Profile cover photo
Profile photo
Chris Luk
34 followers
34 followers
About
Chris's posts

Post has attachment
Sample Plots
... Powered by Cincopa Video Hosting for Business solution.

Post has attachment
Bill Nye vs Ken Ham Debate Response
I’ve recently seen and heard a lot about the creationist vs evolutionist debate that Bill Nye the science guy had yesterday and wanted to address some points. Disclaimer: I’m not arguing for either side I just want to make sure everyone is talking the same ...

Post has attachment
How to Fix No Signal to Monitor
Sometimes when using an old computer the monitor won't connect to the tower. To resolve this follow these simple steps. Check the Power Cable and make sure its firmly connected Check the Monitor Cable and make sure its firmly connected If the above is true ...

Post has attachment
KP Fundamentals
Overview of Kelvin Probe Method Background Kelvin method invented by Lord Kelvin over a century ago Work Function - energy required to remove an electron from material  indicates surface conditions such as absorbed, evaporated layers, surface reconstruction...

Post has attachment
Kelvin Probe Research ToC
Table of Contents KP Fundamentals

Post has attachment
Battery History
The following are notes on battery history History of Batteries 2000 years ago Baghdad battery created in Mesopotamia  Jar of ceramics created with a speculated structure of copper with walls of iron if filled with unknown composition of electrolytes meets ...

Post has attachment
Notes - The ElGamal Public Key Cryptosystem
The following are notes from Introduction to Cyrptography with Coding Theory. ElGamal Public Key Cryptosystem Alice wants to send a message m to Bob Bob chooses a large prime p and a primitive root α Bob chooses a secret integer a and computes B ≡ α a  (mod...

Post has attachment
Notes - Discrete Logarithms
The following are notes from Introduction to Cyrptography with Coding Theory. RSA Algorithm relies on the difficulty of factoring, but we can also use the difficulty of discrete logs Fix a prime p. Let α and Β be nonzero integers mod p and suppose Β ≡ α x (...

Post has attachment
Notes - An Application to Treaty Verification
The following are notes from Introduction to Cyrptography with Coding Theory. This method will essentially describe the RSA signature Scheme Example Countries A and B have signed a nuclear test ban treaty Country A wants to verify the treaty by placing sens...

Post has attachment
Notes - The RSA Algorithm
The following are notes from Introduction to Cryptography with Coding Theory. Public Key Cryptosystem Presented by Diffie-Hellman Goal - allow Alice to send a message to Bob without previous contact and without the use of a courier to exchange a key but pro...
Wait while more posts are being loaded