My teammate and I decide to study a sub-field in virtual machine — memory management. Existing solutions can be categorized into different groups based on several standards: 1) memory reclamation or memory sharing in terms of mechanism, 2) memory utilization or memory isolation in terms of emphasis phase, and 3) whether there is modification in
Category: Junior (2013)
Software Design Final Project
In this project throughout the whole semester, we are asked to target on an open-sourced project with 100,000+ lines of codes, understand its design patterns, and extend some functionalities of it. At the end, we pick up a open-sourced music player, figure out how Android works from scratch, add a shortcut for that app in
Numerical Analysis Homework 7
In the last homework, I implement an algorithm to find out roots for any polynomial function with double-format coefficients using Newton method. The precision I can deal with in my current code is `1e-10`; however, with numerical guarantees, I believe more precise result is available.
Numerical Analysis Homework 5
In this project, I am going to implement sparse matrix multiplication in C++ with `blas` library. At the end, my implementation has very similar performance as MATLAB.
Numerical Analysis Homework 4
Related to last homework. I am asked to continue testing the performance of `blas` library. Triple nested for loop for matrix multiplication takes around 30 minutes to finish the job; however, the pre-built optimized blas can finish the same job in around 1 minute. Other `blas` implementations, such as ATLAS and openBlas, have similar performance.
Numerical Analysis Homework 3
There are two parts in this homework. Firstly, examine the behavior of minimum double value and maximum double value, i.e. make minimum value smaller and maximum value larger. Secondly, examine the performance for loop with different implementations. At the end, it turns out that MATLAB with built-in `blas` library has much better performance compared to
Media Security Final Project – Attack a Well-Known Cloud Encryption Algorithm
After some researches, my teammate and I find out that a serial of published papers use a flawed algorithm, which can be attacked, to encrypt their cloud data. To prove our correctness, we simulate the whole algorithm and crack the hidden information once we collect enough encrypted objects. Professor is really satisfied with our conclusion
Continue Reading “Media Security Final Project – Attack a Well-Known Cloud Encryption Algorithm”
Media Security Homework 1
In the project, I am working on implementing different watermark systems on image and testing whether they are attack-proof. To embed hidden information, I need to 1) transfer images from RGB domain to YCBCR domain, 2) transfer images to frequency domain using Discrete Cosine Transform (DCT) and find out `n` blocks with highest frequency to
Digital Speech Processing Final Project
For the final project, I work on reading one classical paper in speech recognition: `Machine Learning Paradigms for Speech Recognition: An Overview`, which gives me a clearer big picture of what researches have been done before. Some known solutions include: generative learning, discriminative learning, supervised learning, unsupervised learning, semi-supervised learning, active learning, transfer learning, and
Digital Speech Processing Homework 1
I am asked to implement Hidden Markov Model (HMM) and try different initial state in order to achieve better model performance. From the experiment, one can tell that both the number of iterations and the number of status have a great influence on the final learning result. At the end, my model is able to
Recent Comments