The neural network requires to train it before using. We are expected to provide sets od date that will be used for the purpose of learning. It means that we need a generator which will create gestures in a form readable by the NN.
Rzeszów Hackathon – LIVE
Today we are taking part in Rzeszów Hackathon. Our team consists of 4 members – Bartek, Vlad, Michał and me. By the way, you should know Bartek and Michał from the post Pekaton – 24-godzinny hackaton. At the beginning, I want to mention that in this post I’m not going to reveal project’s main idea and implementation details. This is because some of ours competitors may read it (good luck guys ;)). Maybe we will share a few hints. Since the start, this post will be updated every hour, at least I hope so.
Aligning, resizing and normalization
It’s time to start implementing support for recognizing gestures with neural networks. As I mentioned in the previous post, I had seen some potential problems. After two days of work, I can finally write that those problems are solved. In this post, I’ll describe how I solved the problem of different drawing area location. In the second paragraph, I’m going to describe implemented resizing strategy. At the end, in the third part, I’ll write some words about flattering gestures and values normalization.
Artificial Intelligence on the board
In the previous post, I mentioned that the next thing developed in the Aksesi project will be a management console. After submitting that post, I realized that it is going to be another boring application with 90% of its logic encapsulated in CRUD operations. When I decided to take part in Get Noticed competition, my main goal was to learn new things. To make a long story short. The next step won’t be management console; the next step will be gesture recognition with Artificial Intelligence usage.
Planning vol. 2
This post is divided into two main parts. The technical part will be connected with adding custom headers passed to an authentication endpoint. In the second part, I’m going to describe plans for next few weeks.
Change is the only constant – a few words about keeping up
The IT environment is constantly changing. New frameworks, new hardware, new people, new stacks, new everything every month. One of the things that programmers are expected to do is to follow the news. It’s very important to keep up with it if you want to stay competitive on the job market.
By following trends, I don’t mean believe in them and use blindly. To get by in, we need to know buzzwords, have minimum knowledge about its usage and what changes they introduce. Not that much, right? No, it’s a lot, at least, enough to get lost within a few weeks of inactivity.
Shopping time – Bootique
The last few days have been very productive. I have written demo endpoint which is able to return information whether a user should be logged in or not. In this application, I used the tool I met on the last Polish Java User Group meetup – Bootique. I’m going to describe it in the first part of this article. In the second, I’ll show you changes I made in the proxy application. There are a lot of new features.
Quick Action #3 – Facebook JS SDK
The third episode of Quick Action series. Using very simple example I’m going to show how you can retrieve data from Facebook Graph API using Facebook JS SDK. To make an application more user-friendly I decided to use Angular Framework.
Encapsulation and forwarding
Yesterday I realized that I write more about refactoring than implementation. To stay consistent today’s post is about…refactoring. Well, maybe not only about it, but mainly. In the previous week I finished following tasks:
- [F-4] Handling request result (response code, message)
- [F-8] Encapsulate logic from aksesi-gesture.js into a class
- [F-9] Secure initialization
- [P-1] Forwarding requests to an authentication endpoint
FOR loop is no longer cool
The 8th version of Java introduced a few really cool features. My favorites are streams and, connected with them, lambda expressions. In this article, I’ll show you some examples of refactoring existing code into the more modern version. All of the examples, except the 1st one, were inspired by the Aksesi Proxy source code.