Community Profile

photo

Michael Chan


62 total contributions since 2009

I was a Security Specialist for software security and cryptology [2006 to 2008]. Following, I joined a firm under a statutory board involving in National Security Frameworks as a Senior Consultant [2009].

I would like very much to meet altrulistic, courageous, purposive, perspicacious people who are seeking to work on a noble cause. It is a very nourishing experience to share life lessons with compassionate, passionate people who are relentlessly seeking discoveries and growth.

Professional profile:
http://linkd.in/MichaelElijah

My Teachers:
[1] http://bit.ly/ProfessorDavidAkopian
[2] http://bit.ly/ProfessorSosAgaian
[3] http://bit.ly/ProfessorArtyomGrigoryan
[4] http://bit.ly/ProfessorErMengHwa
[5] http://nanyang.academia.edu/DanielTan

[6] http://bit.ly/ProfessorRuanJianhua
[7] http://bit.ly/ProfessorFredHudson
[8] http://bit.ly/ProfessorByeongKilLee
[9] http://bit.ly/ProfessorJinYufang
[10] http://bit.ly/ProfessorFengYusheng

Contact

Contributions in
View by

Submitted


Remapping Data From 1 Given Range to Another Given Range
Remap data from a given range to a different stated range.

1 year ago | 4 downloads |

Thumbnail

Submitted


Figlet Statement Generator
Demonstrate how to create figlet statements from font templates.

2 years ago | 0 downloads |

Thumbnail

Submitted


Big Integer Arithmetic
Demonstrate big integer arithmetic, such as multiplication, addition, subtraction, etc.

2 years ago | 1 downloads |

Thumbnail

Submitted


Serial Downloader
To demonstrate how to create sniffer to scan for (published or hidden) files on a server.

2 years ago | 2 downloads |

Thumbnail

Submitted


Linear congruential random number generator
Demonstrate the principal idea of getting random bits

2 years ago | 17 downloads |

Thumbnail

Submitted


Modular Exponentiation
y = x^e mod n

2 years ago | 4 downloads |

Thumbnail

Submitted


Convert Image To And From Graph Coordinates
Illustrates mapping of binary image to graph coordinates and vice-versa.

2 years ago | 6 downloads |

Thumbnail

Submitted


Using Gauss' Algorithm to solve simultaneous linear congruences for Chinese Remainder Theorem
Gauss' Algorithm to solve for Chinese Remainder Theorem (CRT)

2 years ago | 1 downloads |

Thumbnail

Submitted


Simple Object Creation in Matlab Object Oriented Programming (OOP)
The objective is to provide a simple sample code to illustrate OOP in Matlab.

4 years ago | 1 downloads |

Thumbnail

Submitted


Image Description Notes (with LSB encoding)
The objective is to illustrate how certain reference may be made to a given image.

4 years ago | 19 downloads |

Thumbnail

Submitted


Embedding/ Hiding Image Within Image (with LSB encoding)
The objective is to illustrate how an image may be embedded or hidden within another given image.

4 years ago | 27 downloads |

Thumbnail

Submitted


Wavelet Decomposition For Images
The demo decouples the wavelet operations from the plotting.

4 years ago | 38 downloads |

Thumbnail

Submitted


Perspective Control/ Correction
The objective is to give a simple demonstration on perspective control using 4 corners of a plane.

5 years ago | 35 downloads |

Thumbnail

Submitted


Coordinates Scanning
The objective is to demonstrate some coordinates tracing tools.

5 years ago | 1 downloads |

Thumbnail

Submitted


Help References
The objective is to illustrate how certain references may be made to the codes.

5 years ago | 1 downloads |

Thumbnail

Submitted


Byte data format bits manipulation
Demonstrate ascii character/ symbol convert to/ from byte formats of decimal, binary and hexadecimal

5 years ago | 2 downloads |

Thumbnail

Submitted


Hunt For Local Maxima, Minima, Plateau
Illustrates identification of local maxima, minima or plateau, for exit criteria for long processes.

5 years ago | 13 downloads |

Thumbnail

Submitted


Card dealing
To provide sample utilities and demonstrate card shuffling and dealing.

5 years ago | 4 downloads |

Thumbnail

Submitted


Memory Selection Coverage
Observation on partial scanning for power conservation and enhance speed performance.

5 years ago | 1 downloads |

Thumbnail

Submitted


Symbol Dealing Distributor
The utility may be used for example card dealing or similar operations.

5 years ago | 1 downloads |

Thumbnail

Submitted


Region Coloring
To provide sample usage for highlighting selected region.

5 years ago | 2 downloads |

Thumbnail

Submitted


Character/ symbol frequency distribution analaysis on vintage ciphers
Demonstrates character/ symbol frequency distribution analysis

5 years ago | 2 downloads |

Thumbnail

Responded


Re: Program to find decryption key in RSA algorithm
Hi David, I wrote a trivial example for my students sometime back, and here is the post to help people get closer to the concep...

5 years ago | 6262 views

Responded


Re: Program to find decryption key in RSA algorithm
Hi David, I wrote a trivial example for my students sometime back, and here is the post to help people get closer to the concep...

5 years ago | 6262 views

Submitted


Extended Euclidean Algorithm
Extended Euclidean algorithm is particularly useful when a and b are coprime, since x is the multip

5 years ago | 20 downloads |

Thumbnail

Submitted


IEEE 754 Precision Format
The objective is to illustrate the IEEE 754 double and single precision formats.

5 years ago | 1 downloads |

Thumbnail

Submitted


Generate Exhaustive Permutations
Illustrates generation of exhaustive permutation of symbols given the symbolic bases.

5 years ago | 2 downloads |

Thumbnail

Submitted


Line Data Extraction From Input File
The objective is to illustrate the data sieving and categorization by field identifier.

6 years ago | 2 downloads |

Thumbnail

Responded


Re: function to read email
I am unsure if matlab can read emails, but matlab can run java programs, and java can do so certainly.

6 years ago | 1884 views

Submitted


Brush Smaller Image Or Matrix Over A Larger Matrix, Select ROI with resizeable window
Illustrates how a smaller matrix may be 'brushed' against a larger one without overflowing.

6 years ago | 2 downloads |

Thumbnail

Load more