New Articles (Page 211)
To stay up to date you can also follow on Mastodon.
🔗 Known-Plaintext Attack
The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext). These can be used to reveal further secret information such as secret keys and code books. The term "crib" originated at Bletchley Park, the British World War II decryption operation, where it was defined as:
A plain language (or code) passage of any length, usually obtained by solving one or more cipher or code messages, and occurring or believed likely to occur in a different cipher or code message, which it may provide a means of solving.
Discussed on
- "Known-Plaintext Attack" | 2021-05-29 | 50 Upvotes 19 Comments
🔗 Japanese Invasion Money
Japanese invasion money, officially known as Southern Development Bank Notes (Japanese: 大東亜戦争軍票 Dai Tō-A Sensō gunpyō, "Greater East Asia War military scrip"), was currency issued by the Japanese Military Authority, as a replacement for local currency after the conquest of colonies and other states in World War II. In February 1942 in Japan, laws were passed establishing the Wartime Finance Bank and the Southern Development Bank. Both institutions issued bonds to raise funds. The former loaned money primarily to military industries, but also to a wide range of other ventures, including hydroelectric generators, electric power companies, shipbuilding and petroleum. The latter provided financial services in areas occupied by the Japanese military, and Southern Development Bank notes were in fact used as de facto military scrip. In December 1942, the outstanding balance of Southern Development Bank notes stood at more than 470 million; in March 1945, more than 13 billion.
Already engaged in war with China, in 1940 the Japanese expanded the scope of their military operations in Asia and finally entered the Second World War in late 1941 with the attack on Pearl Harbor. Japan invaded various Asian countries, occupying vast territories and setting up military administrations.
Beginning with the capture of the Philippines, the Japanese military confiscated all hard currency, both on a federal and individual level, replacing it with locally printed notes bearing a proclamation of military issue. All notes bore the name of the Imperial Japanese government, and some notes proclaimed the "promises to pay the bearer on demand". Called “Mickey Mouse Money" by local Filipinos, it was valueless after the overthrow of the Japanese, and tons of it were burned. Japanese troops were ordered to destroy bank records and any remaining currency prior to capitulation.
With the end of World War II, the currency circulated bearing the Japanese name immediately lost any value it once possessed and was discarded en masse. Money that was issued included the Philippines, Burma (now Myanmar), Malaya, North Borneo and Sarawak (now Malaysia), Singapore, Brunei, the Dutch East Indies (now Indonesia) and some areas of Oceania (New Guinea and the Solomon and Gilbert islands). Large amounts of the currency were obtained by Allied forces and civilians at the end of the war; many were kept as wartime souvenirs, and are now in both private and museum collections.
Discussed on
- "Japanese Invasion Money" | 2021-05-29 | 12 Upvotes 1 Comments
🔗 Jonbar Hinge
In science-fiction criticism, a Jonbar hinge or Jonbar point is the fictional concept of a crucial point of divergence between two outcomes, especially in time-travel stories. It is sometimes referred to as a Jon Bar hinge or change-point.
Discussed on
- "Jonbar Hinge" | 2021-05-28 | 15 Upvotes 9 Comments
🔗 Muphry's Law
Muphry's law is an adage that states: "If you write anything criticizing editing or proofreading, there will be a fault of some kind in what you have written." The name is a deliberate misspelling of "Murphy's law".
Names for variations on the principle have also been coined, usually in the context of online communication, including:
- Umhoefer's or Umhöfer's rule: "Articles on writing are themselves badly written." Named after editor Joseph A. Umhoefer.
- Skitt's law: "Any post correcting an error in another post will contain at least one error itself." Named after Skitt, a contributor to alt.usage.english on Usenet.
- Hartman's law of prescriptivist retaliation: "Any article or statement about correct grammar, punctuation, or spelling is bound to contain at least one eror [sic]." Named after editor and writer Jed Hartman.
- The iron law of nitpicking: "You are never more likely to make a grammatical error than when correcting someone else's grammar." Coined by blogger Zeno.
- McKean's law: "Any correction of the speech or writing of others will contain at least one grammatical, spelling, or typographical error."
- Bell's first law of Usenet: "Flames of spelling and/or grammar will have spelling and/or grammatical errors." Named after Andrew Bell, a contributor to alt.sex on Usenet.
Further variations state that flaws in a printed ("Clark's document law") or published work ("Barker's proof") will only be discovered after it is printed and not during proofreading, and flaws such as spelling errors in a sent email will be discovered by the sender only during rereading from the "Sent" box.
Discussed on
- "Muphry's Law" | 2021-05-26 | 11 Upvotes 1 Comments
🔗 E-Prime: English without the verb 'to be'
E-Prime (short for English-Prime or English Prime, sometimes denoted É or E′) is a version of the English language that excludes all forms of the verb to be, including all conjugations, contractions and archaic forms.
Some scholars advocate using E-Prime as a device to clarify thinking and strengthen writing. A number of other scholars have criticized E-Prime's utility.
Discussed on
- "E-Prime – English without the verb “to be”" | 2021-05-26 | 108 Upvotes 66 Comments
- "E-Prime English" | 2021-02-25 | 10 Upvotes 5 Comments
- "E-Prime: English without the verb 'to be'" | 2015-12-07 | 221 Upvotes 152 Comments
- "English-Prime - English without "is"" | 2009-01-05 | 108 Upvotes 76 Comments
🔗 Aarne–Thompson–Uther Index
The Aarne–Thompson–Uther Index (ATU Index) is a catalogue of folktale types used in folklore studies. The ATU Index is the product of a series of revisions and expansions by an international group of scholars: Originally composed in German by Finnish folklorist Antti Aarne (1910); the index was translated into English, revised, and expanded by American folklorist Stith Thompson (1928, 1961); and later further revised and expanded by German folklorist Hans-Jörg Uther (2004). The ATU Index, along with Thompson's Motif-Index of Folk-Literature (1932) (with which it is used in tandem) is an essential tool for folklorists.
Discussed on
- "Aarne–Thompson–Uther Index" | 2020-05-11 | 12 Upvotes 1 Comments
🔗 Stanford Bunny
The Stanford bunny is a computer graphics 3D test model developed by Greg Turk and Marc Levoy in 1994 at Stanford University. The model consists of 69,451 triangles, with the data determined by 3D scanning a ceramic figurine of a rabbit. This figurine and others were scanned to test methods of range scanning physical objects.
The data can be used to test various graphics algorithms, including polygonal simplification, compression, and surface smoothing. There are a few complications with this dataset that can occur in any 3D scan data: the model is manifold connected and has holes in the data, some due to scanning limits and some due to the object being hollow. These complications provide a more realistic input for any algorithm that is benchmarked with the Stanford bunny, though by today's standards, in terms of geometric complexity and triangle count, it is considered a simple model.
The model was originally available in .ply (polygons) file format with 4 different resolutions.
Discussed on
- "Stanford Bunny" | 2021-05-25 | 121 Upvotes 42 Comments
🔗 RFC-1149: IP over Avian Carriers
In computer networking, IP over Avian Carriers (IPoAC) is a proposal to carry Internet Protocol (IP) traffic by birds such as homing pigeons. IP over Avian Carriers was initially described in RFC 1149, a Request for Comments (RFC) issued by the Internet Engineering Task Force (IETF), written by D. Waitzman, and released on April 1, 1990. It is one of several April Fools' Day Request for Comments.
Waitzman described an improvement of his protocol in RFC 2549, IP over Avian Carriers with Quality of Service (1 April 1999). Later, in RFC 6214—released on 1 April 2011, and 13 years after the introduction of IPv6—Brian Carpenter and Robert Hinden published Adaptation of RFC 1149 for IPv6.
IPoAC has been successfully implemented, but for only nine packets of data, with a packet loss ratio of 55% (due to operator error), and a response time ranging from 3,000 seconds (≈54 minutes) to over 6,000 seconds (≈1.77 hours). Thus, this technology suffers from poor latency. Nevertheless, for large transfers, avian carriers are capable of high average throughput when carrying flash memory devices, effectively implementing a sneakernet. During the last 20 years, the information density of storage media and thus the bandwidth of an avian carrier has increased 3 times as fast as the bandwidth of the Internet. IPoAC may achieve bandwidth peaks of orders of magnitude more than the Internet when used with multiple avian carriers in rural areas. For example: If 16 homing pigeons are given eight 512 GB SD cards each, and take an hour to reach their destination, the throughput of the transfer would be 145.6 Gbit/s, excluding transfer to and from the SD cards.
Discussed on
- "IP over Avian Carriers" | 2021-05-24 | 16 Upvotes 1 Comments
- "RFC-1149: IP over Avian Carriers" | 2019-06-05 | 186 Upvotes 82 Comments
- "IP over Avian Carriers" | 2017-06-11 | 44 Upvotes 6 Comments
🔗 Nat Tate: An American Artist 1928–1960
Nat Tate: An American Artist 1928–1960 is a 1998 novel, presented as a biography, by the Scottish writer William Boyd. Nat Tate was an imaginary person, invented by Boyd and created as "an abstract expressionist who destroyed '99%' of his work and leapt to his death from the Staten Island ferry. His body was never found." At the time of the novel's launch, Boyd went some way to encourage the belief that Tate had really existed.
🔗 Reverse Mathematics
Reverse mathematics is a program in mathematical logic that seeks to determine which axioms are required to prove theorems of mathematics. Its defining method can briefly be described as "going backwards from the theorems to the axioms", in contrast to the ordinary mathematical practice of deriving theorems from axioms. It can be conceptualized as sculpting out necessary conditions from sufficient ones.
The reverse mathematics program was foreshadowed by results in set theory such as the classical theorem that the axiom of choice and Zorn's lemma are equivalent over ZF set theory. The goal of reverse mathematics, however, is to study possible axioms of ordinary theorems of mathematics rather than possible axioms for set theory.
Reverse mathematics is usually carried out using subsystems of second-order arithmetic, where many of its definitions and methods are inspired by previous work in constructive analysis and proof theory. The use of second-order arithmetic also allows many techniques from recursion theory to be employed; many results in reverse mathematics have corresponding results in computable analysis. Recently, higher-order reverse mathematics has been introduced, in which the focus is on subsystems of higher-order arithmetic, and the associated richer language.
The program was founded by Harvey Friedman (1975, 1976) and brought forward by Steve Simpson. A standard reference for the subject is (Simpson 2009), while an introduction for non-specialists is (Stillwell 2018). An introduction to higher-order reverse mathematics, and also the founding paper, is (Kohlenbach (2005)).