Lesson Three Code makers and breakers
|
|
- Dwayne Reed
- 5 years ago
- Views:
Transcription
1 Lesson Three Code makers and breakers Teachers Materias Code Makers and Breakers Lesson Pan Further Information Lesson Materias Aan Turing and Enigma images Codes to Break Downoad this resource 21
2 Lesson Three: Codemakers and breakers AIM To expore the activity of spies and the use of code breaking from Word War Two the Cuban missie crisis and beyond. LESSON OUTCOMES A students wi be abe to expain the origins of code breaking and how codes work. Some students wi be abe to evauate the chaenges faced by code breakers during the Cuban missie crisis. A few students wi be abe to consider the egacy of code breaking and its impact on the modern word. CONCEPTS TO EXAMINE Code breaking, secrecy, prejudice and discrimination, egacy, inteigence. OERIEW Students wi discover the history of code breaking and its significance on events such as the Cuban missie crisis. They wi be abe to earn how code breaking works, and create their own codes. The esson wi enabe students to consider the mora diemmas of code breakers. The cass wi examine code breakers egacy. Students can debate the need for secrecy, inteigence gathering and security in the context of the modern word. EQUIPMENT NEEDED - Pens - Timeine of Cuban missie crisis (page 12) - List of codes to break - Code breakers PowerPoint (onine) - Countdown cock SUGGESTED TIME This is a one hour esson, but can de differentiated to run over a period of two essons examining each activity in more detai. ROOM LAYOUT - For group work. - First activity needs space for students to form a debate ine. SKILLS - Numeracy - Literacy - ICT - Enquiry - Cooperation and team work 22
3 INSTRUCTIONS Starter Using Code Breakers PowerPoint teacher to use the debate ine side to consider students views of secrecy. Pose the question to the students Does secrecy protect peace? If they think it protects peace they stand on one side of the room, if they think it doesn t protect peace they stand on the other side of the room. If they are somewhere in the midde they stand somewhere in the midde. Teacher to then encourage students through questioning to expain why they have the opinion that they do make sure an appropriate number of responses from each side of the viewpoint is examined. Main activities Put a picture of Aan Turing or Gordon Wechman on the board. Ask students who they think they are. Then put a picture of the Enigma machine on the board ask students what they think it is. Expain to students using the PowerPoint the historic overview of code breakers at Betchey Park and eading to the Cod War. Spit cass into USA and Soviet Union. Roepay activity with a task: Give students a ist of codes to break for USA and codes to break for Soviet Union. (There are two sets of codes to use these can be used for two sets of groups, or aternatives to extend the code breaking portion of this esson to fi an hour). They have ten minutes to break each set of codes and must work together in order to do this. Countdown the ten minutes using a countdown cock. The majority of codes to crack require knowedge from the further information page they operate on a Caesar cipher, whereby you repace etters with numbers or other etters. The first one to break the code and compete the action required by the code is responsibe for saving the word if the codes are not broken within ten minutes the Presidents of the Soviet Union and the USA wi aunch nucear weapons at each other and both teams wi ose. At end of activity feedback with the students reating to the probems that they faced as a team, and how they worked together to break the codes or how they coud improve their work in the future. Students now to create their own codes. They must have a cipher and a way of the code being decrypted when it reaches its destination. The two teams of USA and Soviet Union stay in pace. Using the timeine of the Cuban missie crisis students pick a significant event in which they woud not want the other team to find out about. They then create a code for it. At the end of the aotted time, students pass the codes to each other and try to break them. PLENARY Students to discuss what they think the egacy of the code breakers during the Cuban missie crisis is in today s word. Do they think codes sti exist? How do they think codes can be used? Are the use of codes a good think? What do they think coud be some of the probems with secrecy and inteigence gathering? DIFFERENTIATION - For the debate ine activity give students prompt cards to hep them discuss the arguments for and against. - Give students part of the cipher for the ist of codes - Give students cues to hep them break the codes - Give students a cipher to make their own codes - Use computers to make a cipher either to crack the codes or make their own 23
4 EXTENSION - For the debate ine activity, students coud be asked Does the use of codes keep our word safe? or other questions on this theme. - Students coud argue against their own view to improve their debating skis. - Students can discuss the egacy of the code breakers, incuding Aan Turing and Gordon Wechman ENRICHMENT - Take students to Betchey Park on a trip to find out more about code makers and code breakers - Watch a fim The Imitation Game to earn more about Aan Turing. - Compete the roe pay or code breaking activities outside the cassroom using props, and creative expression. - Read about Gordon Wechman and the invention of The Coud in computer technoogy - Make and use QR codes to create other forms of codes, these can be done using students mobie phones. 24
5 Further information: Code makers and breakers Since human beings were abe to communicate they have attempted to obscure information from each other in different ways, in order to keep certain things secret. One way in which to do this is to create a code. Those making the codes are caed cryptographers. They give the cipher or way to sove the code to the person who is receiving the message. In this way a the codes made in the same way can be read. Without the cipher the message remains secret uness it is broken. Other peope who do not have the cipher consider ways in which to break or crack the code. Code breakers who use ogic, intuition and come up with compex mathematica systems to uncover the secrets in codes are caed cryptanaysts or code breakers. The Greeks and Romans were some of the first civiisations to use sophisticated ciphers to communicate in secret. The schoar Poybius created a system whereby each etter on a grid woud be repaced with a etter from the aphabet in 5x5 grid. A = 1x1 = 2 or N = 3x3 = 9 or T = 4x4 = 16, so the numbers 2, 9, 16 = ANT. Caesar invented a cipher that shifted the etters of the aphabet by a certain number of etters or numbers i.e. A = 2, B = 3, C = 4 or A = B, B = C, C = D. The more compicated the shift of etters/numbers the more chaenging the cipher and the more difficut it is to break the code. These two systems have formed the basis of many codes throughout history. Modern code makers and breakers Codes continued to advance in a simiar way as this unti the invention of the teegraph machine and Morse code. This meant that nations were now abe to transmit codes across arge distances and transmit messages to each other easiy in times of war. However, the codes that they created had to become more compicated as anyone coud isten in and try to work out the cipher for these messages. Codes made by machines started to become more popuar as technoogy improved, as these codes enabed compicated ciphers to be created. To hep cryptanaysts in deciphering messages, cipher machines were deveoped. One of the odest of these was created in the 15th century and caed the Aberti Disc. It heped code breakers by using two discs on top of each other that coud be turned to find the corresponding etter. One of the most famous cipher machines was the Enigma machine made by the Germans the 1920s. This machine ooked ike a typewriter, but each press of a button indicated a ighted etter. The machine used compex wiring and rotors to create a different etter each time. Without the cipher these machines were amost impossibe to crack as they were using so many miions of different etter combinations. In 1932 the first Enigma machine cipher was broken by the Poish Genera Staff s Cipher Bureau. They were abe to do this by receiving inteigence about aspects to do with the cipher, and create a Bombe machine to crack the code. The Enigma machine was then improved upon and new parts were added to make the code more compicated to crack. Aan Turing In Word War Two the Germans were using Enigma to transmit messages between their forces. The British had previousy set up the Government Codes & Ciphers Schoo which Aan Turing had joined. Aan had some ideas about how to decipher the now very compicated Enigma machine if inteigence coud be received reating to parts of the code that were simiar. Aan Turing created a new Bombe machine and from this the British were abe to crack the Enigma machine, and make significant progress in the war. Aan Turing and his team of code breakers are credited with shortening the overa ength of Word War Two. After Word War Two, Prime Minister Churchi asked for the information reating to the discovery of the Enigma codes to be kept secret. Government Codes & Ciphers Schoo became the Government Communications Headquarters (GCHQ). Aan Turing was not recognised for his work, and due to his sexuaity, was sentenced to be chemicay castrated. He committed suicide in 1954 just before his 42nd birthday. In 2009 Prime Minister Gordon Brown apoogised for the appaing treatment of Turing and in 2013 he was posthumousy pardoned. Code breakers in the Cod War GCHQ, Mi5, Mi6 and their counterparts in America, the Centra Inteigence Agency were very active in the Cod War attempting to uncover secrets transmitted and communicated between the USSR and its aies. 25
6 Inteigence gathering is now reated to mutipe aspects of their work, and the data gathered from both codes and sateites images ed to the escaation in the Cod War of the Cuban missie crisis. Mixed messages and a ack of cear communication resuted in some misunderstandings that coud have potentiay ed to the end of the word as we know it. The internet and The Coud that we use today are a resut of the work that mathmaticians ike Gordon Wechman carried out during the Cod War. Cryptographers and cryptanaysts sti work to make and break codes but now have the abiity to use compex computer programmes to assist. They woud say that there is no unbreakabe code, just codes that have yet to be broken. Aan Turing The Enigma Machine 26 Gordon Wechman Turing s Bombe that broke the code
7 Codes to break Make sure to give each part of the codes to students to ensure that they wi be successfu in breaking them. The codes can aso be differentiated by providing cues. The ciphers for the answers and the answers themseves can be found at the end of each country set. Do not give these to the students uness you wish to revea the answers to them. Each word is part of an action that the students must compete to win the game. There are two sets of codes for two countries. This enabes two rounds or 4 groups. USA Part A: No answers 1st word Code to break: 19, 1, 25 2nd word Code to break: 14, 10, 20, 20, 10, 13, 6 3rd word Codeword: Bay of Pigs Code to break: UD B A Y O F P I G S 27
8 4th word Codeword: Hotine Code to break: YQNL H O T L I N E 5th word Codeword: Time to hurry up, the Soviet Union is winning the arms race. Everyone must support the new atomic age. Atom bombs at the ready. Communists can not rue! Haven't you heard they are getting coser? Expansion of the Soviet Union must be stopped. Ready for nucear annihiation? USA Part B: No answers 1st word Code to break: 4, 15, nd word Code to break: 8,16, 22, 7, 24,19 28
9 3rd word Codeword: Disarm Code to break: JBI 4th word Codeword: Dipomacy Code to break: XPTSP 5th word AB CD EF GH IJ KL MN OP QR U ST YZ WX 29
10 USA Part A: Answers for teachers 1st word: SAY. Match number to get the correct etter 2nd word: MISSILE. Minus 1 from the number to get the correct etter 3rd word: TO. Write in the aphabet in order starting at J. If the etter has aready been taken in the code word then miss that etter out and enter the foowing etter instead. 4th word: YOUR. Enter the aphabet starting with A in A. If the etter in the aphabet appears in the code word Hotine, skip this etter and carry on to the next etter in the aphabet that does not appear in Hotine. 5th word: TEACHER. Take the first etter of each sentence. 1st word nd word rd word B A Y O F P I G S C D E H I K L M N Q R T U X Y Z 4th word U H O T L I N E W X Y Z 30
11 USA Part B: Answers for teachers 1st word: ALL. Minus 3 to the number to get the correct etter 2nd word: SKETCH. Enter the etters in aphabetica order but backwards starting with entering A under 26. 3rd word: FIE. Put code word in to cypher so D of Disarm equas A. Then enter the aphabet. If a etter is taken in the code word then enter the next etter in the aphabet. 4th word: PEACE. Enter the code word backwards so D for Dipomacy equas Z on the grid. Then enter the rest of dipomacy backwards and then the aphabet starting with B underneath Q. 5th word: SIGNS. The symbos correspond to the borders around the etters. If the symbo has a dot then it s the second etter in that duo of etters. 1st word nd word Z Y X W U T S R Q P O N M L K J I H G F E D C B A 3rd word D I S A R M B C E F G H J K L N O P Q T U W X Y Z 31
12 4th word Z X W U T S R Q N K J H G F E B Y C A M O L P I D 5th word A I Q Y B J R Z C K S D L T E M U F N G O W H P X 32
13 Soviet Union Part A: No answers 1st word Code to break: 20, 5,12, 12 2nd word Code to break: 21, 6, 2, 4, 9, 6, 19 3rd word Codeword: Atomic Code to break: BLI A T O M I C 33
14 4th word Codeword: Power Code to break: RQTD P O W E R 5th word Codeword: My, my time is starting to run out. Isn't it time we stopped these evi capitaists? Space race has begun. So we must work together. Imperiaist Americans must be stopped! Let's get to the moon first! Everyone must support the new atomic age. Soviet Union Part B: No answers 1st word Code to break: 7, 21, 4, 26 2nd word Code to break: 11, 22, 26, 24, 22 34
15 3rd word Codeword: Pacify Code to break: TFOGQNT P A C I F Y 4th word Codeword: Truce Code to break: I J E C U R T 5th word AB CD EF GH IJ KL MN OP QR U ST YZ WX 35
16 Soviet Union Part A: Answers for teachers 1st word: TELL. Match number to get the correct etter 2nd word: TEACHER. Minus 1 from the number to get the correct etter 3rd word: THE. Write in the aphabet in order starting at G, entering B. If the etter has aready been taken in the code word Atomic then miss that etter out and enter the foowing etter in the aphabet instead. 4th word: WORD. Enter the aphabet starting with A in A uness it appears in Power. Skip this etter and carry on to the next etter in the aphabet that doesn't appear in Power. 5th word: MISSILE. Take the first etter of each sentence. 1st word 2nd word 3rd word A T O M I C B D E F G H J K L N P Q R S U W X Y Z 4th word A B C D F G H I J K L M N Q S P O W E R T U X Y Z 36
17 Soviet Union Part B: Answers for teachers 1st word: DRAW. Pus 3 to the number to get the correct etter. 2nd word: PEACE. Enter the etters in aphabetica order but backwards starting with entering A under 26. 3rd word: SYMBOLS. Put code word in to cypher so P of Pacify equas A. Then enter the aphabet. If a etter is taken in the code word then miss it out and enter the next etter in the aphabet. 4th word: ON. Enter the code word backwards so T for Truce equas Z on the grid. Then enter the rest of Truce backwards and then the aphabet starting with A underneath U. If a etter is taken in the code word, miss it out and enter the next etter in the aphabet. 5th word: PAPER. The symbos correspond to the borders around the etters. If the symbo has a dot then it s the second etter in that duo of etters. 1st word 2nd word Z Y X W U T S R Q P O N M L K J I H G F E D C B A 3rd word P A C I F Y B D E G H J K L M N O Q R S T U W X Z 37
18 4th word Z Y X W S Q P O N M L K J I H G F D B A E C U R T 5th word A I Q Y B J R Z C K S D L T E M U F N G O W H P X Now get students to design their own codes! Use the above ciphers or they can make their own. 38
Lesson Objective Identify the value of a quarter and count groups of coins that include quarters.
LESSON 9.9C Hands On Quarters PROFESSIONAL PROFESSIONAL DEVELOPMENT DEVELOPMENT LESSON AT A GLANCE Mathematics Forida Standard Te and write time. MAFS.MD.a.a Identify and combine vaues of money in cents
More informationLesson Objective Identify the value of a group of coins that includes pennies and/ or dimes.
LESSON 9.9B Count Coections LESSON AT A GLANCE Daiy Routines Mathematics Forida Standard Te and write time. MAFS.1.MD.2.a.b Identify and combine vaues of money in cents up to one doar working with a singe
More informationEmployment and Support Allowance (ESA)
Empoyment and Support Aowance (ESA) Pease read this eafet carefuy This eafet gives you more information about Empoyment and Support Aowance (ESA) and tes you: about the support we can give you, and what
More informationOne Dollar LESSON AT A GLANCE. Daily Routines. Problem of the Day. Vocabulary Builder. Digital Path. About the Math. Dollar. Teaching for Depth
LESSON 9.9D One Doar PROFESSIONAL DEVELOPMENT PROFESSIONAL DEVELOPMENT LESSON AT A GLANCE Mathematics Forida Standard Te and write time. MAFS.1.MD.2.a.c Identify and combine vaues of money in cents up
More informationMarketing tips and templates
For financia adviser use ony. Not approved for use with customers. Marketing tips and tempates Heping you to grow your equity reease business The growing equity reease market can offer many opportunities
More informationTANF WORK. The Future Is. Yours...
TANF WORK The Future Is Yours... Temporary Assistance for Needy Famiies (TANF) is an Okahoma Department of Human Services (OKDHS) program that gives you the hep you need to find and keep a job. TANF offers
More informationIn this chapter, I explain the essentials that you need to start drawings. After a
CHAPTER Starting to Draw In this chapter, I expain the essentias that you need to start drawings. After a itte background, I discuss the basics of the screen that you see when you open AutoCAD or AutoCAD
More informationSlim-line Aluminium Roofs Assembly Guide
Sim-ine Auminium Roofs Assemby Guide Contents Bonded fush gazed roofs Page 3 Singe section of gass Page 4 Singe square with opener Page 5 Mutipe gass panes Page 6 Instaing Openers Page 10 Timber Kerb For
More informationAlignment of Defense Contractors Innovation Strategies With US DOD RDT&E Plans: The Winners and Losers.
Aignment of Defense Contractors Innovation Strategies With US DOD RDT&E Pans: The Winners and Losers. A new anaysis by Vector Anaytics based on the FY19 budget request. www.vector-anaytics.com 2 This new
More informationContents. Talk Boost KS1 Tutor Training Manual / 1 Talk Boost / 1
Tutor Training Manua 2016 Contents Section 01: Tutor information... 3 What is Tak Boost KS1?... 3 Overview of the day... 4 Deivery, Course schedue, Tutor s skis... 5 Tutor s roe / Purpose of Tak Boost
More informationAlan Turing: Codebreaker
1 CLOSE READING Alan Turing: Codebreaker Invisible ink, cipher wheels, and hidden messages these are the spy gadgets of the past. Modern spy devices include unmanned aircraft and other spy planes. But
More information===================== & 4
Messing Up Ideas (A Lesson On Deveoping A Creative Process) By David Oakes and James Seaberry A note from David Oakes: James Seaberry and I have been onine friends for severa years now He has been instrumenta
More informationCOPYRIGHTED MATERIAL
How Do I Get Started with Twitter? COPYRIGHTED MATERIAL Are you ready to share with the word seect bits and pieces of your ife, 140 characters (or ess) at a time? I suspected as much. This means that you
More informationSECOND LEVEL THIRD LEVEL FOURTH LEVEL LEARNING RESOURCES. Charlie Higson. Resource created by Jennifer Buchan
LEARNING RESOURCES Charie Higson Resource created by Jennifer Buchan SECOND LEVEL THIRD LEVEL FOURTH LEVEL Contents 2 About Charie Higson 3 Charie Higson Introductory Activities 3 The Enemy Activities
More informationSoftware Process & Agile Software Development
CSE516 Science for Society Software Process & Agie Software Deveopment Apri 25, 2014 Ichu Yoon (icyoon@sunykorea.ac.kr) Software A textbook description Instructions (computer programs) that when executed
More informationSecure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits
Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9
More informationLBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual
Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From
More informationWhere do I want to go?
Where do I want to go? Copyright 2016 The Open University 2 of 27 Thursday 7 December 2017 Contents Introduction 4 Learning Outcomes 5 1 What do I reay want from work? 5 2 What kind of work woud I ike
More informationCreated by Paul Hallett
The National Cold War Exhibition covers many aspects of the GCSE Modern World syllabus. This package focuses on: The formation of NATO and the Warsaw Pact, the membership of these organisations and their
More informationhp scanjet 4400c series and 5400c series scanners user s manual
hp scanjet 4400c series and 5400c series scanners user s manua Copyright Hewett-Packard Company 2001 A rights reserved. Reproduction, adaptation, or transation without prior written permission is prohibited,
More informationThe European Emission Specifications
The European Emission Specifications. Manfred Stecher Rohde & Schwarz GmbH & Co. KG MihdorfstraDe 15 D-81671 Miinchen, Germany SUMMARY The paper gives an overview over the current European emission specifications.
More informationHomework Assignment # 9 (Due April 6, 8am)
EE143 Homework Assignment # 9 (Due Apri 6, 8am) S2006 Week of 3/27 is Spring Recess Midterm Exam #2 wi be on Apri 5 (Wed) 6:00-7:30pm, GPB Room 100, cosed book exam, 8 sheets of handwritten notes aowed.
More informationCOMDIAL. Digital Telephone System Industry-Standard Telephone. User s Guide (Interfaced through the ATI-D)
COMDIAL Digita Teephone System Industry-Standard Teephone User s Guide (Interfaced through the ATI-D) This user s guide appies to Industry Standard Singe Line Teephones, such as the Comdia 2500-xx (when
More informationBringing LEARNING TO LIFE. Making Immersive Learning Practical.
Bringing LEARNING TO LIFE Making Immersive Learning Practica www.veative.com About VEATIVE A goba provider of education technoogy and innovative digita earning soutions, using immersive technoogies. Providing
More informationVisual Arts Grade 8. Grade: 8 Term: 1
Visua Arts Grade 8 This course is open to a grade 8 students interested in earning about the creative process, incuding too-use, techniques, and the concepts traditionay used in art making. In addition
More informationChannel Division Multiple Access Based on High UWB Channel Temporal Resolution
Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:
More informationMI CASA ES TU CASA. Lesson Plan #17. Creating Small, Animated Houses. by Carolina Pedraza
Lesson Pan #17 MI CASA ES TU CASA Creating Sma, Animated Houses by Caroina Pedraza There s no pace ike home! For centuries, the idea of home has been a source of inspiration for numerous artists. The most
More informationAnalysis, Analysis Practices, and Implications for Modeling and Simulation
, Practices, and Impications for Modeing and imuation Amy Henninger The Probem The act of identifying, enumerating, evauating, and mapping known technoogies to inferred program requirements is an important
More informationProvides exact fault location to one span
TWS Mark VI Traveing wave faut ocator Provides exact faut ocation to one span Reduce down time by getting to the faut site faster Track intermittent sef cearing fauts and focus maintenance at the right
More informationP H O T O CD I N F O R M A T I O N B U L L E T I N
PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio
More informationWireless Communications
Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve
More informationGeorgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation
Power ntegrity/signa ntegrity Co-Simuation for Fast Design Cosure Krishna Srinivasan1, Rohan Mandrekar2, Ege Engin3 and Madhavan Swaminathan4 Georgia nstitute of Technoogy 85 5th St NW, Atanta GA 30308
More informationRateless Codes for the Gaussian Multiple Access Channel
Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W
More informationKnowledge Representation and Reasoning in the Design of Composite Systems
470 IEEE TRANSACTIONS ON, SOFTWARE ENGINEERING, VOL. 18, NO. h, JUNE 1992 Knowedge Representation and Reasoning in the Design of Composite Systems Stephen Fickas and B. Robert Hem Abstract- Our interest
More informationSYMMETRY AND PRACTICAL GEOMETRY
MTHEMTIS UNIT 9 SYMMETRY N RTIL GEOMETRY () Main oncepts and Resuts figure is said to have ine symmetry, if by foding the figure aong a ine, the eft and right parts of it coincide exacty. The ine is caed
More informationOpenStax-CNX module: m Inductance. OpenStax College. Abstract
OpenStax-CNX modue: m42420 1 Inductance OpenStax Coege This work is produced by OpenStax-CNX and icensed under the Creative Commons Attribution License 3.0 Cacuate the inductance of an inductor. Cacuate
More informationSTAG LANE JUNIOR SCHOOL HISTORY POLICY
Status-Recommended Prepared by: Siobhan Padian Date written September 2016 Shared with staff: Autumn 2016 Date for review: July 2019 STAG LANE JUNIOR SCHOOL HISTORY POLICY United Nations Convention on
More informationRelays that Cooperate to Compute
Reays that Cooperate to Compute Matthew Nokeby Rice University nokeby@rice.edu Bobak Nazer Boston University bobak@bu.edu Behnaam Aazhang Rice University aaz@rice.edu Natasha evroye University of Iinois
More information: taking service robots to play soccer
Virbot@fied : taking service robots to pay soccer Larena Adaberto, Escaante Boris, Torres Luis, Abad Verónica, Vázquez Lauro Bio-Robotics Laboratory, Department of Eectrica Engineering Universidad Naciona
More informationComputer Science Clinic Overview
Harvey Mudd Coege Computer Science Department Computer Science Cinic Overview Robert M. Keer Professor & Director www.cs.hmc hmc.edu/cinic keer@cs.hmc hmc.edu 909-621-8483 History of Computer Science Cinic
More informationTRANSPORT AND WOMEN S SAFETY. Re-thinking women s safety in the growing intermediate public transportation sector.
TRANSPORT AND WOMEN S SAFETY Re-thinking women s safety in the growing intermediate pubic transportation sector. APRIL 2015 Report by: Zainab Kaka zkaka@embarqindia.org Jyot Chadha jchadha@embarqindia.org
More informationEMINENT & ENIGMATIC. 10 aspects of Alan Turing
EMINENT & ENIGMATIC. 10 aspects of Alan Turing Exhibition at the Heinz Nixdorf MuseumsForum from January to December 2012 The international scientific focus in 2012 will be firmly on Alan Turing. This
More informationWhat is York getting INTO? The proposed joint venture between The University of York and INTO University Partnerships
? The proposed joint venture between The University of York and INTO University Partnerships January 2014 UCU has ed a series of high profie campaigns against universities forming partnerships with this
More informationEXETER CITY COUNCIL PUBLIC ART POLICY AND STRATEGY EXECUTIVE SUMMARY
EXETER CITY COUNCIL PUBLIC ART POLICY AND STRATEGY EXECUTIVE SUMMARY 1 EXETER CITY COUNCIL PUBLIC ART POLICY AND STRATEGY EXECUTIVE SUMMARY 1. Introduction and terms of the Summary 1. 1 Exceence in the
More informationCOURSE 6 - WRITING PROJECT (DETAILS)
COURSE 6 - WRITING PROJECT (DETAILS) Course Code: DCE 6 Course Tite: Writing Project (Project) The detais for your course work/project are given beow: a) Introduction Course 6 is a Compusory course in
More informationOnline, Artificial Intelligence-Based Turbine Generator Diagnostics
AI Magazine Voume 7 Number 4 (1986) ( AAAI) Robert L. Osborne, Ph. D Onine, Artificia Inteigence-Based Turbine Generator Diagnostics introduction The need for onine diagnostics in the eectric powergeneration
More informationConfiguring Onyx to print on your HEXIS media
Configuring Onyx to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing the media profie into Onyx 3 2. Defaut setting
More informationOCTOBER 23-25, 2018 MARRIOTT MARQUIS ATLANTA ATLANTA, GA. Don t Miss Out! Register by July 31st at and save $125!
OCTOBER 23-25, 2018 MARRIOTT MARQUIS ATLANTA ATLANTA, GA Don t Miss Out! Register by Juy 31st at www.sqfconference.com/brochure and save $125! is a division of JOIN SQF STAKEHOLDERS AND FOOD SAFETY PROFESSIONALS
More informationYongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS
BNL CAP CCII, 65685 225-MUON-98C A NEW STRUCTURE OF LINEAR COLLIDER * Yongxiang Zhao Brookhaven Nationa Laboratory Upton, NY, 11973 RECEIVED AIK 1 7 1998 OSTI *This work was supported by the US Department
More informationKing George V Primary School Topic/Curriculum Overview
King George V Primary School Topic/Curriculum Overview Term: Spring One Year group: Class 5 Teacher: Mr Reed Theme Time allocated Outcome 7 s The Final Frontier Stunning Start : Discovery of footprints,
More informationOperation Guide
MO0907-EB Operation Guide 709 713 Getting Acquainted Congratuations upon your seection of this CASO watch. To get the most out of your purchase, be sure to read this manua carefuy. Expose the watch to
More informationGRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES
VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty
More informationES 442 Homework #8 Solutions (Spring 2017 Due May 1, 2017 ) Print out homework and do work on the printed pages.
NAME Soutions ES 44 Homework #8 Soutions (Spring 017 Due May 1, 017 ) Print out homework and do work on the printed pages. Textbook: B. P. athi & Zhi Ding, Modern Digita and Anaog Communication Systems,
More informationPerformance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2
ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,
More informationMinimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks
1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,
More informationThe Manhattan Project (NCSS8)
The Manhattan Project (NCSS8) I. General Information Subject: US History Teacher: Sarah Hendren Unit: World War II Grade: 11 Lesson: The Manhattan Project # of Students: 24 II. Big Question For Today s
More informationAnnouncements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm
Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright
More informationIH MARINE EAST YORKSHIRE DEALER
IH MARINE EAST YORKSHIRE DEALER 07429 562 014 Advanced technoogy for fundamenta tasks www.oex.no Survey Visuaization Potting Positioning Concerted charting since 1997 Seabead discrimination Survey and
More informationAcknowledgement. Wireless History
Acknowedgement Sides derived from cass materia posted by Dr. A. Godsmith www.stanford.edu/cass/ee359/ ectures.htm See aso: A. Godsmith, Wireess Communications, Cambridge Press Wireess History Ancient Systems:
More informationTheme One: International Conflicts and Threats to Peace in the 20 th century
F3 History Useful Websites Theme One: International Conflicts and Threats to Peace in the 20 th century 1. The First World War The website provides a timeline and research article to introduce the First
More informationOn optimizing low SNR wireless networks using network coding
On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie
More informationPilkington K Glass Range Pilkington K Glass Pilkington K Glass OW Pilkington K Glass OW on Surface 4 Pilkington K Glass S
Pikington K Gass Range Pikington K Gass Pikington K Gass OW Pikington K Gass OW on Surface 4 Pikington K Gass S Upstairs windows using energy-efficient gazing. Downstairs windows using origina singe gazing.
More informationFor 2-5 players Ages 8 and above Minutes
For 2-5 payers Ages and above 30-90 Minutes CN Rues V2 EN DEF 2015_Mise en page 1 19/05/15 15:39 Page2 COmpOnents Setting up t Macao and Ports where trading occurs Macao with its Back Market A port and
More informationA Closer Look at ASML. September 26-27, 2002
A Coser Look at ASML September 26-27, 2002 TWINSCAN Outine Introduction TWINSCAN roadmap Dua stage technoogy Productivity TWINSCAN dua stage performance Concusion Outine Introduction TWINSCAN roadmap Dua
More informationHAREWOOD JUNIOR SCHOOL. History
HAREWOOD JUNIOR SCHOOL History Purpose of study A high-quality history education will help pupils gain a coherent knowledge and understanding of Britain s past and that of the wider world. It should inspire
More informationRadial basis function networks for fast contingency ranking
Eectrica Power and Energy Systems 24 2002) 387±395 www.esevier.com/ocate/ijepes Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of
More informationADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL
ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar
More information3-5 Slopes of Lines. Warm Up Lesson Presentation Lesson Quiz. Holt McDougal Geometry
3-5 Slopes of Lines Warm Up Lesson Presentation Lesson Quiz Geometry Warm Up Find the value of m. 1. 2. 3. 4. undefined 0 Objectives Find the slope of a line. Use slopes to identify parallel and perpendicular
More informationFrom Script to Schedule
Chapter 4 From Script to Schedue INTRODUCTION My definition of production is the process of taking a script and creating (or producing ) a movie (or TV show, cabe movie, commercia, webisode, mobisode or
More informationPulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis
Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics
More informationJoint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,
More informationEquivalent length design equations for right-angled microstrip bends Visser, H.J.
Equivaent ength design equations for right-anged microstrip ends Visser, H.J. Puished in: The Second European Conference on Antennas and Propagation,. EuCAP. - Novemer, Edinurgh, UK Puished: // Document
More informationChapter 15 Other Modifications
Chapter 15 Other Modifications We have aready seen ways to modify a sound through either edition (see Chap. 6) or fitering (see Chap. 14). Some other changes in ampitude, time, and/or frequency might be
More informationEffect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels
Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver
More informationRate-Allocation Strategies for Closed-Loop MIMO-OFDM
Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu
More informationTechnology valuation and innovation brokerage
TEMP-0010-DOT-F - Verhaert Presentation Technology valuation and innovation brokerage Zane Smilga Coordinator Inno ab zane.smilga@verhaert.com 22.11.2016 Technology valuation and innovation brokerage 1
More informationThe US ITER Role in Magnet Technology
The US ITER Roe in Magnet Technoogy Timothy A. Antaya Fusion Technoogy and Engineering Division MIT Pasma Science and Fusion Center Representing Many UFA Meeting, Univ. Maryand, 7 May 2003 antaya@psfc.mit.edu
More informationLIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS
C I R E D 17 th Internationa Conference on Eectricity Distribution Barceona, 12-15 May 23 LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS
More informationCAN FD system design
icc 215 CAN FD system design Dr. - Ing. M. Schreiner Daimer Research and Deveopment Abstract The objective of this paper is to give genera design rues for the physica ayer of CAN FD networks. As an introduction
More informationFuzzy Model Predictive Control Applied to Piecewise Linear Systems
10th Internationa Symposium on Process Systems Engineering - PSE2009 Rita Maria de Brito Aves, Caudio Augusto Oer do Nascimento and Evaristo Chabaud Biscaia Jr. (Editors) 2009 Esevier B.V. A rights reserved.
More informationCO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL
XIV Internationa PhD Worshop OWD 00 3 October 0 CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL G. Tymchi I. Diorditsa S. Murahovsyy R. Tymchi Nationa Technica University of Uraine "Kiev Poytechnic
More informationNetwork Control by Bayesian Broadcast
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type
More informationUnderstanding The HA2500 Horizontal Output Load Test
Understanding The HA2500 Horizonta Output Load Test Horizonta output stages are part of every CRT video dispay incuding cosed circuit monitors, computer monitors, video games, medica monitors, TVs. HDTVs,
More informationEfficiently Fuzzy Controlling with Dynamic Window in Elliptic Curve Cryptography Sensor Networks
Efficienty Fuzzy Controing with Dynamic Window in Eiptic Curve Cryptography Sensor Networks Xu Huang, Dharmendra Sharma and Pritam Gakumar Shah Abstract It is noted that the wireess sensor networks (WSN)
More informationWhat you need: A notebook Writing tools A voice recording device / voice recorder on your mobile phone
EXPLORING ENGLISH EVERYDAY ENGLISH BASIC 1. INTRODUCING YOURSELF How to use this Exporing Engish earning series: Read the Learning Points marked L Learning Point Practice the conversations marked CP1 to
More informationAutomation of the Solution of Kakuro Puzzles
Automation of the Soution of Kakuro Puzzes R. P. Davies, P. A. Roach, S. Perkins Department of Computing and Mathematica Sciences, University of Gamorgan, Pontypridd, CF37 1DL, United Kingdom, rpdavies@gam.ac.uk
More informationDESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION
Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University
More informationResource Allocation via Linear Programming for Fractional Cooperation
1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying
More informationSatellite remote sensing of oil spills at sea
Sateite remote sensing of oi spis at sea Good practice guideines for the appication of sateite remote sensing during oi spi response operations The goba oi and gas industry association for environmenta
More informationBest Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks
IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen
More informationCryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 1 Cryptography Module in Autumn Term 2016 University of Birmingham Lecturers: Mark D. Ryan and David Galindo Slides originally written
More informationIntro to Robotics 110
Intro to Robotics 110 Wecome to the Tooing University. This course is designed to be used in conjunction with the onine version of this cass. The onine version can be found at http://www.tooingu.com. We
More informationFox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM
Fox-1E (RadFxSat-2) Teemetry and Whoe Orbit Data Simuation Burns Fisher, W2BFJ Car Wick, N3MIM 1 Review: Fox-1 DUV Teemetry Fox-1A through Fox-1D are FM Repeater Sateites» Ony a singe downink frequency»
More informationConfiguring RolandVersaWorks to print on your HEXIS media
PRINTING DIVISION Product Buetin N 4 Configuring RoandVersaWorks to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing
More informationNoisy Broadcast Networks with Receiver Caching
Noisy Broadcast Networs with Receiver Caching Shirin Saeedi Bidohti, Michèe Wigger and Roy Timo arxiv:605.037v [cs.it] 8 May 06 Abstract We study noisy broadcast networs with oca cache memories at the
More informationObjective Sound. Chapter 1 AN OLD STORY. Propagation PROPERTIES OF PHYSICAL SOUND
Chapter 1 AN OLD STORY A tree fas over in a wood. Does it make a sound? From one point of view, the answer is that it must make a sound, because the physica requirements for sound to exist have been met.
More informationSimplifying the Controls of an Interactive Movie Game :I
65 CHI 98. 18-23 APRIL 1998 PAPERS : Simpifying the Contros of an Interactive Movie Game :I Jeff Johnson UI Wizards, Inc. 231 Moscow St. San Francisco, CA USA t-14155865285 jjohnson@uiwizards.com ; t.
More informationAreas of the museum to visit for this lesson plan: The Admiral Nimitz Museum and the George H.W. Bush Gallery
Activity Title: Science and Technology Areas of the museum to visit for this lesson plan: The Admiral Nimitz Museum and the George H.W. Bush Gallery Teacher Note: If you are bringing a large group you
More informationSENDING MESSAGES. In the battle that followed, the British navy sank four German ships. Steady chaps!
The Postal Museum, 2010-0423/2 SENDING MESSAGES General Post Office Engineers Communicating with troops on the front line is vitally important in any war. During the First World War, General Post Office
More informationCode Breakers: Uncovering German Messages. by Rena Korb. Scott Foresman Reading Street 4.4.4
Suggested levels for Guided Reading, DRA, Lexile, and Reading Recovery are provided in the Pearson Scott Foresman Leveling Guide. Code Breakers: Uncovering German Messages by Rena Korb Genre Expository
More information