Guessing Passwords using an LSTM Network
Introduction A while ago I applied NLP strategies to implement an algorithm that is capable to guess a password. Since then a new method called transformer was developed and successfully …
A science blog about my spare time data analysis projects.
Introduction A while ago I applied NLP strategies to implement an algorithm that is capable to guess a password. Since then a new method called transformer was developed and successfully …
I recently realized that I have a certain habit when it comes to stock trading even though I used to tell myself that “every trading strategy is useless because the …
Estimating maxima and minima of a noisy curve turns out to be very hard and to a large part is still an open question. In this blog post we will discover some strategies …
Working at my post about the dask cluster, I realized that the code snippets presented in the post will eventually change in my GitHub Repo. I wanted to avoid having …
This post is supposed to give a brief introduction in Frequency-Severity models. These models are very popular for determine the optimal price for an insurance. We will take a look …
In the last two articles we covered the topics “How to teach a computer gamerules” and “The Multiarmed Bandit Problem”. Indeed these two articles where intended to be an introduction …
1. Formulation of the Multiarmed Bandit Problem Consider the following problem: A gambler enters a casino with slot machines. The probability to receive a reward for each slot machine follows …
To explain the registration problem i will start with an example. In Figure 1 the pinch force dataset is shown, to collect the data a group of 20 subjects were …