Generations of Computer
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (19391945). -
Wearable-Based Pedestrian Inertial Navigation with Constraints Based on Biomechanical Models
Wearable-based pedestrian inertial navigation with constraints based on biomechanical models Dina Bousdar Ahmed∗ and Kai Metzger† ∗ Institute of Communications and Navigation German Aerospace Center (DLR), Munich, Germany Email: [email protected] † Technical University of Munich, Germany Email: kai [email protected] Abstract—Our aim in this paper is to analyze inertial nav- sensor to correct the heading estimation [4]. The combina- igation systems (INSs) from the biomechanical point of view. tion of inertial sensors and WiFi measurements is useful in We wanted to improve the performance of a thigh INS by indoor environments. Chen et al. use the position estimated applying biomechanical constraints. To that end, we propose a biomechanical model of the leg. The latter establishes a through WiFi measurements to correct the position estimates relationship between the orientation of the thigh INS and the of an inertial navigation system [5]. The latter is based on a kinematic motion of the leg. This relationship allows to observe smartphone. the effect that the orientation errors have in the expected motion The detection of known landmarks, e.g. turns, elevators, etc, of the leg. We observe that the errors in the orientation estimation can improve the position estimation. Chen et al. [5] incorporate of an INS translate into incoherent human motion. Based on this analysis, we proposed a modified thigh INS to integrate landmarks to improve the performance of their navigation biomechanical constraints. The results show that the proposed system. Munoz et al. [6] use also landmarks to correct directly system outperforms the thigh INS in 50% regarding distance the heading estimation of a thigh-mounted inertial navigation error and 32% regarding orientation error. -
How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma. -
Technical Details of the Elliott 152 and 153
Appendix 1 Technical Details of the Elliott 152 and 153 Introduction The Elliott 152 computer was part of the Admiralty’s MRS5 (medium range system 5) naval gunnery project, described in Chap. 2. The Elliott 153 computer, also known as the D/F (direction-finding) computer, was built for GCHQ and the Admiralty as described in Chap. 3. The information in this appendix is intended to supplement the overall descriptions of the machines as given in Chaps. 2 and 3. A1.1 The Elliott 152 Work on the MRS5 contract at Borehamwood began in October 1946 and was essen- tially finished in 1950. Novel target-tracking radar was at the heart of the project, the radar being synchronized to the computer’s clock. In his enthusiasm for perfecting the radar technology, John Coales seems to have spent little time on what we would now call an overall systems design. When Harry Carpenter joined the staff of the Computing Division at Borehamwood on 1 January 1949, he recalls that nobody had yet defined the way in which the control program, running on the 152 computer, would interface with guns and radar. Furthermore, nobody yet appeared to be working on the computational algorithms necessary for three-dimensional trajectory predic- tion. As for the guns that the MRS5 system was intended to control, not even the basic ballistics parameters seemed to be known with any accuracy at Borehamwood [1, 2]. A1.1.1 Communication and Data-Rate The physical separation, between radar in the Borehamwood car park and digital computer in the laboratory, necessitated an interconnecting cable of about 150 m in length. -
Application of Advanced Technology to Space Automation
MCR-79-509 N79-1901 2 (NASI-CR-18350) APPICATION OF ADVANCED TECHNOLOGY TO SPACE AUTOMATION Final Report (Martin Marietta Corp!) 325 p HC A14/MF A01 CSCL. 22A Unclas G3/12 15352 Application of Advanced Technology to Space Automation Roger T. Schappell, John T. Polhemus, James W. Lowrie, Catherine A. Hughes, James R. Stephens, Chieng-Y Chang Martin Marietta Corporation Denver, Colorado 80201 Contract NASW-3106 January 1979 NASA National Aeronautics and Space Administration NASA Headquarters Washington, DC 20546 MARTIN MARIETTA AEROSPACE DENVER DIVISION POST OFFICE BOX 179 DENVER, COLORADO 80201 TELEPHONE (303) 973-3000 Refer to: 79-Y-11112 6 February 1979 To: NASA Headquarters Washington, D.C. 20546 Attn: Dr. W. E. Gevarter, Code RES, Deputy Director (Space) Electronics Division Subj: Contract NASw-3106, Application of Advanded Technology to Space Automation, Transmittal of Final Report Ref: (a) Contract NASw-3106, Article X B. Encl: (1) MCR-79-519, Final Report (4 Copies) The Final Report, Enclosure (i), is being transmitted in compliance with the referenced requirement of the subject contract. Very truly yours, MARTIN MARIETTA CORPORATION Q64WWLLCQ Ray D. Harrell, Chief Contract Requirements & Documentation -Martin Marietta Aerospace Denver Division RDH:RW:kw External Distribution NASA Headquarters Washington, D.C. 20546 Attn: New Technology Representative, Code ET (I Copy) Admiristrajve Contracting Officer (Ltr. Only) NASA Scientific & Technical Information Facility P. 0. Box 8757 Baltimore/Washington International Airport Baltimore, ND 21240 (2 Copips and I Reproducible) Additional External Distribution on Next Page Internal Distribution (w/oEndl R. T. Schappell, 0511 R. Harrell, 2404 F. Perello, 2404 Refer to: 79-Y-11112 Page 2 External Distribution (Cont'd) NASA, Kennedy Space Center, Florida 32899 Attn: Raymond J. -
Preparation and Investigation of Highly Charged Ions in a Penning Trap for the Determination of Atomic Magnetic Moments
Preparation and Investigation of Highly Charged Ions in a Penning Trap for the Determination of Atomic Magnetic Moments Präparation und Untersuchung von hochgeladenen Ionen in einer Penning-Falle zur Bestimmung atomarer magnetischer Momente Dissertation approved by the Fachbereich Physik of the Technische Universität Darmstadt in fulfillment of the requirements for the degree of Doctor of Natural Sciences (Dr. rer. nat.) by Dipl.-Phys. Marco Wiesel from Neustadt an der Weinstraße June 2017 — Darmstadt — D 17 Preparation and Investigation of Highly Charged Ions in a Penning Trap for the Determination of Atomic Magnetic Moments Dissertation approved by the Fachbereich Physik of the Technische Universität Darmstadt in fulfillment of the requirements for the degree of Doctor of Natural Sciences (Dr. rer. nat.) by Dipl.-Phys. Marco Wiesel from Neustadt an der Weinstraße 1. Referee: Prof. Dr. rer. nat. Gerhard Birkl 2. Referee: Privatdozent Dr. rer. nat. Wolfgang Quint Submission date: 18.04.2017 Examination date: 24.05.2017 Darmstadt 2017 D 17 Title: The logo of ARTEMIS – AsymmetRic Trap for the measurement of Electron Magnetic moments in IonS. Bitte zitieren Sie dieses Dokument als: URN: urn:nbn:de:tuda-tuprints-62803 URL: http://tuprints.ulb.tu-darmstadt.de/id/eprint/6280 Dieses Dokument wird bereitgestellt von tuprints, E-Publishing-Service der TU Darmstadt http://tuprints.ulb.tu-darmstadt.de [email protected] Die Veröffentlichung steht unter folgender Creative Commons Lizenz: Namensnennung – Keine kommerzielle Nutzung – Keine Bearbeitung 4.0 International https://creativecommons.org/licenses/by-nc-nd/4.0/ Abstract The ARTEMIS experiment aims at measuring magnetic moments of electrons bound in highly charged ions that are stored in a Penning trap. -
Cryptography in a Quantum World
Cryptography in a Quantum World ⋆ Gilles Brassard 1,2 1 D´epartement d’informatique et de recherche op´erationnelle Universit´ede Montr´eal, C.P. 6128, Succursale Centre-ville Montr´eal (QC), H3C 3J7 Canada 2 Canadian Institute for Advanced Research [email protected] http://www.iro.umontreal.ca/~brassard/en/ Abstract. Although practised as an art and science for ages, cryptog- raphy had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation. However, Shannon’s approach was rooted is his own information theory, itself inspired by the classical physics of Newton and Einstein. But our world is ruled by the laws of quantum mechanics. When quantum-mechanical phenomena are taken into account, new vistas open up both for codemakers and codebreakers. Is quantum mechanics a blessing or a curse for the protection of privacy? As we shall see, the jury is still out! Keywords: Cryptography, Quantum mechanics, Quantum computa- tion, Post-quantum cryptography, Quantum communication, Quantum key distribution, Edgar Allan Poe 1 Introduction For thousands of years, cryptography has been an ongoing battle between code- makers and codebreakers [1,2], who are more formally called cryptographers and cryptanalysts. Naturally, good and evil are subjective terms to designate code- makers and codebreakers. As a passionate advocate for the right to privacy, my allegiance is clearly on the side of codemakers. I admit that I laughed hyster- ically when I saw the Zona Vigilada warning that awaits visitors of the Pla¸ca de George Orwell near City Hall in Barcelona [3]. Nevertheless, I recognize that codebreakers at Bletchley Park during the Second World War were definitely on the side of good. -
Chapter 1 Computer Basics
Chapter 1 Computer Basics 1.1 History of the Computer A computer is a complex piece of machinery made up of many parts, each of which can be considered a separate invention. abacus Ⅰ. Prehistory /ˈæbəkəs/ n. 算盘 The abacus, which is a simple counting aid, might have been invented in Babylonia(now Iraq) in the fourth century BC. It should be the ancestor of the modern digital calculator. Figure 1.1 Abacus Wilhelm Schickard built the first mechanical calculator in 1623. It can loom work with six digits and carry digits across columns. It works, but never /lu:m/ makes it beyond the prototype stage. n. 织布机 Blaise Pascal built a mechanical calculator, with the capacity for eight digits. However, it had trouble carrying and its gears tend to jam. punch cards Joseph-Marie Jacquard invents an automatic loom controlled by punch 穿孔卡片 cards. Difference Engine Charles Babbage conceived of a Difference Engine in 1820. It was a 差分机 massive steam-powered mechanical calculator designed to print astronomical tables. He attempted to build it over the course of the next 20 years, only to have the project cancelled by the British government in 1842. 1 新编计算机专业英语 Analytical Engine Babbage’s next idea was the Analytical Engine-a mechanical computer which 解析机(早期的机 could solve any mathematical problem. It used punch-cards similar to those used 械通用计算机) by the Jacquard loom and could perform simple conditional operations. countess Augusta Ada Byron, the countess of Lovelace, met Babbage in 1833. She /ˈkaʊntɪs/ described the Analytical Engine as weaving “algebraic patterns just as the n. -
TX-0 Computer After 10,000 Hours of Operation", L
tX If ,@8s~~~I 17A .:~- I-:· aTg Dc''n'_ !-41 2 . LK - ! v M IT6u i ~~6:illn -jW-~ 4 1 2 The RESEARCH LABORATORY of ELECTRONICS at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY CAMBRIDGE, MASSACHUSETTS 02139 TX-O Computer History John A. McKenzie RLE Technical Report No. 627 June 1999 MASSACHUSETTS INSTITUTE OF TECHNOLOGY RESEARCH LABORATORY OF ELECTRONICS CAMBRIDGE, MASSACHUSETTS 02139 TX-O COMPUTER HISTORY John A. McKenzie October 1, 1974 TX-O COMPUTER HISTORY OUTLINE ABSTRA CT PART I (at LINCOLN ABORATORY) INTRODUCTION 1 DESCRIPTION 2 LOGIC 4 CIRCUITRY 5 MARGINAL CHECKING 6 TRANSISTORS MEMORY (S Memory) SOFTWARE (Initial) 9 TX-2 10 TRANSISTORIZED MEMORY (T Memory) 11 POWER CONTROL 12 IN-OUT RACK 13 CONSOLE 13 PART II (at CAMBRIDGE) INTRODUCTION 14 MOVE to CAMBRIDGE 15 EXTENDED INPUT/OUTPUT FACILITY, Addition of 16 FIRST YEAR at CAMBRIDGE 18 MODE of OPERATION 19 MACHINE EXPANSION PHASE 20 T-MEMORY EXPANSION 21 ORDER CODE ENLARGEMENT 22 DIGITAL MAGNETIC TAPE SYSTEM 24 SOFTWARE DEVELOPMENT 25 APPLICATIONS 29 TIMESHARING (PDP-1) 34 CONCLUSION 34 A CKNOWLEDGEMENT 35 BIBLIOGRAPHY TX-O COMPUTER HISTORY A BSTRA CT The TX-O Computer (meaning the Zeroth Transistorized Computer) was designed and constructed, in 1956, by the Lincoln Laboratory of the Massachusetts Institute of Tech- nology, with two purposes in mind. One objective was to test and evaluate the use of transistors as the logical elements of a high-speed, 5 MHz, general-purpose, stored-program, parallel, digital computer. The second purpose was to provide means for testing a large capacity (65,536 word) magnetic-core memory. -
Vax 6135 Car Vax Uk - Service Parts List
VAX 6135 CAR VAX UK - SERVICE PARTS LIST Item Vax Part No. Description Price Code Service Item Item Vax Part No. Description Price Code Service Item 2 1-2-31-01-006 FILTER-FOAM-EXHAUST S1 CS 34 1-2-30-01-015 SEAL-FILTER/RESERVOIR K1 S 5 1-2-11-04-007 CABLE CLAMP L1 CS 35 1-3-15-03-007 FILTER HSG ASSY-UNIV-BLACK T3 S 29 1-2-31-01-002 FILTER DISC-BONDINI A1 CS 39 1-2-14-02-001 BALL VALVE N1 S 32 1-2-31-01-007 FILTER -FIBRE-MOULDED X1 CS 40 1-3-09-06-007 RESERVOIR ASSY-UNIV-BLACK W3 S 44 1-3-13-02-001 UPHOLSTERY TOOL Y1 CS 41 1-2-30-02-002 SEAL-CONICAL DUCT D2 S 47 1-2-39-01-010 CREVICE TOOL Y1 CS 42 1-2-30-02-003 SEAL-EXHAUST D2 S 48 1-3-13-01-001 DUSTBRUSH H2 CS 43 1-2-124731-12 RECOVERY BUCKET/SPIDER ASSY Z3 S 50 1-2-13-02-002 TUBE-EXTN-STAINLESS B3 CS 45 1-2-32-01-002 CASTOR-TWO WHEEL X1 S 52 1-3-18-01-022 HOSE & GRIP ASSY W3 CS 60 1-9-124423-00 TUBE-PUMP TO QRV A1 S 53 1-9-124962-00 WASH HEAD J3 CS 62 1-1-06-01-073 FEMALE QRV ASSY S2 S 54 1-9-124961-00 FLOOR BRUSH F3 CS 63 1-3-124422-00 ELBOW-QRV-ET408 C2 S 64 1-2-11-03-007 RETAINER CLIP-SPRING H1 CS 65 1-2-13-04-008 INLET TUBE-PVC A1 S 74 1-2-124594-00 UPHOLSTERY WASH TOOL K3 CS 66 1-3-124424-00 FIXING STRAP-ET408 L1 S 75 1-9-125226-00 TURBO TOOL-100mm R3 CS 67 1-7-124677-00 FILTER-WATER-INLET E2 S 77 1-9-125549-00 CREVICE TOOL-EXTRA LONG G2 CS 68 1-5-124419-00 PUMP-ET408 S3 S 101 1-2-124805-00 WATER TUBE ASSY-STRAIGHT Z2 CS 69 1-6-124425-00 SEAL-PUMP ET408 L1 S 3 1-3-124588-03 COVER-ACCESS-B R GREEN X1 NS 99 1-2-07-03-001 DUCT-CONICAL X1 S 6 1-2-36-04-004 CORD PROTECTOR A1 NS 102 -
HY-5948A Hydrogen Triode Thyratron
SUNSTAR传感与控制 http://www.sensor-ic.com/ TEL:0755-83376549 FAX:0755-83376182E-MAIL: [email protected] HY-5948A Hydrogen Triode Thyratron Description The HY-5948A is a hydrogen-filled, triode thyratron. The hydrogen gas fill facilitates reliable operation at moderately-high pulse repetition rates when compared to similar deuterium filled thyratrons. The reservoir is designed to be operated at a nominal setting of 4.0 Vac. High pulse currents are achievable using only free or forced air convection cooling. The tube may be mounted by its mounting flange in any position. Specifications Absolute Ratings (Maximum)(Non-Simultaneous) epy, Peak Forward Anode Voltage (Notes 1, 2, 3) ...................................................................... 25 kV ib, Peak Forward Anode Current (Notes 4, 5) .............................................................................. 5 Ka ibx, Peak Reverse Anode Current (Note 6) .................................................................................. .1 ib epx, Peak Reverse Anode Voltage (Note 6) ............................................................................... 25 kV epy, Min, Minimum Anode Supply Voltage ..............................................................................1 k Vdc tp, Anode Current Pulse Duration (Note 5) ............................................................................. 10μsec Ib, Average Anode Current .................................................................................................... 2.2 Adc Ip, RMS Average Current (Note 9) ........................................................................................47.5 -
CS 6290 Chapter 1
Spring 2011 Prof. Hyesoon Kim Xbox 360 System Architecture, „Anderews, Baker • 3 CPU cores – 4-way SIMD vector units – 8-way 1MB L2 cache (3.2 GHz) – 2 way SMT • 48 unified shaders • 3D graphics units • 512-Mbyte DRAM main memory • FSB (Front-side bus): 5.4 Gbps/pin/s (16 pins) • 10.8 Gbyte/s read and write • Xbox 360: Big endian • Windows: Little endian http://msdn.microsoft.com/en-us/library/cc308005(VS.85).aspx • L2 cache : – Greedy allocation algorithm – Different workloads have different working set sizes • 2-way 32 Kbyte L1 I-cache • 4-way 32 Kbyte L1 data cache • Write through, no write allocation • Cache block size :128B (high spatial locality) • 2-way SMT, • 2 insts/cycle, • In-order issue • Separate vector/scalar issue queue (VIQ) Vector Vector Execution Unit Instructions Scalar Scalar Execution Unit • First game console by Microsoft, released in 2001, $299 Glorified PC – 733 Mhz x86 Intel CPU, 64MB DRAM, NVIDIA GPU (graphics) – Ran modified version of Windows OS – ~25 million sold • XBox 360 – Second generation, released in 2005, $299-$399 – All-new custom hardware – 3.2 Ghz PowerPC IBM processor (custom design for XBox 360) – ATI graphics chip (custom design for XBox 360) – 34+ million sold (as of 2009) • Design principles of XBox 360 [Andrews & Baker] - Value for 5-7 years -!ig performance increase over last generation - Support anti-aliased high-definition video (720*1280*4 @ 30+ fps) - extremely high pixel fill rate (goal: 100+ million pixels/s) - Flexible to suit dynamic range of games - balance hardware, homogenous resources - Programmability (easy to program) Slide is from http://www.cis.upenn.edu/~cis501/lectures/12_xbox.pdf • Code name of Xbox 360‟s core • Shared cell (playstation processor) ‟s design philosophy.