Close
  • Poster Presentation

math equations

Math for Data Science

Machine Learning is just a fancy term for Statistics. And to get through ML, one needs a good understanding of Linear Algebra, Calculus and Probability Theory. Thus, I have composed a quick cookbook for all the mathematical concepts required for data analysis and statistical modeling.
money in a bag

Forecasting Cryptocurrency

Predicting bitcoin prices using ensembling on multivariate time series. These feature sets can be categorised as macroeconomic factors, blockchain attributes and public opinion.
python snake cartoon

Python Quickstart

I have been coding in Python, on and off, for 5 years now. Yet every time I am about to start a new project, I look for those quick recap videos on YouTube. But none seems to cater my explicit requirements, thus after a long overhaul, I came up with my version of a Python notebook that covers the topics relevant to the analytics domain.
girl playing voilin

Predictions on Big Data from Sensors

Predicting pedestrian hot-spots in the city of Melbourne for street art performers. The predictions were made on real time streaming data using Apache Kafka and Spark.
database

Introduction to Databases

While people are busy learning about the much hyped Python and R programming languages, they often neglect the basic querying concepts. And without a database, Data Science seems quite meaningless.
car parking

Analysing on-street Car Parking

Explored data from Parking Sensors across the city of Melbourne using Tableau and Visualised the results via a dynamic website built using Shiny in R.
paper sheets

Classifying Academic Text

Categorised 50,000 Research Papers using Natural Language Processing and Topic Modelling. Deployed 24 different configurations to compare Statistical Modelling against Deep Learning for Natural Language Processing.
laptop, bug and bomb

PETYA Ransomware 2.0

Petya, generally, is the term for a ransomware program which targets Microsoft Windows based systems by infecting the MBR and demands virtual money to release the files uninfected.
face

Face Recognition

Detecting and identifying faces using KNearestNeighours and Haar Cascades.

Top Challenges Faced by Growing Organisations

Growing organisations face a number of issues ranging from investing in technology to taking appropriate measures to secure it. As the business grows, it demands enhanced security layers and better solutions for newer problems.
laptop, bug and bomb

Cyber Intelligence Reporting

Security-Intelligence refers to real time monitoring and analysis of critical data that has the potential to impact an organisation, both in terms of reputation as well as capital.
server_logo

In-house vs Cloud Server

Cloud computing is comparatively new but tends to hold great potential in terms of upcoming applications. Keeping its benefits aside, let’s start from the base level to rule out the better alternative among Cloud and Physical servers.
laptop, tablet, cloud

End to End Encryption

End to end encryption is an enforced algorithm for communication between two endpoint devices, to prevent a third party from accessing the packets between these clients.
envelope and hands

Data Loss Protection

Data Loss Protection is the practice followed to restrict movement of data outside the organisation and is highly recommended to avoid misuse of proprietary information or other sensitive material.
diabetes - pills and injection

ML in Healthcare

Using classification to improve diabetes diagnostics by computing factors that may affect insulin levels.
amazon logo with cart

Amazon Stores

After acquiring Whole Foods for a whooping $13.7 Billion, Amazon drops another bomb by patenting a new technology to restrict its customers from comparing rival’s products, while in amazon stores.
magnifying glass

Lost & Found Portal

A website to report items lost and/or found in college, built using Bootstrap, MySql and PHP.
people exchanging notes

Academia

Developed a website to share academic material like notes, eBooks and projects.

Zip Bomb

A zip bomb, also known as a zip of death or decompression bomb, is a malicious archive file designed to crash the program or system reading it.
message logo

Chat Room

Full duplex communication channel between Server and Client by binding sockets in C.
cloud

IaaS vs PaaS

Acronyms SaaS, PaaS and IaaS are heavily used in cloud computing industries and are the models for online services that a cloud offers. The “Cloud” is a very broad concept otherwise but let’s just focus on a few services that it offers.
http protocol and lock

HTTP and SSL

HTTP stands for HyperText Transfer Protocol and is used to control the transfer of content over the web. The content may vary from miniature texts to heavy graphic files. This protocol was developed by Ted Nelson and came out in 1991 with its successors in 1996, 1997 and 2015.
usb cable

USB Type-C

USBs have been a very part of our computing needs but only a few of us would be knowing what it stands for. And that’s Universal Serial Bus. Going by it’s nomenclature, type-C looks like a bump to the trend for standardising the connection peripherals. For those, still unaware of the new form-factor of the USB port, here’s the visual to explain why is USB type-C a big deal!
www and domain extensions

Domain Extensions

Question arises, how domain extensions work and what impact do these have on the internet market. For all the curious minds out there, here’s a list of the existing common extensions:
  • .com
  • .net
  • .org
  • .in
  • .us
  • .xyz
  • .website
explosion

Fork Bomb

A fork bomb aka Rabbit Virus is a denial-of-service attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation.