scholarly journals CPK Public Key and Its Basic Functions

OALib ◽  
2022 ◽  
Vol 09 (01) ◽  
pp. 1-12
Author(s):  
Xianghao Nan
Keyword(s):  
Author(s):  
D.S. Rakisheva ◽  
◽  
B.G. Mukanova ◽  
I.N. Modin ◽  
◽  
...  

Numerical modeling of the problem of dam monitoring by the Electrical Resistivity Tomography method is carried out. The mathematical model is based on integral equations with a partial Fourier transform with respect to one spatial variable. It is assumed that the measurement line is located across the dam longitude. To approximate the shape of the dam surface, the Radial Basic Functions method is applied. The influence of locations of the water-dam, dam-basement, basement-leakage boundaries with respect to the sounding installation, which is partially placed under the headwater, is studied. Numerical modeling is carried out for the following varied parameters: 1) water level at the headwater; 2) the height of the leak; 3) the depth of the leak; 4) position of the supply electrode; 5) water level and leaks positions are changing simultaneously. Modeling results are presented in the form of apparent resistivity curves, as it is customary in geophysical practice.


Informatica ◽  
2012 ◽  
Vol 23 (4) ◽  
pp. 537-562 ◽  
Author(s):  
Ting-Yi Chang ◽  
Min-Shiang Hwang ◽  
Wei-Pang Yang

Author(s):  
Yasuhiko IKEMATSU ◽  
Dung Hoang DUONG ◽  
Albrecht PETZOLDT ◽  
Tsuyoshi TAKAGI

Author(s):  
Ai ISHIDA ◽  
Keita EMURA ◽  
Goichiro HANAOKA ◽  
Yusuke SAKAI ◽  
Keisuke TANAKA

Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


Sign in / Sign up

Export Citation Format

Share Document