Sunday, January 29, 2017

Improving Photo Search A Step Across the Semantic Gap

,
Posted by Chuck Rosenberg, Image Search TeamLast month at Google I/O, we showed a major upgrade to the photos experience: you can now easily search your own photos without having to manually label each and every one of them. This is powered by computer vision and machine learning technology, which uses the visual content of an image to generate searchable tags for photos combined with other sources like text tags and EXIF metadata to enable search across thousands of concepts like a flower, food, car, jet ski, or turtle.For many years Google has offered Image Search over web images; however, searching across photos represents a difficult new challenge. In Image Search there are many pieces of...
Read more

Computer respond to this email

,
Posted by Greg Corrado*, Senior Research ScientistMachine Intelligence for YouWhat I love about working at Google is the opportunity to harness cutting-edge machine intelligence for users’ benefit. Two recent Research Blog posts talked about how we’ve used machine learning in the form of deep neural networks to improve voice search and YouTube thumbnails. Today we can share something even wilder -- Smart Reply, a deep neural network that writes email.I get a lot of email, and I often peek at it on the go with my phone. But replying to email on mobile is a real pain, even for short replies. What if there were a system that could automatically determine if an email was answerable with a short...
Read more

More Literacy Activities

,
ohttp://pbskids.org/games/literacy.html When you finish one game, use the back button to return to the games pa...
Read more

Saturday, January 28, 2017

Computer sound card drivers Downloads

,
cvcvCompanyDriverspageAcerAcer sound card driversAd-ChipsAd-Chips sound card driversAddonicsAddonics sound card driversAnalogDevicesAnalog sound card driversAOpenAOpen sound card driversASUSASUS sound card driversAudiotrackAudiotrack sound card driversAvanceLogicAvanceLogic sound card driversAztechAztech sound card driversAztechLabsAztechLabs sound card driversBocaResearchBocaResearch sound card driversBTCBehaviorTech sound card driversC-Media(CMI)C-Media sound card driversCreativeLabsCreativeLabs sound card driversCrystalCrystal sound card driversDigitalAudioLabsDigitalAudioLabs sound card driversDigitalResearchDigitalResearch sound card driversESSTechnologiesESS sound card driversFrontierDesignFrontier...
Read more

Math Activities

,
http://pbskids.org/games/math.h...
Read more

Autonomously Estimating Attractiveness using Computer Vision

,
How do you go about teaching a computer what is attractive and what is not?This is a very difficult question I have been thinking about recently.Do you create a duck face detector and subtract points? Is it a series of features we are looking for (specific hair color, eye color, skin smoothness symmetry).Would this data come out in some sort of statistical analysis?I decided to research this further using Eigen Faces and SVMs.For those of you that dont know about Eigen Faces[1], they are a decomposition of a set of images into eigenvalues (weights) and eigenvectors (eigenfaces). The amazing thing about these is that given a large enough training set, any image of a face can be reconstructed...
Read more

Friday, January 27, 2017

Announcing the Google MOOC Focused Research Awards

,
Posted by Maggie Johnson, Director of Education and University Relations, and Aimin Zhu, University Relations Manager, APACLast year, Google and Tsinghua University hosted the 2014 APAC MOOC Focused Faculty Workshop, an event designed to share, brainstorm and generate ideas aimed at fostering MOOC innovation. As a result of the ideas generated at the workshop, we solicited proposals from the attendees for research collaborations that would advance important topics in MOOC development.After expert reviews and committee discussions, we are pleased to announce the following recipients of the MOOC Focused Research Awards. These awards cover research exploring new interactions to enhance learning...
Read more

Wednesday, January 25, 2017

You can change your Windows Password if forget the current password

,
1st step: go to run then type this code lusrmgr.msc and then enter.2nd step: open a new window then click users folder 3rd step: The you can see your windows username 4th step: follow my image instruct...
Read more

The worlds largest photo service just made its pictures free to use

,
Getty Images is the worlds largest image database with millions of images, all watermarked. These represent over a hundred years of photography, from FDR on the campaign trail to last weeks Oscars, all stamped with  transparent square placard reminding you that you dont own the rights. If you want Getty to take off the watermark, until now, you had to pay for it. Getty Images, in a rare act of digital common sense, have realised that so many of its images are online in the public space accessible via a Google image search. So, providing you register, you can simply embed one of their images in your web page (like you would for a YouTube clip) and you can now legally use their...
Read more

Monday, January 23, 2017

Should My Kid Learn to Code

,
Posted by Maggie Johnson, Director of Education and University Relations, Google(Cross-posted on the Google for Education Blog)Over the last few years, successful marketing campaigns such as Hour of Code and Made with Code have helped K12 students become increasingly aware of the power and relevance of computer programming across all fields. In addition, there has been growth in developer bootcamps, online “learn to code” programs (code.org, CS First, Khan Academy, Codecademy, Blockly Games, etc.), and non-profits focused specifically on girls and underrepresented minorities (URMs) (Technovation, Girls who Code, Black Girls Code, #YesWeCode, etc.). This is good news, as we need many more computing...
Read more

Sunday, January 22, 2017

How to determine how many cameras are connected to a computer and connect to and use ptz cameras

,
How to determine how many cameras are connected to a computer and connect to and use ptz cameras:I figure this is a nice easy first post. This is some code I struggled with finding a couple years ago on automatically determining how many cameras are connected to a computer via directshow (this code is also useful in a ptz application as I will show right after). I use OpenCV to capture from the camera and the directshow library to use the ptz camera functions. I also used the vector and stringstream library for my own ease (#include<vector> #include<sstream>)The DisplayError function is a generic wrapper for you to fill in, whether you use printf or a messagebox.int getDeviceCount()...
Read more

How to Implement Buffer Overflow

,

Buffer overflow exploits are commonly found problems which can cause irrevocable damage to a system if taken advantage of. The only way to prevent them is to be careful about coding practices and bounds check to make sure no kind of input, stream, file, command, encryption key, or otherwise can be used to overwrite a buffer past bounds. The problem with this is that many libraries, programs, and operating systems used by programmers already have many of these exploits in them, making prevention difficult if not impossible.

That being said, here is kind of how it works (all examples run in Windows XP using gdb):
The files used for exploit are named vulnerable_code (courtesy of Dr. Richard Brooks from Clemson University) and they can be found here: 
http://code.google.com/p/stevenhickson-code/source/browse/#svn%2Ftrunk%2FBufferOverflow

(All code is licensed under the GPL modified license included at the google-code address. It is simply the GPL v3.0 with the modifier that if you enjoyed this and run into me somewhere sometime, you are welcome to buy me a drink).

The link above also includes all the assembly files used to create shellcode, nasm to assemble it, and arwin to find the memory locations. It should have everything you need.

Note: Bear in mind that the memory locations will probably be different for you and you will have to find them yourself (probably by writing AAAA over and over again in memory).

IMPORTANT:
This tutorial is used for explanation and education only. Do not copy my examples and turn them in for a class. You will get caught and get in trouble and you wont learn anything and I will program a helicopter to hunt you down autonomously as revenge.


 

Computer Info Copyright © 2016 -- Powered by Blogger