Prologue !

portfolio-profile

As to best describe me, I always keep this saying in mind that: DREAMS WITHOUT GOALS ARE JUST A DREAM ! To be an innovator in the vast commenced field of Artificial Intelligence where its' Preliminary Principles can be incubated with CyberSecurity alarming emergence. As AI/ML is the approach that can re-define Techno-driven Intelligence for most of the Monetary-eccentric Products where Automating any Task with endless working efficiency of Machine would drive the Human Resources to an enormous extends. AI/ML applications are getting populated with Deep Learning and Natural Language Processing enlighten scope where encapsulating the machine productivity has become the Fundamental Principle . To opt for the Passion that can best describe me, was to amend the AI principles utilisation for highly encentric domain, where first aggregated approach needs to fulfill the stipulation for Cyber Security products where the security fabrics more effictively be annexed.

The thrist for onboarding with AI-driven approaches was to first Practice out on, What AI/ML kind of stuff is ? Then other burning thought was about how CyberSec can be enchanced (moreover its Practice other than theory)! By investing my entire 2 years of undergraduation on Learning and exploring the vast growth of AI/ML and CNN projects and how people with different mindset or more professionally, THINKING, made this imagination to a true scorable bounds. The lurk of CyberSec AI arouse the Deep impact on how differently Security Fabrics can be enhanced, thinking wasn't arised by sitting backdoors but more profoundly when I heard about Crypto-Currency products making their shift to AI/ML grounds to make Mining procedure more confluencing and machine-driven other than depending on Human-liability, this made me really think on 3 perspectives..... Why, When, and How ??? and What impact would leashed out !

Failing multiple times on managing how to make imagination a True scope of enactment, as only scope thats' best to drake is keep practicing and focusing on what I thought to Achieve and Develop for CyberSec resources enrichment when I emphasised on this best spokens' : WE NEVER PLAN TO FAIL, BUT FAIL TO PLAN !

Project Work

The practice of leading the work of a team to achieve goals and meet success criteria at the specified time. The primary challenge of project management is to achieve all of the project goals within the given constraints. This information is usually described in project documentation, created at the beginning of the development process. The primary constraints are scope, time and quality. A project is a temporary endeavor designed to produce a unique product, service or result with a defined beginning and ends with usually time-constrained, and often undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value.

Human Identification using Detection and Recognition from Real Time video

Motion can be described either by a 2-D motion model or 3-D motion model. The two dimensional motion estimation is an important part of our video stabilization system. The motion estimation is the foundation/ pre-requisite for video stabilisation. So working with the direct pixel approach will help in making the optimal use of the frame information available.

Initially, the practical approach was to use sparse optical flow (Shi tomasi) which is concerned with computing the motion of pixels between consecutive image frames. Usually uses image features such as edges, corners, etc. However, Dense Optical Flow using Gunner Farneback's algorithm computes the optical flow for all the points in the frame.

Activity Recognizer for Drowsiness using the Decisive Learning

Driver fatigue is a huge traffic safety problem and is widely believed to be one of the largest contributors to fatalities and severe injuries in traffic today, either as a direct cause of falling asleep at the wheel or as a contributing factor in lowering the attention and reaction time of a driver in critical situations. Accidents with commercial heavy vehicles are not only dangerous but also very costly and the counteraction of driver fatigue is highly important for improvement of road safety.

A typical program for handling fatigue related risks is designed in several steps, applied in different phases and involves different levels of the organisation. In what way an organisation choose to define a FRM program depend on the targeted group of people the program is developed for.

Face Identification and Gesture Recognition for Bio-informatic Applications

Face recognition is quite simple and intuitive. You look at a person’s face, eyes, nose, mouth, color and overall look. This is your mind learning or training for the face recognition of that person by gathering face data.

The first is the introduction of a new image representation called the “Integral Image” which allows the features used by our detector to be computed very quickly. The second is a learning algorithm, based on AdaBoost, which selects a small number of critical visual features from a larger set and yields extremely efficient classifiers. LBP features are extracted to form a feature vector to classify a face from a non-face because face is composed of micro texture patterns and LBP is a texture descriptor.

Towards Unsupervised Text Classification Leveraging Experts and Word Embeddings

Supervised machine learning models have shown great success in this area but they require a large number of labeled documents to reach adequate accuracy. With the help of TF-IDF (unsupervised learning) we can see how important a word is to a document in a collection or corpus. We then make use of the TF-IDF matrix to calculate document similarity by making use of scikit-learn.

Our approach for unsupervised text classification is based on the choice to model the task as a text similarity problem between two sets of words: One containing the most relevant words in the document and another containing keywords derived from the label of the target category. While the key advantage of this approach is its simplicity, its success hinges on the good definition of a dictionary of words for each category.

Image Captioning Using Recurrent Neural Network

Image captioning is somewhat interesting to study with machine learning perspectives because it concerns what we understood about the perception with respect to the machine learning activities. Image Captioning research has been around for a number of years, but the efficacy of the techniques were limited, and they generally weren’t robust enough to handle the real world.

To overscale the use of Recurrent Neural Network and LSTM to make the perceptrons map with the neighbourhood using the feed forward learning, the output of which is to minimize the fatal error by using the stored memory of LSTM gates in the back forward propagation step.

Research Brief

Research is "creative and systematic work undertaken to increase the stock of knowledge, including knowledge of humans, technology and its best practiced applications, and the use of this stock of knowledge to devise new applications. Research is important for three reasons.1. Research adds to our knowledge: Adding to knowledge means that educators undertake research to contribute to existing information about issues 2.Research improves practice: Research is also important because it suggests improvements for practice.

A research project may also be an expansion on past work in the field. Research projects can be used to develop further knowledge on a topic, or in the example of a school research project, they can be used to further a student's research prowess to prepare them for future jobs or reports. The degree of originality of the research is among major criteria for articles to be published in academic journals and usually established by means of peer review.

Stock Capitalization Prediction With Twitter Comment Using NLP And Machine Learning

The proliferation of machine learning has been unprecedented. There exists very few domains where data-based decision making is required that hasn’t seen its widespread application. The field of investing is no exception. One simply has to search Google jointly for “ML” and “stock prediction” to be presented with a plethora of time series forecasting and Recurrent Neural Network related content. One commonly used technique in both (investment) literature and practice to combat these abnormalities in time series data is to take the price return for stocks (or rate of change for other data), between two periods instead of the absolute value.

As the proposed algo is designed on low accuracy principles. The point to work on the project is to reframe the project with the research taken forward using NLP and Machine Learning (using Tensor-flow/Chainer(begginner)/Pytorch lib) and to increase the accuracy with learning Efficiency.

3301 Clauseř - Sophomore

The product inhibit the Security of server Infra’ by injecting ciphers for phishing and bypassing the security spectrum by using the fundamentals of Stenography in its root practice(haskel) based on the principle modules of Sec Tools penetrating - project titled as Code 9 Newspaper Article !

The roots for the prototype are deep stretched to the Research Analysis, where the back-end support written in python3.x integrated with c++ core is to be utilised as a tool to globe the spectrum for Stenography principle security testing, main objective was to be on-hands with Stenographical knowledge and to practice scripting where AI + CyberSec can highly utilized. The Project is 29/100 online

Delineate !

CORE STRENGTHS :

PERSONAL STRENGTHS :

HOBBIES AND INTERESTS :

Contact

To get best in touch if any Research related or AI CyberSec kinda project or prototype is to be published or worked upon, as to neutralise the exempts of coding languages I practice Python (high efficiency) and C++ (memory and Object utilization) with major objectives to focus on. As being Undergrad passed out of NIIT, look forward to contribute in un-commenced or I'M Possible kind of Research Work !

Raise Query below, If I can be helpful anyhow ....

Can we Reached out here !