## VigenĂ¨re Cipher And Breaking it

It was originally thought to be unbreakable. You use a key such as PASSWORD.  Each Letter in your message is encoded by placing PASSWORDPASSWORDPASSWORD THISISATESTOFTHECODE Each letter is encoded by using choosing the corresponding row from the key letter above your message letter.  The obvious failing is that after a bit Read more…

## Summary Outline of Richard Feynmans Thesis – Framework for learning QED and Quantum Mechanics in general

A reasonable strategy for learning QED would be to try to recreate Richard Feynman's path of discovery that lead him to his thesis paper.   If you are an electrical or computer engineer you should probably set about the task of learning the subject for sooner or later quantum computing and Read more…

## Long hand division generation of polynomials

Do a long hand division of   x greater than or equal to 1 does not result in convergence of this sum.  However this algorithm can still be used to do some interesting things.  Let us use a complex value of    Each power of x yields a result one step around Read more…

## Z transform of and exponentially decaying sequence

The series:          this converges for x < 1 : Both of these expressions are the Z transform of the  exponential decay sequence.  The first expression is easier to deal with because it is smaller and easier to work with.  The following diagram uses a decay sequence with   The filter Read more…