. By entering the <strong>purchase price</strong>, the <strong>down payment</strong>, the <strong>number of years</strong> it takes to repay the loan, the <strong>payment frequency</strong>, the <strong>annual interest rate</strong>, and clicking on the "<strong>calculate</strong>" buttom, the calculator will give you the <strong>amount of payment</strong> for each payment period.</p>
<p> </p>
<p>Want to make a loan? Try it out and see how things change with respect to each element.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Car Loan Calculator" align="left"/><p>This loan calculator facilitates the life of a borrower. By entering the <strong>purchase price</strong>, the <strong>down payment</strong>, the <strong>number of years</strong> it takes to repay the loan, the <strong>payment frequency</strong>, the <strong>annual interest rate</strong>, and clicking on the "<strong>calculate</strong>" buttom, the calculator will give you the <strong>amount of payment</strong> for each payment period.</p>
<p> </p>
<p>Want to make a loan? Try it out and see how things change with respect to each element.</p>145174Wed, 27 Mar 2013 04:00:00 ZZinan WangZinan Wang