The task is to take in sample text and generate a tweet (280 characters) in the style of that text using Markov Chains. For super-extra credit consume a user name from Twitter and grab some tweets by the person as your source material. Further awesomeness if you build a tweet-bot.
This task is designed to push you a bit. You'll have to figure out many moving parts to make it a success. Here are some mastery tasks you can measure yourself by and talk to me if you get stuck.
Quality Assurance This markovian tweeter will be a center piece of a new ad campaign for your company. It will be morphed and used in many new products and it will learn from user data which might be malicious. Your job, as the QA team, is to take a deep dive into the partner team's codebase looking for flaws. Use the CERT rules and recs as your compass, so any violations of those go in your report. The job is to provide an actionable report on issues with the codebase that the developers should fix before launch and for the long-term maintainability of the project.
In this one you are building a command line tool which allows users to provide the filename of an image and 3 flags:
-s followed by a shape value (square, rectangle, circle, etc.) and the flag
followed by a color (like
black) the third flag is
-o which allows the user to specify
the name of the output image (like output.ppm).
The program needs to create a new image file (at the location specified in the -o flag) which is the original image with a rectangle drawn around and shapes found in the image that match the -s flag. (Detect a square in the image and draw a colored rectangle around it in the output image).
For the image format, make this work with
I will accept a project which only works on black and white images which only contain clean rectangles. But it's extra credit to those that accept more shapes than just rectangles, and more for more difficult images, yet more for more difficult image formats.
This project has many layers so here are some steps towards the simplest layer:
convert input.png output.ppm), this is for you to test with.
coutthe lines of the image.
Your job is to build a program that lets a users "register" with a username and password. Login to their account with their password. See a list of other users. Send a message to another user. Read their received messages. Each message needs to be stored encrypted. That does imply that it is the responsibility of your users to communicate a secret passphrase shared by the two users.
There is a lot of room for security thinking in this, so show me what you got.