Difference between revisions of "Junk"
From Derek
(Created page with '===Executive Summary=== ==Introduction== ===Background=== ====The Case==== ====The Code==== ====Previous Studies==== ===Project Objectives=== ==Project Breakdown and Re...') |
(→Web Crawler and Pattern Matcher System Design) |
||
Line 22: | Line 22: | ||
===Technical Designs and Requirements=== | ===Technical Designs and Requirements=== | ||
− | |||
Revision as of 22:04, 18 March 2013
Contents
Executive Summary
Introduction
Background
The Case
The Code
Previous Studies
Project Objectives
Project Breakdown and Requirements
Project Breakdown Overview
Technical Designs and Requirements
Work Completed to Date
Work for Remainder of Project
Project Deliverables and Closeout
Project Management
Project Schedule
Gantt Chart
Budget
Risk Management
Project Risk Management
Occupational Health and Safety Risk Management
Summary
References
See also
- Cipher Cracking (main page)
- Cipher Cracking 2013
- Cipher Cross-off List
- Timeline of the Taman Shud Case
- List of people connected to the Taman Shud Case
- List of facts on the Taman Shud Case that are often misreported
- List of facts we do know about the Somerton Man
- The Taman Shud Case Coronial Inquest
- Primary source material on the Taman Shud Case
- Secondary source material on the Taman Shud Case
References and useful resources
- The taman shud case
- Edward Fitzgerald's translation of رباعیات عمر خیام by عمر خیام
- Adelaide Uni Library e-book collection
- Project Gutenburg e-books
- Foreign language e-books
- UN Declaration of Human Rights - different languages
- Statistical debunking of the 'Bible code'
- One time pads
- Analysis of criminal codes and ciphers
- Code breaking in law enforcement: A 400-year history
- Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems