This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"name": "Static-D3-Visualisation", | |
"version": "1.0.0", | |
"description": "Template to make visualisations with D3 locally", | |
"dependencies": { | |
"jsdom": "^3.1.2" | |
}, | |
"devDependencies": { | |
"coffee-script": "^1.10.0" | |
}, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
clear all; close all | |
% Input Parameters | |
shieldxs = [0, 10, 10*cos(pi/3), 0]; | |
shieldys = [0, 0, 10*sin(pi/3), 0]; | |
shieldv = 10; | |
corexs = [4, 4, 6, 6, 4]; | |
coreys = [5*tan(pi/6)+1, 5*tan(pi/6)-1, 5*tan(pi/6)-1, ... | |
5*tan(pi/6)+1, 5*tan(pi/6)+1]; | |
corev = -10; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
\subsection{Natural Language Watermarking and Tamperproofing} | |
In \emph{Natural language watermarking and tamperproofing}, Atallah \emph{et al.} \cite{atallah2003natural} propose a method for steganographically embedding watermarks or fingerprints into plain text. Modern natural language steganography methods attempt to apply steganographic methods to text, without relying on modifying specific formatting parameters, such as \LaTeX or HTML. | |
In this work, authors continue from previous work \cite{atallah2001natural}, and use a similar base concept. The concept depends on fundamental redundancies in language structure and semantics. These two separate areas of redundancy are exploited within this text to embed the hidden message. | |
Firstly, a sentence can be restructured, and maintain the exact same meaning \cite{bennett2004linguistic}. For example, ``Ashley submitted a perfect assignment'' and ``A perfect assignment was submitted by Ashley.'' In these sentenced, the order of the subject and object have been reve |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FROM debian:jessie | |
MAINTAINER Ashley Gillman <[email protected]> | |
# Source working/installation directory | |
ENV INSTALL /usr/local/src | |
RUN echo '[ ! -z "$TERM" -a -r /etc/motd ] && cat /etc/issue && cat /etc/motd' \ | |
>> /etc/bash.bashrc \ | |
; echo "\ | |
===================================================================\n\ | |
= SomeApp Docker container =\n\ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
rule all: | |
input: 'output.txt' | |
rule clean: | |
shell: 'rm input_* intermediate_* output.txt' | |
rule merge: | |
input: dynamic('intermediate_{n}.txt') | |
output: 'output.txt' | |
shell: 'cat {input} > {output}' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# /etc/openconnect_wrapper | |
# swap out SIGTERM for openconnect-friendly SIGINT | |
_term() { | |
kill -INT "$child" 2>/dev/null | |
} | |
trap _term SIGTERM |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
def sieve_up_to(n): | |
possible = list(range(2, n+1)) | |
primes = [] | |
for i, p in enumerate(possible): | |
if p: | |
primes.append(p) | |
for j in range(i, n-1, p): | |
possible[j] = False | |
return primes |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
nix-setup-user() { | |
TARGET_USER="$1" | |
SYMLINK_PATH="/home/$TARGET_USER/.nix-profile" | |
PROFILE_DIR="/nix/var/nix/profiles/per-user/$TARGET_USER" | |
echo "Creating profile $PROFILE_DIR..." | |
echo "Profile symlink: $SYMLINK_PATH" | |
rm "$SYMLINK_PATH" | |
mkdir -p "$PROFILE_DIR" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <stdio.h> | |
#include <stdlib.h> | |
#include <math.h> | |
int main (int argc, char** argv) { | |
unsigned int a, b, c, max, offset = 0, nVars = 0, nClauses = 0; | |
if (argc < 2) { | |
printf ("run using ./ptn-encode MAX [OFFSET=0]\n"); exit (0); } |