TWO PAGERS

DESIGNS & ARCHITECTURES

LATEST ARTICLES

Title
Qiskit multi qubit quantum gates
In the last post, I explained about matrix operations, the eigen vectors, the operator matrix, etc. We also went through the basic single qubit gates, like the Pauli X gate, Hadamard...
Title
Quantum computing - maths
My next few posts will be about quantum computing, (not the Iran’s version where they portrayed a ZedBoard Zynq-7000 as a quantum processor).We will code on IBM Qiskit libraries....
Screenshot 2025-02-01 124435
Speech to Text
Speech-to-text technology converts spoken language into written text using automated speech recognition (ASR). It is widely used for applications such as voice assistants, transcription...
Title
Model Quantization
Model quantization is a technique used to optimize machine learning models by reducing their size and computational requirements, making them more efficient and suitable for deployment...
Title
Playing with ESP32 Micro Python
ESP32 is a single 2.4 GHz Wi-Fi-and-Bluetooth combo chip designed with the TSMC low-power 40 nm technology. We will use the GPIO pins functionality only in this post, but each pin has...
Screenshot 2024-09-20 190129
VLSI Physical placement
The physical design process is crucial in transforming chip designs into real-world products that drive our digital world. It involves a carefully planned series of steps aimed at optimizing...
Title3
Cryptocurrency: how it works
A cryptocurrency is a digital currency designed to work as a medium of exchange through a computer network that is not reliant on any central authority, such as a government or bank,...
Title
GAN: Diffusion Model
A generative adversarial network (GAN) is a class of machine learning frameworks and a prominent framework for approaching generative AI.The core idea of a GAN is based on the “indirect”...
Screenshot 2024-05-26 at 9.40
Transformer model for Computer vision tasks
When the transformer model came in the “Attention is all you need” paper, it changed the way NLP tasks were handled. I explained it in my previous post Transformer modelIn...
Screenshot 2024-04-21 at 6.48
Custom back-propagation
A neural network is a network of neurons. A neuron is a mathematical function which transforms the input data elements into a single output value. In the above diagram the single neuron...
Title
Asymmetric ENCRYPTION
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding...
Title
Symmetric ENCRYPTION
A Symmetric cipher is an algorithm which uses only 1 key for both encryption and decryption. So the same key is used to convert the plain text to encoded text and to convert the encoded...

Connect

Send me a note if you want to contribute here or need details on some topic.