PinnedErdem Ege ErogluBaby Steps to Object Detection with Machine Learning1- Collecting DataAug 31, 2022Aug 31, 2022
PinnedErdem Ege ErogluFoMO, A Destructor for SuccessFor the last few decades, the fear of missing out has turned into a popular phenomenon in psychology by means of the advances in…Aug 26, 2021Aug 26, 2021
Erdem Ege ErogluTendermint ConsensusTendermint consensus is a type of Byzantine Fault Tolerant (BFT) consensus algorithm that is used to reach consensus among a group of nodes…Jan 5, 2023Jan 5, 2023
Erdem Ege ErogluA summary of “An Introduction to Data Protection”Data privacy has been turned into a tremendous phenomenon. The exponential increase in amount of the data via social networking paved the…Oct 25, 2022Oct 25, 2022
Erdem Ege Erogluk-Anonymity: A Model for Protecting Privacyk-Anonymity data protecting model is significant because it provides guarantees of privacy protection. Anonymity is not possible y hiding…Oct 25, 2022Oct 25, 2022
Erdem Ege ErogluCustom Object Detection with Yolov5 in 4 Steps1- Create data set in Yolo formatSep 5, 2022Sep 5, 2022
Erdem Ege ErogluVisitor Design PatternVisitor design pattern allows you to add methods to classes of different types without much altering to those classes.Sep 2, 2021Sep 2, 2021
Erdem Ege ErogluBuilder Design PatternThe builder pattern is a creational design pattern.Sep 2, 2021Sep 2, 2021
Erdem Ege ErogluChain of Responsibility Design PatternChain of responsibility is a behavioral design pattern.Sep 1, 2021Sep 1, 2021
Erdem Ege ErogluFactory Design PatternFactory pattern is a creational design pattern.Sep 1, 2021Sep 1, 2021