Pinned Repositories
Blockchain-Anomaly-Detection
Blockchain technology has emerged as a transformative force in the digital landscape, revolutionizing industries with its promise of secure, transparent, and immutable transaction records across decentralized networks. Despite the inherent security features of blockchain systems, the presence of anomaly activities poses a major threat.
Blockchain-Implementation
successfully implemented a custom blockchain from scratch, marking a significant milestone in my programming journey. This project goes beyond theoretical understanding, providing a hands-on experience in building a decentralized and secure system.
Comparitive-Analysis-of-Cryptographic-Algorithm
Comparative analysis of cryptographic algorithms, evaluating their security, efficiency, and suitability for different use cases
LT.Care-Customer-relation-management
CRM stands for customer relationship management (CRM) , which is a system for managing all of your company's interactions with current and potential customers.
Machice-Learning-Fundamentals
Machine Learning (ML) is a field of artificial intelligence (AI) that focuses on developing algorithms and models capable of learning from data to make predictions or decisions without explicit programming. In ML, systems are designed to recognize patterns, extract meaningful insights, and improve their performance over time through experience.
Machine-Learning-Projects
This repository, named "ml_practice," serves as a learning ground for various machine learning concepts and techniques. The repository contains a collection of Python scripts and Jupyter notebooks, each dedicated to exploring and implementing different machine learning algorithms, models, and methodologies.
Python-for-Data-Science
Python Libraries such as NumPy, Pandas, Matplotlib, Seaborn and Sickit-Learn, for Data Analysis, Data Visualization, EDA & Data Science
Stegnography
Steganography is the ancient art and science of hiding information within seemingly innocuous carriers, such as images, audio files, or text, with the goal of concealing the very existence of the hidden data.
Supply-Chain-Management-DBMS-Project
Creating a Database Management System (DBMS) lab and mini project involves implementing a database, performing various operations on it, and potentially developing a small-scale database-driven application. The project was to handle the flow of products in Supply Chain
Supply.Link-SCM-Optimization
Supply chain management (SCM) is the process of turning raw materials into finished goods and delivering them to customers. Supply chain optimization is the process of using tools and processes to ensure that a supply chain operates at its best
Dheeraj-02NK's Repositories
Dheeraj-02NK/Machine-Learning-Projects
This repository, named "ml_practice," serves as a learning ground for various machine learning concepts and techniques. The repository contains a collection of Python scripts and Jupyter notebooks, each dedicated to exploring and implementing different machine learning algorithms, models, and methodologies.
Dheeraj-02NK/Supply-Chain-Management-DBMS-Project
Creating a Database Management System (DBMS) lab and mini project involves implementing a database, performing various operations on it, and potentially developing a small-scale database-driven application. The project was to handle the flow of products in Supply Chain
Dheeraj-02NK/Stegnography
Steganography is the ancient art and science of hiding information within seemingly innocuous carriers, such as images, audio files, or text, with the goal of concealing the very existence of the hidden data.
Dheeraj-02NK/Blockchain-Anomaly-Detection
Blockchain technology has emerged as a transformative force in the digital landscape, revolutionizing industries with its promise of secure, transparent, and immutable transaction records across decentralized networks. Despite the inherent security features of blockchain systems, the presence of anomaly activities poses a major threat.
Dheeraj-02NK/Blockchain-Implementation
successfully implemented a custom blockchain from scratch, marking a significant milestone in my programming journey. This project goes beyond theoretical understanding, providing a hands-on experience in building a decentralized and secure system.
Dheeraj-02NK/Machice-Learning-Fundamentals
Machine Learning (ML) is a field of artificial intelligence (AI) that focuses on developing algorithms and models capable of learning from data to make predictions or decisions without explicit programming. In ML, systems are designed to recognize patterns, extract meaningful insights, and improve their performance over time through experience.
Dheeraj-02NK/Python-for-Data-Science
Python Libraries such as NumPy, Pandas, Matplotlib, Seaborn and Sickit-Learn, for Data Analysis, Data Visualization, EDA & Data Science
Dheeraj-02NK/Recommendation-System
A recommendation system is a type of software application or algorithm that analyzes user preferences, behaviors, and patterns to provide personalized suggestions or recommendations. These systems are commonly used in various online platforms, such as e-commerce websites, streaming services, and social media etc
Dheeraj-02NK/C-Data-Structures-and-Algorithms
Creating a project that implements various sorting algorithms in C is a great way to deepen your understanding of data structures and algorithms. Below is a simple example project that includes the implementation of several sorting algorithms.
Dheeraj-02NK/Dheeraj-02NK
Dheeraj-02NK/Vampus-World
"Vampus World" is a grid-based exploration game where the player controls a blue agent to find gold while avoiding red vampus obstacles. The objective is to navigate the agent through the grid, receiving feedback on proximity to vampus, with the game concluding either in victory upon finding the gold or defeat if caught by the vampus.
Dheeraj-02NK/Android-App-Development
Android app development using Android Studio is a dynamic and versatile process that allows developers to create innovative and user-friendly applications for the Android platform. Android Studio, the official integrated development environment (IDE) for Android, provides powerful tools and features for designing, coding, testing, and debugging
Dheeraj-02NK/Artificial-Intelligence
AI is a comprehensive repository housing cutting-edge artificial intelligence algorithms, models, and tools for research, experimentation, and innovation in the field of AI
Dheeraj-02NK/Comparitive-Analysis-of-Cryptographic-Algorithm
Comparative analysis of cryptographic algorithms, evaluating their security, efficiency, and suitability for different use cases
Dheeraj-02NK/Cryptography-and-Hashing
Cryptography and Network Security form the backbone of secure communication in the digital realm. Cryptography involves the art and science of securing information through techniques such as encryption and decryption. Network Security, on the other hand, focuses on safeguarding data during its transmission across computer networks.
Dheeraj-02NK/Data-Structures-and-Algorithm
Data structures are objects or collections that can be used to store and organize data. Python offers a variety of built-in data structures that are designed to efficiently manage and manipulate data. Here are some common data structures in Python
Dheeraj-02NK/Digital-Image-Processing-and-Computer-Vision
Computer vision and digital image processing are fields that involve analyzing and manipulating visual data using computers. Computer vision focuses on enabling machines to understand and interpret visual information, while digital image processing involves manipulating and enhancing digital images.
Dheeraj-02NK/Exploratory-Data-Anaylsis
EDA (Exploratory Data Analysis) is a data analysis approach that involves summarizing and visualizing the main characteristics of a dataset to gain insights and identify patterns or trends, helping to understand the data better before performing more advanced analyses or modeling.
Dheeraj-02NK/Natural-Language-Processing
NLP (Natural Language Processing) is a field of study that combines computer science, linguistics, and artificial intelligence to enable computers to understand, interpret, and generate human language.
Dheeraj-02NK/QR-Catch
This project focuses on developing an Android application that combines QR code and barcode scanning functionalities within a single, user-friendly interface. While existing apps predominantly offer QR code scanning, this novel app aims to bridge the gap by incorporating barcode recognition capabilities.
Dheeraj-02NK/AI-Image-Generator
Prompt-Wala: AI Image Generator is a Python application that utilizes OpenAI's GPT-3 to generate images based on user prompts and style preferences. This application provides a graphical user interface (GUI) built using Tkinter for a seamless user experience.
Dheeraj-02NK/Computer-Network-Lab
A Computer Network Laboratory using Cisco Packet Tracer provides students and professionals with a simulated environment to design, configure, and troubleshoot computer networks. Cisco Packet Tracer is a powerful network simulation tool that allows users to visualize and experiment with various networking concepts without the need for hardware
Dheeraj-02NK/Chatbot-to-Analyze-PDF
Pdf Analyzer
Dheeraj-02NK/JavaScript-Data-Structures
Java Script Beginning
Dheeraj-02NK/LT.Care-Customer-relation-management
CRM stands for customer relationship management (CRM) , which is a system for managing all of your company's interactions with current and potential customers.
Dheeraj-02NK/Autonomous-Car-Simulation
Using Unity and Genetic algorithm
Dheeraj-02NK/Cricket-Project
Dheeraj-02NK/rCNN
Recursive Convolutional Neural Network (rCNN) is an innovative algorithm that I have personally developed. rCNN combines the power of convolutional neural networks (CNNs) with a recursive approach, introducing a novel architecture for feature extraction and representation learning.
Dheeraj-02NK/Django-Guide
This guide covers the essential steps to get started with Django, including setting up virtual environments, starting projects, creating apps, and configuring URLs, templates, and static files.