In this post, I introduce Jdlib a java wrapper for Dlib toolkit.
In this post, we will learn how to build a custom object detector using Yolo. For example, I made a detector to detect my Rubik’s Cube.
In this post, we will learn how to solve a printed sudoku solver using a real-time feed from a camera.
In this post, we will learn how to develop an app to measure a distance between a pinhole camera and an object.
In this post, we will learn how to develop an application to segment a handwritten multi-digit string image and recognize the segmented digits using deep learning.
In this post, I introduce an implementation of a proposed CNN design for Arabic handwritten characters recognition.
In this post, I will explain how to generate a model from ARFF dataset file and how to classify a new instance with this model using Weka API in Java.
Using TensorFlow and Inception-v3 model, I built this small demo in Java to recognize objects in images and classify it into 1000 classes like Lion, Frog, Flowers, ....etc.
In this post, I will explain classical encryption techniques Ceasar cipher, Monoalphabetic cipher, and Playfair cipher, and provide a java code demonstrating encryption and decryption processes for each one.
The value of encryption increases over time simply because encryption keeps your call from eavesdroppers and protects confidential data, Obviously it shows more value when it comes to military or financial affairs.
Design pattern is best practise and a proper solution to a problem faced by software developers this solution based on two principles of object oriented design . 1- Program to an interface not an implementation. 2- Preferring object composition over class inheritance.
More speed is a dominant need in our life and IT field has no exception from that. Redis comes to meet the need of speed in the database domain.