In this article, I’m going to describe a possible scenario for the precise positioning of autonomous cars in the streets and intersections. Overview Before describing the localization of autonomous cars, I want to describe some important components which may be used in the next generation of autos. Basically, there are two vital elements for driving
So far we have discussed some basics and we know how convolution in image processing works. It is time to talk more about applications of convolution (kernel convolution). So in this post, we will go through Edge Detection algorithms and after reading this post you should be able to understand edge detection concept and its
In this post, we will continue to learn more about low-level computer vision which we’ve started in last post. After reading this post you will learn Convolution as well as literally most of the computer vision because it appears somehow in all functions that we will use in the CV. Let’s get started. Convolution and
As you may know, demand on Computer Vision Applications is increasing and so I decided to make post series about that and dive into my favorite topic “Computer Vision” and share my knowledge with you to help you to get deep understanding of different topics in this field. These series divided into three parts each
The goal in this post is describing the installation process of ROS2 Crystal Clemmys with ROS bag and giving you an overview of ROS2. Installing ROS2 can be a waste of time if you don’t know where to start and which packages/dependencies you need to install. I wasted time to figure out how to install
This article tries to clarify and describe how insecure physical layer can cause insecurity in other layers and consequently causing different security issues. I will go through that by describing a very simple example using Mongoose OS. I try to describe the security aspects that we should consider whenever we use Mongoose OS and are
The goal in this post is to give an overview of the security goal in IoT applications (CIA Model) and see if MQTT and CoAP protocols satisfy this goal. Due to rush to the market security in IoT devices often neglected. A small number of IoT devices support some protection and security which most of
This post is the second part of the last post and will describe the architecture along with characteristics of Malware especially Mirai and Hajime. Characteristics of IoT malware As mentioned before, the IoT device should get the Malware in order to participate in DDoS attacks. Most of the malwares are Linux based and has limited
The goal in this post and the next one is to describe Distributed Danial of Service attack, its architecture, and the most common Malware for DDoS in IoT devices. What is Danial of Service One of the most popular attacks is the Denial of Service attack in which the attacker tries to make the server
In this post series, I’m going to talk about security in IoT devices and I try to clarify the following aspects and questions about them: Security for IoT devices. Motivation and why people should care about the security of their IoT device or more general, for every device that can connect to the Internet? IoT