Everything posted by shivajikobardan
-
Composite transformation using matrices, where did my approach go wrong?
Here is the problem: A square plate has vertices at A(1,1), B(-1,1),C(-1,3), and D(1,3). It is translated by 5 units along the +x-direction and then rotated by 45 degrees about P(0,2). Determine the final coordinates of the plate vertices. My answer: I will take point A(1,1) and transform it only. Order of transformations: First translate then translate+rotate+translate-back Initially, This is the translation matrix This is the A's coordinates matrix. Now we multiply them and get For rotation, we translate first by -2 in y-axis. we still get the same result of matrix. then rotate by 45 degrees After translating back to by +2 in y, we still get the same as above. The rotation matrix that I have used is Where did my approach go wrong?
-
Is there some restrictions on values of p,q,d,e etc in RSA algorithm while trying to encrypt English Ciphertext?
I'll present few cases of RSA encryption: [math]CT=(PT)^e mod \, n[/math] [math]PT=(CT)^d mod \, n[/math] CT= Cipher Text PT=Plain Text e*d/m should give remainder 1, where; m=(p-1)*(q-1); where p, q are 2 prime numbers. A) Sender takes p=3, q=11. The value of e=3, d=7 satisfied the remainder=1 condition. So, if sender wants to send "SELL": S=19, CT=28 E=5. CT=26 L=12, CT=12 L=12, CT=12(? What to do to not get the cipher text same as plain text without making things too complex and still being able to do it in paper manually?) B) p=2, q=11 e=3,d=7 I'll only write CT here(i.e S=17 means that 17 is a cipher text for S after RSA encryption): S=17 E=15 L=12 L=12 (Same here? why? Because of d,e being the same?) C) p=13, q=11 d=13, e=37 So, S=95 E=93 L=12 L=12 (Again got the same value, what is this? Even with different values of p,q,d,e!) Questions: a) Is there any restrictions if among p or q, anyone should be greater? b) Is there any restrictions like which of the d or e should be greater? I know e<m and e>1 And e should be relatively prime to m, i.e GCD(e,m)=1. GCD(13,120)=1 For d, de mod m=1 c) Would there be any cases, where while decryption, we would not be able to get the plain text due to some reasons (like if not choosing values properly for d,e,p,q in english alphabet encryption? This is the main confusion that is making me ask this )
-
What's the technique used by this teacher to solve ax+by=GCD(a,b) in RSA Algorithm-Cryptography?
https://www.youtube.com/watch?v=di3OXhHMZmI It starts at 6:16 It's the part where he's pointing his hand in this picture. I didn't get it although it's pretty mechanical, so I'd like to learn that technique as this is really useful in RSA algorithm(rather than having to memorize some values). I've been searching for a method like that since I saw this problem(been months) but could not find a technique like that. And it was always about just do it rather having any mechanical method like this one. So, I want to learn this. Or, if you have any other simple methods to solve this equation, please tell me
-
Galois Field multiplication in AES, I got E3 using my method, but the answer is D3 in book.
This is taken from this book: https://books.google.com.np/books?id=k-rKDwAAQBAJ&pg=PA91&dq=advanced+encryption+standard&hl=en&sa=X&ved=2ahUKEwj_nIeU6t75AhUMGKYKHbJWDms4oAEQ6AF6BAgGEAI#v=onepage&q=advanced%20encryption%20standard&f=false Page 102 I've used this method given in this pdf below to calculate "mix column" step output. https://www.networkdls.com//Articles/AESbyExample.pdf It's in page number 9. I'm trying to find this below ( + means XOR here) 1*36+2*b9+3*a5+3*38 =36+69+f4+48 =e3
-
Data Encryption Standard Confusion
First I'll give some context about how the book's written as many books are presenting it in different ways. Reference: CRYPTOGRAPHY AND INFORMATION SECURITY, THIRD EDITION By PACHGHARE, V. K. Confusions: 1) Why is Expansion Permutation called so? The name sounds very contrary to what what you'd expect a Expansion Permutation to do. You'd expect it to work like say 4:16 decoder. 2) Why is Expansion Permutation done here? The number of bits remained the same. What's the difference? Or are we calling after discarding parity bits as "Expansion Permutation"? 3) Plus I'm reading some answers here and there. And I'm hearing that the information that I presented here is wrong. 4) One comment I saw in some other post is that, "(IP) and and (EP) are applied to the plaintext, not the key" https://en.wikipedia.org/wiki/Data_Encryption_Standard According to it, Wikipedia vs my first source: a) No initial permutation is done on key. b) No expansion permutation is done c) Only left shift happens, no right shift as shown in my first figure. There're some other sources which seem to be taken from wikipedia and sound similar to it. They're given follows. Others: 1) https://www.lri.fr/~fmartignon/documenti/systemesecurite/4-DES.pdf Go to page 19. So, which one should I believe? I think WikiPedia should be believed as many are copying from it, but I'm not sure. Which version is correct according to the actual DES? 2) Source: https://academic.csuohio.edu/yuc/security/Chapter_06_Data_Encription_Standard.pdf
-
Is the key of this encryption(transposition cipher) correct? I think it should've been 524736, what do you think?
- poker test probability confusion
An example of how probabilities are calculated in poker hand. Probability and Statistics with Applications: A Problem Solving Text By Leonard Asimow, Ph.D., ASA, Mark Maxwell, Ph.D., ASA You can ask me for more details about question, I won't paste them here, as it'd make the question too lengthy to view. What problem I'm trying to do? I am trying to find expected probability for random number independence testing aka poker test. We've 10,000 random numbers of five digit each. They're assumed to be independent. My calculations-: 1) Full house 10C1*9C1/10,000 =0.009 I'm correct. My only confusion here would be the denominator. Why is it 10,000? According to the above example, should not it be 10C5? Explanation of my thought process-: First pick 1 digit out of 10 digits. Then next, pick another digit(only 1 digit as we need a pair), out of remaining 9 digits. 2) 1 pair: Again I looked at that highlighted figure. For one pair, from 10 digits, choose 1 digit. That 1 digit makes a pair. Now you've remaining 3 choices. But none of those choices can be same to each other. So, 10C1*9C1*8C1*7C1/10,000 =0.504 I'm correct here as well. 3) 3 of a kind: Here, I need to pick only single digit for 3 places, then 2 different digits for the remaining 2 places. So, 10C1*9C1*8C1/10,000 =0.072 Here, also I'm correct. But not anymore. 4) Four of a kind: So from 10 digits, I need to pick 1 digit and out remaining 9 digits, I need to pick another 1 digit. So, it should be 10C1*9C1/10,000 But it becomes similar to full house. This is wrong. I don't get why this became wrong. 5) 5 different digits: This should've been simple, I got the answer but I got the answer greater than 1. 10C1*9C1*8C1*7C1*6C1/10,000 =3.024 I'm not sure why I got this. I am skeptical about the denominator since the start as I feel that's randomly chosen here unlike above where we did 52C5. If I increase 1 "zero" in denominator, the answer would be correct. (I've seen techniques like 10/10*9*10*8/10*7/10*6/10, but i prefer to do it as per the first poker example figure I showed so that it becomes simple for understanding). 6) Five of a kind: It should be 10C1/10,000 =0.001 but it is instead 0.0001, so it's asking for another "zero" in the denominator for correct answer. I don't know why. We have just 10,000 random numbers. This is the reason for studying this-: https://genuinenotes.com/wp-content/uploads/2020/03/Random-Numbers.pdf- Lucene confusion big data analytics
These are the steps of indexing in Lucene given in our syllabus-: I understand the second step clearly. But I don't understand the first and third step. It's not mentioned clearly in this figure imo. Can you clear my confusion? Plus the sources that I refer don't even mention it like this, they explain it differently. I'm not sure from where this is copied from. What are we doing in first vs third step as written in that figure text? Why was indexwriter created first and not used later? Because according to my information that I've collected, you can also use indexwriter to add/remove/update indexes. I've a good feeling that all of this information is incorrect but this is what's written in my teacher's notes so I'm not 100% sure of it. And even if it's wrong, they'd expect us to write the same thing in exam, so I've to learn it.- Find the probability of using coke for a current pepsi user in 4th purchase?Markov Model problem.
Design the markov model and transition matrix for the given data. Answer the following questions based on the mode. a) If a person purchase coke now the probability of purchase of coke next time is 80%. b) If a person purchases pepsi now the probability of purchasing pepsi next time is 70%. Then, Find the probability of using coke for a current pepsi user in 4th purchases-: My solution-: This is the transition diagram. This is the transition probability matrix-: So, what I did was basically to Took this TPM(Transition Probability Matrix) to the power 4. My basis for doing this was this source-: https://www.math.pku.edu.cn/teachers/xirb/Courses/biostatistics/Biostatistics2016/Lecture4.pdf So what I got was-: Now I am assuming that the rows means FROM and column side means TO. And the first element of row and column is "Coke". So, to find from Pepsi to Coke, I'd go to second row and first column, the value would be 0.5625 But the problem is that, I've conflicting source which claims the answer is sth else-: It solves it like this-: P=TPM p=Current distribution=[0 1] Now, for 2nd purchase p²=p*P=[0.3 0.7] For 3rd purchase-: p³=p² * P =[0.45 0.55] For 4th purchase-: =[0.525 0.475] Thus, it concludes that the required answer is 0.525. Which one is correct in your opinion? Plus admins, please fix this issue. I'm not getting reply notifications once I ask and receive an answer.- What is the difference between activity and event in "simulation"?
I am studying about components of a system. Activity-: It is What entities do to cause changes is activity. It is represented by time period of a specified length. Event-: Event is defined as an instantaneous occurrence that might change state of the system. Endogenous events occurs within the system and exogenous events occurs outside the system. eg-: making a deposit is an activity, arrival of customer is an exogenous event and completion of service of a customer is an endogenous event. I don't see any difference between them. making deposits can also be an event as it'll change the state of the system. i.e money in bank account. The one difference that can be taken from these definitions is "instantaneous" vs "time period' but the examples don't deliver anything about it. Below is the figure from a slide available online.- Authentication in Pretty Good Privacy Confusions
We want authentication ie -> the source written in the received message should be the actual real source that sent the message. ->information should not be altered in the way (data integrity) So to support this, book does this. But I can’t realize how it is helping authentication? How do we know the source in the received message is actual source? (You might say by comparing the received hash and computed hash of received email message) but that I can’t feel it how. Leaving PGP aside, What is the best way in real life to know that the message is sent to me by someone whom I know? Maybe if we have some well established secret code between us. authentication means-: 1) when information is received from a source, authentication means that source is indeed as alleged in the information. 2) information was not altered along the way. this authentication is also referred to as maintaining data integrity. RSA at sender-: with sender's private key My genuine questions(I am aware about symmetric and assymetric encryption-here the text explicity said public key for encryption and private key for decryption. Any scientific reason behind that) { Why not use sender's public key here? Why not use receiver's private key here? Why not use receiver's public key here? } RSA at receiver-: with sender's public key. { Why not use sender's private key here? Why not use receiver's private key here? Why not use receiver's public key here? }- What will be paramters to be consider while designing solar mini grid in village?
Got this question in one of the previous year questions. Not sure what would be its answer as it is not included in the reference textbook, reference pdfs etc. Can you guide a bit about this?- When is a problem said to be decidable or undecidable?
Definition 1-: Taken from here-: https://research.cs.queensu.ca/home/cisc462/moni/m3.pdf This in my opinion, just makes things complicated. Decision problem is just something where we get output in the form of yes/no…T/F…etc. But it says it gives input true or false…can you give me example about that? I thought the goal of decision algorithm should be to find answer in the form of yes or no. Definition 2-: Source-: http://www.cs.virginia.edu/~evans/cs302/classes/class17.pdf This says something else. Definition 3-: Source-: https://www.youtube.com/watch?v=WdWbi5-OIy8 This says something else. I am confused in this seemingly simple thing. What I feel is that “if there is an algorithm to solve it(basically a turing machine) then it is decidable”...else undecidable. Am I right?- Few confusions about halting problem is unsolvable proof-:
How can same machine take same machine as input(is it same machine taking encoding of itself as input—if that’s the case, what does that means some examples to understand this)? (in Universal Turing Machine, i know it was possible). What does that even mean here? I feel like adding a turing machine flipper is like cheating and should not be allowed as well.- Regular expression to NFA-confusing regular expressions-:
R=(01+010)* For it I made the below nfa which i believe seems correct. Plus the tutorials that I am following also make sure it’s correct. Q0 is initial state(forgot to mention in figure). R=(01)*+(010)* But idk how to convert this to NFA What will be languages accepted by this NFA? Won’t it be the same as the above one? (for some different question) I got small hint about this. It was to add epsilon transition, but I don’t understand the need for it. Source-: https://www.cs.wcupa.edu/rkline/fcs/nfas.html- Confusions about finding equivalence classes for the set of natural numbers corresponding to equivalence relation a+b is even.
- LZW decoding-:There is no entry for index 7 in the dictionary while decoding, how do I fix this issue?
Source of my knowledge-: Encoding-: https://www.youtube.com/watch?v=9gkiphD-VIY Decoding-: https://www.youtube.com/watch?v=XSYSVEqFnes&t=27s Other references-: https://www.youtube.com/watch?v=55oV3HriCjg Question-: There is no entry for index 7 in the dictionary while decoding, how do I fix this issue?- Why do we use CMYK color for printing?
I will tell my research that i have done earlier here. CMYK is used for print pieces like brochurers and business cards. For RGB we need to start on black paper but we can't add light until we reach white because light can't be painted on surface, what does this bold content means to say? in a monitor, light is being emitted (or added)when you add r,g,b you get white...in ink light is being absorbed(or subtracted) and when you absorb r,g,b you get black if rgb is used, you get strange, muddy, and incorrect colors from printer. (but the question is why) cmy cover most lighter color range quite easily compared to rgb. I want if possible some mathematical representations of this...thanks- Confusion on motion estimation block diagram-MPEG video compression-:
My doubts are as follows-: -> Why frame n is not segmented to blocks? -> Why no inputs from (n-1) side for block matching? -> What do we do in prediction error coding? Source-: https://homepages.inf.ed.ac.uk/rbf/CVonline/LOCAL_COPIES/AV0506/s0561282.pdf I have read this many times but that didn’t help to clear my doubts. https://www.youtube.com/watch?v=deyyXiTsvB0&list=PL6wr_B29b3UR5weQ80W8aYMkxEAz92IIC&index=73 This video. This confused the hell out of me.- Why men and society so important to engineering profession?
I didn't find any resources regarding this topic. Can you help me with some points on how men and society would be important to engineering profession.- Except the fact that database is a part of information system, what are differences between information system and database system?
Can you tell it? I googled I didn't find. Maybe you guys can help me.- what is minimum requirement vs specific requirements to be called in as intelligent agent for any software code piece?
https://uobrep.openrepository.com/bitstream/handle/10547/223815/ESWA agent paper -v2.pdf;jsessionid=16B243A8F6C1FC1242A75969D18D00B7?sequence=5 here is some information but i am unable to dcode what is minimum requirement vs specific requirements. can you help me a bit in this case?- Difference between fully integrated vs loosely integrated enterprise-:
I have been banging my head on the wall to find the difference between these two online. I have found only 1 resource which seems bs to me. here it is.. https://ioesolutions.esign.com.np/notes/text-notes-show/Enterprise-Management-System can you help me understanding what these two terms essentially mean? is this loose coupling and tight coupling stuff? or what is this?- Classification of web usage mining confusion-:
I don't understand what these things are trying to say in gist. Please guide me a bit-: There are 3 types of web usage mining-: 1) web server data the user logs are collected by the web server. typical data includes ip address, page reference, and access time. 2) application server data commercial application servers have significant features to enable e commerce applications to be built on top of them with little effort. a key feature is the ability to track various kinds of business events and log them in application server logs. 3) application level data new kinds of events can be defined in an application, and logging can be turned on for them thus generating histories of these specially defined events. it must be noted, however ,that many end applications require a combination of one more of the techniques applied in the categories above. what is the gist of all of these. what is the summary of what it is saying? what is this paragraph trying to say? i can't understand. please guide me a bit.- what is difference between cold start vs early rater problem in collaborative filtering-recommender system?
cold start-: system requires huge amt of current user data to make accurate predictions early rater-: new user hasn't rated many items to make predictions. both same? isn't it? - poker test probability confusion
Important Information
We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.