Difference between revisions of "Derek's wiki test space"

From Derek
Jump to: navigation, search
 
(227 intermediate revisions by 5 users not shown)
Line 6: Line 6:
 
  |Data 1||Data 2
 
  |Data 1||Data 2
 
  |}
 
  |}
 +
 +
 +
==Comment box==
 +
{| border="1" cellpadding="5" cellspacing="0.1" style="text-align:left"
 +
|-
 +
! style="background:#efefef;" | Tip
 +
|-
 +
|Description  to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a  key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves.
 +
|}
 +
 +
 +
 +
 +
{{Infobox
 +
|style      = border:    2px
 +
|bodystyle  = width:      350px
 +
|abovestyle = background: #c8ccd1
 +
|datastyle  = text-align: left 
 +
 +
|above      = Comment box testing
 +
 +
 +
|data1      = Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a  key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves.
 +
 +
}}
 +
 +
==Symbol==
 +
__MATHJAX_NODOLLAR__
 +
I owe you 20.
 +
 +
I owe you $20
 +
 +
 +
 +
 +
 +
I owe you $20
 +
 +
==Download test==
 +
 +
* [[File: test.pdf]]
  
 
==Infoboxtest==
 
==Infoboxtest==
Line 24: Line 65:
  
 
Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know.
 
Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know.
 +
 +
I owe you $20
  
 
==More Testing==
 
==More Testing==
Line 30: Line 73:
 
* <math>\int_b^y f(\alpha\,)\,dy,{\rm not~quite,~as~referencing~is~cactus.}</math>
 
* <math>\int_b^y f(\alpha\,)\,dy,{\rm not~quite,~as~referencing~is~cactus.}</math>
 
* <math>\int_b^y f(\alpha\,)\,dy,cactii eradicated</math>
 
* <math>\int_b^y f(\alpha\,)\,dy,cactii eradicated</math>
b
+
 
  
 
According to scientists, the Sun is pretty big.<ref>E. Miller, The Sun, (New York: Academic Press, 2005), 23-5.</ref>
 
According to scientists, the Sun is pretty big.<ref>E. Miller, The Sun, (New York: Academic Press, 2005), 23-5.</ref>
Line 41: Line 84:
 
Edit: It works!!
 
Edit: It works!!
 
-->
 
-->
 +
 +
== MathJax Test ==
 +
 +
Here is an inline equation: \( x^2 \)
 +
 +
Here is a display equation:
 +
\begin{align}
 +
\int 2x \; dx &= x^2 + C \tag{1}\label{eqn:integral}
 +
\end{align}
 +
 +
That last equation was Eqn.&nbsp;\ref{eqn:integral}.
 +
 +
\( \int_a^y f(\alpha\,)\,dy , \)
 +
 +
and in display form
 +
 +
\[ \int_a^y f(\alpha\,)\,dy . \]
 +
 +
==Scratch==
 +
 +
Therefore, the minimal cost = $50 million <math>\times</math> 360 = $18,000 million = $18 billion.  The maximal cost is = $50 million <math>\times</math> 20,300 = $1,016,500 million = $1 trillion (approx).
  
 
==Scratch pad downloads==
 
==Scratch pad downloads==
 +
 +
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/RF.pdf  Avionic notes]
 +
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/avionic_exams.xlsx  Avionic exam time]
 +
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/test.ppt  test download]
 +
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/test1.ppt  test1 download]
 +
 +
===Presentations===
 +
 +
* https://www.youtube.com/watch?v=4P61D6JbgHE
 +
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/Tips.ppt  Proposal seminar slides]
 +
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/Proposal_Seminar2014.pdf  Proposal seminar slides]
 +
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/Final_Seminar2014.pdf Final seminar slides]
 +
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/video.m4v Final seminar video]
  
 
==Notes relating to Test space==
 
==Notes relating to Test space==
 
<references/>
 
<references/>

Latest revision as of 18:13, 25 February 2024

Test space

Heading 1 Heading 2
Data 1 Data 2


Comment box

Tip
Description  to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves.



Comment box testing
Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves.

Symbol

__MATHJAX_NODOLLAR__ I owe you 20.

I owe you $20



I owe you $20

Download test

Infoboxtest

Infobox testing
Code 1.jpg
Main Heading
First set of data
Remove this line (optional)

OK this is the test bed for the u-beaut infobox. What a pain to install. For the record, I followed the info at this link: http://www.etcwiki.org/wiki/Mediawiki_template_guide

Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know.

I owe you $20

More Testing

  • [math]\int_a^y f(\alpha\,)\,dy[/math]
  • [math]\int_b^y f(\alpha\,)\,dy,{\rm does~it~work?}[/math]
  • [math]\int_b^y f(\alpha\,)\,dy,{\rm not~quite,~as~referencing~is~cactus.}[/math]
  • [math]\int_b^y f(\alpha\,)\,dy,cactii eradicated[/math]


According to scientists, the Sun is pretty big.[1] The Moon, however, is not so big.[2]

Green-rectangle.gif


MathJax Test

Here is an inline equation: \( x^2 \)

Here is a display equation: \begin{align} \int 2x \; dx &= x^2 + C \tag{1}\label{eqn:integral} \end{align}

That last equation was Eqn. \ref{eqn:integral}.

\( \int_a^y f(\alpha\,)\,dy , \)

and in display form

\[ \int_a^y f(\alpha\,)\,dy . \]

Scratch

Therefore, the minimal cost = $50 million [math]\times[/math] 360 = $18,000 million = $18 billion. The maximal cost is = $50 million [math]\times[/math] 20,300 = $1,016,500 million = $1 trillion (approx).

Scratch pad downloads

Presentations

Notes relating to Test space

  1. E. Miller, The Sun, (New York: Academic Press, 2005), 23-5.
  2. R. Smith, "Size of the Moon", Scientific American, 46 (April 1978): 44-6.