Skip to main content

Posts

Showing posts from May, 2020
The Review of Paper "Computer vision in Security" Author: Fothul Karim Forhan The paper is the overview on a technology that helps us recognize different patterns and proceed it in a specific format. The focus is set on security field where CV helps to prevent attacks and massive resource looses. The introduction covers a bit of history as well as points to goals of the research. The main part is divided into: Types of CV technologies applied in security matters, security matters that require CV and other safety matters. For me the most fascinating part is CV in financial field. In the given example cv could identify fraudsters by emotional state, the way a fraudster behaves. After the thief is identified, the alarm is enabled automatically and the transaction is terminated. This is a direct example of how cv saves a companies' money. The only thing that missing is lack of illustrations. It'd be great to see face-recognition algorithms visualization. Overall
Rule Utilitarianism. Big data The Utilitarianism theory defines what is write and what is wrong by assessing outcomes. No matter what bad consequences take place, the most ethical choice is always the one that has the greatest good. Big data falls under this theory just fine. While it's hard to give any precise guidelines, the example can be considered in the abstract. On the one hand it brings us economy boost by providing more specific information, on another hand it affects on the privacy of consumers. Examples of The Good Big data cuts business costs Help government to track citizens and prevent unwanted events Using big data improves company's pricing policy Allow competition with bigger companies Suggests to user more interest-related content  Examples of The Bad Ruins people's privacy Add an advantage to those who have been shown as a more trustable person by doing nothing personal online Uses tons of computational resources and not necessarily
Refreshable braille display In the era of technologies everyone should be provided with access to computer. One of the most challenging innovation is providing access to blind people by transmitting information from the screen to an adaptive device. Braille display is a peripheral device that allows blind or visually impaired people to interact with a computer. A braille monitor uses the braille system that blind people use to read. Raised dots spell out text that the user traces a finger over to read In 1995 Handy Tech Braille display in combination with a screen reader makes Microsoft Windows accessible for blind users. Later in 2005 Easy Braille, a super compact Braille display as well as Sophie, the reading system with a natural sounding voice, and Sophie Pro an extended Version of the Sophie, were introduced. Software The content of a page is taken from the OS, after it proceeds to be converted into braille characters and sends it to the display. Most of displays are co
Linux Mint vs. MX-Linux Mint Linux Mint - Linux distribution based on Ubuntu. It gives full out-of-the-box multimedia support in pair with proprietary software. Origin 1.0 beta version came out in 2006. Linux Mint has been following the same release cycle as Ubuntu since 2008. Starting with Linux Mint 6 'Felicia', each version was based on a corresponded Ubuntu release, built directly from it. On 20th of February, 2016, the Linux Mint web page was hacked, and download links for a version of Linux Mint were replaced with a modified version that contained malware. MX MX-Linux - OS based on Debian. This distro is a cooperative project between the antiX and former MEPIS communities. MX-linux has additional software that comes from MX community. Origin November 2, 2016 - first public beta release of MX-16. December 20, 2018 - MX-18 with a new kernel, enabled whole disk encryption. Comparison Both OS are going head to head in most of ranking lists and it's h