-
Posts
7862 -
Joined
-
Last visited
-
Days Won
26
Content Type
Profiles
Forums
Events
Everything posted by Sensei
-
Suppose so we have a Java (e.g. Android mobile game) code with a base class Item and a set of items: public class Item { public String what; public Item( String what ) { this.what = what; } } public class Key extends Item { public Key() { super( "key" ); } } public class Cat extends Item { public Cat() { super( "cat" ); } } public class DeadCat extends Item { public DeadCat() { super( "deadcat" ); } } If the Box code is: public class Box extends Item { public Box() { super( "box" ); } public Item open() { List<Item> items = new ArrayList(); items.add( new Key() ); items.add( new Cat() ); items.add( new DeadCat() ); Random random = new Random(); random.setSeed( System.currentTimeMillis() ); return( items.get( random.nextInt( items.size() ) ) ); } } What the player gets is drawn at random when the box is opened. setSeed() is set to current date and time in milliseconds. The moment of opening the box by player causes "collapse". The game superadmin/admin could not check in advance what players will receive. In has the advantage of not taking up memory to store the hidden element. But if the code is: public class Box extends Item { private Item hidden_item; public Box() { super( "box" ); List<Item> items = new ArrayList(); items.add( new Key() ); items.add( new Cat() ); items.add( new DeadCat() ); Random random = new Random(); random.setSeed( System.currentTimeMillis() ); hidden_item = items.get( random.nextInt( items.size() ) ); } public Item open() { return( hidden_item ); } } The hidden contents of the box are fairly well known to the computer from the moment the box is created, but are not revealed until the player opens the box. The game superadmin/admin can check in advance what players will receive. But if the code is: public class Box extends Item { private static final Random = new Random(); private Item hidden_item; public Box() { super( "box" ); List<Item> items = new ArrayList(); items.add( new Key() ); items.add( new Cat() ); items.add( new DeadCat() ); hidden_item = items.get( random.nextInt( items.size() ) ); } public Item open() { return( hidden_item ); } } The order of hidden objects is not only known, but always the same, regardless of time. "superadmin" knows what the box contains only if its contents were generated when the box was created. The advantage of leaving it "empty" is less memory consumption. In the physical world, objects are made up of atoms that can be assigned unique identifiers (mass behavior, quantum number behavior, etc.), So what's in the box is defined from the BB. The rock on the moon may have been there for billions of years. Or maybe it was generated when the astronaut arrived on the Moon?
-
I think it's worth noting that this is not about COVID-19 and flu, but about RNA viruses vs DNA viruses. https://www.google.com/search?q=rna+mutations+vs+dna+mutations+viruses "Rates of spontaneous mutation vary amply among viruses. RNA viruses mutate faster than DNA viruses, single-stranded viruses mutate faster than double-strand virus, and genome size appears to correlate negatively with mutation rate." "RNA viruses have high mutation rates—up to a million times higher than their hosts" https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6107253/ "Their inherently high mutation rates yield offspring that differ by 1–2 mutations each from their parent [9], producing a mutant cloud of descendants that complicates our conception of a genotype’s fitness. Their ability to rapidly change their genome underlies their ability to emerge in novel hosts, escape vaccine-induced immunity, and evolve to circumvent disease resistance engineered or bred into our crops [10, 11]. On the other hand, their mutation rates are an exploitable Achilles’ heel: researchers and clinicians can increase RNA virus mutation rates using nucleoside analogues, and a 3–5-fold increase in mutation rate causes lethal mutagenesis in human-infecting viruses like poliovirus and influenza [12, 13]. The exogenous mutagen causes enough additional mutations, which are often deleterious, so that the progeny RNA viruses are of lower fitness, eventually leading to ecological collapse of the population"
-
Why did you choose this and not a molecule that has slightly different properties, i.e. heavy water D2O and semi-heavy water DHO? Different enough to be lethal to mammals. "The only known exception is the anhydrobiotic nematode Panagrolaimus superbus, which is able to survive and reproduce in 99.9% D2O. Mammals (for example, rats) given heavy water to drink die after a week, at a time when their body water approaches about 50% deuteration." https://en.wikipedia.org/wiki/Heavy_water Some isotopes are simply too rare. To be able to measure the differences for a complex system such as the human or animal body, one would have to be able to create it in milliliters or liters. IMHO, an interesting project for researchers..
-
There are more than 3,200 isotopes of elements. Most of them are unstable or extremely unstable. Only a percentage of them are stable enough to form molecules. The same can be said of molecules. But in the vacuum in cosmic space, once they are created, there is nothing to react for a long time. Rare (extremely reactive) molecules on Earth, in cosmic space are "common".. https://www.google.com/search?q=the+most+common+molecules+interstellar Did you hear about polymers? https://en.wikipedia.org/wiki/Polymer "A polymer (/ˈpɒlɪmər/;[4][5]) is a substance or material consisting of very large molecules called macromolecules, composed of many repeating subunits.[6] Due to their broad spectrum of properties,[7] both synthetic and natural polymers play essential and ubiquitous roles in everyday life.[8]" By swapping one or more atoms for other elements, in different places, you get a different molecule, with slightly different physical or chemical properties. How many different macromolecules, polymers or biopolymers (RNA, DNA) can be created from a few simple elements? Should we consider them as independent molecules or not?
-
If you type "iq test" in the search box of an Internet search engine, one of the first results is the "Mensa IQ Challenge". https://www.mensa.org/public/mensa-iq-challenge They offer a test with 35 questions to be solved in 25 minutes, which is average 42-43 seconds for each. If you don't know the correct answer, they suggest you guess it.. They claim that time is not measured. If we believe this, it means that only points count. So you can get from 0 to 35 correct answers. The score will range from 85 to 145 IQ points. Looking at my example above, you have 1) a limited number of questions you need to answer 2) limited time to do so (or unmeasured time) 3) the probability of guessing the correct answer without any intelligence. ps. People in express chess often lose due to lack of time to move..
-
That example occurred to me after I had asked the question. So the particles collide and as a result new particles result. Do they accelerate away from the region where the "parent" particle was? Or do they travel like a photon ,either at zero velocity or at c? If the latter then they don't accelerate and the acceleration as in "particle accelerator " is a classical process. Calculations at CERN/LHC or any other particle accelerator, or near the speed of light, are done in CoM (Center-of-Mass/Center-of-Momentum) FoR (Frame-of-Reference). https://en.wikipedia.org/wiki/Center-of-momentum_frame https://en.wikipedia.org/wiki/Center_of_mass In this FoR, all kinetic energies of all particles participating in this collision, must exceed the masses-energies of the all newly formed particles after the collision. The remaining energy (if it exceeds the threshold *) is carried by the newly formed particles as their kinetic energy (including photons and neutrinos). Calculations made in CoM are translated into laboratory ("lab frame", "local") FoR, to learn to what velocity particles are required to accelerate at particle accelerator. https://en.wikipedia.org/wiki/Local_reference_frame *) in the case of Pion meson it is called "pion threshold creation" https://www.google.com/search?q=pion+threshold+creation If you look at my 2017+ posts, you should find that I have repeatedly attached the URL to an article where physicists showed how to calculate pion threshold creation and how to convert from CoM to lab frame.. Check this out https://galileo.phys.virginia.edu/classes/252/particle_creation.html Acceleration means change of velocity. Fly through vacuum ("near vacuum conditions") with no interactions is continuous without disruptions and at constant velocity, until some interaction happens. The more particles, the more interactions, thus slowing down and losing (kinetic) energy. In particle accelerators, physicists specifically place strong magnetic fields to find out what are charges of the newly created short-living particles. This forces charged particle flying in "circles", which directions and radius depends on applied magnetic field, particle kinetic energy/velocity/momentum, charge, etc.
-
Aren't CERN and the LHC examples of accelerators that accelerate quantum particles to near the speed of light? New (usually short-lived) particles appear, and other particles are destroyed into smaller components, etc. etc.
-
@fiveworlds is right. Read about IEEE 754 resolution. https://en.wikipedia.org/wiki/IEEE_754 Table: https://en.wikipedia.org/wiki/IEEE_754#Basic_and_interchange_formats ps. In simple cases, it may help to change the order of operations in the equation. For example, adding/subtracting 1 to 10^-20 will result in truncated fractions..
-
That's why people invented checksums, hash functions, digital signatures.. and a pretty simple project for a first-year student with just socket(), listen(), accept(), connect(), send(), recv(), close(), fopen(), fread(), possibly select() (for async), which has just raw data, will grow to a pretty complex.. just to detect malicious data in our stream.. In the worst-case scenario, if you send an (unused yet) offset to the secret key to the other party (to regain any encrypted communication after introduction of any malicious data in the stream), MITM could use DoS/DDoS to cause the secret key to be depleted on the machines.. 64 GB / 100 Mbps (12.5 MB/s) = ~ 5243 seconds..
-
We have two phones or two computers. They open a connection from one to the other over a potentially hostile environment, the Internet. One uses socket send(), the other uses recv(), and then vice versa. One byte sent, one byte received, so the sender's counter is incremented accordingly. The same thing happens to the counter on the receiving machine. All good if there is no MITM which intercepts the connection and injects the bytes in the middle of the stream, resulting in machines being at different offsets in the secret key.. ..all is good as long as there is no MITM, then why encrypt and decrypt messages..? .. anyone can pretend to send a text message from any GSM number. The receiver sees the "correct phone number", but from MITM or whomever in the case of SMS/MMS. The message that will be decoded into the trash and offset to the secret key on the receiver of such a message will have a different value than on the 2nd machine.
-
Once the zero-day is revealed to public, anyone can use it against devices with older vulnerable versions of the operating system or software. You can get root on any Windows 7 and 8 system (including Server and Enterprise versions) with default settings and on any Mint Linux system.. ..it just tells that their customers are idiots..
-
If someone has an iOS older than 14.8, Pegasus can instantly remotely hack it, as long as they have Internet access: https://www.macrumors.com/2021/09/13/ios-14-8-zero-click-exploit-pegasus/ If someone has an iOS older than 16.6.1, Pegasus can instantly remotely hack it, as long as they have Internet access: https://medium.com/@letshackit/apples-ios-16-6-1-update-fixes-severe-zero-day-exploit-used-to-install-pegasus-spyware-dca4aafd25ef
-
..sending random data to the recipient would result in desynchronization. They would be in different bytes of the key.. The keyword here is "single-use", which is virtually impossible. Sooner or later you will end up sending the same key again. Plaintext with all zeros XOR key = key. Basic human communication in ASCII has few zeros (8th bit will be mostly 0), but binary data has many zeros, e.g. an ISO image can have an area with 32 KB of zeros, UTF-16 usually have 0 byte every two bytes, etc. etc. The key must be generated in some way. Discovering the key generation algorithm increases the chance of decoding the signal. Instead of brute force WiFi password hacking, you can check the device manufacturer and see how they created the password creation algorithm.. https://www.google.com/search?q=access+point+wifi+password+generation+algorithms or this: https://hackaday.com/2016/01/27/tp-links-wifi-defaults-to-worst-unique-passwords-ever/ "TP-LINK’s WiFi Defaults To Worst Unique Passwords Ever" Desynchronization forced by a third party or transmission errors will require resending the data.
-
hijack from Was Nietzsche talking about the 2nd coming of Jesus?
Sensei replied to Oobermensch's topic in Trash Can
..you are "borken" too, I am afraid..- 33 replies
-
-1
-
In the United States and UK, the names of criminals are published by the media.. and you can see the results - everyone knows the names of the serial killers (now even TV and Netflix series are created about them, what they did and how, with details), and they started to like it ("fame"), and copycats appeared, mimicking previous murders of serial killers based on detailed photos of police investigations that the media published.. Osama bin Laden was inspired by hijack of other airplane, Air France Flight 8969. Mass media and politicians worried to let this airplane flight to the France to Paris and hit some building. https://en.wikipedia.org/wiki/Air_France_Flight_8969 "We received this information directly from members of the Algerian secret service. And this information was very worrying. The terrorists' true aim was to crash the plane in Paris. — French Minister of the Interior Charles Pasqua[6]" Public shaming, by revealing detailed information about their bad deeds, works against some, but also inspires others. Welcome to China and its points system. People cannot travel on public transportation, buses, trains, planes, etc. because they have too low score. https://en.wikipedia.org/wiki/Social_Credit_System https://en.wikipedia.org/wiki/Social_Credit_System#No-fly_and_no-ride_lists ps. The neighborhoods surrounding the homes of millionaires and billionaires are usually pretty darn clean..
-
...my dislike is toward philosophy rather than you, my child.. ps. Once I said that if one wants to train the brain, one should train the creation of algorithms.. ..if I will destroy you tube, will be it understandable answer from my side for disagreement for whatever you will say and backup it with a video.. ? ps. You will say that their servers don't work.. I guess..
-
Why did blue eyes proliferate?
Sensei replied to TheVat's topic in Evolution, Morphology and Exobiology
Accident. Next time it may not be case if someone takes gene-altering drugs. ps. I introduced this as novel information in case it was not noticed by forum members.. -
Why did blue eyes proliferate?
Sensei replied to TheVat's topic in Evolution, Morphology and Exobiology
In some people, the eyes turned blue overnight: https://nypost.com/2023/09/05/babys-brown-eyes-turn-blue-overnight-after-covid-19-treatment/ -
It would fit this thread only if I suggested that "every man is a thief".. ps. You do that quite often, like "pulling a rabbit out of a hat", which suggests that you have been preprogrammed that way.. ps2. You seem to have some unnatural and inexplicable attraction to philosophy.. The code should be fixed. Otherwise you will talk to me like in "Westworld"
-
I am a "master of efficiency".. On of the first "paid" jobs in my new coming in '90 was converting C/C++ to Motorola 68k and PowerPC assembler.. ps. "paid" because the service provider didn't pay as much as we agreed.. He unexpectedly earned too much and decided to screw me.
-
Passing you through online translator did not make you any more understandable..
-
What former (from my list)? Former are people working at polling stations.. ..then you shouldn't be ambiguous (and pay special attention not to be ambiguous in the future).. Otherwise there will be meaningless "what did you mean" or "misunderstandings" derailing the thread.. ...I was referring to "his minions"...