Narrow your search
Listing 1 - 2 of 2
Sort by

Book
Numerical Modeling in Civil and Mining Geotechnical Engineering
Author:
ISBN: 3036554424 3036554416 Year: 2022 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Special Issue (SI) collects fourteen articles published by leading scholars of numerical modeling in civil and mining geotechnical engineering. There is a good balance in the number of published articles, with seven in civil engineering and seven in mining engineering. The software used in the numerical modeling of these article varies from numerical codes based on continuum mechanics to those based on distinct element methods or mesh-free methods. The studied materials vary from rock, soil, and backfill to tailings. The investigations vary from mechanical behavior to hydraulic and thermal responses of infrastructures varying from pile foundations to tailings dams and underground openings. The SI thus collected a diversity of articles, reflecting the state-of-the-art of numerical modeling applied in civil and mining geotechnical engineering.

Keywords

Technology: general issues --- History of engineering & technology --- near-surface thick deposit --- surface subsidence --- numerical simulation --- unmanned aerial survey --- accurate model --- railway ballast fouling --- ballast degradation --- micro-mechanical parameters --- shear strength --- large diameter bored pile --- hyperparameters --- supervised machine learning --- finite element method --- parametric study --- load transfer --- failure mechanism --- geothermal heat exchangers --- permafrost --- thaw settlement --- sustainability --- embedded beam elements --- finite element --- mesh sensitivity --- soil-structure interaction --- deep foundation --- 3D modelling --- fluid fine tailings --- dewatering --- modelling --- seasonal weathering --- freeze–thaw --- evaporation --- mining backfill --- compressibility --- constitutive models --- numerical modeling --- plasticity --- critical state soil model --- modified Cam Clay model --- model normalization --- precomputation --- incompatibility --- rock --- plastic deformation --- goaf-side entry --- stability of surrounding rock --- pillar size optimization --- confined water --- paste filling mining --- filling step --- advancing distance --- floor failure --- tailings dam --- impacting force --- kinetic energy --- smoothed particle hydrodynamics (SPH) --- 3D nonlinear yield criterion --- elastoplastic model --- circular opening --- backfill --- FLAC3D --- pore water pressure --- hydraulic conductivity --- alternative method --- numerical analyses --- unsaturated soil --- n/a --- freeze-thaw


Book
The Mathematics of Secrets : Cryptography from Caesar Ciphers to Digital Encryption
Author:
ISBN: 0691184550 Year: 2018 Publisher: Princeton, NJ : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.

Keywords

Cryptography --- Ciphers. --- Computer security. --- Mathematics. --- Adaptive chosen-ciphertext attack. --- Advanced Encryption Standard. --- Affine cipher. --- Alice and Bob. --- Autokey cipher. --- Block cipher mode of operation. --- Block cipher. --- Block size (cryptography). --- Brute-force attack. --- Brute-force search. --- Caesar cipher. --- Calculation. --- Chosen-ciphertext attack. --- Chosen-plaintext attack. --- Cipher. --- Ciphertext-only attack. --- Ciphertext. --- Codebook. --- Communication Theory of Secrecy Systems. --- Computational problem. --- Confusion and diffusion. --- Correlation attack. --- Craig Gentry (computer scientist). --- Cryptanalysis. --- Cryptogram. --- Cryptographic engineering. --- Cryptographic hash function. --- Cryptography Research. --- Cryptography. --- Cryptosystem. --- Data Encryption Standard. --- Differential cryptanalysis. --- Diffie–Hellman key exchange. --- Discrete logarithm. --- Disquisitiones Arithmeticae. --- Dual EC DRBG. --- ElGamal encryption. --- Elliptic curve cryptography. --- Encryption. --- Enigma machine. --- Euler's theorem. --- Fast Software Encryption. --- Feistel cipher. --- Fermat's little theorem. --- Forward secrecy. --- Grover's algorithm. --- Hill cipher. --- Homomorphic encryption. --- Hyperelliptic curve cryptography. --- Information theory. --- Initialization vector. --- International Association for Cryptologic Research. --- Kerckhoffs's principle. --- Key (cryptography). --- Key schedule. --- Key size. --- Keystream. --- Known-plaintext attack. --- Lattice problem. --- Linear cryptanalysis. --- Logjam (computer security). --- Mathematical problem. --- Mathematician. --- Mental poker. --- Merkle's Puzzles. --- Monte Carlo algorithm. --- Multiple encryption. --- NSA Suite B Cryptography. --- Nonlinear feedback shift register. --- Number theory. --- Padding (cryptography). --- Permutation box. --- Permutation. --- Plaintext. --- Polyalphabetic cipher. --- Post-quantum cryptography. --- Precomputation. --- Probabilistic encryption. --- Product cipher. --- Public-key cryptography. --- Quantum algorithm. --- Quantum cryptography. --- Quantum key distribution. --- RSA (cryptosystem). --- RSA problem. --- Related-key attack. --- S-box. --- Security level. --- Shor's algorithm. --- Sign (mathematics). --- Spyware. --- Stream cipher. --- Substitution cipher. --- Symmetric-key algorithm. --- Transposition cipher. --- VIC cipher. --- Variable (computer science). --- Vigenère cipher. --- Vulnerability (computing).

Listing 1 - 2 of 2
Sort by