Giter Site home page Giter Site logo

Hi πŸ‘‹, I'm Nikhil


kumarnikhil936

GIF

πŸ’β€β™‚οΈ About me

  • πŸ’» I am a data professional with 7+ years of work experience, currently working as an Applied Scientist with Audible, Amazon.
  • πŸ”­ I enjoy developing end-to-end data science solutions to provide valuable insights and support data-driven decision-making.
  • πŸ§‘β€πŸŽ“ I have done an M. Sc. in Computer Engineering from University of Paderborn, where I specialized in Data Science and Intelligent Systems.
  • πŸ“„ Know about my experiences and skillset from my CV.
  • πŸ€“ Always open to learning and trying new things. Happy to provide freelance support and be involved in open-source projects.



Connect with me 🀝

Gmail GitHub LinkedIn LinkedIn LinkedIn



πŸ› οΈ Skill set











πŸ”₯ Streak Stats

kumarnikhil936




πŸ† Git profile Trophies

kumarnikhil936




πŸ“Š Github Stats

πŸ’» GitHub Profile Stats

kumarnikhil936's Github Stats
Β  kumarnikhil936



⚑ Recent GitHub Activity
kumarnikhil936's Activity Graph

Nikhil Kumar J.'s Projects

adaptive_anomaly_detection icon adaptive_anomaly_detection

In this paper, we introduce an approach to adaptive anomaly detection, which is based on a new self monitoring concept and suitable to cope with the evolving nature of the autonomous system and data.

adversarial_attacks_on_ml_models icon adversarial_attacks_on_ml_models

The machine learning model can be easily fooled to incorrectly classify an input sample which was structurally and intentionally modi ed. These perturbed samples created from the original data set by making the worst case changes are called adversarial examples, and this act of fooling the model is called adversarial attacks. This vulnerability of the machine learning models to force misclassification is a major security concern since such models are deployed at various locations for various tasks.

alexnet_cifar_tensorflow icon alexnet_cifar_tensorflow

Implemented the Alexnet neural network architecture for CIFAR10 dataset classification, using tensorflow framework.

alexnet_lenet_vgg16_keras icon alexnet_lenet_vgg16_keras

Implemented various neural network models like Alexnet, Lenet, and VGG16 for the task of face recognition. The dataset used is a slightly different variant of the LFW dataset. Also given here is the support to save your models in h5 file format and later use it to create a tflite model to be run on embedded device.

anomaly_detection_autoencoder_jads_data icon anomaly_detection_autoencoder_jads_data

Autoencoders are a specific type of feedforward neural networks where the input is the same as the output. They compress the input into a lower-dimensional code and then reconstruct the output from this representation. The code is a compact β€œsummary” or β€œcompression” of the input, also called the latent-space representation.

automated_ci_cd_pipeline icon automated_ci_cd_pipeline

Creating an end to end machine learning pipeline using Docker, Heroku, Better Code, PyTest, and more such tools.

compressing_deep_learning_models icon compressing_deep_learning_models

Apr 2018 - Aug 2018 : Provides an idea of existing techniques like pruning, weight sharing and hashing to optimize the neural networks in order to achieve the optimal network which does generalization same or better than the original model.

contiki_distributed_event_detection icon contiki_distributed_event_detection

This is a system for collaborative event detection directly on the sensor nodes. The system does not require a base station for centralized coordination or processing, and is fully trainable to recognize different classes of application-specific events. Communication overhead is reduced to a minimum by processing raw data directly on the sensor nodes and only reporting which events have been detected. an event may be anything from a malfunction of monitored machinery to an intrusion into a restricted area. The goal is to provide high-accuracy event detection at minimal energy cost in order to maximize network lifetime.

covid19_visualisation_india icon covid19_visualisation_india

The python script scraps the number of active cases for COVID19 in India on daily basis, and sends a mail from your email to any other email address.

data-science-projects icon data-science-projects

The main purpose of this curated set of different data science projects is to get hands-on experience on different topics of machine learning.

drop_connect_neural_network_sparsity icon drop_connect_neural_network_sparsity

Taking various NN with hidden layers from 2 to 9 and applying drop connect method on the various layers of the neural networks, to understand the effect of sparsity on the accuracy of the network. Implementation done in Tensorflow. All the networks have their pre trained weights in the respective folders. Also, the graphs showing the effect of weights being dropped over accuracy is present for all the NNs, plotted against both test and training data.

edge_computing_tflite icon edge_computing_tflite

Using TensorFlow Lite, an easy solution for running machine learning models on mobile and embedded devices. It enables on‑device machine learning inference with low latency and a small binary size on Android and other embedded platforms.

facial_recognition_inception_network icon facial_recognition_inception_network

This implementation is based on the Facenet paper published by Google, which proposes the idea of using inception module (basically inception network) for the task of facial recognition. This method uses a deep convolutional network trained to directly optimize the embedding itself, rather than an intermediate bottleneck layer as in previous deep learning approaches where the training is done on the complete picture rather than the face area only. To train, triplets of roughly aligned matching / non-matching face patches generated using a novel online triplet mining method. However, here we will be using the pretrained weights which is uploaded here as well for one's easy access. The benefit of this approach is much greater representational efficiency, since face recognition performance is using only 128-bytes per face.

feature_selection_using_regularization icon feature_selection_using_regularization

Here, various methodologies have been discussed and tried to create a model that only includes the most important features. This has three benefits. First, the model becomes more simple to interpret. Second, we can reduce the variance of the model, and therefore overfitting. Finally, we can reduce the computational cost (and time) of training a model. The process of identifying only the most relevant features is called β€œfeature selection.”

imageembeddings icon imageembeddings

Generating embeddings and finding similar images: Run inference on images to get embeddings using EfficientNet and then get K-nearest neighbors to get similar flower images.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.