Lorentz Transformation
Lorentz transformation is the central question in the mathematical structure of special relativity. Simply put, given the coordinate...
Fashion & Luxury: Products Development, Communication, Retail
Products Development There is a major difference between luxury and fashion companies in dealing with the product development...
The Keras Functional API
The reason you might want to use the Functional API (instead of the Sequential API) is if you...
Special Relativity: Length and Simultaneity
The concept of “length” and “the same time” have to be reconsidered in special relativity. Light Ruler and...
Fundamentals of Network Communication
Simply put, a communication network is a set of equipment (routers, servers, switches, etc) and facilities (copper wires,...
Regression and Classification Model Assessment
Let’s take a look at how the performance of regression and classification models can be quantified so that...
Logistic Regression & Support Vector Machines
Often, some of the “shifts” we need to make when we’re using regression based approaches for classification. There...
Implementing Networks in Google Cloud
GCP uses a software defined network, that is build on top of a global fiber infrastructure, which makes...
Linear Regression
Recall that the concept of hypothesis spaces is a collection of hypotheses that might answer a particular question, and learning...
Virtual Reality and Psychology
How to define virtual reality? Different people has different experiences. In order to describe these experiences, we often...
Public Key Infrastructures & SSL/TLS
An attacker can try to manipulate the public key distribution process. In particular nothing prevents an attacker from...
Discrete Logarithm Based Digital Signature
Identification Schemes Identification schemes are extremely important as building block for digital signature scheme. An identification scheme is...
Digital Signature
Digital signature is a mechanism that can be used to provide integrity in the public key setting, analogous...
Public Key Encryption
A public-key encryption scheme is composed of three probabilistic polynomial time algorithms: Gen The key-generation algorithm that on...
Itemized Deductions and Retirement Plans
Recall that the itemized deductions are also called “from AGI” deductions or below the line deductions. They are...