TWO PAGERS

DESIGNS & ARCHITECTURES

LATEST ARTICLES

Title
Model Quantization
Model quantization is a technique used to optimize machine learning models by reducing their size and computational requirements, making them more efficient and suitable for deployment...
Title
Playing with ESP32 Micro Python
ESP32 is a single 2.4 GHz Wi-Fi-and-Bluetooth combo chip designed with the TSMC low-power 40 nm technology. We will use the GPIO pins functionality only in this post, but each pin has...
Screenshot 2024-09-20 190129
VLSI Physical placement
The physical design process is crucial in transforming chip designs into real-world products that drive our digital world. It involves a carefully planned series of steps aimed at optimizing...
Title3
Cryptocurrency: how it works
A cryptocurrency is a digital currency designed to work as a medium of exchange through a computer network that is not reliant on any central authority, such as a government or bank,...
Title
GAN: Diffusion Model
A generative adversarial network (GAN) is a class of machine learning frameworks and a prominent framework for approaching generative AI.The core idea of a GAN is based on the “indirect”...
Screenshot 2024-05-26 at 9.40
Transformer model for Computer vision tasks
When the transformer model came in the “Attention is all you need” paper, it changed the way NLP tasks were handled. I explained it in my previous post Transformer modelIn...
Screenshot 2024-04-21 at 6.48
Custom back-propagation
A neural network is a network of neurons. A neuron is a mathematical function which transforms the input data elements into a single output value. In the above diagram the single neuron...
Title
Asymmetric ENCRYPTION
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding...
Title
Symmetric ENCRYPTION
A Symmetric cipher is an algorithm which uses only 1 key for both encryption and decryption. So the same key is used to convert the plain text to encoded text and to convert the encoded...
webrtc2
WebRTC flow
Let’s simplify how webRTC works. There are 3 parts to webRTC. Signalling Connecting Communicating WebRTC is a peer to peer protocol which eliminates the need for the traffic to...
ios2
iOS App - Local storage guide
In iOS App there is sometimes a need to store the data locally on the device. This data might be simple key value pair, or a slightly bigger more managed structured data, all the way...
ios1
iOS App - Rock Paper Scissors
We are going develop an iOS app today. We will run a small game of rock paper scissors which is easy to understand. Let’s dive in. Download Xcode and create a new app Give any...

Connect

Send me a note if you want to contribute here or need details on some topic.