joelja835 Goto Github PK
Name: Joel Jani
Type: User
Bio: Electrical and Computer Engineering Undergraduate at Technical University of Crete
Name: Joel Jani
Type: User
Bio: Electrical and Computer Engineering Undergraduate at Technical University of Crete
Attacking and Exploiting Modern Web Applications, published by Packt
Series of projects related to autonomous agents
An enhanced access control logging system using the C programming language. The enhanced access control logging system will monitor and keep track of every file access and modification that occurs in the system by every user.
Implementation of Diffie-Hellman-Key-Exchange cryptography
The DM.ME program scrapes for gpus from the website:https://www.skroutz.gr/c/55/kartes-grafikwn-vga.html?o=gpu and prints the gpu titles and prices on the terminal.
An E-Shop project for the Cloud Computing course.
A custom built chess GUI interface and an implementation of Q-learning reinforcement algorithm.
Implementation of Multi-Armed Bandit (MAB) algorithms UCB and Epsilon-Greedy. MAB is a class of problems in reinforcement learning where an agent learns to choose actions from a set of arms, each associated with an unknown reward distribution. UCB and Epsilon-Greedy are popular algorithms for solving MAB problems.
maintenance-replacement optimization problem, where the goal is to optimize the decision of when to replace a machine based on its age and associated costs. This problem is relevant in many industries, where machines are critical for production and the decision of when to replace them can have a significant impact on costs and performance.
Multistage Decision-Making Graph Shortest Path Problem is a dynamic programming problem where the aim is to find the shortest path in a graph with multiple stages, each with different costs and decision-making nodes. The algorithm calculates the optimal path by minimizing the total cost of all stages.
In this assignment, we work with network scanning and iptables rules. Iptables are used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains.
Using libpcap, we will capture packets right as they come off of the network card.
The purpose of this assignment was the implementation and comparison of the weighted A* and IDA* algorithms in an optimal path finding problem. The problem is solved offline and then follows the optimal route that gets generated.The implementations use 2 heuristics, the Euclidean and the Octile distance.
Implementation of RSA cryptography
A secure connection between client and server using the TLS1.2 protocol.
A project developed for an AI course at Technical University of Crete in the department of Electrical and Computer Engineering.. The environment and the graphics were provided and we had to work on the agent itself. Specifically, the first implementation was the minimax algorithm along with extensions that aim to improve the efficiency of the agent and the second was the Monte Carlo algorithm.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.