Saturday, April 28, 2018

this is so F' complex...why did I choose computing today? ok, started by markov chain time reversible...then...surf, surf, the solving of the equation...is just add a row, like Q1=0 , let me putted like this...you're confusing the confusion of lineal algebra  then...surf, surf, surf...calibration , forget oscillators..you have the decoder, so...use this
Manufacturer of Electromagnetic Vibrator Controllers - Digital Vibrator Controller DVC 05, Vibrator Controller VC 72/ L, Digital Frequency Controller DFC 05 and Vibrator Controller for Vibratory Feeders -VC1500/VC800 offered by Maitry Instruments & Control, Surat, Gujarat

welcome back to war! another day in paradise! ...boolean tribe, get a look at this code ...and particularly " The weights of their machines are different, as they are randomly initialized. If they could synchronize the weights of their machines (without transferring the actual weights, of course) they could then use those weights as a cryptographic key for the rest of their communication. The following algorithm is used to synchronize the weight matrices of Bob's and Alice's machines:.."

Neural Key Exchange using Tree Parity Machine in Python
Python
Latest commit d6ace8e on 24 Jan 2016

 README.md

neuralkey

Neural Key Exchange using Tree Parity Machine in Python
Hi! This is an implementaion of the Neural Key Exchange Protocol in python written with simplicity, understandability and code readability in mind. Suiltable for academic and researh purposes. The code is documented line by line, so lets get straight to theory.

Diffie–Hellman key exchange
If Alice and Bob wish to communicate with each other by exchanging encrypted messages, each of them should be able to decrypt the messages received from the other. And to do so, they have to exchange the keys with which the messages will be encrypted, and should be carefull not to let Eve get hold of the keys, or else she too would be able to decrypt the messages. So a secure protocol should be used for exchanging the keys, or else nosy Eve would be able to read all of Bob's and Alice's messages. Neural or not, the most used protocol for key exchange between two parties A and B is the Diffie-Hellman protocol. Diffie–Hellman Key Exchange establishes a shared secret between two parties that can be used for secret communication for exchanging data over a public network. The following conceptual diagram illustrates the general idea of the key exchange by using colors instead of very large numbers:
Diffe-Hellman

Neural Key Exchange Protocol
The Diffe-Hellman protocol can be implemented using a neural neural network with a single hidden layer (also called a tree parity machine). The number neurons in the hidden layer is denoted as K and the number of input neurons per hidden neuron is denoted as N. There is a weight matrix W between the input and hidden layers of dimensions KxN and the range of each weight is {-L, ..., -2, -1, 0, 1, 2, ..., +L} where L is a parameter of the tree.
tpm
Both Bob and Alice posses tree parity machines with same set of parameters (KN and L). The weights of their machines are different, as they are randomly initialized. If they could synchronize the weights of their machines (without transferring the actual weights, ofcourse) they could then use those weights as a cryptographic key for the rest of their communication. The following algorithm is used to synchronize the weight matrices of Bob's and Alice's machines:
algorith
For a given random input vector x (of dimensions [K,N]), the output (tau) of a tree parity machine is computed as follows:
eqn1
eqn2
eqn2
eqn3
eqn4
And if the outputs of both Alice's and Bob's machines are equal, their weights are update using any of the following rules:
  • Hebbian rule:
hebbian
  • Anti-hebbian rule:
anti-hebbian
  • Random-walk:
random-walk

The Code

The code is heavily documented. It consists of 4 files, machine.py, which defines a tree parity machine, update_rules.py, which contains functions for all the three update rules, run.py which simple creates 2 machines with default parameters and try to sync them and eve.py which is similar to run.py, except that nosy Eve will be trying to sync her machine with Alice's and Bob's. Will she get what she wants?
Installation
sudo git clone http://www.github.com/farizrahman4u/neuralkey.git
cd neuralkey/neuralkey
python run.py
python eve.py
Requirements
TODO
  • Simulate Eve and man in the middle attack
  • Improve visualization

#Bye!!

Friday, April 27, 2018

ok. So this goes...more expertise than usual. But its not that difficult. You'll need to download this packet . This packet encodes the iris on giTF dots (images) ...so let me put this simple...their encryption, is not encryption the way we usual understand...because the machine verifying is only a mouse cursor. All you need, is to have 100 iris on your mobile phone, passing each second, and all encoded with this
A C++ library for decoding and encoding glTF files.

Create a digital copy of voice

back to war...again
Lyrebird - Create a digital copy of voice
This beta version allows anyone to create their digital voice with only one minute of audio. Simply sign up, record yourself for at least one minute and you will be able to generate any sentence…
LYREBIRD.AI
you need to program it ...and glue it on a silicone layer on your trwoat...and do the job
1x RT 5350F RTS350F RT53S0F RT535OF RT5350 RT5350F BGA196 IC Chip | Business & Industrial, Electrical & Test Equipment, Electronic Components | eBay!
EBAY.CA

Good morning! welcome back to war! So...what was missing yesterday?
China offices in different provinces. The huge human resources in. . | eBay!
EBAY.COM

Thursday, April 26, 2018

face printing

OK, I felt kind of stupid when my friends just said to me...you get me a face mold printing shit...and then we let you know... so...I thought this shit was granted already...silly me...so...news of the day, print an assholl face, and whatever you do...remember me. 1st "scanning is with the Kinect and the software Skanect" 2nd 1) Connect the Kinect to the computer USB port;
2) Open Skanect software and change the setup information;
2.1) Skanect: 
At “Prepare” window I went to New / Start a New Scan / Define Scene as “Body” / Let the Bounding box to be 1 x 1 x 1 meters / Defined the path to save the file. At Settings I changed the “Recording Feedback” to GPU (Graphic Processing Unit) in order to get a better scanning / In “Feedback Quality” I let the default “Medium” quality for not overloading the computer capacity / In “Offline Recording I checked “All Frames” (default) and turned off the “GPU Live Point Cloud”.
3) After defining those additional settings I started the scanning on the window “Record”. There I defined the scanning time period (20 seconds) and the timer before start scanning (5 seconds). 3rd generate the mesh in the Skanect software and exported it to a PLY format 4th send the file to print in a software called VCarve:
1) Check the material size and the final object size.
2) Define the mill diameter (6mm) and type (helicoidal);
3) Determine the space between each milling layer (the time of carving can be determined here), the less space between each mill path the better will be the resolution;
4) Adjust the “Finishing” parameters;
5) Referencing the mill while resetting the X/Y/Z axes;
...back to war! so we already have 4 different channels, coming from the Passive Optical Network from the operator , on our router. Let's convert this fiber to fiber connection, and have lots of partitions
(Ethernet )and 100base FX (fiber optic);. --Core optical fiber can be completed in just one way signal transmission compared to dual fiber optic data transmission. --An…
Welcome back to war! don't ever undermine the enemy. The operators, on the distribution box of fiber use a PLC splitter module. This fused fiber optics splitters, divide the light beam, into several channels. if you connect this to your router, you will be having internet, in 4 different channels, based on a single IP address. Let me have my humble breakfast...because like in everything in computing science nothing comes easy
网立方 全新1分2 FC APC光纤分路器一分二尾纤式分光器可定制光比. FC 单模光纤法兰盘 光纤连接器 耦合器 光纤转换器 电信级适配器. 网立方…
EBAY.COM