Image Processing: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=238
en-us2014 Maplesoft, A Division of Waterloo Maple Inc.Maplesoft Document SystemMon, 15 Sep 2014 04:05:23 GMTMon, 15 Sep 2014 04:05:23 GMTNew applications in the Image Processing categoryhttp://www.mapleprimes.com/images/mapleapps.gifImage Processing: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=238
Image Tools
http://www.maplesoft.com/applications/view.aspx?SID=4881&ref=Feed
This example demonstrates how to efficiently work with images in Maple. Using the embedded GUI components you can read in images, apply manipulations and edge detection to those images.<img src="/view.aspx?si=4881/imagetools.gif" alt="Image Tools" align="left"/>This example demonstrates how to efficiently work with images in Maple. Using the embedded GUI components you can read in images, apply manipulations and edge detection to those images.4881Tue, 06 May 2008 00:00:00 ZMaplesoftMaplesoftMaple Tools for Preliminary Cryptanalysis
http://www.maplesoft.com/applications/view.aspx?SID=4498&ref=Feed
Constantly rising amounts of sensitive data transmitted between computers over the Internet generates the need for cryptography in private sectors. Consequently, many researchers frequently and easily propose new cryptographic systems, advertised as unbreakable. Unfortunately, in many cases proposed systems without the suitable cooperation of cryptographers and cryptoanalysts are designed. It follows from the fact that a cryptanalyst is typically considered (generally unfairly) to be a peeper of the private sector, who only does the industrial and commercial espionage. It is evident that a friendly cryptanalyst can play a useful and etihcal role by discovering ususpected impuissance of a cipher. Therefore, any cryptographer ought either to interact with a tried and trusted cryptanalyst, or use his own cryptographic tools in order to accurately examine the files, representing a plaintext, a cryptographic key and a cryptogram, respectively. But cryptanalysis is the prerogative of governments, cryptanalysts mostly work behind closed doors, and it is difficult to chum with a clever person doing such a secret research. So, generally a cryptographer should verify by himself if and in which extent the statistical properties of a plaintext and of a secret key are transferred to the cryptogram, evaluate the cryptogram's susceptibility to compression and also perform other statistical tests. In order to start his job he ought to apply the tools for preliminary cryptanalysis. As one can expect, many versions of such tools may be constructed using Maple. Then, an example of tools for doing preliminary cryptanalysis in this contribution has been presented. Besides, the way of performing preliminary cryptanalysis of a class of quasigroup synchronous stream ciphers, using presented tools, has also been demonstrated.<img src="/view.aspx?si=4498//applications/images/app_image_blank_lg.jpg" alt="Maple Tools for Preliminary Cryptanalysis" align="left"/>Constantly rising amounts of sensitive data transmitted between computers over the Internet generates the need for cryptography in private sectors. Consequently, many researchers frequently and easily propose new cryptographic systems, advertised as unbreakable. Unfortunately, in many cases proposed systems without the suitable cooperation of cryptographers and cryptoanalysts are designed. It follows from the fact that a cryptanalyst is typically considered (generally unfairly) to be a peeper of the private sector, who only does the industrial and commercial espionage. It is evident that a friendly cryptanalyst can play a useful and etihcal role by discovering ususpected impuissance of a cipher. Therefore, any cryptographer ought either to interact with a tried and trusted cryptanalyst, or use his own cryptographic tools in order to accurately examine the files, representing a plaintext, a cryptographic key and a cryptogram, respectively. But cryptanalysis is the prerogative of governments, cryptanalysts mostly work behind closed doors, and it is difficult to chum with a clever person doing such a secret research. So, generally a cryptographer should verify by himself if and in which extent the statistical properties of a plaintext and of a secret key are transferred to the cryptogram, evaluate the cryptogram's susceptibility to compression and also perform other statistical tests. In order to start his job he ought to apply the tools for preliminary cryptanalysis. As one can expect, many versions of such tools may be constructed using Maple. Then, an example of tools for doing preliminary cryptanalysis in this contribution has been presented. Besides, the way of performing preliminary cryptanalysis of a class of quasigroup synchronous stream ciphers, using presented tools, has also been demonstrated.4498Mon, 05 Apr 2004 14:14:40 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyFFT with the DiscreteTransforms Package
http://www.maplesoft.com/applications/view.aspx?SID=1392&ref=Feed
The new DiscreteTransforms package in Maple 9 provides routines for Fast Fourier Transforms that are many times faster and more flexible than the older FFT routines of previous releases. In this demonstration, we use the DiscreteTransforms and ArrayTools packages to analyze a .wav sound file ( the Windows "Ding" ) , alter the signal, and write out a new sound file.<img src="/view.aspx?si=1392/1183.gif" alt="FFT with the DiscreteTransforms Package" align="left"/>The new DiscreteTransforms package in Maple 9 provides routines for Fast Fourier Transforms that are many times faster and more flexible than the older FFT routines of previous releases. In this demonstration, we use the DiscreteTransforms and ArrayTools packages to analyze a .wav sound file ( the Windows "Ding" ) , alter the signal, and write out a new sound file.1392Thu, 15 May 2003 14:12:48 ZMaplesoftMaplesoftRecognition of Leaves and General 2-D Objects
http://www.maplesoft.com/applications/view.aspx?SID=4295&ref=Feed
The shape of a complicated 2D object can be approximated by a polygon consisting of a finite number of line segments. We use Maple to compute a polygon fit to a scanned image of a maple leaf (in DXF) using a Fourier series technique.<img src="/view.aspx?si=4295/leaf.gif" alt="Recognition of Leaves and General 2-D Objects" align="left"/>The shape of a complicated 2D object can be approximated by a polygon consisting of a finite number of line segments. We use Maple to compute a polygon fit to a scanned image of a maple leaf (in DXF) using a Fourier series technique.4295Wed, 14 Aug 2002 12:00:12 ZStanislav BartonStanislav BartonReconstruction of 2-D Images and CAT Scans
http://www.maplesoft.com/applications/view.aspx?SID=4273&ref=Feed
This is a Maple application centered around the article "How to resurrect a cat from its grin" that appeared in the Mathematical Recreations" section of Scientific American (Sept. 1990).<img src="/view.aspx?si=4273/cat.gif" alt="Reconstruction of 2-D Images and CAT Scans" align="left"/>This is a Maple application centered around the article "How to resurrect a cat from its grin" that appeared in the Mathematical Recreations" section of Scientific American (Sept. 1990).4273Mon, 13 May 2002 11:54:43 ZBruno GuerrieriBruno Guerrieri