0%

What is Matlab?
Matlab Screen
Variables, array, matrix, indexing Operators (Arithmetic, relational, logical ) Display Facilities
Flow Control
Using of M-File
Writing User Defined Functions Conclusion

Read more »

Given an array nums of distinct integers, return all the possible permutations. You can return the answer in any order.

Example 1:

Input: nums = [1,2,3]
Output: [[1,2,3],[1,3,2],[2,1,3],[2,3,1],[3,1,2],[3,2,1]]

Read more »

Given an array of distinct integers candidates and a target integer target, return a list of all unique combinations of candidates where the chosen numbers sum to target. You may return the combinations in any order.

The same number may be chosen from candidates an unlimited number of times. Two combinations are unique if the frequency of at least one of the chosen numbers is different.

It is guaranteed that the number of unique combinations that sum up to target is less than 150 combinations for the given input.

Read more »

Given an array of integers nums sorted in ascending order, find the starting and ending position of a given target value.

If target is not found in the array, return [-1, -1].

Example 1:

Input: nums = [5,7,7,8,8,10], target = 8
Output: [3,4]
Example 2:

Input: nums = [5,7,7,8,8,10], target = 6
Output: [-1,-1]
Example 3:

Input: nums = [], target = 0
Output: [-1,-1]

Read more »

Project Guidelines

  1. Project title [8-20 words]
    (indicate what’s in the paper)

  2. one week to read papers, one week to finialize

  3. No more than 10% internet paper, they were not been peer reviewed

Threats and Vulnerbilities

strategies: specific goal we want to achieve
principle: high level

  • information
    telephone, records

Information are not just computer information

  • Threat is a potential occurrence that can have an undesirable effect on the system.
  • A vulnerability is a weakness that makes a threat possibily occur, and there is not way to ensure no vulnerability

Four categories of threats

  • disclosure: Unauthorized access to information
    • snooping
  • deception: Acceptance of false data
    • altenation
    • spoofing
    • denial of receipt ( when we sent people a email, how to make sure we are sending to the right person? Using public and private keysg)

Security principles

  • Auditability and Accountability

    • Auditability is the ability to verify the activities of a control
    • Accountability is to hold Individual answeable responsible or liable
  • Access Control

    • Separation of functions - No one owns all process, control all security features, or process unrestricted access to all information i.e. (CEO has the right to know everything, but checker need to write record)
    • Role-based access control (RBAC)
      • Asscoiate role with each individual
      • Individual needs to be authentication
    • Situation-aware c
  1. Confidentiality
    • confidentiality principles include:
      1. need to know: An individual should possess combination of clearance, privilege of access, and need-to-know,before being authorized access
      2. Data seperation
      3. Compartmentalization: seperate tasks
      4. Classification: Assign labels to information to identify the appropriate level of protection, handling and control the information
        • Corporation: public use - registered- confidential
        • US Goverment - Official use only - top secret
      5. Encryption
        • A reversible process of transforming plain text

About CSE 408

Description: the course deals with the design, use, and applications of multimedia information systems. An introduction to acquisition, processing, compression, storage, retrieval, and presentation of data from different media types such as images, text, voice, graphics, and alphanumeric.
• Learning objectives: master fundamental concepts, specific domain knowledge, applications, and current research topics.

Read more »

Language processing ( NLP )

  • a field of CS, AI, or tasks involved in human languages, such as human-machine communication
  • Language involve many human activities, reading, writing, speaking
  • ability to perform massibe amont of textual data ( data mining )

NLP applications:
advanced: speech recognition, machine translation.
basic: spelling, grammar

Natural language on the web
basic components: text, links, graphic ( everything that is visual)
basic formating: text, links, graphic
Main container for document: page
performance: page
architecture: site
captions: highly stylize and associate with pictures

Read more »

What is multimedia?

Give examples of MM data

  • combinations of text, sound, images, animation, graphics

Discuss a multimedia system you use on one of the following platforms: mobile phone, home PC, TV, Social media, streaming video, etc.

  • Ex: a web-based video editor that lets anyone create a new video by editing, annotating and reminxing videos on the cloud
  • Searching very large video and image databases for target visual objects, using semantics of objects

Explain three state of the art MM research topics

  • Mutiple views: allowing photo-realistic (video-quality) synthesis of virtual actores from several cameras or from a single camera under different lighting
  • Digital fashion: aims to develop smart clothing that can communicate with others such enhanced clothing using wireless communication
  • 3D motion capture: used for multiple actor capture so that multiple real actores in a virtual studio can be used to automatically produce realistic animated models with natural movement