Using the Wikipedia API to extract Wikipedia user data and preprocess it

Contents

  1. Introduction
  2. Code Walkthrough
  3. Further Reading
Image by ipopba on Unsplash
Image by ipopba on Unsplash

Introduction

Wikipedia is one of the most frequently visited websites on the internet worldwide. It represents a key source of information for a wide variety of purposes for a significant proportion of people and as such, it becomes very important to understand the composition of the…

My journey to and experience as a Student Placement Coordinator at IIT Kharagpur

2021 -2022 Student Placement Team, IIT Kharagpur
2021 -2022 Student Placement Team, IIT Kharagpur

The year is 2021. IIT Kharagpur has just had its best-ever placement season with the largest-ever batch size. Some highlights of the year -

Fastest ever IIT to reach 1000 -crossing 1100 by just Day 3

Highest ever (1650+) number of students placed in Phase I

2 offers exceeding 2…

C++ code to encrypt a binary string using Merkle-Hellman encryption

Contents

  1. Introduction
  2. Merkle-Hellman Knapsack Cryptosystem
  3. C++ Implementation
  4. Outputs for Binary Plaintext Strings
  5. Further Reading
Published by Kevin Ku on Unsplash
Published by Kevin Ku on Unsplash

Introduction

Cryptography is the science or art of secret writing. The fundamental objective of cryptography is to enable 2 people to communicate over an insecure channel in such a way that an opponent cannot understand what is being…

C code to decrypt a string encoded using the Playfair cipher

If you haven’t read this article on Playfair Encryption, go take a look first! It has a brief on the Playfair cipher as well as the logic behind most of the code.

Contents

  1. The Playfair Cipher
  2. Rules for Decryption
  3. C Implementation
  4. Outputs for Some Ciphertexts
  5. Further Reading
Photo by iMattSmart on Unsplash
Photo by iMattSmart on Unsplash

The Playfair Cipher

Assuming the keyword is…

C code to encrypt a string using the Playfair cipher

Contents

  1. Introduction
  2. The Playfair Cipher
  3. Rules for Encryption
  4. C Implementation
  5. Outputs for Some Plaintexts
  6. Further Reading
Published by Fabio on Unsplash
Published by Fabio on Unsplash

Introduction

Cryptography is the science or art of secret writing. The fundamental objective of cryptography is to enable 2 people to communicate over an insecure channel in such a way that an opponent cannot understand what…

Building and analyzing word and character based LSTM models using Python, Keras and the NLTK library

If you’re not familiar with the NLTK library and data preprocessing, take a look at this article. If you’re interested in language models and how to build them, read this article. If you’re familiar with NLP and language models, continue reading!

Contents

  1. What are LSTMs?
  2. Initial Steps
  3. Training the Word Based…

Experimenting with POS tagging, a standard sequence labeling task using Conditional Random Fields, Python, and the NLTK library.

For an introduction to NLP and basic text preprocessing, refer to this article. For an introduction to language models and how to build them, take a look at this article. If you’re familiar with NLP and its tools, continue reading!

Contents

  1. What is POS tagging?
  2. How can POS tags be used?

Building and comparing the accuracy of NB and LSTM models on a given dataset using Python, Keras and the NLTK library.

If you’re not familiar with the NLTK library and data pre-processing, take a look at this article. If you’re interested in language models and how to build them, read this article. If you’re familiar with NLP and language models, continue reading!

Contents

  1. What are Language Based Classifier Models?
  2. Naive Bayes Classifier

Building and studying statistical language models from a corpus dataset using Python and the NLTK library.

To get an introduction to NLP, NLTK, and basic preprocessing tasks, refer to this article. If you’re already acquainted with NLTK, continue reading!

Contents

  1. What are Language Models?
  2. Types of Language Models
  3. What are N-gram Models?
  4. Initial Steps
  5. Building the N-gram Models
  6. What is Add-1 Smoothing?
  7. Next Word Prediction
  8. Conclusion
  9. Further…

Ruthu S Sanketh

Aerospace and Comp Sci at IIT Kharagpur. Passionate about robotics, AI, and tech that is shaping the future. Spend most of my time reading :)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store