Open in app

Sign In

Write

Sign In

Hussain Safwan
Hussain Safwan

68 Followers

Home

About

Jul 19, 2021

Self Attention

Explained with Q, K, V notions — Let's kick off with a little scenario. The earth is like an orange, Orange is a bright color. Now, put a little focus on the words orange in either sentence. It should be pretty obvious that the very same word is conveying meanings that are wildly different from each other…

Naturallanguageprocessing

6 min read

Self Attention
Self Attention
Naturallanguageprocessing

6 min read


Jun 12, 2021

Decision Trees. Implemented

Simple, module wise implementation of Decision Trees using Gini index — I’ve talked quite a bit about decision trees. This is the article that we actually implement one. For the very basics, decision trees are a class of supervised learning algorithms in ML that relies on repeatedly splitting the dataset with respect to the “most plausible feature” to construct a graphical…

Machine Learning

3 min read

Decision Trees. Implementaion.
Decision Trees. Implementaion.
Machine Learning

3 min read


Dec 16, 2020

Mary’s Room

The door to Epiphenomenalism — Think of a brilliant scientist called Mary made to live in a dark room unable to connect to the external world except via a screen through which she monitors the world and unfortunately the screen is only capable of displaying grayscale images. Mary, a neurophysiologist by profession, excels in the…

Philosophy

5 min read

Mary’s Room
Mary’s Room
Philosophy

5 min read


Dec 11, 2020

What Are Activation Functions?

The data itself is redundant, all that is needed to know is if it was greater than a threshold. — Activation functions are the driving forces of artificial neural networks, as they sit on top of any neuron and administer its behavior such as if it should fire upon a certain input, if it does, to what degree, and so on. Technically speaking, the activation function of a certain node…

Artificial Neural Network

6 min read

What Are Activation Functions?
What Are Activation Functions?
Artificial Neural Network

6 min read


Published in The Startup

·Dec 5, 2020

Fundamentals of ConvNets

“Computer vision is the science of programming a computer to gain a high-level understanding of digital imagery.” — ConvNets are at the heart of image recognition and computer vision. One of the most fascinating things about this is how a sequence of raw mathematical operations like multiplication and addition goes all the way to process and recognize complex visuals. In this episode, we talk about a few fundamental…

Convolutional Network

5 min read

Fundamentals of ConvNets
Fundamentals of ConvNets
Convolutional Network

5 min read


Oct 28, 2020

Adversarial Search and α-β pruning

Can you beat what you just created? — Wonder why it is virtually impossible for an average person to beat a computer in strategic board games like chess, go, or tic tac toe? That’s because computers can literally see into the future (or futures, to be precise) of the game and decide the upcoming move accordingly. The class…

Artificial Intelligence

6 min read

Adversarial Search and α-β pruning
Adversarial Search and α-β pruning
Artificial Intelligence

6 min read


Published in The Startup

·Oct 20, 2020

Visualizing the Density Based Clustering Algorithms

In the previous episodes, we’ve discussed a few clustering strategies like centroid based and hierarchy based (you can find them here, if interested); in this episode, we talk of yet another family of clustering algorithms. Density based clustering algorithms are ones that proceed by finding the areas with a higher…

Clustering

6 min read

Visualizing the Density Based Clustering Algorithms
Visualizing the Density Based Clustering Algorithms
Clustering

6 min read


Published in The Startup

·Oct 9, 2020

What Is Hash-Based Message Authentication?

So you’re reading this, but how confident are you that this is the same text from the author stated above and hasn’t been compromised to something else on the way (like I was writing on Data Science and the adversary altered it to a text on cryptography)? Well, networks are…

Cryptography

5 min read

What Is Hash-Based Message Authentication?
What Is Hash-Based Message Authentication?
Cryptography

5 min read


Published in The Startup

·Sep 29, 2020

The ElGamal Cryptosystem. From Root to the Leaves

Over the years, we’ve all grown up and so have Alice and Bob. Now they need more sophisticated and reliable cryptographic standards. That’s where the idea of public key encryption pops in. Public key encryption, in the generic sense, is a scheme that employs one globally shareable public key and…

Cryptography

6 min read

ElGamal Scheme. From Root to the Leaves
ElGamal Scheme. From Root to the Leaves
Cryptography

6 min read


Published in DataDrivenInvestor

·Sep 24, 2020

Hierarchical clustering with a work-out example

Say you’ve got a bunch of points (or objects, suppose, with reasonable similarity among each) and now you want to arrange them into nice little buckets, but the problem is you don’t know how many different sets to partition them into. So you can’t use k means or any related…

Machine Learning

5 min read

Hierarchical clustering with a work-out example
Hierarchical clustering with a work-out example
Machine Learning

5 min read

Hussain Safwan

Hussain Safwan

68 Followers

Developer, writer, artist. Total blend. Visit me at https://safwan.netlify.app/

Following
  • TDS Editors

    TDS Editors

  • Gayle Kurtzer-Meyers

    Gayle Kurtzer-Meyers

  • Adrian Drew

    Adrian Drew

  • Team AV

    Team AV

  • Pranjal Saxena

    Pranjal Saxena

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech