forked from TheAlgorithms/Python
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add README files 2/8 (TheAlgorithms#5766)
* add 5 README files * empty commit to (hopefully) get rid of the `test-are-failling` label * Update ciphers/README.md Co-authored-by: John Law <[email protected]> * Update conversions/README.md Co-authored-by: John Law <[email protected]> * Update cellular_automata/README.md Co-authored-by: John Law <[email protected]> * Update computer_vision/README.md Co-authored-by: John Law <[email protected]> * Update conversions/README.md Co-authored-by: John Law <[email protected]> * Update compression/README.md Co-authored-by: John Law <[email protected]>
- Loading branch information
1 parent
f36ee03
commit 6314195
Showing
5 changed files
with
36 additions
and
5 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,8 @@ | ||
# Cellular Automata | ||
|
||
* https://en.wikipedia.org/wiki/Cellular_automaton | ||
* https://mathworld.wolfram.com/ElementaryCellularAutomaton.html | ||
Cellular automata are a way to simulate the behavior of "life", no matter if it is a robot or cell. | ||
They usually follow simple rules but can lead to the creation of complex forms. | ||
The most popular cellular automaton is Conway's [Game of Life](https://en.wikipedia.org/wiki/Conway%27s_Game_of_Life). | ||
|
||
* <https://en.wikipedia.org/wiki/Cellular_automaton> | ||
* <https://mathworld.wolfram.com/ElementaryCellularAutomaton.html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
# Ciphers | ||
|
||
Ciphers are used to protect data from people that are not allowed to have it. They are everywhere on the internet to protect your connections. | ||
|
||
* <https://en.wikipedia.org/wiki/Cipher> | ||
* <http://practicalcryptography.com/ciphers/> | ||
* <https://practicalcryptography.com/ciphers/classical-era/> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
# Compression | ||
|
||
Data compression is everywhere, you need it to store data without taking too much space. | ||
Either the compression lose some data (then we talk about lossy compression, such as .jpg) or it does not (and then it is lossless compression, such as .png) | ||
|
||
Lossless compression is mainly used for archive purpose as it allow storing data without losing information about the file archived. On the other hand, lossy compression is used for transfer of file where quality isn't necessarily what is required (i.e: images on Twitter). | ||
|
||
* <https://www.sciencedirect.com/topics/computer-science/compression-algorithm> | ||
* <https://en.wikipedia.org/wiki/Data_compression> | ||
* <https://en.wikipedia.org/wiki/Pigeonhole_principle> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,11 @@ | ||
### Computer Vision | ||
# Computer Vision | ||
|
||
Computer vision is a field of computer science that works on enabling computers to see, identify and process images in the same way that human does, and provide appropriate output. | ||
|
||
Computer vision is a field of computer science that works on enabling computers to see, | ||
identify and process images in the same way that human vision does, and then provide appropriate output. | ||
It is like imparting human intelligence and instincts to a computer. | ||
Image processing and computer vision are a little different from each other. Image processing means applying some algorithms for transforming image from one form to the other like smoothing, contrasting, stretching, etc. | ||
|
||
While computer vision comes from modelling image processing using the techniques of machine learning, computer vision applies machine learning to recognize patterns for interpretation of images (much like the process of visual reasoning of human vision). | ||
|
||
* <https://en.wikipedia.org/wiki/Computer_vision> | ||
* <https://www.algorithmia.com/blog/introduction-to-computer-vision> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
# Conversion | ||
|
||
Conversion programs convert a type of data, a number from a numerical base or unit into one of another type, base or unit, e.g. binary to decimal, integer to string or foot to meters. | ||
|
||
* <https://en.wikipedia.org/wiki/Data_conversion> | ||
* <https://en.wikipedia.org/wiki/Transcoding> |