## Guessing Passwords using an LSTM Network

Introduction A while ago I applied NLP strategies to implement an algorithm that is capable to guess a password. Since then a new method called transformer was developed and successfully …

Skip to content
# Category: Coding

## Guessing Passwords using an LSTM Network

## Building a minimal, cost efficient Dask cluster

## Frequency-Severity Modeling in consideration of COVID-19 induced effects

## Kernel Regression using the Fast Fourier Transform

## Fast Kernel Density Estimation using the Fast Fourier Transform

## Non-Linear Classification Methods in Spark

## An AI with less than 200 lines of code

## Teaching a Computer Gamerules

## Solving the Multiarmed Bandit problem with JavaScript

## Non-Linear Support Vector Machines (SVM)

A science blog about my spare time data analysis projects.

Introduction A while ago I applied NLP strategies to implement an algorithm that is capable to guess a password. Since then a new method called transformer was developed and successfully …

In this article we will show a way to do high performance parallel computing at a Kubernetes cluster using task. A primary focus is that we want to archive the …

This post is supposed to give a brief introduction in Frequency-Severity models. These models are very popular for determine the optimal price for an insurance. We will take a look …

1. Setup In a previous post it was shown how to speed up the computation of a kernel density using the Fast Fourier Transform. Conceptually a kernel density is not …

1. Setup This Post is about how to speed up the computation kernel density estimators using the FFT (Fast Fourier Transform). Let be be a random sample drawn from an …

In a previous post I covered how to apply classical linear estimators like support vector machines or logistic regression to a non-linear dataset using the kernel method. This article can …

In the last two articles we covered the topics “How to teach a computer gamerules” and “The Multiarmed Bandit Problem”. Indeed these two articles where intended to be an introduction …

Sequential games with perfect information 1. A very short course in Game Theory In the twenties people start to describe games using math. Since then Game Theory becomes an important …

1. Formulation of the Multiarmed Bandit Problem Consider the following problem: A gambler enters a casino with slot machines. The probability to receive a reward for each slot machine follows …

1. Introduction This blog post is about Support Vector Machines (SVM), but not only about SVMs. SVMs belong to the class of classification algorithms and are used to separate one …