Deep Image Prior

by Rehan Guha

Deep Image Prior defies the idea that “deep learning only works in the context of massive datasets or models pretrained on such datasets”. This paper showed that some deep neural networks could be successfully trained on a single image without large datasets, the structure of the network itself could be preventing deep networks from overfitting.

Zero Knowledge Proof

by Abhijit Sinha

This is a short introduction to zero knowledge proofs (ZKP), along with some motivating examples. The aim of this post is to generate curiosity among the readers for this upcoming new area of research. After giving the readers an intution of what zero knowledge proofs are, In the next posts I would then get into some technical deep dives to show how ZKP is used in the wild.

How to Measure Topic Coherence

by Haridas Narayanaswamy
Unsupervised topic modeling algorithms like LDA and NMF produces list of vocabularies for each topic after the training. These vocabs help human to assign the subject information of the topic model. So how we measure the quality of these topic words ?, this problem has to be addressed in unsupervised topic clustering algorithms like LDA / NMF to understand models are improving or not. It’s always a challenge to qualitatively measure the goodness of the words produced by each topic.

Transforms

by Srikumar Subramanian

Sharing a small page I cooked up to help people explore transformations - both the linear and the non-linear kind by drawing pictures and modifying them using transformations. This hack is in the spirit of the theme of this year’s Infinity festival at Pramati - where we have “Engaging the senses” as a theme. So, engage your senses to grasp the math of transformations.

Diffie Hellman Key exchange using Elliptic Curve Cryptography

by Abhijit Sinha

Diffie–Hellman key exchange (DH) is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as originally conceptualized by Ralph Merkle and named after Whitfield Diffie and Martin Hellman. DH is one of the earliest practical examples of public key exchange implemented within the field of cryptography.

In this post we would first explain how a Diffie Hellman key exchange works. Then we would dive deeper into the details of elliptic curves and its properties. Finally we would show how Elliptic Curves can be used for efficient key exchange.

PMail

by Uttam Erukala et al

Screening through hundreds of mail and prioritizing your work for the day is a difficult job. One kind of prioritization that is important is dealing with deadlines that are indicated in emails such as a slide deck or report due. The first step of calendarizing deadlines is to identify that a deadline is indeed present. We’ve tried to tackle this deadline tagging as an email classification problem using a Bayesian approach with the result being PMail. We also built an RNN based model which we compare with the Bayesian approach. We were able to show promising results with the approaches we took, which we detail in this post.

Stellar private network setup and wallet app tutorial

by Vishwas Bhushan
Stellar - the blockchain network based on a federated consensus protocol - is cool but it comes with a lot of complexities. However, as far as I researched, I found it’s not as stable as Ethereum. Builds have bugs (check out the issue list here) but the good news is, they have very active and well-managed support. A separate forum is there for that. You can ask or checkout questions there.