Cryptography for Data Security: How to Secure Your Big Data with RSA and AES
This post introduces hybrid cryptography for securing large datasets by combining RSA (for key encryption) and AES (for data encryption). Ideal for anyone looking to secure big data at rest or in transit using industry-standard cryptographic techniques.
1258 words
|
8 minutes
Cover Image of the Post
Become Rustic. MLOps without Fancy Stacks and with Zero Cost
I know you want to start to become top ML Engineer, but you don't have fancy production setup. A beginner-friendly, cost-free MLOps setup using Colab, Drive, MLflow, and Ngrok, no fancy cloud platforms needed.
693 words
|
5 minutes
Cover Image of the Post
NLP Getting Started: Classical GloVe–LSTM and Into BERT for Disaster Tweet Analysis
Step-by-step guide from word embeddings with GloVe and LSTM to fine-tuning BERT for analyzing disaster-related tweets.
1212 words
|
8 minutes
Cover Image of the Post
Diving into Latest YOLOv5
A next version of YOLO v5, the development of one of the most popular object detection models in the computer vision community
356 words
|
2 minutes
Cover Image of the Post
How I Actually Started Into the Object Detection
A hands-on introduction to object detection using YOLO and Darknet, exploring how real-time computer vision works and how it can be applied in practical, everyday scenarios — from robotics to recognizing traffic and food. Also includes ethical reflections on the technology's impact.
865 words
|
6 minutes
Cover Image of the Post
The Pigeonhole Principle
A counting idea that shows up in many parts of daily things if you have more items than containers, at least one container has to hold more than one item.
452 words
|
3 minutes
Cover Image of the Post