Pinned Repositories
Anonymization
Web Application for applying different anonymization techniques to datasets.
Computer_Networks_Devices_on_Network
Finds and builds a list of the devices on a network and their respective manufacturer, based on the MAC ADDRESS of each device
Cyber_Security_Diffie_Hellman_Man_in_the_Middle_Attack
Diffie Hellman Algorithm implementation with man in the middle attack simulation.
Data_Science_Clustering_EM
Clustering with the expectation maximization algorithm, for Gaussian Mixture Models.
Data_Science_Decision_Trees
Implementing binary classification for id3, c45 and cart trees.
Data_Science_Image_Classification_With_PCA_and_KNN_Classifier
Transforming a dataset of images, into their eigen-faces with PCA, then selecting the main of those vectors and applying unsupervised classification.
DataScience_Unsupervised_Machine_Learning_SpectralClustering
Unsupervised Spectral Clustering Machine Learning Model Implemented
MERN-Stack-MongoDB-Express-React-Node
MERN Stack (MongoDB, Express, React, Node) for Vaccine Registration.
Sentiment-analysis-of-Ecuadorian-political-tweets-from-2021election-with-Natural-Language-Processing
In this project, we captured sentiments of replies to tweets from two Ecuadorian presidential candidates in the 2021 elections (@LassoGuillermo and @ecuarauz). A model of neural networks was used to classify tweets considering their sentiment as positive, negative, or neutral.
Web_Applications_Final_Project
A simple prototype of a multi-layer web application, includes a database, back-end and front-end.
Davidmenamm's Repositories
Davidmenamm/Sentiment-analysis-of-Ecuadorian-political-tweets-from-2021election-with-Natural-Language-Processing
In this project, we captured sentiments of replies to tweets from two Ecuadorian presidential candidates in the 2021 elections (@LassoGuillermo and @ecuarauz). A model of neural networks was used to classify tweets considering their sentiment as positive, negative, or neutral.
Davidmenamm/Computer_Networks_Devices_on_Network
Finds and builds a list of the devices on a network and their respective manufacturer, based on the MAC ADDRESS of each device
Davidmenamm/Cyber_Security_Diffie_Hellman_Man_in_the_Middle_Attack
Diffie Hellman Algorithm implementation with man in the middle attack simulation.
Davidmenamm/Data_Science_Clustering_EM
Clustering with the expectation maximization algorithm, for Gaussian Mixture Models.
Davidmenamm/Data_Science_Decision_Trees
Implementing binary classification for id3, c45 and cart trees.
Davidmenamm/Data_Science_Image_Classification_With_PCA_and_KNN_Classifier
Transforming a dataset of images, into their eigen-faces with PCA, then selecting the main of those vectors and applying unsupervised classification.
Davidmenamm/DataScience_Unsupervised_Machine_Learning_SpectralClustering
Unsupervised Spectral Clustering Machine Learning Model Implemented
Davidmenamm/MERN-Stack-MongoDB-Express-React-Node
MERN Stack (MongoDB, Express, React, Node) for Vaccine Registration.
Davidmenamm/Anonymization
Web Application for applying different anonymization techniques to datasets.
Davidmenamm/Artificial_Intelligence_8_Puzzle_Program
Implementing the 8 puzzle program, manhattan distance algorithm is used to find best path and also a learned through experience heuristic algorithm.
Davidmenamm/Calendar_Application
Simple Calendar Application Built with React. Focused on the front end.
Davidmenamm/Web_Applications_Final_Project
A simple prototype of a multi-layer web application, includes a database, back-end and front-end.
Davidmenamm/Web_Applications_Users_App_JSF_CDI_Beans
Simple web application plataform, for user's to login and communicate through messages with eachother. Developed using Java Server Faces (JSF) and CDI Beans.
Davidmenamm/Computer_Networks_Multiple_Chat_Ftp
Asynchronic chat between clients, managed by a main server. Ability to build groups or chat between two clients. Ability to send files via FTP
Davidmenamm/Cyber_Security_Brute_Force_Timing_AES_DES_3DES
Brute force algorithm for maximum speed of decryptions in AES, DES and 3DES systems.
Davidmenamm/Cybersecurity_Miller_Rabin_PrimeNumber_Detection_Algorithm
Calculates if a number is composite or PROBABLY prime using the Miller-Rabin algorithm. If the number calculated is more than 10 digits long it could present errors.
Davidmenamm/Cybersecurity_Steganography_and_Ciphers
Cryptography: The steganography of images, and the application of caesar's cipher to decode the encrypted message.
Davidmenamm/Cybersecurity_Stein_Algorithm_GCD
Implemententing the Stein's algorithm, for calculating the greatest common divisor in number theory, with applications in cyber-security
Davidmenamm/Data_Science_KNN_Naive_Bayes
Binary Classification with KNN and Naive Bayes Models.
Davidmenamm/Data_Science_Neural_Networks
Classification with neural networks and analysis of metrics and hyperparameter configuration.
Davidmenamm/Data_Science_Preprocessing
Apply preprocessing for feature selection, for a numerical input and categorical output dataset
Davidmenamm/MERN_Stack_Units_Conversion_And_Operations
Application to convert and operate among different units, for various magnitudes. Uses a MERN Stack Architecture.
Davidmenamm/Multi-agent-Reinforcement-Learning-PPO-Proximal-Policy-Optimization---OpenAI
Benchmarking different types of PPO (Proximal Policy Optimization), an algorithm brought by Open AI for reinforcement learning.
Davidmenamm/Operating_Systems_Bankers_Algorithm
Simulates the bankers algorithm used in operating systems to avoid deadlocks, and see what sequences of processes are "safe sequences"
Davidmenamm/Operating_Systems_Minikernel
A simulation of the main functions of an operating system
Davidmenamm/PageRank_Algorithm_Simulation
Simulates the page rank algorithm created by Google initially, includes 20 nodes, with 4 spider traps and 3 dead-ends
Davidmenamm/Reinforcement-Learning---PPO-Algorithm-Communication
Reinforcement Learning - PPO Algorithm Communication