Difference between revisions of "Derek's wiki test space"
(227 intermediate revisions by 5 users not shown) | |||
Line 6: | Line 6: | ||
|Data 1||Data 2 | |Data 1||Data 2 | ||
|} | |} | ||
+ | |||
+ | |||
+ | ==Comment box== | ||
+ | {| border="1" cellpadding="5" cellspacing="0.1" style="text-align:left" | ||
+ | |- | ||
+ | ! style="background:#efefef;" | Tip | ||
+ | |- | ||
+ | |Description  to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves. | ||
+ | |} | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | {{Infobox | ||
+ | |style = border: 2px | ||
+ | |bodystyle = width: 350px | ||
+ | |abovestyle = background: #c8ccd1 | ||
+ | |datastyle = text-align: left | ||
+ | |||
+ | |above = Comment box testing | ||
+ | |||
+ | |||
+ | |data1 = Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves. | ||
+ | |||
+ | }} | ||
+ | |||
+ | ==Symbol== | ||
+ | __MATHJAX_NODOLLAR__ | ||
+ | I owe you 20. | ||
+ | |||
+ | I owe you $20 | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | |||
+ | I owe you $20 | ||
+ | |||
+ | ==Download test== | ||
+ | |||
+ | * [[File: test.pdf]] | ||
==Infoboxtest== | ==Infoboxtest== | ||
Line 24: | Line 65: | ||
Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know. | Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know. | ||
+ | |||
+ | I owe you $20 | ||
==More Testing== | ==More Testing== | ||
Line 30: | Line 73: | ||
* <math>\int_b^y f(\alpha\,)\,dy,{\rm not~quite,~as~referencing~is~cactus.}</math> | * <math>\int_b^y f(\alpha\,)\,dy,{\rm not~quite,~as~referencing~is~cactus.}</math> | ||
* <math>\int_b^y f(\alpha\,)\,dy,cactii eradicated</math> | * <math>\int_b^y f(\alpha\,)\,dy,cactii eradicated</math> | ||
− | + | ||
According to scientists, the Sun is pretty big.<ref>E. Miller, The Sun, (New York: Academic Press, 2005), 23-5.</ref> | According to scientists, the Sun is pretty big.<ref>E. Miller, The Sun, (New York: Academic Press, 2005), 23-5.</ref> | ||
Line 41: | Line 84: | ||
Edit: It works!! | Edit: It works!! | ||
--> | --> | ||
+ | |||
+ | == MathJax Test == | ||
+ | |||
+ | Here is an inline equation: \( x^2 \) | ||
+ | |||
+ | Here is a display equation: | ||
+ | \begin{align} | ||
+ | \int 2x \; dx &= x^2 + C \tag{1}\label{eqn:integral} | ||
+ | \end{align} | ||
+ | |||
+ | That last equation was Eqn. \ref{eqn:integral}. | ||
+ | |||
+ | \( \int_a^y f(\alpha\,)\,dy , \) | ||
+ | |||
+ | and in display form | ||
+ | |||
+ | \[ \int_a^y f(\alpha\,)\,dy . \] | ||
+ | |||
+ | ==Scratch== | ||
+ | |||
+ | Therefore, the minimal cost = $50 million <math>\times</math> 360 = $18,000 million = $18 billion. The maximal cost is = $50 million <math>\times</math> 20,300 = $1,016,500 million = $1 trillion (approx). | ||
==Scratch pad downloads== | ==Scratch pad downloads== | ||
+ | |||
+ | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/RF.pdf Avionic notes] | ||
+ | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/avionic_exams.xlsx Avionic exam time] | ||
+ | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/test.ppt test download] | ||
+ | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/test1.ppt test1 download] | ||
+ | |||
+ | ===Presentations=== | ||
+ | |||
+ | * https://www.youtube.com/watch?v=4P61D6JbgHE | ||
+ | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/Tips.ppt Proposal seminar slides] | ||
+ | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/Proposal_Seminar2014.pdf Proposal seminar slides] | ||
+ | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/Final_Seminar2014.pdf Final seminar slides] | ||
+ | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/video.m4v Final seminar video] | ||
==Notes relating to Test space== | ==Notes relating to Test space== | ||
<references/> | <references/> |
Latest revision as of 18:13, 25 February 2024
Contents
Test space
Heading 1 | Heading 2 |
---|---|
Data 1 | Data 2 |
Comment box
Tip |
---|
Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves. |
Comment box testing | |
---|---|
Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves. |
Symbol
__MATHJAX_NODOLLAR__ I owe you 20.
I owe you $20
I owe you $20
Download test
Infoboxtest
![]() | |
Main Heading | |
---|---|
First set of data | |
Remove this line (optional) |
OK this is the test bed for the u-beaut infobox. What a pain to install. For the record, I followed the info at this link: http://www.etcwiki.org/wiki/Mediawiki_template_guide
Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know.
I owe you $20
More Testing
- [math]\int_a^y f(\alpha\,)\,dy[/math]
- [math]\int_b^y f(\alpha\,)\,dy,{\rm does~it~work?}[/math]
- [math]\int_b^y f(\alpha\,)\,dy,{\rm not~quite,~as~referencing~is~cactus.}[/math]
- [math]\int_b^y f(\alpha\,)\,dy,cactii eradicated[/math]
According to scientists, the Sun is pretty big.[1]
The Moon, however, is not so big.[2]
MathJax Test
Here is an inline equation: \( x^2 \)
Here is a display equation: \begin{align} \int 2x \; dx &= x^2 + C \tag{1}\label{eqn:integral} \end{align}
That last equation was Eqn. \ref{eqn:integral}.
\( \int_a^y f(\alpha\,)\,dy , \)
and in display form
\[ \int_a^y f(\alpha\,)\,dy . \]
Scratch
Therefore, the minimal cost = $50 million [math]\times[/math] 360 = $18,000 million = $18 billion. The maximal cost is = $50 million [math]\times[/math] 20,300 = $1,016,500 million = $1 trillion (approx).
Scratch pad downloads
Presentations
- https://www.youtube.com/watch?v=4P61D6JbgHE
- Proposal seminar slides
- Proposal seminar slides
- Final seminar slides
- Final seminar video