Skip to content
View JayantUppal's full-sized avatar
😄
Learning
😄
Learning
Block or Report

Block or report JayantUppal

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
JayantUppal/README.md

Hi there, I'm Jayant 👋

Inquisitive computer science student with a strong foundation in math and programming logic. Seeking to leverage solid development skills with a focus on collaboration, communication, passion, and creativity as a data scientist.

Jayant's Github Stats

Top Langs

Highlights

Given any two blog posts, it finds similarity among the posts based on examining two text entities and images and determining whether they have the same meaning or not.

Identify and recognize human activity from a videosource and classify it based on the activity thus performed.

Deep Neural Network (RNN + LSTM) model to predict cryptocurrency (Ethereum) closing prices for future dates based on historical data. Blog Post | Youtube

A predictive model capable of distinguishing between intrusions or attacks, and normal connections. Decision Tree, Gaussian Naive Bayes and XGBoost classifiers are used to make predictions and the final result is obtained through the max voting technique.

Image Steganography using K-Means clustering and DES encryption in C language.

This cheat sheet covers TensorFlow 2.0 basics and how to start a machine learning or deep learning project within just a few seconds.

Pinned Loading

  1. Intrusion-Detection-System Intrusion-Detection-System Public

    Intrusion Detection System using Machine Learning and Ensemble Techniques

    Jupyter Notebook 9 2

  2. Honey20/Camouflage Honey20/Camouflage Public

    Image Steganography using K-Means clustering and DES encryption

    C 11 2

  3. Infinity Infinity Public

    This repo is all about Python. Python is a dynamically typed programming language designed by Guido van Rossum. Because of its large usage, many libraries and support for various frameworks, I've n…

    Jupyter Notebook 4 2

  4. Computer-Graphics Computer-Graphics Public

    A list of OpenGL programs to demonstrate concepts of Computer Graphics.

    C 2 2

  5. DSA DSA Public

    Implementation of data structures and algorithms

    C 1

  6. Cryptography Cryptography Public

    A list of encryption algorithms to demonstrate concepts of Cryptography.

    C