Beruflich Dokumente
Kultur Dokumente
To learn how to classify your own images, continue on to the next reading!
3. An email is sent to the address that you signed up with to confirm your email address.
Check your email and copy and paste Verification code. Then click Next.
4. You must define storage for your project before you can create it. If you already have an
instance of Cloud Object Storage, you can select it, otherwise under Select storage
service, click Add.
5. On the Cloud Object Storage page, verify that Lite plan is selected, and then click Create.
6. Now on the Create Project page, under Define storage, you may need to click Refresh to
see the newly created instance of Cloud Object Storage (COS).
7. Once an instance of Cloud Object Storage (COS) is listed, click Create to create the
Project.
5. In the panel that is presented scroll down and click on the Visual Recognition service.
6. On the Visual Recognition page, verify that Lite plan is selected, and then click Create.
7. Your instance of Visual Recognition service should now be created.
8. Now associate your instance of Visual Recognition service with your Watson Studio
project by selecting the check box to the left of it and clicking on Associate service.
5. Once you have uploaded your images, Watson Studio Visual Recognition will tell you
what it thinks it found in your images! Beside each class of object (or color, object type
or other characteristics), it gives you a confidence score (between 0 and 1) showing how
confident it is that it found that particular object or feature in your image (0 for lowest
confidence and 1 for highest confidence).
6. Use the check boxes on the left to filter the images. In this example, only images in
which Watson VR has detected beige color are displayed.
7. Use the Threshold slider to only display images in which Watson VR has at least 90%
confidence of the beige color.
Task 3: Save a screenshot
Note: The screenshot saved in this step will be required as part of the Graded Final Assignment
for those pursuing a certificate for this course. This step is optional for those auditing the course.
1. From Task 2, choose just one of the images that you uploaded. Select an image that does
not have too many classes of objects.
2. Take and save a screenshot in .jpeg or .jpg format including the Watson Visual
Recognition confidence scores (that are indicated below the image). Ensure the labels and
confidence scores below the picture are readable. See the sample screenshot below.
Task 4: Share your results
Follow Rav on Twitter and share some of the funniest and most interesting results you found
with IBM Watson Visual Recognition!
In fact, ROM is technically a subset of the system’s RAM. In other words, a portion of the system’s
random access memory address space is mapped into one or more ROM chips. This is necessary to
contain the software that enables the PC to boot up; otherwise, the processor would have no program
in memory to execute when it is powered on.
For example, when a PC is turned on, the processor automatically jumps to address FFFF0h,
expecting to find instructions to tell the processor what to do. This location is exactly 16 bytes from
the end of the first megabyte (1024 KB) of RAM space, as well as the end of the ROM itself.
If this location were mapped into regular RAM chips, any data stored there would have disappeared
when the power was previously turned off, and the processor would subsequently find no instructions
to run the next time the power was turned on. By placing a ROM chip at this address, a system start-
up program can be permanently loaded into the ROM and will be available every time the system is
turned on.
Normally, the system ROM starts at address E0000h or F0000h, which is 128KB or 64KB prior
to the end of the first megabyte. The ROM programs occupy the entire last 128KB of the first
megabyte, including the critical FFFF0h start-up instruction address, which is located 16 bytes from
the end of the BIOS space.
Some motherboard ROM chips are larger, up to 256KB or 512KB in size. The additional code
in these is configured to act as a video card ROM (addresses C0000h–C7FFFh) on motherboards with
built-in video and might even contain additional ROM drivers configured anywhere from C8000h to
DFFFFh to support additional onboard devices, such as SCSI or network adapters.
Figure 5.2 shows a map of the first megabyte of memory in a PC; notice the upper memory areas
reserved for adapter card and motherboard ROM BIOS at the end of the first megabyte.
Some think it is strange that the PC would start executing BIOS instructions 16 bytes from the
end of the ROM, but this design is intentionally built in to Intel’s x86 processors. All the ROM
programmer has to do is place a JMP (jump) instruction at that address that instructs the processor
to jump to the actual beginning of the ROM—in most cases, close to E0000h / F0000h—which is about
128KB / 64KB earlier in the memory map.
It’s like deciding to read every book starting 16 pages from the end and then having all
book publishers agree to place an instruction there to jump back the necessary number of pages to get
to page 1. By setting the processor startup location in this way, Intel enabled the ROM to grow to be
any size, all the while keeping it at the upper end of addresses in the first megabyte of the memory
address space.
Adapter card ROMs are automatically scanned and read by the motherboard ROM during the early
part of the boot process—during the POST. The motherboard ROM scans a special area of RAM
reserved for adapter ROMs (addresses C0000–DFFFFh) looking for 55AAh signature bytes. This area
indicates the start of a ROM.
All adapter ROMs must start with 55AAh; otherwise, the motherboard won’t recognize them. The
third byte indicates the size of the ROM in 512-byte units called paragraphs, and the fourth byte is the
actual start of the driver programs. The size byte is used by the motherboard ROM for testing
purposes. The motherboard ROM adds all the bytes in the ROM and divides the sum by the number
of
bytes. The result should produce a remainder of 100h. Thus, when creating a ROM for an adapter,
the
programmer typically uses a “fill” byte at the end to get the checksum to come out right. Using this
checksum, the motherboard tests each adapter ROM during the POST and flags any that appear to
have been corrupted.
The motherboard ROM automatically runs the programs in any adapter ROMs it finds during the
scan. You see this in most systems when you turn them on, and during the POST you see the video
card BIOS initialize and announce its presence.