Posts by Tags

Topic Modeling

Repucall - A new means to characterize phone number reputation

less than 1 minute read

Published:

Just wrapped up my second semester of post-graduate studies in mathematics and statistics. I decided to take a graduate network security course. My capstone research project was within the field of telephony. You can find the paper included in the publications section. In retrospect, I could have submitted this to a security conference, but, at the time, I also got swept up in a couple of other projects with Dr. Laber. In the end, I missed the opportunity to submit this paper to NDSS, CCS and other highly prestigious security conferences. This was certainly a learning experience in finding out what works for you and making sure you can do one thing well and execute it to its fullest extent. However, I learned much about academic writing, writing for a security-research audience and how to structure your argumentation to make sure your paper is contributing to a body of work.

algegraic geometry

convex optimization

covid-19

cvxopt

deep learning

Natural Language Processing with Deep Learning

less than 1 minute read

Published:

I recently completed Stanford’s course on natural language processing. This course opened my eyes to different representaions of speech and linguistics.

kmeans

latent dirichlet allocation

Repucall - A new means to characterize phone number reputation

less than 1 minute read

Published:

Just wrapped up my second semester of post-graduate studies in mathematics and statistics. I decided to take a graduate network security course. My capstone research project was within the field of telephony. You can find the paper included in the publications section. In retrospect, I could have submitted this to a security conference, but, at the time, I also got swept up in a couple of other projects with Dr. Laber. In the end, I missed the opportunity to submit this paper to NDSS, CCS and other highly prestigious security conferences. This was certainly a learning experience in finding out what works for you and making sure you can do one thing well and execute it to its fullest extent. However, I learned much about academic writing, writing for a security-research audience and how to structure your argumentation to make sure your paper is contributing to a body of work.

mathematics

Derivation of Support Vector Machines

less than 1 minute read

Published:

Recently, I am experimenting with different mechanisms for deriving decision functions for multiclass classification problems. I have spent some time reading and experiementing with examples from the following references:

matrix calculus

Derivation of Support Vector Machines

less than 1 minute read

Published:

Recently, I am experimenting with different mechanisms for deriving decision functions for multiclass classification problems. I have spent some time reading and experiementing with examples from the following references:

matrix completion

mc prediction

Sutton and Barto Part 3

less than 1 minute read

Published:

I am currently reading Sutton and Barto (reference below). Along the way I decided to recreate certain experiments cited in each book chapter. This particular example includes the Blackjack problem definition.

Sutton and Barto Part 2

less than 1 minute read

Published:

I am currently reading Sutton and Barto (reference below). Along the way I decided to recreate certain experiments cited in each book chapter. This particular example includes the example from Figure 6.2.

Sutton and Barto Part 1

less than 1 minute read

Published:

I am currently reading Sutton and Barto (reference below). Along the way I decided to recreate certain experiments cited in each book chapter. This particular example includes the Blackjack problem definition in Example 5.1. Along with it is a visual with varying numbers of steps taken.

neural networks

Natural Language Processing with Deep Learning

less than 1 minute read

Published:

I recently completed Stanford’s course on natural language processing. This course opened my eyes to different representaions of speech and linguistics.

nlp

Natural Language Processing with Deep Learning

less than 1 minute read

Published:

I recently completed Stanford’s course on natural language processing. This course opened my eyes to different representaions of speech and linguistics.

parallelism

reinforcement learning

Sutton and Barto Part 3

less than 1 minute read

Published:

I am currently reading Sutton and Barto (reference below). Along the way I decided to recreate certain experiments cited in each book chapter. This particular example includes the Blackjack problem definition.

Sutton and Barto Part 2

less than 1 minute read

Published:

I am currently reading Sutton and Barto (reference below). Along the way I decided to recreate certain experiments cited in each book chapter. This particular example includes the example from Figure 6.2.

Sutton and Barto Part 1

less than 1 minute read

Published:

I am currently reading Sutton and Barto (reference below). Along the way I decided to recreate certain experiments cited in each book chapter. This particular example includes the Blackjack problem definition in Example 5.1. Along with it is a visual with varying numbers of steps taken.

reproduction rates

scala

supervised learning

Derivation of Support Vector Machines

less than 1 minute read

Published:

Recently, I am experimenting with different mechanisms for deriving decision functions for multiclass classification problems. I have spent some time reading and experiementing with examples from the following references:

support vector machines

Derivation of Support Vector Machines

less than 1 minute read

Published:

Recently, I am experimenting with different mechanisms for deriving decision functions for multiclass classification problems. I have spent some time reading and experiementing with examples from the following references:

telephony

Repucall - A new means to characterize phone number reputation

less than 1 minute read

Published:

Just wrapped up my second semester of post-graduate studies in mathematics and statistics. I decided to take a graduate network security course. My capstone research project was within the field of telephony. You can find the paper included in the publications section. In retrospect, I could have submitted this to a security conference, but, at the time, I also got swept up in a couple of other projects with Dr. Laber. In the end, I missed the opportunity to submit this paper to NDSS, CCS and other highly prestigious security conferences. This was certainly a learning experience in finding out what works for you and making sure you can do one thing well and execute it to its fullest extent. However, I learned much about academic writing, writing for a security-research audience and how to structure your argumentation to make sure your paper is contributing to a body of work.

unsupervised learning