wizzdev image

Tracking – OpenCV Basics #4

In the previous post, we learned a little bit about colour spaces and utilised the power of HSV thresholding to detect our desired objects. However, our detection method, like many others,

wizzdev image

Detecting color – OpenCV Basics #3

In our previous posts, we mainly focused on processing grayscale images. Even when our initial material has color, it often makes sense to convert it to grayscale to reduce the computational

wizzdev image

Detecting lines on a road – OpenCV Basics

Machine vision has seen significant growth in recent years. Advancements in hardware and improvements in algorithms have made image-based analysis much easier and more effective. While the term “AI” is quite

wizzdev image

Tracking – OpenCV Basics #4

In the previous post, we learned a little bit about colour spaces and utilised the power of HSV thresholding to detect our desired objects. However, our detection method, like many others,

wizzdev image

Detecting color – OpenCV Basics #3

In our previous posts, we mainly focused on processing grayscale images. Even when our initial material has color, it often makes sense to convert it to grayscale to reduce the computational

wizzdev image

Detecting lines on a road – OpenCV Basics

Machine vision has seen significant growth in recent years. Advancements in hardware and improvements in algorithms have made image-based analysis much easier and more effective. While the term “AI” is quite

Recent Posts

Constrained Application Protocol_minimalistic icon set

Constrained Application Protocol in IoT

Internet protocol conversations usually boil down to speed, reliability, or the range of functions performed. Large applications and video streams require high bandwidth, necessitating demanding hardware requirements. In the context of

Northbound and Southbound Interfaces_wizzdev

Northbound and Southbound interfaces in Edge IoT

Managing large-scale networks is challenging even for experienced engineers. As traffic grows, controlling devices individually quickly becomes inefficient and error-prone. Large networks process massive data volumes every second, increasing the risk

No more posts to show

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.