This chart comes from Reddit. Since many data scientists occasionnally have to make a presentation at a conference (or when presenting their doctoral thesis), I thought y...
This article was written by Louis Columbus. Louis is currently serving as Director, Global Cloud Product Management at Ingram Cloud. Customer Analytics (48%), Operationa...
Here I discuss breaking encryption keys that rely on the product of two very large prime numbers. In other words, the interest here is to factor a number (representing a ...
What exactly is “IoT”? Internet of Things, yes; but what does that mean? Internet of Things is a structural definition; it says there are “Things” such as sensors...
Last year I started developing a Face Recognition model. I started with static pictures and using Wolfram Mathematica. This year I found out we can do the same job using ...
Achieving accurate anomaly detection requires more than statistics. Simple assumptions like normal distribution do not work in the real world. Time series data – repres...
At first there were a lot of different opinions, but now, almost everybody agrees that big data was able to take over the whole business world. A lot of businesses are re...
Cybersecurity began with the antivirus. It was the antivirus software that we relied on to secure systems and networks, plus of course endpoint devices too. But today, wi...
Response Modeling Using Machine Learning Techniques with R-Programming (WIP). I have tried to exhibit credit scoring case studies with German Credit Data. This article in...
In the previous post of our Understanding machine learning series, we presented how machines learn through multiple experiences. We also explained how, in some cases, hu...
We are in the process of writing and adding new material (compact eBooks) exclusively available to our members, and written in simple English, by world leading experts in AI, data science, and machine learning.