Computer systems
|Компьютерныесистемы
Guestbook – January 2022
· #37
· Popovych E. (Friday, 28 January 2022 11:52)
To Linda M. A. AC- 192
You've passed the exam. Taking into account all types of work, your mark is 60
points.
· #36
Tomasevych N.P. to Havrilov AM-202 (Thursday, 27 January 2022 11:27)
Taking into account all types of work you've done,
You've passed the exam. Your score is 60 points
· #35
Havrilov AM-202(Tomasevich) (Thursday, 27 January 2022 11:22)
1. Summarizing, Unit 3
http://21talks.lovestoblog.com/123/uploads/1643278220_Havrilov%20AM-202(Tomasevich))Summarizing_unit3.jpg
2. Topic: Fundamentals of algorithmic languages.
An algorithmic programming language is a formal language used to write,
implement, and learn algorithms. Unlike most programming languages, the
algorithmic language is absolutely not tied to the architecture of the computer,
does not contain details related to the structure of the machine. To study the
basics of algorithmization, the so-called Russian algorithmic language ( school
algorithmic language ) is used, which uses words in Russian that are
understandable to the student. An algorithm-like algorithmic language with
Russian syntax was introduced into use by Academician A. P. Ershov in the
mid-1980s, as the basis for a machine-less computer science course.
https://voca.ro/1nsYtftizE5I
3. Final Test paper 3
http://21talks.lovestoblog.com/123/uploads/1643277976_Havrilov%20AM-202(Tomasevich)Final_paper_test3.jpg
· #34
Hani hayo (post_graduate student) (borysenka) (Saturday, 15 January 2022 19:15)
Today I have read the article
Lesson's from and perspective for health-care students volunteer activities
after the Fukushima disaster
https://voca.ro/1ingDzY7IDkB
· #33
Hani hayo (post_graduate student) (borysenka) (Saturday, 15 January 2022 19:07)
today I have read the article
( Lesson's Frome and perspective for health-care , students volunteer activities
after the Fukushima disaster )
M.kawashima
M.oikawa
Healthcare students volunteered at Fukushima Medical University after the Great
East Japan Earthquake and the Fukushima Nuclear Accident. At the time of the
disaster, healthcare students, who were in a position between doctors and
non-medicalists, listened to the victims' various fears and fears. Specifically,
they founded the Fukushima Well - a disaster medical club. These activities
continued for about 10 years after the Fukushima disaster
radioprotection.org
· #32
Borysenko (Saturday, 15 January 2022 11:50)
To Hani hayo( post-graduate student). No address of the article you have commented on. Your voice message is rather poor because of the mispronounced words . Best of luck.
· #31
Borysenko (Saturday, 15 January 2022 11:40)
To Ivanova (post-graduate student). You have already posted the whole amount of comments you had to post during the term but unfortunately it wasn't done on time and you didn't take into consideration my remarks as to your voice messages, and it lessens your points. Best wishes
· #30
Hani hayo (post_graduate student) (borysenka) (Saturday, 15 January 2022 07:24)
today I have read the article
Mental health consequence and social issues after the Fukushima disaster
https://voca.ro/19xES0WnZLzI
· #29
Hani hayo (post_graduate student) (borysenka) (Saturday, 15 January 2022 07:05)
Today I have read the article
(Mental health consequences and social issues after the Fukushima disaster).
Masharumaeda
the radioactive fallout brought chronic anxiety regarding physical risks of
radiation exposure to people, especially young mothers. People often have
different opinions about the radiation risk and their own future plans,
resulting in a reduction in the resilience that communities and families had
before the disaster. In addition, such weakened community resilience may produce
a significant increase in disaster-related suicide in Fukushima. Specific social
issues, such as "radiation stigma" among the public and self-stigma among
evacuees, that are never seen with other natural disasters also increased in
Fukushima.
bmed.nbci.nlm.nih.gov
· #28
OlenaIvanova, post-graduate student (Borysenko) (Friday, 14 January 2022 10:29)
I have read the article “Low complexity features for JPEG steganalysis using
undecimated DCT”.
This paper introduces a novel feature set for steganalysis of JPEG images. Its
name is DCTR because the features are computed from noise residuals obtained
using the 64 DCT bases. Its main advantage over previous art is its low
computational complexity, lower dimensionality in comparison to other rich
models, and a competitive performance w.r.t. previously proposed JPEG domain
steganalysis features.
In my opinion these qualities make DCTR a good candidate for building practical
steganography detectors and in steganalysis applications.
Article:
http://dde.binghamton.edu/vholub/pdf/TIFS15_Low_Complexity_Features_for_JPEG_Steganalysis.pdf
Voice: https://voca.ro/1cZtBYd8acuR
· #27
OlenaIvanova, post-graduate student (Borysenko) (Friday, 14 January 2022 10:28)
Recently I have read the article “Robust hash functions for digital
watermarking”.
In this paper, the authors introduce the concept of a robust hash function with
applications to digital image watermarking for authentication and integrity
verification of video data and still images. The authors claim the robust hash
function can be used for generating pseudo-random watermark sequences that
depend sensitively on a secret key yet continuously on the image. The robust
image digest can also be used as a search index for efficient database searches.
Article:
http://www.mathcs.emory.edu/~whalen/Hash/Hash_Articles/IEEE/Robust%20hash%20functions%20for%20digital%20watermarking.pdf
Voice: https://voca.ro/1c40PsNIMBVH
· #26
OlenaIvanova, post-graduate student (Borysenko) (Friday, 14 January 2022 09:19)
I have read the article “Lossless authentication of MPEG-2 video”.
The article tells us a lossless authentication watermark for MPEG-2 video. In
this paper, two methods are presented: authentication by frames and
authentication by groups of frames. In the first approach, each frame contains
its hash embedded losslessly, while in the second approach we embed a hash of a
group of frames in B frames only. The first approach provides better temporal
localization while the second approach introduces less distortion. The authors
claim that the algorithms can perform in real-time enabling concurrent
authentication while playing the video.
Article: http://www.ws.binghamton.edu/fridrich/Research/2536.pdf
Voice: https://voca.ro/11I0KZfilsVZ
· #25
OlenaIvanova, post-graduate student (Borysenko) (Friday, 14 January 2022 09:18)
Today I have read the article “Wet paper codes with improved embedding
efficiency”.
In this paper, the authors propose a new approach to wet paper codes using
random linear codes of small codimension that at the same time improves the
embedding efficiency (number of random message bits embedded per embedding
change). Practical algorithms are given and their performance is evaluated
experimentally and compared to theoretically achievable bounds. The considered
coding method can be modularly combined with most steganographic schemes to
improve their security.
This approach to wet paper codes provides an efficient, general and elegant tool
for solving the non-shared choice channel problem, which is quite common in
steganography.
Article:
http://www.ws.binghamton.edu/fridrich/Research/wpc_with_improved_embedding_efficiency-ieee.pdf
Voice: https://voca.ro/1xUm86584Dwl
· #24
OlenaIvanova, post-graduate student (Borysenko) (Thursday, 13 January 2022 20:27)
Recently I have read the article “Detection of double-compression in JPEG images
for applications in steganography”.
This article presents a method for detection of double JPEG compression and a
maximum likelihood estimator of the primary quality factor. The proposed methods
are essential for construction of accurate targeted and blind steganalysis
methods for JPEG images. These methods use support vector machine classifiers
with feature vectors formed by histograms of low-frequency DCT coefficients. The
performance of the algorithms is compared to selected prior art on a database
containing approximately 1, 200, 000 images.
Article: http://www.ws.binghamton.edu/fridrich/research/dc_7_d.pdf
Voice: https://voca.ro/1lSXbWhc0JUv
· #23
OlenaIvanova, post-graduate student (Borysenko) (Thursday, 13 January 2022 20:27)
Article:
http://www.ws.binghamton.edu/fridrich/research/icip08paper_v7_camera_ready.pdf
Voice: https://voca.ro/1eB6X9aYCLva
I have read the article “Using sensor pattern noise for camera model
identification”.
The article tells us about the problem of digital camera sensor identification
using a sensor fingerprint based on photoresponse non-uniformity, which is a
multiplicative noise that is unintentionally embedded by the digital camera into
every image it takes. The authors proposed a method for estimating the
fingerprint from a set of digital images and fordetecting its presence in a
specific image under investigation. Successful detection is indicative of the
fact that the image was taken by the exact same camera.
· #22
OlenaIvanova, post-graduate student (Borysenko) (Thursday, 13 January 2022 20:26)
Today I have read the article “Complete characterization of perfectly secure
stego-systems with mutually independent embedding operation”.
This paper presents a complete characterization of all perfectly secure
stego-systems that employ mutually independent embedding operation. In this
article, showed that for a fixed embedding operation, the only perfectly secure
stegosystems are those whose cover distribution is an element of a linear vector
space with basis vectors determined by the embedding operation. Moreover, the
authors show that perfect security (zero KL divergence) is equivalent to
satisfying a simple condition related to Fisher information.
Article: http://www.ws.binghamton.edu/fridrich/research/mi_embedding.pdf
Voice: https://voca.ro/1hcib4ilkrPx
· #21
Borysenko (Thursday, 13 January 2022 15:45)
To Ivanova (. post-graduate student). I have read all your 7 comments, better
late than never. #15 has no comment, there are some mistakes (#14), it is not
always possible to find the file with the article you have commented on, and
your voice messages are still leave much to be desired. Best wishes.
.
· #20
OlenaIvanova, post-graduate student (Borysenko) (Thursday, 13 January 2022)
Today I have read the article “Rich models for steganalysis of digital images”.
The article tells us describe a novel general strategy for building
steganography detectors for digital images. In contrast to previous approaches,
the authors make the model assembly a part of the training process driven by
samples drawn from the corresponding cover- and stego-sources. For each
algorithm, they apply a simple submodel-selection technique to increase the
detection accuracy per model dimensionality and show how the detection saturates
with increasing complexity of the rich model.
In my opinion steganalysis built around rich image models combined with ensemble
classifiers is a promising direction towards automatizing steganalysis for a
wide spectrum of steganographic schemes.
Article: http://dde.binghamton.edu/kodovsky/pdf/TIFS2012-SRM.pdf
Voice: https://voca.ro/19NgGTA91UaZ
· #19
OlenaIvanova, post-graduate student (Borysenko) (Thursday, 13 January 2022 11:43)
I have read the article “Digital camera identification from sensor pattern
noise”.
The article tells us about a new approach to the problem of camera
identification from images. This identification method uses the pixel
non-uniformity noise which is a stochastic component of the pattern noise common
to all digital imaging sensors. In this article, the presence of this noise is
established using correlation as in detection of spread spectrum watermarks. The
authors investigated the reliability of camera identification from images
processed using JPEG compression, gamma correction, and a combination of JPEG
compression and in-camera resampling.
Article: http://ws2.binghamton.edu/fridrich/Research/double.pdf
Voice: https://voca.ro/1c1LweOuYoUm
· #18
OlenaIvanova, post-graduate student (Borysenko) (Thursday, 13 January 2022 10:10)
Recently I have read the article “Matrix embedding for large payloads”.
The article tells us about Matrix embedding. This is a general coding method
that can be applied to most steganographic schemes to improve their embedding
efficiency.
Authors present novel matrix embedding schemes that are efficient for embedding
messages close to the embedding capacity. The first method uses simplex codes
and codes derived from them, while the second method uses codes of small
dimension with random generator matrix. In this paper, the embedding efficiency
of the proposed methods is evaluated with respect to theoretically achievable
bounds.
Article: http://www.ws.binghamton.edu/fridrich/research/large_payloads-spie.pdf
Voice: https://voca.ro/12FeHVH1rc0s
· #17
OlenaIvanova, post-graduate student (Borysenko) (Wednesday, 12 January 2022 22:41)
Recently I have read the article “Extending the reverse JPEG compatibility
attack to double compressed images”.
The reverse JPEG compatibility attack is an extremely accurate, universal, and
quite simple steganalysis technique that was originally shown to be limited to
high quality factors (99 or 100). In this paper, the authors provides
mathematical analysis and demonstrate experimentally that this attack can be
extended to double compressed images when the first compression quality is 93 or
larger and the second quality equal or larger than the first quality.
Article: http://www.ws.binghamton.edu/fridrich/Research/DoubleCompression-14.pdf
Voice: https://voca.ro/15odActqSnwg
· #16
OlenaIvanova, post-graduate student (Borysenko) (Wednesday, 12 January 2022 21:22)
Today I have read the article “Reverse JPEG Compatibility Attack”
In this paper, a new compatibility steganalysis attack is proposed, which is
applicable to both color and grayscale JPEG images saved with quality 99 and
100. The detection statistic is formed from the rounding errors in the spatial
domain after decompressing the JPEG image. The attack works whenever, during
compression, the discrete cosine transform is applied to integer-valued signal.
The authors call the new approach the “reverse JPEG compatibility attack.”
Article:http://www.ws.binghamton.edu/fridrich/research/rounding-mystery-08.pdf
Voice: https://voca.ro/1m38XatEf0Hf
· #15
OlenaIvanova, post-graduate student (Borysenko) (Wednesday, 12 January 2022 20:57)
Voice: https://voca.ro/13Ir245E1TOM to #8
· #14
OlenaIvanova, post-graduate student (Borysenko) (Wednesday, 12 January 2022 20:25)
Today I have read the article “Multivariate gaussian model for designing
additive distortion for steganography”.
The article tells us about approach to steganography in empirical objects, such
as digital media, is to cast the embedding problem as source coding with a
fidelity constraint. In this paper, the authors adopt a strategy in which the
cover is modeled as a sequence of independent but not necessarily identically
distributed quantized Gaussians and the embedding change probabilities are
derived to minimize the total KL divergencewithin the chosen model for a given
embedding operation and payload. Steganalysis was carried out using supervised
machine learning by building a binary classifier for the class of cover images
and stego images embedded with a fixed relative payloads.
http://dde.binghamton.edu/kodovsky/pdf/ICASSP2013_Multivariate_Gaussian_model.pdf
Voice: https://voca.ro/122EFuuFoFbj
· #13
OlenaIvanova, post-graduate student (Borysenko) (Wednesday, 12 January 2022 20:03)
Today I have read the article “Effect of cover quantization on steganographic
Fisher information”
This article presents an extension of the square root law of imperfect
steganography to consider the effects of quantization on the steganographic
Fisher information. This work reveals a connection between statistical
detectability and the complex interplay between the precover distribution and
the embedding operation. The authors make the assumption that the cover elements
are quantized i.i.d. samples drawn from an underlying continuous-valued
`precover' distribution. This extension is relevant for understanding the
effects of pixel color depth and JPEG quality factor on secure payload of
imperfect steganography realized using a mutually independent embedding
operation.
Article: http://www.ws.binghamton.edu/fridrich/research/srl_quant_wifs.pdf
Voice: https://voca.ro/13Y2nXJx3r1i
· #12
Borysenko (Wednesday, 12 January 2022 10:24)
To Hani hayo( post-graduate student). Your written comment is almost ok, but your voice message is full of mispronounced words (consequences, susceptible, diverted, etc.). Pls, read your comment before recording it. Best wishes
· #11
Hani hayo (post_graduate student) (borysenka) (Wednesday, 12 January 2022 08:11)
Today I have read the article (
The Chernobyl accident 20years on;an assessment of the health consequences and
the international response
https://voca.ro/1gFdtjqhj4b1
· #10
Hani hayo (post_graduate student) (borysenka) (Wednesday, 12 January 2022 07:51)
Today I have read the article
( The Chernobyl accident, 20yesrs on : an assessment of the health consequences
and the international response)
Keith Baverstok.
radiation to the thyroid from radioisotopes of iodine has caused several
thousand cases of thyroid cancer but very few deaths; exposed children were most
susceptible. The focus on thyroid cancer has diverted attention from possible
nonthyroid effects, such as mini-satellite instability, which is potentially
important. The international response to the accident was inadequate and
uncoordinated, and has been unjustifiably reassuring. Accurate assessment of
Chernobyl’s future health effects is not currently possible in the light of dose
uncertainties, current debates over radiation actions, and the lessons from the
late consequences of atomic bomb exposure.
Ehpnieh.nih.gov
· #9
Borysenko (Monday, 10 January 2022 11:42)
To Ivanova (post-graduate student).I have checked your comment, unfortunately
there is a problem with your voice message,pls., check before posting. Best of
luck.
.
· #8
OlenaIvanova, post-graduate student (Borysenko) (Sunday, 09 January 2022 14:49)
Article: http://www.ws.binghamton.edu/fridrich/Research/full_paper_02.pdf
Voice: https://voca.ro/1mSDHqPptgAj
Recently I have read the article “Digital image forensics using sensor noise”.
The paper introduces several digital forensic methods that capitalize on the
fact that each imaging sensor casts a noise-like fingerprint on every picture it
takes. The main component of the fingerprint is the photo-response
nonuniformity, which is caused by pixels’ varying capability to convert light to
electrons. The article explains how photo-response nonuniformity of imaging
sensors can be used for a variety of important digital forensic tasks, such as
device identification, device linking, recovery of processing history, and
detection of digital forgeries.
· #7
Borysenko to OlenaIvanova, post-graduate student (Saturday, 08 January 2022 19:12)
Your written comments are almost ok, but your voice messages leave much to be desired. I would strongly advise you to consult a dictionary before recording your voice messages. Mind that all the articles you are supposed to comment on should be closely connected with your specialty, and should be written by native speakers. Good luck!
· #6
Borysenko (Saturday, 08 January 2022 13:26)
To Ivanova( post-graduate student). Your written comments are almost ok, but your voice messages leave much to be desired as they are full of mispronounced words, I would strongly advise you to consult a dictionary before recording your voice message. Mind ,that the articles you are going to comment on should be closely connected with your specialty , and should be written by native speakers. Good luck
· #5
Borysenko (Saturday, 08 January 2022 09:15)
To Ivanova( post-graduate student). Your written comments are almost ok, but your voice messages are very poor, l would strongly advise you to consult a dictionary before recording your voice messages. Pls. don't forget that all the articles your are supposed to comment on should be connected with your specialty , and should be written by native speakers. Good luck
· #4
OlenaIvanova, post-graduate student (Borysenko) (Friday, 07 January 2022 15:44)
Recently I have read the article “Payload Scaling for Adaptive Steganography: An
Empirical Study”.
This article discusses the scaling laws of imperfect steganography payload.
Scaling laws are typically derived for a specific cover model and embedding
operation. Early forms of the law assumed independent and identically
distributed cover elements and 1st-order Markov chains. Recent extensions
include models with dependent cover elements – Markov random fields, kth-order
Markov chains, Ising models, and hidden-layer models. The authors carry out an
empirical study for the case when the steganographer and the steganalyst operate
at a game-theoretic equilibrium. They are exploring the possibility to leverage
a generalization of the square root law to content-adaptive steganography due to
Ker.
Article: http://www.ws.binghamton.edu/fridrich/Research/SPL_SRL-07.21.pdf
Voice: https://voca.ro/1WNKTCKc8256
· #3
OlenaIvanova, post-graduate student (Borysenko) (Friday, 07 January 2022 14:30)
Today I have read the article «A linguistic steganography framework using Arabic
calligraphy». In this article, a steganography framework based on Arabic
calligraphy is proposed. The steganography framework consists of three main
phases: preparation, embedding and extraction phase. In this paper presents the
original Aho-Corasick algorithm and suffix trees and how they are used in string
matching. The framework also includes corpus creation and a modification of the
Aho-Corasick string-matching algorithm. The authors proposed the stages of the
modified steganography system and presented the experimental results and
evaluation of the proposed steganography system.
Article:
https://reader.elsevier.com/reader/sd/pii/S1319157819301818?token=798F1A8A1826DAE397AFEF794B403BF4F45B21306A9E6A7CF444B24E5B4F7F4AEC65FACB9A841705969FDA7E42E80E87&originRegion=eu-west-1&originCreation=20220107132832
Voice: https://voca.ro/1mObFf1Vguni
· #2
OlenaIvanova, post-graduate student (Borysenko) (Friday, 07 January 2022 14:01)
Today I have read the article «Engineers bring a soft touch to commercial
robotics». The article tells us about a reconfigurable hybrid robotics system
that is able to grip a variety of objects: from the small, soft and delicate to
the large, heavy and bulky. The hybrid robotic grippers use soft, flexible
3D-printed fingers with a reconfigurable gripper base. The fingers are
air-driven and equipped with a novel locking mechanism for adjustable stiffness.
The technology is targeted at a range of industries, including food assembly,
vertical farming and consumer packaging, which will gradually automate more and
more operations over the coming years.
Article: https://techxplore.com/news/2021-12-soft-commercial-robotics.html
Voice: https://voca.ro/1fXrvfFrZcVT
· #1
OlenaIvanova, post-graduate student (Borysenko) (Friday, 07 January 2022 11:35)
Today I have read the article « Engineers bring a soft touch to commercial
robotics ». The article tells us about a reconfigurable hybrid robotics system
that is able to grip a variety of objects: from the small, soft and delicate to
the large, heavy and bulky. The hybrid robotic grippers use soft, flexible
3D-printed fingers with a reconfigurable gripper base. The fingers are
air-driven and equipped with a novel locking mechanism for adjustable stiffness.
The technology is targeted at a range of industries, including food assembly,
vertical farming and consumer packaging, which will gradually automate more and
more operations over the coming years.
Article: https://techxplore.com/news/2021-12-soft-commercial-robotics.html
Voice: https://voca.ro/1fXrvfFrZcVT