Czeslaw Koscielny: New Applications
http://www.maplesoft.com/applications/author.aspx?mid=16738
en-us2016 Maplesoft, A Division of Waterloo Maple Inc.Maplesoft Document SystemSun, 29 May 2016 07:37:06 GMTSun, 29 May 2016 07:37:06 GMTNew applications published by Czeslaw Koscielnyhttp://www.mapleprimes.com/images/mapleapps.gifCzeslaw Koscielny: New Applications
http://www.maplesoft.com/applications/author.aspx?mid=16738
Cryptographic Protection of E-Mail Attachment with Filename Extensions `txt`, `doc`, `docx`, `rtf` or `mw` Using the Secret Key of Length 1980 Bits
http://www.maplesoft.com/applications/view.aspx?SID=154109&ref=Feed
This worksheet contains an easy-to-use applications for encrypting and decrypting email attachments to ensure the security of confidential information. It can be used with Word, text, RTF, and Maple documents. The key space used by the algorithms is huge (1980 bits), therefore, the encrypted contents of the file is in practice unbreakable.<img src="/view.aspx?si=154109/tk1980b64.jpg" alt="Cryptographic Protection of E-Mail Attachment with Filename Extensions `txt`, `doc`, `docx`, `rtf` or `mw` Using the Secret Key of Length 1980 Bits" align="left"/>This worksheet contains an easy-to-use applications for encrypting and decrypting email attachments to ensure the security of confidential information. It can be used with Word, text, RTF, and Maple documents. The key space used by the algorithms is huge (1980 bits), therefore, the encrypted contents of the file is in practice unbreakable.154109Mon, 23 May 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyTransport Encoding/Decoding and Cryptographic Protection of Computer Storage
http://www.maplesoft.com/applications/view.aspx?SID=154088&ref=Feed
This worksheet contains two user-friendly useful applications for encrypting personal files. One is useful for encoding arbitrary binary information, such as, for example, *.exe files, encrypted messages, cryptographic keys and audio and image files, for transmission by electronic mail. The second application provides an easy mechanism for non-computer science specialists to protect confidential data stored on their computers.<img src="/view.aspx?si=154088/cspr.jpg" alt="Transport Encoding/Decoding and Cryptographic Protection of Computer Storage" align="left"/>This worksheet contains two user-friendly useful applications for encrypting personal files. One is useful for encoding arbitrary binary information, such as, for example, *.exe files, encrypted messages, cryptographic keys and audio and image files, for transmission by electronic mail. The second application provides an easy mechanism for non-computer science specialists to protect confidential data stored on their computers.154088Thu, 21 Apr 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyByte Frequency Analyzer
http://www.maplesoft.com/applications/view.aspx?SID=153920&ref=Feed
In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.<img src="/view.aspx?si=153920/bytefreq.png" alt="Byte Frequency Analyzer" align="left"/>In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.153920Thu, 12 Nov 2015 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of the Secure Transport Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153863&ref=Feed
An easy-to-use interactive Maple implementation of transport encryption scheme has been presented. It allows to encrypt any file with arbitrary extension stored in the used computer system and in portable memory devices. The encrypted file may contain all 7-bit characters. Therefore, the encrypted file can be securely transmitted over the internet as an e-mail enclosure. The application encrypts also the name of the plaintext file: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. On encryption/decryption in the GUI Text Area the user will see an exhaustive information about the performed task. On decryption, the encrypted file is removed. The presented applications sm128b.mw must have permission to save and remove the processed files. It is worth to know that the secret key in the application is embedded. Thus, any user can embed his own secret key in the application in many ways.<img src="/view.aspx?si=153863/transport.png" alt="Maple Implementation of the Secure Transport Encryption Scheme" align="left"/>An easy-to-use interactive Maple implementation of transport encryption scheme has been presented. It allows to encrypt any file with arbitrary extension stored in the used computer system and in portable memory devices. The encrypted file may contain all 7-bit characters. Therefore, the encrypted file can be securely transmitted over the internet as an e-mail enclosure. The application encrypts also the name of the plaintext file: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. On encryption/decryption in the GUI Text Area the user will see an exhaustive information about the performed task. On decryption, the encrypted file is removed. The presented applications sm128b.mw must have permission to save and remove the processed files. It is worth to know that the secret key in the application is embedded. Thus, any user can embed his own secret key in the application in many ways.153863Wed, 09 Sep 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encryption Scheme Using the Secret Key of Length 479 Bits
http://www.maplesoft.com/applications/view.aspx?SID=153841&ref=Feed
An easy-to-use Maple implementation of transport encryption has been presented. It allows encrypting any file with arbitrary extension stored in the used computer system. The encrypted file contains space, alphabetic and decimal digit characters and the following special characters !#$%&'()*+,-./:;<=>?@[]^_`{|}~. These 93 printable characters can be defined by the set {32, 33, 35, seq(i, i=36 .. 91), seq(i, i=93 .. 126)} of byte values. Therefore, the encrypted file can be not only securely transmitted over the internet as an e-mail enclosure, but also protected effectively against unauthorized access. The application encrypts the name of the plaintext file as well: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. The size of the encrypted file is about 22.3% greater than the size of the plaintext file. On encryption/decryption in the GUI Text Area the user will see exhaustive information about the performed task. On decryption, the encrypted file is removed. It is worth knowing that the secret key in the application is embedded. Thus, any user can install his own secret key in the application in many ways. For example, he can change the value of the variable skc and the value of the variable seed in the procedures fne and fnd. The presented applications fed479k.mw must have permission to save and to remove the processed files. For security reason the application worksheet fed479k.mw ought to be stored in the meticulously watched over pen drive.<img src="/view.aspx?si=153841/im.jpg" alt="Maple Implementation of Transport Encryption Scheme Using the Secret Key of Length 479 Bits" align="left"/>An easy-to-use Maple implementation of transport encryption has been presented. It allows encrypting any file with arbitrary extension stored in the used computer system. The encrypted file contains space, alphabetic and decimal digit characters and the following special characters !#$%&'()*+,-./:;<=>?@[]^_`{|}~. These 93 printable characters can be defined by the set {32, 33, 35, seq(i, i=36 .. 91), seq(i, i=93 .. 126)} of byte values. Therefore, the encrypted file can be not only securely transmitted over the internet as an e-mail enclosure, but also protected effectively against unauthorized access. The application encrypts the name of the plaintext file as well: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. The size of the encrypted file is about 22.3% greater than the size of the plaintext file. On encryption/decryption in the GUI Text Area the user will see exhaustive information about the performed task. On decryption, the encrypted file is removed. It is worth knowing that the secret key in the application is embedded. Thus, any user can install his own secret key in the application in many ways. For example, he can change the value of the variable skc and the value of the variable seed in the procedures fne and fnd. The presented applications fed479k.mw must have permission to save and to remove the processed files. For security reason the application worksheet fed479k.mw ought to be stored in the meticulously watched over pen drive.153841Thu, 13 Aug 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encoding Scheme Using the Base Value Equal to 93
http://www.maplesoft.com/applications/view.aspx?SID=153817&ref=Feed
In the `RFC 4648` document (http://www.rfc-base.org/rfc-4648.html) the commonly used base 64, base 32, and base 16 encoding schemes are decribed. The output file, encoded according to this document, is about 33%, 60% and 100% greater than the input file, respectively. The presented application uses the base value equal to 93, and now the encoded file is only about 22% greater than the input file. The application must have a permission to save and to remove the files processed. It is easy to use - the reader is informed which tasks are being performed for any selected option, namely, he will know the input file size and name, the output file size and name, the encoding/decoding rates.In the `RFC 4648` document (http://www.rfc-base.org/rfc-4648.html) the commonly used base 64, base 32, and base 16 encoding schemes are decribed. The output file, encoded according to this document, is about 33%, 60% and 100% greater than the input file, respectively. The presented application uses the base value equal to 93, and now the encoded file is only about 22% greater than the input file. The application must have a permission to save and to remove the files processed. It is easy to use - the reader is informed which tasks are being performed for any selected option, namely, he will know the input file size and name, the output file size and name, the encoding/decoding rates.153817Thu, 25 Jun 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encoding and Transport Encrypting with the Secret Key of Length 1980 bits Using John Walker's Base 64 Encoding Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153721&ref=Feed
<p>The application uses John Walker's very useful and accessible in the Internet implementation of a fast Base 64 encoding and decoding scheme. Presented worksheet allows to perform fast transport encoding and encrypting of files of an arbitrary format. The secret key in the application is embedded. It can easily be generated using the `keygen` procedure and an arbitrary `password` string. Evidently, many procedures for key generation may be implemented. The user can also himself directly construct the global variables `b2o`, `o2b`, `f2o` and `o2f` used in the encryption/decryption procedures. The code of the application in the startup code region and in the combobox `select action` is stored.</p>
<P><B>Note:</B> For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\transport.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Maple Implementation of Transport Encoding and Transport Encrypting with the Secret Key of Length 1980 bits Using John Walker's Base 64 Encoding Scheme" align="left"/><p>The application uses John Walker's very useful and accessible in the Internet implementation of a fast Base 64 encoding and decoding scheme. Presented worksheet allows to perform fast transport encoding and encrypting of files of an arbitrary format. The secret key in the application is embedded. It can easily be generated using the `keygen` procedure and an arbitrary `password` string. Evidently, many procedures for key generation may be implemented. The user can also himself directly construct the global variables `b2o`, `o2b`, `f2o` and `o2f` used in the encryption/decryption procedures. The code of the application in the startup code region and in the combobox `select action` is stored.</p>
<P><B>Note:</B> For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\transport.</p>153721Tue, 16 Dec 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyA new Approach to Transport Encryption
http://www.maplesoft.com/applications/view.aspx?SID=153715&ref=Feed
<p>Living in the global surveillance era, any internet user should himself organize the secrecy of his communication. Therefore, in the submission, it is shown how to use the base conversion as an effective cryptographic transformation because the statistical structure of the encoded file is quite different from that of the input file. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="A new Approach to Transport Encryption" align="left"/><p>Living in the global surveillance era, any internet user should himself organize the secrecy of his communication. Therefore, in the submission, it is shown how to use the base conversion as an effective cryptographic transformation because the statistical structure of the encoded file is quite different from that of the input file. </p>153715Wed, 03 Dec 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyStrong Cryptographic File Protection Using Base 32 Encoding Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153686&ref=Feed
<p>It has been shown how to implement user-friendly tool for strong cryptographic protection of e-mail enclosures.</p><img src="/view.aspx?si=153686/Patio.jpg" alt="Strong Cryptographic File Protection Using Base 32 Encoding Scheme" align="left"/><p>It has been shown how to implement user-friendly tool for strong cryptographic protection of e-mail enclosures.</p>153686Fri, 10 Oct 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyElGamal E-mail Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153538&ref=Feed
<p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p><img src="/view.aspx?si=153538/image.PNG" alt="ElGamal E-mail Encryption Scheme" align="left"/><p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p>153538Wed, 02 Apr 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyCryptographic directory protection using the byte-oriented stream-cipher of type A256K1024
http://www.maplesoft.com/applications/view.aspx?SID=153483&ref=Feed
<p>This one-worksheet user-friendly application allows to encrypt/decrypt selected by user directory, containing confidential files, by means of practically unbreakable non-redundant byte-oriented cipher of type <strong>A256K1024.</strong> The type cipher name means that the encryption process involves<strong> addition</strong> operation in <strong>GF(256)</strong> and the secret key of length <strong>1024</strong> bytes (8192 bits), which in the application is embedded. The user can replace the application key (the list <strong>K</strong> of 1024 integers in the range 0..255) by his one. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="Cryptographic directory protection using the byte-oriented stream-cipher of type A256K1024" align="left"/><p>This one-worksheet user-friendly application allows to encrypt/decrypt selected by user directory, containing confidential files, by means of practically unbreakable non-redundant byte-oriented cipher of type <strong>A256K1024.</strong> The type cipher name means that the encryption process involves<strong> addition</strong> operation in <strong>GF(256)</strong> and the secret key of length <strong>1024</strong> bytes (8192 bits), which in the application is embedded. The user can replace the application key (the list <strong>K</strong> of 1024 integers in the range 0..255) by his one. </p>153483Mon, 23 Dec 2013 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnySimon Tatham's 5 Puzzle Games
http://www.maplesoft.com/applications/view.aspx?SID=152142&ref=Feed
<p>It has been shown how to implement one-worksheet application containing six *.exe files. The files, embedded in the presented statham5mp.mw Maple worksheet, allow the Maple user to play Simon Tatham's five one-player puzzle games</p>
<p>(<a href="http://www.chiark.greenend.org.uk/~sgtatham/puzzles/">http://www.chiark.greenend.org.uk/~sgtatham/puzzles/</a>).</p>
<p>Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\games.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Simon Tatham's 5 Puzzle Games" align="left"/><p>It has been shown how to implement one-worksheet application containing six *.exe files. The files, embedded in the presented statham5mp.mw Maple worksheet, allow the Maple user to play Simon Tatham's five one-player puzzle games</p>
<p>(<a href="http://www.chiark.greenend.org.uk/~sgtatham/puzzles/">http://www.chiark.greenend.org.uk/~sgtatham/puzzles/</a>).</p>
<p>Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\games.</p>152142Tue, 24 Sep 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple `Keyless` Base b Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=149026&ref=Feed
In this submission it will be shown that the convert/base built-in function can be used to create many new tools which can encrypt or decrypt any file selected. Such a tool, named Maple "keyless` base b encryption scheme, allows to determine the admissible number of elements of the set of ASCII decimals which will be present in the encrypted file, and to choose all the elements of this set.<img src="/applications/images/app_image_blank_lg.jpg" alt="Maple `Keyless` Base b Encryption Scheme" align="left"/>In this submission it will be shown that the convert/base built-in function can be used to create many new tools which can encrypt or decrypt any file selected. Such a tool, named Maple "keyless` base b encryption scheme, allows to determine the admissible number of elements of the set of ASCII decimals which will be present in the encrypted file, and to choose all the elements of this set.149026Mon, 01 Jul 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyBase 128 Encoding Scheme
http://www.maplesoft.com/applications/view.aspx?SID=147458&ref=Feed
<p>In the submission a new encoding/decoding method of files, which is not described in RFC documents, named base 128 encoding scheme, has been presented. The size of the file, encoded using the presented method, equals to 1.1428 of the size of original file, while the commonly used base 64 encoding generates encoded file having the size 33% greater than the size of original file. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="Base 128 Encoding Scheme" align="left"/><p>In the submission a new encoding/decoding method of files, which is not described in RFC documents, named base 128 encoding scheme, has been presented. The size of the file, encoded using the presented method, equals to 1.1428 of the size of original file, while the commonly used base 64 encoding generates encoded file having the size 33% greater than the size of original file. </p>147458Fri, 31 May 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyC64K366 "Keyless" File Encryption
http://www.maplesoft.com/applications/view.aspx?SID=147752&ref=Feed
<p>This maplet application fulfilling the role of the secret key uses base 64 encoding scheme non-linear transformations for encrypting or decrypting e-mailed files. The encrypted files with extension ".e64" contain only 64 characters belonging to the set of base 64 encoding scheme alphabet and 23 characters "()<>[]{}|-*^_!?@#$%&,:;". The application uses original encryption tool named C64K366. The number following the letter "C" means that any encrypted file contains only 64 characters with ASCII decimals belonging to the set {33, 35 .. 38, 40 .. 45, 47 .. 60, 62 .. 91, 93 .. 95, 97 .. 125}. K366 means that the secret key length equals to 366 bits. For proper functioning of the application, the c64k366.maplet must be saved in a location with no spaces in the path name. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="C64K366 "Keyless" File Encryption" align="left"/><p>This maplet application fulfilling the role of the secret key uses base 64 encoding scheme non-linear transformations for encrypting or decrypting e-mailed files. The encrypted files with extension ".e64" contain only 64 characters belonging to the set of base 64 encoding scheme alphabet and 23 characters "()<>[]{}|-*^_!?@#$%&,:;". The application uses original encryption tool named C64K366. The number following the letter "C" means that any encrypted file contains only 64 characters with ASCII decimals belonging to the set {33, 35 .. 38, 40 .. 45, 47 .. 60, 62 .. 91, 93 .. 95, 97 .. 125}. K366 means that the secret key length equals to 366 bits. For proper functioning of the application, the c64k366.maplet must be saved in a location with no spaces in the path name. </p>147752Mon, 27 May 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyBase 32 and Base 32 Extended Hex Encoding Schemes
http://www.maplesoft.com/applications/view.aspx?SID=147431&ref=Feed
<p>Two one-maplet applications performing base 32 and base 32 extended hex selected file encoding and decoding according to RFC 4648 are presented. The encoded file does not contain 'line breaks' control characters.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Base 32 and Base 32 Extended Hex Encoding Schemes" align="left"/><p>Two one-maplet applications performing base 32 and base 32 extended hex selected file encoding and decoding according to RFC 4648 are presented. The encoded file does not contain 'line breaks' control characters.</p>147431Tue, 21 May 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyBase 64 "Keyless" File Encryption
http://www.maplesoft.com/applications/view.aspx?SID=145918&ref=Feed
Abstract: A "keyless" cipher not using complex mathematical formulas but applying non-linear transformations of base 64 encoding scheme has been described. The word "keyless" means that the encrypting/decrypting application itself fulfills the role of the secret key and should be carefully watched and stored. Presented tool is mainly suitable for cryptographic protection of e-mail enclosures.<BR>
<P>
Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\keyless.<img src="/applications/images/app_image_blank_lg.jpg" alt="Base 64 "Keyless" File Encryption" align="left"/>Abstract: A "keyless" cipher not using complex mathematical formulas but applying non-linear transformations of base 64 encoding scheme has been described. The word "keyless" means that the encrypting/decrypting application itself fulfills the role of the secret key and should be carefully watched and stored. Presented tool is mainly suitable for cryptographic protection of e-mail enclosures.<BR>
<P>
Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\keyless.145918Mon, 15 Apr 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyOM applications
http://www.maplesoft.com/applications/view.aspx?SID=144190&ref=Feed
It has been shown a new approach to Maple programming allowing to create so-called OM applications (OM means One-Maplet). The approach consists inusing Base64 encoding scheme for embedding files of any format in the source codeof the maplet. In the presented "Entertainment" OM application one *.jpg file and five *.exe files are embedded. For Windows only
<P>
<B>Note:</B> For proper functioning of this application, this Maplet must be saved in a location with no spaces in the path name, e.g. C:\entertainment.<img src="/applications/images/app_image_blank_lg.jpg" alt="OM applications" align="left"/>It has been shown a new approach to Maple programming allowing to create so-called OM applications (OM means One-Maplet). The approach consists inusing Base64 encoding scheme for embedding files of any format in the source codeof the maplet. In the presented "Entertainment" OM application one *.jpg file and five *.exe files are embedded. For Windows only
<P>
<B>Note:</B> For proper functioning of this application, this Maplet must be saved in a location with no spaces in the path name, e.g. C:\entertainment.144190Tue, 05 Mar 2013 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnySlide Show Maplets Generator
http://www.maplesoft.com/applications/view.aspx?SID=135501&ref=Feed
<p>Any lecturer knows that it is conveniently to store many image slide files in one slide-show maplet file. The presented application performs this task.</p><img src="/view.aspx?si=135501/m16.jpg" alt="Slide Show Maplets Generator" align="left"/><p>Any lecturer knows that it is conveniently to store many image slide files in one slide-show maplet file. The presented application performs this task.</p>135501Thu, 28 Jun 2012 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyReversible and palindromic primes
http://www.maplesoft.com/applications/view.aspx?SID=133995&ref=Feed
<p>The application allows to compute the set of all reversible n-digit <br />prime numbers, with n = 2 .. 8, sets of all palindromic n-digit primes, <br />n = 3, 5, 7 and many reversible primes with an arbitrary <br />n = 2, 3, ..., several thousands.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Reversible and palindromic primes" align="left"/><p>The application allows to compute the set of all reversible n-digit <br />prime numbers, with n = 2 .. 8, sets of all palindromic n-digit primes, <br />n = 3, 5, 7 and many reversible primes with an arbitrary <br />n = 2, 3, ..., several thousands.</p>133995Wed, 09 May 2012 04:00:00 ZAndrzej TeodorczukAndrzej Teodorczuk