Guessing Passwords using an LSTM Network
Introduction A while ago I applied NLP strategies to implement an algorithm that is capable to guess a password. Since then a new method called transformer was developed and successfully …
A science blog about my spare time data analysis projects.
Introduction A while ago I applied NLP strategies to implement an algorithm that is capable to guess a password. Since then a new method called transformer was developed and successfully …
In this article we will show a way to do high performance parallel computing at a Kubernetes cluster using task. A primary focus is that we want to archive the …
This post is supposed to give a brief introduction in Frequency-Severity models. These models are very popular for determine the optimal price for an insurance. We will take a look …
1. Setup In a previous post it was shown how to speed up the computation of a kernel density using the Fast Fourier Transform. Conceptually a kernel density is not …
1. Setup This Post is about how to speed up the computation kernel density estimators using the FFT (Fast Fourier Transform). Let be be a random sample drawn from an …
In a previous post I covered how to apply classical linear estimators like support vector machines or logistic regression to a non-linear dataset using the kernel method. This article can …
In the last two articles we covered the topics “How to teach a computer gamerules” and “The Multiarmed Bandit Problem”. Indeed these two articles where intended to be an introduction …
Sequential games with perfect information 1. A very short course in Game Theory In the twenties people start to describe games using math. Since then Game Theory becomes an important …
1. Formulation of the Multiarmed Bandit Problem Consider the following problem: A gambler enters a casino with slot machines. The probability to receive a reward for each slot machine follows …
1. Introduction This blog post is about Support Vector Machines (SVM), but not only about SVMs. SVMs belong to the class of classification algorithms and are used to separate one …