|
|
(One intermediate revision by the same user not shown) |
Line 1: |
Line 1: |
− | ===Executive Summary===
| |
| | | |
− |
| |
− | ==Introduction==
| |
− |
| |
− |
| |
− | ===Background===
| |
− | ====The Case====
| |
− |
| |
− |
| |
− | ====The Code====
| |
− |
| |
− | ====Previous Studies====
| |
− |
| |
− | ===Project Objectives===
| |
− |
| |
− |
| |
− | ==Project Breakdown and Requirements==
| |
− | ===Project Breakdown Overview===
| |
− |
| |
− |
| |
− |
| |
− | ===Technical Designs and Requirements===
| |
− |
| |
− |
| |
− | ==Work Completed to Date==
| |
− |
| |
− |
| |
− |
| |
− |
| |
− |
| |
− | ==Work for Remainder of Project==
| |
− |
| |
− |
| |
− | ===Project Deliverables and Closeout===
| |
− |
| |
− |
| |
− | ==Project Management==
| |
− | ===Project Schedule===
| |
− | ====Gantt Chart====
| |
− |
| |
− |
| |
− |
| |
− | ===Budget===
| |
− |
| |
− |
| |
− | ===Risk Management===
| |
− | ====Project Risk Management====
| |
− |
| |
− | ====Occupational Health and Safety Risk Management====
| |
− |
| |
− |
| |
− |
| |
− | ==Summary==
| |
− |
| |
− |
| |
− | ==References==
| |
− | <references/>
| |
− |
| |
− | ==See also==
| |
− | * [[Cipher Cracking]] (main page)
| |
− | * [[Cipher Cracking 2013]]
| |
− | * [[Cipher Cross-off List]]
| |
− | * [[Timeline of the Taman Shud Case]]
| |
− | * [[List of people connected to the Taman Shud Case]]
| |
− | * [[List of facts on the Taman Shud Case that are often misreported]]
| |
− | * [[List of facts we do know about the Somerton Man]]
| |
− | * [[The Taman Shud Case Coronial Inquest]]
| |
− | * [[Primary source material on the Taman Shud Case]]
| |
− | * [[Secondary source material on the Taman Shud Case]]
| |
− |
| |
− |
| |
− | == References and useful resources==
| |
− | * [http://en.wikipedia.org/wiki/Taman_Shud_Case The taman shud case]
| |
− | * [http://www.library.cornell.edu/colldev/mideast/okhym.htm Edward Fitzgerald's translation of رباعیات عمر خیام by عمر خیام]
| |
− | * [http://ebooks.adelaide.edu.au/ Adelaide Uni Library e-book collection]
| |
− | * [http://www.gutenberg.org/wiki/Main_Page Project Gutenburg e-books]
| |
− | * [http://onlinebooks.library.upenn.edu/archives.html#foreign Foreign language e-books]
| |
− | * [http://www.ohchr.org/EN/UDHR/Pages/Introduction.aspx UN Declaration of Human Rights - different languages]
| |
− | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/tamanshud/SSC_mckay1999.pdf Statistical debunking of the 'Bible code']
| |
− | * [http://enc.slider.com/Enc/OneTimePads One time pads]
| |
− | * [http://www.fbi.gov/hq/lab/fsc/backissu/jan2000/olson.htm Analysis of criminal codes and ciphers]
| |
− | * [http://www.fbi.gov/hq/lab/fsc/backissu/april2006/research/2006_04_research01.htm Code breaking in law enforcement: A 400-year history]
| |
− | * [http://portal.acm.org/citation.cfm?id=1389095.1389425 Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems]
| |
− |
| |
− | ==Back==
| |
− | *[https://myuni.adelaide.edu.au/webapps/portal/frameset.jsp Back to MyUni]
| |
− | *[http://www.eleceng.adelaide.edu.au/personal/dabbott Back to Derek Abbott's homepage]
| |
− | *[http://www.eleceng.adelaide.edu.au Back to EEE Department page]
| |
− | *[http://www.adelaide.edu.au Back to the University of Adelaide homepage]
| |