We do web-authentication through the block

We do web-authentication through the block
 
Recently I participated in the Ethereum-hakaton, and today I want to talk about the EtherAuth project, with which the MixBytes team took the third place. EtherAuth is an attempt to make a decentralized version of the login to the site using an external account. How to button enter through Facebook, only without Facebook.
The source code is
  Recently I participated in the Ethereum-hakaton, and today I want to talk about the EtherAuth project, with which the MixBytes team took the third place. EtherAuth is an attempt to make a decentralized version of the login to the site using an external account. How to button enter through Facebook, only without Facebook. The source code is  ...
+ 0 -

"Three in a Boat, Poverty and Dogs," or how the Antiplagy seeks paraphrase

"Three in a Boat, Poverty and Dogs," or how the Antiplagy seeks paraphraseA new school year has come. The students received a schedule and began to think about
drunk girls-girls-guitars
future session. Writing coursework, diplomas, articles and dissertations is not far off. So, there is also an analysis of texts for the availability of borrowing, and verification reports, and other headache student and administrator pain. And hundreds of thousands of people (without jokes - we figured!) Already there is a natural question - how to deceive "Antiplagiarism". In our case, almost all methods of deception are somehow connected with distortions of the text. We have already ...
+ 0 -

Expert system on Rails

The article is devoted to the creation of an expert system. In the beginning of the article - the block diagram from the book from the list of literature, then the description of the database and algorithm. Next is a "help on how to do this project", which describes the algorithm for creating this project. At the end of the article is a list of references. Also in it there are a couple of screenshots.
 
 
Expert system on Rails
 
Block diagram of the algorithm
 
 
The database contains three tables - images, questions and outcomes. The first one is the main one for "classification and identification", it contains a sign of successful ...
+ 0 -

Determination of the number of storeys of a house by its photo without machine learning

Determination of the number of storeys of a house by its photo without machine learning
 
In this article I will give, in my opinion, an interesting solution to the problem of computer recognition of objects on an image without using training.
 
The task: having a photo of a multi-storey building try to determine the number of floors in it.
 
A good estimate for the number of floors can give the number of windows along the vertical of the house. Windows, balconies and other objects are good characteristics of floors (especially in apartment houses). I will consider residential houses, images of which are easy to find on the net. One important limitation should be noted in advance: the house ...
+ 0 -

Development of a chat-bot with a given personality. Lecture in Yandex

Development of a chat-bot with a given personality. Lecture in YandexAn important feature of the problems in machine learning lies in the fact that an equally good result is achievable by different methods. This also gives excitement to ML competitions: even if you have other competencies than a known strong opponent, you can still win. Teams Tensorborne and Neurobotics had almost equal chances of winning the hackathon DeepHack and eventually took the first two places. At training Yandex representatives of both teams made a one-dimensional report. In the decoding you are waiting for detailed analysis of decisions and advice to budding contestants.
 
 
+ 0 -

Optical trackers: ASEF and MOSSE

Optical trackers: ASEF and MOSSEOne of the important subtasks of video analytics is the tracking of objects on video. It is not so primitive that it was necessary to descend to the per-pixel level, but it is not so difficult to unambiguously require a multilayer neural network for solving. Tracking can be used as an end in itself, and as part of other algorithms:
 
 
 
Counting of unique people who entered a certain zone or crossed the border in frame
 
Identification of typical routes of cars in the parking lot and people in the store
 
Automatic rotation of the CCTV camera when the object is displaced
 
 
Even without looking ...
+ 0 -

Hide without hiding. Once again about LSB-steganography, chi-square and singularities?

Today, again, we'll rotate the old nest and talk about how to hide a pile of bits in the picture with the seal, look at several available tools and analyze the most popular attacks. And it would seem, what has the singularity to do with it?
 
 
As the saying goes, if you want to figure something out, then write about this article on the Khabr! (Beware, a lot of text and pictures)
 
 
Hide without hiding. Once again about LSB-steganography, chi-square and singularities?  
here.
 
 

From the command line


 
There are not many open-access command line tools that represent LSB steganography.
 
 
The most popular can be found in the table below.
 
 
 
 
Tool
 
Types of files
 
Description
 
Concealment
 
Extract
 
 
 
open...[/h]
+ 0 -

You have not yet finished the word "hello", but we already know who you are

This can be done by our neural network, recognizing a person by one pronounced syllable. However, the topic of this article does not deal directly with voice identification, although it will be related to it. We will talk about neural network features, the so-called d-vector, which can be used in tasks of sound processing: from verification to speech and emotion recognition.
 
 
You have not yet finished the word "hello", but we already know who you are

 
Pitch and MFCC . The first has a physical meaning of the vibration frequency of the vocal cords, which differ, for example, for different people, and also depend on the ...
+ 0 -

How to find similar texts and sort

There is a simple method for sorting a set of texts by similarity to a given text: according to the Euclidean distance between the word frequencies in the analyzed texts. In principle, this algorithm should be understandable, a simple implementation can be found here: github.com/srogatch/TextMatching .
 
 
Surprisingly, a simple method gives good results. For example, if we are looking for the next book to read, you can enter the text of a read book or several read books as a sample for searching, and then for this repository of 10 books we get the following results for the book "FAIRY TALES ...
+ 0 -

The first experience or how to try to become a Legend of code and magic

Hello. My name is Valentine.
 
 
On the 10th of July I read on Khabr. post Oli Ollisteka about the platform codingame.com and decided to try his hand at logical tasks, as well as in the Legends of Сode and Magic competition.
 
 
In view of the large amount of free time, I got carried away with puzzles and tasks that are present on this resource. What's good is that every task, every puzzle makes you look for a solution, sometimes not obvious.
 
 
The first experience or how to try to become a Legend of code and magic
 
 
Next will be a brief information about the rules of the ...
+ 0 -