## Recent Posts

### LaTeX3 Quick Reference Guide

As I am getting more and more familiar with LaTeX, my personal need of writing complicated LaTeX packages continue to increase. However, I am totally blown away by the complexity of expansion control in tradition LaTeX. Fortunately, the LaTeX3 project provides a way to write large scale LaTeX programs with much simpler expansion control and more systemic naming conventions. This post serves as a quick guide to introduce one to LaTeX3.

### CIS-375 Help Session Note 5 (Spring 2020)

*Scire ad trascendere*- Learn to transcend.Topics covered:

- Mathematical induction
- Strong induction

### Connecting a Linux Computer to SU Network

Since I am working with Linux, which is considered to be “insecure” by Syracuse University’s ITS, there is no official approach to connect to SU’s network with VPN. Fortunately, if you have an OSX or Windows machine around, which are capable of using SU’s VPN, we can set up a NAT rule to allow Linux computers in the same LAN to access SU hosts.

### CIS-375 Help Session Note 4 (Spring 2020)

*Scire ad trascendere*- Learn to transcend.Topics covered:

- Functions

**Please always pay attention to Blackboard announcements and your mailbox. Prof. Lee and I are trying different approaches to make sure this course can go on as usual. You do not want to miss major changes in course format or policies.**### Generating Link Preview

Link previews can help one understand a link. It is also much more beautiful than a simple hyperlink. Let’s discuss how to generate these beautiful previews for a web page. The resulting preview block looks like this:

Ever wondered how this preview is generated?📅 Mar 25, 2020 🔗 medium.com### CIS-375 Help Session Note 3 (Spring 2020)

*Scire ad trascendere*- Learn to transcend.Topics covered:

- Relations
- Indirect proof

### CIS-375 Help Session Note 2 (Spring 2020)

*Scire ad trascendere*- Learn to transcend.Topics covered:

- Set-builder notation
- Set operations: union, intersection, set difference, symmetric difference
- Subset, power set
- Using Boolean logic to prove set-related propositions
- Logical quantifiers
- Relation

### Performance Evaluation Issues in Image Forensics

We observed the fact that, in recent literature, the performance of tampering localization techniques are evaluated by rather universal metrics, such as accuracy, ROC curve, AUC, F-score and so on. These metrics are designed for binary classification problems where individual samples are independent. However, it is easy to see that in the case of image tampering localization, the image patches (pixels) that are fed into the classifier do not follow the metrics’ design. As it will be shown in this article, these metrics not very descriptive when applied to image tampering detection practice.

### CIS-375 Help Session Note 1 (Spring 2020)

*Scire ad trascendere*- Learn to transcend.Topics covered:

- Boolean logic, truth tables
- Understanding and using definitions
- Divisibility and fundamental theorem of artithmetic
- Proof of if-then and iff statements

### The Awkward Case of the Julia Language

Since last year, I happily started to learn Julia, hoping that this promising language will drastically increase my work efficiency and change the way that I work. Unfortunately, I find out that the reality is hardly similar to what I expected. So far, my conclusion is that there is barely a situation where using Julia can consistently boost work efficiency.