Skip to content
View ksinghs's full-sized avatar
Block or Report

Block or report ksinghs

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ksinghs/README.md

Hey 👋🏽, I'm [Kundan Singh!]

Hi, I'm Kundan Singh, Data Engineer with passion of Business Intelligence using Machine learning and cutting edge technologies. Data Engineer with proven experience in SQL, Azure Data Factory, Azure Data Bricks, Pyspark, Python, ETL, SSIS, Snowflake, Enterprise DataWarehouse. Proven background in designing, developing and optimizing end to end big data solutions. Helped to design data models, datawarehouse, data lakes and pipelines for multiple business process as per clients requirement.

I have over six years of experience in data engineering and data analysis in highly regulated environments such as healthcare, telecom, fintech, and e-commerce, for local and global companies based in the US, China,Europe, Italy, Netherlands, Sweden,UK.

Pinned Loading

  1. Automate-Crypto-trading-using-ML Automate-Crypto-trading-using-ML Public

    ML Implementation and testing of automated trading of crypto currency using algo trading

    Jupyter Notebook 2

  2. Identity-anonymization-on-graphs Identity-anonymization-on-graphs Public

    K-degree Graph anonymization for Data protection and privacy of individual social network data.

    Jupyter Notebook 6

  3. Fake-New-Identification-Classification Fake-New-Identification-Classification Public

    ML and NLP implementation to identify and classify Fake news.

    Jupyter Notebook

  4. Network-Robustness Network-Robustness Public

    It checks the network robustness to different type of attacks. The attacks is random, based on centrality like degree, closeness, betweenness and PageRank attacks.

    Jupyter Notebook 1