Pinned Repositories
face_recognition
The goal of this project is to provide a comparative study between popular techniques such as PCA, ICA, and LDA, when using the SVM classifier. Labeled Faces in the Wild (LFW) dataset was used to develope and train the model.
FSM_wall_following
Python-based program used to control the Pioneer 3DX mobile robot in CoppeliaSim (V-REP).
fuzzy_inference_system
This paper presents the design and development of a Fuzzy Inference Systems (FIS) to provide advice and assist in the decision- making process for job application into the cyber security industry.
network_intrusion
Neural Network model aimed at detecting intrusions or attacks on a computer network. The KDD Cup 1999 was used to develop and train the model and compromises two approaches, binary and multiclass classififcation.
penetration_testing
We conducted a comprehensive security assessment of BadStore.net in order to determine existing vulnerabilities and establish the current level of security risk associated with the web application and services in use. https://www.vulnhub.com/entry/badstore-123,41/
PID_wall_following
Python based controller for the Pioneer-3DX mobile robot interfaced with CoppeliaSim (VREP) using a PID controller to achieve wall following.
robertandreibarbulescu's Repositories
robertandreibarbulescu/PID_wall_following
Python based controller for the Pioneer-3DX mobile robot interfaced with CoppeliaSim (VREP) using a PID controller to achieve wall following.
robertandreibarbulescu/FSM_wall_following
Python-based program used to control the Pioneer 3DX mobile robot in CoppeliaSim (V-REP).
robertandreibarbulescu/penetration_testing
We conducted a comprehensive security assessment of BadStore.net in order to determine existing vulnerabilities and establish the current level of security risk associated with the web application and services in use. https://www.vulnhub.com/entry/badstore-123,41/
robertandreibarbulescu/face_recognition
The goal of this project is to provide a comparative study between popular techniques such as PCA, ICA, and LDA, when using the SVM classifier. Labeled Faces in the Wild (LFW) dataset was used to develope and train the model.
robertandreibarbulescu/fuzzy_inference_system
This paper presents the design and development of a Fuzzy Inference Systems (FIS) to provide advice and assist in the decision- making process for job application into the cyber security industry.
robertandreibarbulescu/network_intrusion
Neural Network model aimed at detecting intrusions or attacks on a computer network. The KDD Cup 1999 was used to develop and train the model and compromises two approaches, binary and multiclass classififcation.