Projects
Replication of "Scale-Free Networks Are Rare"
- Replicated the findings of the influential paper "Scale-Free Networks Are Rare" by Anna Deokar
and Mark E. J. Newman to critically evaluate the prevalence of scale-free networks in real-world
datasets.
- Reproduced the statistical analysis conducted in the original paper using a variety of
real-world network datasets.
Employed rigorous statistical methods to test for the presence of power-law distributions in the
degree sequences of networks.
- Utilized the powerlaw library to fit power-law distributions and compare them with alternative
distributions. Implemented statistical techniques to ensure the robustness of the power-law
fitting process,
avoiding false positives. Analyzed a diverse set of networks including social, biological,
technological, and information
networks using the networkx library.
- Collected and processed datasets using pandas for data manipulation and cleaning. Utilized numpy
for numerical operations and data transformations.
- Created comprehensive visualizations using matplotlib to illustrate the degree distributions and
the goodness-of-fit for different statistical models. Developed plots to compare the empirical
degree distributions with the fitted power-law and alternative models.
- Confirmed the findings of the original paper, demonstrating that true scale-free networks are
relatively rare in the analyzed datasets. Provided a detailed statistical analysis showing that many networks are better described by
distributions other than power-laws.
- Tools and Technologies Used:numpy, pandas, matplotlib, networkx, powerlaw
CSU, Chico WREC App Resign
- Led the redesign of the university gym (WREC) app to enhance user experience and streamline
access to gym facilities.
- Managed and directed the redesign project, coordinating with stakeholders and team members to
ensure project alignment with user needs.
- Implemented one-time login functionality to simplify user access and improve the overall user
experience.
Enhanced the booking processes for gym facilities, making it more intuitive and efficient for
users to reserve equipment and spaces.
- Integrated modern design principles and best practices in mobile app development to ensure a
seamless and engaging user interface. Utilized Kotlin and Android Studio as the primary
development tools to create a more responsive and user-friendly application.
- Tools and Technologies Used: Kotlin, Android Studio, Firebase, Figma, XML
Evaluation of ML Classification Methods
- To compare the performance of various machine learning classification methods on the MNIST
dataset, which consists of 10,000+ handwritten digit samples.
- Decision Trees: Basic implementation with depth control and pruning to avoid overfitting.
- Random Forests: Utilized an ensemble of decision trees to improve accuracy and robustness, with
hyperparameter tuning for the number of trees and depth.
- Support Vector Machines (SVM): Evaluated both linear and kernelized (RBF, polynomial) SVMs using
Grid Search for hyperparameter optimization (C, gamma, kernel type).
- Preprocessed the data with normalization and PCA for dimensionality reduction to improve model
performance.
- Accuracy, precision, recall, F1-score to provide a comprehensive assessment of each model's
performance. Confusion matrix analysis to understand misclassifications. Cross-validation
(k-fold) to ensure robustness and generalizability of results.
- Employed Grid Search techniques to fine-tune model parameters for optimal performance.
- Detailed comparison of model performance, highlighting strengths and weaknesses of each method.
Visualizations of training and validation accuracy/loss curves.
Analysis of computational efficiency and scalability of each method.
- Tools and Libraries: Utilized Python with libraries such as scikit-learn, NumPy, Pandas, and
Matplotlib for implementation and visualization.
Analyzing Voting Results using Influence Matrix Technique
- Developed a predictive model to forecast election winners based on historical results and
current survey data using advanced data mining techniques.
- Data Acquisition and Modeling:
Collected and processed datasets from publicly available sources, treating them as outcomes of a
discrete random process.
Utilized these datasets to analyze voting patterns and behaviors over time.
- Algorithm Implementation:
Designed and planned the implementation of the DeGroot algorithm and maximum-a-posterior (MAP)
estimator.
Formulated an influence matrix (transition matrix) to capture the dynamics of voter influence
and opinion shifts.
- Tools and Technologies Used:
.NET Framework & C#: Core development environment and programming language for implementing the
predictive model.
Data Mining Techniques: Applied statistical and data mining methods to analyze and predict
election outcomes.
Algorithmic Implementation: Developed the influence matrix using DeGroot and MAP estimators to
model voter behavior and predict election results.
- Published the paper - International Research Journal of Engineering and Technology (IRJET),
S.NO:149 Vol 6, Issue 8, Aug 2019
Providing Secure Session through Encryption of Logs for Financial Services
- Proposed and developed a framework for a secure and cost-efficient cloud-based log management
service tailored for financial transactions.
- Framework Design: Conceptualized and designed a robust framework to securely manage log files of
bank transactions in a cloud environment.
- Encryption Techniques:
Utilized a homomorphic encryption algorithm for the secure analysis and storage of log files.
Implemented a secret key cryptosystem to ensure the protection of log records during transit and
while stored in the database.
- Security and Integrity:
Addressed and resolved security and integrity issues in log maintenance by implementing an
encrypted log management system.
Ensured data confidentiality and integrity through rigorous encryption protocols and secure
logging mechanisms.
- Prototype Development:
Developed a proof-of-concept prototype to demonstrate the feasibility and effectiveness of the
proposed secure logging approach.
Maintained and managed encrypted log records, showcasing the practical application of the system
- Published the paper - International Research Journal of Engineering and Technology (IRJET),
S.NO:53 Vol 6, Issue 1, Jan 2019
- Tools used: .NET framework, C# , Front End Asp.Net