Self-driving cars and Localization

In this article, I’m going to describe a possible scenario for the precise positioning of autonomous cars in the streets and intersections. Overview Before describing the localization of autonomous cars, I want to describe some important components which may be used in the next generation of autos. Basically, there are two vital elements for driving

Edge Detections

So far we have discussed some basics and we know how convolution in image processing works. It is time to talk more about applications of convolution (kernel convolution). So in this post, we will go through Edge Detection algorithms and after reading this post you should be able to understand edge detection concept and its

Convolution, Cross-Correlation and Gaussian

In this post, we will continue to learn more about low-level computer vision which we’ve started in last post. After reading this post you will learn Convolution as well as literally most of the computer vision because it appears somehow in all functions that we will use in the CV. Let’s get started. Convolution and

Computer Vision Basics

As you may know, demand on Computer Vision Applications is increasing and so I decided to make post series about that and dive into my favorite topic “Computer Vision” and share my knowledge with you to help you to get deep understanding of different topics in this field. These series divided into three parts each

ROS2 Installation and Overview

The goal in this post is describing the installation process of ROS2 Crystal Clemmys with ROS bag and giving you an overview of ROS2. Installing ROS2 can be a waste of time if you don’t know where to start and which packages/dependencies you need to install. I wasted time to figure out how to install

Security in IoT – Distributed Danial of Service (DDoS) II

This post is the second part of the last post and will describe the architecture along with characteristics of Malware especially Mirai and Hajime. Characteristics of IoT malware As mentioned before, the IoT device should get the Malware in order to participate in DDoS attacks. Most of the malwares are Linux based and has limited

Security in IoT – Distributed Danial of Service (DDoS) I

The goal in this post and the next one is to describe Distributed Danial of Service attack, its architecture, and the most common Malware for DDoS in IoT devices. What is Danial of Service One of the most popular attacks is the Denial of Service attack in which the attacker tries to make the server

Security in IoT – Overview

In this post series, I’m going to talk about security in IoT devices and I try to clarify the following aspects and questions about them: Security for IoT devices. Motivation and why people should care about the security of their IoT device or more general, for every device that can connect to the Internet? IoT