From the moment an image is captured until some information is inferred, various subprocesses are at work. These process the image as a set of pixels to classify and interpret different groups of pixels based on certain criteria. In short, they try to “identify” which objects are contained in a given scene.
viernes, 20 de diciembre de 2024
miércoles, 18 de diciembre de 2024
Computer vision #1 | A brief introduction to computer vision
This is the first "chapter" of what will be a small series about computer vision—a very extensive area of technological knowledge that has caught my attention. I do not plan to follow a content script, so I will decide what to publish as time goes on. I am dedicating a lot of effort and care to studying it, so I hope that, as a reader, you enjoy it, share it, and, above all, learn something new each time.
Figure 1. Real-time social distancing monitoring in COVID times Source: deepnote.com |
The origin of the so-called 'bugs'
We have all heard of bugs: errors in software that prevent or disrupt its correct behavior. But how did this term come about? There is certainly not much relation between a bug and a problem. And although for some people there is, I am referring to other types of mishaps.
Decrypt HTTPS (TLS) traffic using the SSL Key Log File | Wireshark @Windows 10
To go through the following practice, services offered by a network traffic capturer will be required. I opted for Wireshark, which can be downloaded from its official site https://www.wireshark.org/#download. It is easy to install and free to use.