The goal in this post and the next one is to describe Distributed Danial of Service attack, its architecture, and the most common Malware for DDoS in IoT devices. What is Danial of Service One of the most popular attacks is the Denial of Service attack in which the attacker tries to make the server
In the last three posts, we have learned some important basics in computer vision and in this post, I want to talk about the concept “Feature” which plays an important role in different levels of image processing. Feature (local Feature) In image processing, feature (local feature) is basically a piece of image (patch) which can
In this post, I’m going to describe basic and important parameters for camera and lenses. After reading this post you should have the following knowledge: Clearly know what is Focal Length Aperture Depth of View Clear understanding of different types of lenses Field of View Sensor size Shutter Speed ISO Maximum Transmission Unit (MTU) Ground
In this article, I’m going to describe a possible scenario for the precise positioning of autonomous cars in the streets and intersections. Overview Before describing the localization of autonomous cars, I want to describe some important components which may be used in the next generation of autos. Basically, there are two vital elements for driving
So far we have discussed some basics and we know how convolution in image processing works. It is time to talk more about applications of convolution (kernel convolution). So in this post, we will go through Edge Detection algorithms and after reading this post you should be able to understand edge detection concept and its
In this post, we will continue to learn more about low-level computer vision which we’ve started in last post. After reading this post you will learn Convolution as well as literally most of the computer vision because it appears somehow in all functions that we will use in the CV. Let’s get started. Convolution and
As you may know, demand on Computer Vision Applications is increasing and so I decided to make post series about that and dive into my favorite topic “Computer Vision” and share my knowledge with you to help you to get deep understanding of different topics in this field. These series divided into three parts each
The goal in this post is describing the installation process of ROS2 Crystal Clemmys with ROS bag and giving you an overview of ROS2. Installing ROS2 can be a waste of time if you don’t know where to start and which packages/dependencies you need to install. I wasted time to figure out how to install
In this post series, I’m going to talk about security in IoT devices and I try to clarify the following aspects and questions about them: Security for IoT devices. Motivation and why people should care about the security of their IoT device or more general, for every device that can connect to the Internet? IoT
According to Wikipedia, Edge Computing is a method of optimizing applications or cloud computing systems by taking some portion of an application, its data, or services away from one or more central nodes (the “core”) to the other logical extreme (the “edge”) of the Internet which makes contact with the physical world or end users