Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "science" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
masonagrow

A Brief History of Cryptography | Red Hat Security - 0 views

  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
  •  
    Cryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundr...
Hannah Lee

Knowing When To Fold 'Em: The Science of Poker | Cocktail Party Physics, Scientific American Blog Network - 0 views

  •  
    This article concerning the science behind poker and its categorization as either skill or luck is particularly well written in that it draws its audience in by presenting a recent event that concerned poker, and then proceeding to present information on the history of poker as well as the statistics that support its argument.  Furthermore, the author establishes credibility throughout her post by referencing credible studies done. Her voice throughout the post continues to be entertaining, keeping the reader's attention for the entirety of her post.
aconn55

Fossil insect hid by carrying a basket of trash - 0 views

  •  
    I found this article to be well written and interesting because of the conversational and casual way it was written. The idea that one needs to remove all pronouns from scientific writing is one that is hammered into students from high school science day 1, yet may not be true. This was not written in the way that I was taught to write about science, however, it was both easy to read and informative. The casual writing style of science blogs may influence other writing standards of other areas of science in the future.
nate_clause

Oppenheimer's Folly: On black holes, fundamental laws and pure and applied science | The Curious Wavefunction, Scientific American Blog Network - 0 views

  •  
    I feel this article is well written for a few reasons. If has the feel of telling a story but remains formal and in the style of academic writing at the same time. The flow of the post is very well done also as each paragraph logically leads into the next. Lastly, the post concludes very well tying in everything the post discusses and how they relate to science in the world today.
jetabery

Gait Recognition - Science NetLinks - 1 views

  •  
    Researchers at Georgia Tech are currently focusing on using gait recognition to identify people. What is useful about this is that people do not need to be enrolled in a database in order to recognize them.
Annie Vreeland

Walking on Eggshells: Anatomy of a Science Story | Cocktail Party Physics, Scientific American Blog Network - 0 views

  •  
    I like the way this is written because the author makes it a fun read. It is not a long boring article about the writing process of her story, but rather it breaks down her process into steps. Moreover, her writing is entertaining, which grasped my interest more so than many other posts. 
Ryan McLaughlin

Painkilling chemicals with no side effects found in black mamba venom | Not Exactly Rocket Science | Discover Magazine - 0 views

  •  
    Interesting introduction and does a good job of explaining what has been discovered.
Marco Tiburcio

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Annie Vreeland

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
Sahand Kalhori

Galileo's Pendulum - 0 views

  •  
    The blogger explained all of the science in easy to understand terms and keeps the reader interested using an intriguing writing style.
Malak Elmousallamy

Bonanza denied by pickax and jackass - 0 views

  •  
    This particular blog post caught my eye because of its funny, and somewhat goofy, title. Instead of simply listing the facts, the author describes a piece of history in a comedic and entertaining manner.
Derek Bruff

Fairy wrens teach secret passwords to their unborn chicks to tell them apart from cuckoo impostors | Not Exactly Rocket Science | Discover Magazine - 0 views

  •  
    An unexpected place for passwords to appear...
Siegfried Schlunk

Quantum cryptography keys ride the lightning on existing fiber lines - 1 views

  •  
    Quantum computing has teased us with its potential for some time, but we won't be seeing qubits in our laptops anytime soon. However, science has also sought to leverage quantum physics in cryptography, and a recent breakthrough will allow for quantum encryption over fiber optic cables already in use.
Malak Elmousallamy

Quantum code sent on common fibre - 0 views

  •  
    The "uncrackable codes" made by exploiting the branch of physics called quantum mechanics no longer require the use of special "dark fibres" and have been sent down kilometres of standard broadband fibre.
Derek Bruff

Codebreaker Challenge - 0 views

  •  
    Check out this code-breaking challenge from the UK's Science Museum.
Siegfried Schlunk

The Bible Codes - 0 views

  •  
    A brief look at the science of cryptology and the simple encryptions found in the Old Testament. Has a couple of examples and explains the three main transformations used.
Collin Jackson

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
giordas

http://pages.cpsc.ucalgary.ca/~boyd/papers/biometric-summerschool.pdf - 1 views

  •  
    Essentially, this paper goes through the types of gait recognition software that currently exist as well as the reliability of this software. There are a lot of different elements that influence a persons gait (like terrain, shoes, fatigue, etc.), which effects how well the software works. It's a pretty heavy read but it's really interesting if you want to just jump to a certain section and read in depth. This technology is very much out there and in development, and it is definitely being improved upon. Also, even though this paper is a little bit older, it is still being cited in a lot of more recent research papers and I thought it would give a good enough grasp on the science for our purposes.
mackense

Hospital food standards: did medieval hospitals do it better? - 0 views

  •  
    I enjoyed reading this blog comparing medieval hospital foods to current hospitals because of the way the blog was set up with examples of medieval and contemporary hospital moves. The pictures also enhanced the blog.
1 - 20 of 30 Next ›
Showing 20 items per page