Artificial Intelligence (AI)
Artificial Intelligence (AI)
│
├── Data Science (DS)
│ ├── Data Analysis
│ ├── Data Visualization
│ ├── Statistical Modeling
│ ├── Big Data
│ └── Data Engineering
│
├── Machine Learning (ML)
│ ├── Supervised Learning
│ │ ├── Regression
│ │ ├── Classification
│ │ └── Time Series Analysis
│ ├── Unsupervised Learning
│ │ ├── Clustering
│ │ └── Dimensionality Reduction
│ ├── Semi-Supervised Learning
│ ├── Reinforcement Learning (RL)
│ └── Deep Learning (DL)
│ ├── Neural Networks
│ ├── Convolutional Neural Networks (CNNs)
│ ├── Recurrent Neural Networks (RNNs)
│ ├── Generative Adversarial Networks (GANs)
│ └── Transformers
│
├── Natural Language Processing (NLP)
│ ├── Text Processing
│ ├── Sentiment Analysis
│ ├── Machine Translation
│ ├── Named Entity Recognition (NER)
│ ├── Speech Recognition
│ └── Text Generation
│
├── Computer Vision
│ ├── Image Classification
│ ├── Object Detection
│ ├── Image Segmentation
│ ├── Facial Recognition
│ └── Video Analysis
│
├── Robotics
│ ├── Autonomous Vehicles
│ ├── Drones
│ ├── Robotic Process Automation (RPA)
│ ├── Industrial Robots
│ └── Humanoid Robots
│
├── Expert Systems
│ ├── Medical Diagnosis
│ ├── Financial Analysis
│ ├── Fraud Detection
│ └── Decision Support Systems
│
└── Generative AI
├── Text Generation
├── Image Generation
├── Music Generation
└── Video Generation
Software Engineering
Software Engineering
│
├── Software Development Life Cycle
│ ├── Requirements Gathering
│ ├── Analysis
│ ├── Design
│ ├── Implementation
│ ├── Testing
│ ├── Deployment
│ └── Maintenance
│
├── Software Design
│ ├── Architectural Design
│ ├── Component Design
│ ├── Interface Design
│ ├── Data Design
│ └── Algorithm Design
│
├── Programming Languages
│ ├── Procedural Programming Languages
│ │ ├── C
│ │ ├── C++
│ │ └── Java
│ ├── Object-Oriented Programming Languages
│ │ ├── Java
│ │ ├── C#
│ │ └── Python
│ ├── Functional Programming Languages
│ │ ├── Haskell
│ │ ├── Lisp
│ │ └── Scala
│ └── Scripting Languages
│ ├── Python
│ ├── Ruby
│ └── PHP
│
├── Software Testing
│ ├── Unit Testing
│ ├── Integration Testing
│ ├── System Testing
│ ├── Acceptance Testing
│ └── Regression Testing
│
├── Software Engineering Tools
│ ├── Version Control Systems
│ │ ├── Git
│ │ ├── SVN
│ │ └── Mercurial
│ ├── Integrated Development Environments (IDEs)
│ │ ├── Eclipse
│ │ ├── Visual Studio
│ │ └── IntelliJ IDEA
│ └── Project Management Tools
│ ├── Jira
│ ├── Trello
│ └── Asana
│
└── Software Engineering Methodologies
├── Agile Development
├── Waterfall Development
├── V-Model Development
├── Spiral Development
└── Extreme Programming (XP)
Computer Networking
Computer Networking
│
├── Network Fundamentals
│ ├── Network Topology
│ ├── Network Protocols
│ ├── OSI Model
│ ├── TCP/IP Model
│ └── Network Devices
│
├── Network Architecture
│ ├── LAN (Local Area Network)
│ ├── WAN (Wide Area Network)
│ ├── MAN (Metropolitan Area Network)
│ ├── WLAN (Wireless Local Area Network)
│ └── WiMAX (Worldwide Interoperability for Microwave Access)
│
├── Network Protocols
│ ├── TCP/IP Suite
│ │ ├── TCP (Transmission Control Protocol)
│ │ ├── IP (Internet Protocol)
│ │ ├── UDP (User Datagram Protocol)
│ │ ├── ICMP (Internet Control Message Protocol)
│ │ └── IGMP (Internet Group Management Protocol)
│ ├── DNS and DHCP
│ │ ├── DNS (Domain Name System)
│ │ └── DHCP (Dynamic Host Configuration Protocol)
│ └── Network Security
│ ├── Firewalls
│ ├── VPN (Virtual Private Network)
│ ├── SSL/TLS (Secure Sockets Layer/Transport Layer Security)
│ └── Authentication and Authorization
│
├── Network Management
│ ├── Network Monitoring
│ ├── Network Troubleshooting
│ ├── Network Configuration
│ └── Network Performance Optimization
│
└── Network Applications
├── Email
├── FTP (File Transfer Protocol)
├── HTTP (Hypertext Transfer Protocol)
├── SSH (Secure Shell)
└── Telnet
Hardware
Hardware
│
├── Computer Systems
│ ├── CPU (Central Processing Unit)
│ ├── Motherboard
│ ├── Memory (RAM)
│ ├── Storage (HDD, SSD, etc.)
│ └── Power Supply
│
├── Input/Output Devices
│ ├── Keyboard
│ ├── Mouse
│ ├── Monitor
│ ├── Printer
│ └── Scanner
│
├── Storage Devices
│ ├── Hard Disk Drive (HDD)
│ ├── Solid-State Drive (SSD)
│ ├── Flash Drive
│ ├── CD/DVD Drive
│ └── Tape Drive
│
├── Networking Hardware
│ ├── Network Interface Card (NIC)
│ ├── Router
│ ├── Switch
│ ├── Modem
│ └── Wi-Fi Adapter
│
├── Mobile Devices
│ ├── Smartphone
│ ├── Tablet
│ ├── Laptop
│ └── Wearable Devices
│
├── Embedded Systems
│ ├── Microcontrollers
│ ├── Robotics
│ ├── Automotive Systems
│ └── IoT Devices
│
└── Peripherals
├── Graphics Card
├── Sound Card
├── Network Card
└── Other Peripherals
Technical Support
Technical Support
│
├── Help Desk
│ ├── Ticketing Systems
│ ├── Incident Management
│ └── Problem Management
│
├── Troubleshooting
│ ├── Hardware Troubleshooting
│ ├── Software Troubleshooting
│ ├── Network Troubleshooting
│ └── System Troubleshooting
│
├── Technical Documentation
│ ├── User Manuals
│ ├── Technical Guides
│ ├── Release Notes
│ └── Knowledge Base
│
├── Customer Service
│ ├── Communication Skills
│ ├── Conflict Resolution
│ ├── Customer Feedback
│ └── Service Level Agreements (SLAs)
│
├── IT Service Management
│ ├── ITIL (Information Technology Infrastructure Library)
│ ├── Service Desk
│ ├── Change Management
│ └── Continuity Management
│
├── Remote Support
│ ├── Remote Desktop
│ ├── Virtual Private Network (VPN)
│ ├── Screen Sharing
│ └── Online Meeting Tools
│
└── Support Tools
├── Diagnostic Tools
├── System Monitoring Tools
├── Log Analysis Tools
└── Automation Tools
Software Development
Software Development
│
├── Programming Languages
│ ├── Python
│ ├── Java
│ ├── C++
│ └── JavaScript
│
├── Development Frameworks
│ ├── React
│ ├── Angular
│ ├── Vue.js
│ └── Ruby on Rails
│
├── Databases
│ ├── Relational Databases
│ ├── NoSQL Databases
│ ├── Graph Databases
│ └── Database Modeling
│
├── Software Design Patterns
│ ├── Creational Patterns
│ ├── Structural Patterns
│ ├── Behavioral Patterns
│ └── Architectural Patterns
│
├── Testing and Debugging
│ ├── Unit Testing
│ ├── Integration Testing
│ ├── System Testing
│ └── Debugging Techniques
│
├── Version Control Systems
│ ├── Git
│ ├── SVN
│ ├── Mercurial
│ └── CVS
│
└── Agile Development
├── Scrum
├── Kanban
├── Lean Software Development
└── Extreme Programming (XP)
Networking
Networking
│
├── Network Fundamentals
│ ├── TCP/IP
│ ├── DNS
│ ├── DHCP
│ └── Network Topology
│
├── Network Architectures
│ ├── LAN
│ ├── WAN
│ ├── Wi-Fi
│ └── Network Virtualization
│
├── Network Protocols
│ ├── HTTP
│ ├── FTP
│ ├── SSH
│ └── SMTP
│
├── Network Security
│ ├── Firewalls
│ ├── VPNs
│ ├── Access Control
│ └── Network Segmentation
│
├── Network Management
│ ├── Network Monitoring
│ ├── Network Troubleshooting
│ ├── Network Configuration
│ └── Network Optimization
│
└── Network Devices
├── Routers
├── Switches
├── Firewalls
└── Network Interface Cards (NICs)
Cybersecurity
Cybersecurity
│
├── Security Fundamentals
│ ├── Confidentiality, Integrity, and Availability (CIA)
│ ├── Threats, Vulnerabilities, and Risks (TVR)
│ ├── Security Policies and Procedures
│ └── Security Awareness and Training
│
├── Network Security
│ ├── Network Architecture and Design
│ ├── Network Protocols and Devices
│ ├── Firewalls and Access Control
│ └── Network Segmentation and Isolation
│
├── Cryptography
│ ├── Encryption and Decryption
│ ├── Hash Functions and Digital Signatures
│ ├── Symmetric and Asymmetric Cryptography
│ └── Cryptographic Protocols and Algorithms
│
├── Identity and Access Management (IAM)
│ ├── Authentication, Authorization, and Accounting (AAA)
│ ├── Identity Management and Provisioning
│ ├── Access Control Models and Mechanisms
│ └── Identity Federation and Single Sign-On (SSO)
│
├── Threat Intelligence and Incident Response
│ ├── Threat Intelligence Gathering and Analysis
│ ├── Incident Response Planning and Execution
│ ├── Threat Hunting and Vulnerability Management
│ └── Digital Forensics and Incident Response
│
├── Cloud Security
│ ├── Cloud Computing Models and Services
│ ├── Cloud Security Architecture and Design
│ ├── Cloud Security Controls and Compliance
│ └── Cloud Security Monitoring and Incident Response
│
├── Application Security
│ ├── Secure Coding Practices and Guidelines
│ ├── Web Application Security and OWASP Top 10
│ ├── Mobile Application Security and Threats
│ └── Secure Development Life Cycle (SDLC)
│
├── Data Security
│ ├── Data Classification and Protection
│ ├── Data Encryption and Masking
│ ├── Data Loss Prevention (DLP) and Backup
│ └── Data Governance and Compliance
│
├── Compliance and Regulatory Issues
│ ├── HIPAA and Healthcare Security
│ ├── PCI-DSS and Payment Card Security
│ ├── GDPR and EU Data Protection
│ └── NIST Cybersecurity Framework and Compliance
│
└── Cybersecurity Management and Governance
├── Cybersecurity Governance and Risk Management
├── Cybersecurity Policy and Procedure Development
├── Cybersecurity Awareness and Training Programs
└── Cybersecurity Budgeting and Resource Allocation
Mathematics
Mathematics
│
├── Arithmetic
│ ├── Numbers and Operations
│ ├── Fractions and Decimals
│ ├── Percentages
│ └── Ratios and Proportions
│
├── Algebra
│ ├── Equations and Inequalities
│ ├── Linear Algebra
│ ├── Quadratic Equations
│ └── Functions
│
├── Geometry
│ ├── Points, Lines, and Planes
│ ├── Angles and Measurements
│ ├── Triangles and Quadrilaterals
│ └── Circles and Spheres
│
├── Calculus
│ ├── Limits
│ ├── Derivatives
│ ├── Integrals
│ └── Multivariable Calculus
│
├── Statistics and Probability
│ ├── Descriptive Statistics
│ ├── Inferential Statistics
│ ├── Probability Theory
│ └── Regression Analysis
│
├── Trigonometry
│ ├── Angles and Triangles
│ ├── Trigonometric Functions
│ ├── Identities and Equations
│ └── Applications of Trigonometry
│
├── Graph Theory
│ ├── Graph Basics
│ ├── Graph Traversal
│ ├── Graph Algorithms
│ └── Network Flow
│
├── Combinatorics
│ ├── Permutations and Combinations
│ ├── Recurrence Relations
│ ├── Generating Functions
│ └── Inclusion-Exclusion Principle
│
├── Number Theory
│ ├── Divisibility and Prime Numbers
│ ├── Congruences and Diophantine Equations
│ ├── Cryptography
│ └── Modular Arithmetic
│
├── Mathematical Physics
│ ├── Classical Mechanics
│ ├── Electromagnetism
│ ├── Thermodynamics
│ └── Quantum Mechanics
│
└── Mathematical Biology
├── Population Dynamics
├── Epidemiology
├── Ecology
└── Systems Biology
Data Science
Data Science
│
├── Data Analysis
│ ├── Descriptive Statistics
│ ├── Inferential Statistics
│ └── Data Visualization
│
├── Machine Learning
│ ├── Supervised Learning
│ │ ├── Regression
│ │ ├── Classification
│ │ └── Time Series Analysis
│ ├── Unsupervised Learning
│ │ ├── Clustering
│ │ └── Dimensionality Reduction
│ ├── Semi-Supervised Learning
│ └── Reinforcement Learning
│
├── Data Visualization
│ ├── Matplotlib
│ ├── Seaborn
│ └── Plotly
│
├── Data Mining
│ ├── Association Rule Mining
│ ├── Clustering
│ └── Decision Trees
│
├── Big Data
│ ├── Hadoop
│ ├── Spark
│ └── NoSQL Databases
│
└── Data Engineering
├── Data Warehousing
├── ETL (Extract, Transform, Load)
└── Data Pipelines
Machine Learning
Machine Learning
│
├── Supervised Learning
│ ├── Regression
│ │ ├── Linear Regression
│ │ ├── Ridge Regression
│ │ └── Lasso Regression
│ ├── Classification
│ │ ├── Logistic Regression
│ │ ├── Decision Trees
│ │ └── Random Forest
│ └── Time Series Analysis
│ ├── ARIMA
│ ├── Prophet
│ └── LSTM
│
├── Unsupervised Learning
│ ├── Clustering
│ │ ├── K-Means
│ │ ├── Hierarchical Clustering
│ │ └── DBSCAN
│ ├── Dimensionality Reduction
│ │ ├── PCA
│ │ ├── t-SNE
│ │ └── Autoencoders
│ └── Anomaly Detection
│ ├── One-Class SVM
│ ├── Local Outlier Factor
│ └── Isolation Forest
│
├── Semi-Supervised Learning
│ ├── Self-Training
│ ├── Co-Training
│ └── Generative Adversarial Networks
│
├── Reinforcement Learning
│ ├── Q-Learning
│ ├── SARSA
│ └── Deep Q-Networks
│
└── Deep Learning
├── Neural Networks
├── Convolutional Neural Networks
├── Recurrent Neural Networks
└── Transformers
Natural Language Processing
Natural Language Processing
│
├── Text Preprocessing
│ ├── Tokenization
│ ├── Stopword Removal
│ └── Stemming/Lemmatization
│
├── Text Representation
│ ├── Bag-of-Words
│ ├── TF-IDF
│ └── Word Embeddings
│
├── Sentiment Analysis
│ ├── Binary Classification
│ ├── Multi-Class Classification
│ └── Regression
│
├── Machine Translation
│ ├── Rule-Based Translation
│ ├── Statistical Machine Translation
│ └── Neural Machine Translation
│
├── Named Entity Recognition
│ ├── Rule-Based Approach
│ ├── Machine Learning Approach
│ └── Deep Learning Approach
│
├── Speech Recognition
│ ├── Acoustic Modeling
│ ├── Language Modeling
│ └── Decoder
│
└── Text Generation
├── Language Modeling
├── Text Classification
└── Sequence-to-Sequence Models
- LUNGSCAN-AHR: A project to develop a non-invasive, AI-powered system for detecting lung cancer associated with combustion particles and fine particulate matter (PM2.5).
Project Name | Link | Tools/Technologies | IDE/OS |
---|---|---|---|
Text-to-Image | text-to-image | Python, TensorFlow, Keras, OpenCV, Git | PyCharm, Ubuntu |
Deep Learning | deeplearning | Python, TensorFlow, Keras, PyTorch, Git | Visual Studio Code, Windows 10 |
GAN | gan | Python, TensorFlow, Keras, PyTorch, Git | Jupyter Notebook, macOS |
Deep Vision | deepvision | Python, OpenCV, TensorFlow, Keras, Git | PyCharm, Ubuntu |
Face Recognition | facerecognition | Python, OpenCV, FaceRecognition, Dlib, Git | Visual Studio Code, Windows 10 |
Image Classification | imageclassification | Python, TensorFlow, Keras, OpenCV, Git | Jupyter Notebook, macOS |
Sentiment Analysis | sentiment-analysis | Python, NLTK, scikit-learn, TensorFlow, Git | PyCharm, Ubuntu |
Chatbot | chatbot | Python, Dialogflow, Node.js, Express.js, Git | Visual Studio Code, Windows 10 |
Voice Assistant Chatbot | voice-assistant-chatbot | Python, Dialogflow, Node.js, Express.js, Google Cloud Speech-to-Text, Git | Android Studio, Windows 10 |
Project Name | Link | Tools/Technologies | IDE/OS |
---|---|---|---|
Data Analysis | dataanalysis | Python, Pandas, NumPy, Matplotlib, Scikit-learn, Git | Jupyter Notebook, macOS |
ML Loan Eligibility | ml-loan-eligibility | Python, Scikit-learn, TensorFlow, Keras, Git | PyCharm, Ubuntu |
Project Name | Link | Tools/Technologies | IDE/OS |
---|---|---|---|
Device | device | Python, Bash, Raspberry Pi 4B, Git | Raspberry Pi Imager, macOS, Ubuntu, Kali Linux |
Firmware | firmware | C, C++, Arduino, ESP32, Git | Arduino IDE, Windows 10 |
Project Name | Link | Tools/Technologies | IDE/OS |
---|---|---|---|
CPT Automation | cpt-automation | Python, Selenium, PyAutoGUI, Robot Framework, Git | PyCharm, Ubuntu |
NetConfig Automator | NetConfig-Automator | Python, Netmiko, Paramiko, Cisco IOS, Git | Visual Studio Code, Windows 10 |
Project Name | Link | Tools/Technologies | IDE/OS |
---|---|---|---|
Ecommerce | ecommerce | Node.js, Express.js, React, MongoDB, Git | Visual Studio Code, Windows 10 |
Airline Booking System | airline-booking-system | Node.js, Express.js, React, MySQL, Git | IntelliJ IDEA, macOS |
Portfolio Website | niladrridas.github.io | HTML, CSS, JavaScript, Git | Visual Studio Code, macOS |
Project Name | Link | Tools/Technologies | IDE/OS |
---|---|---|---|
Takashi | Takashi | JavaScript, CSS, HTML, Git | Visual Studio Code, macOS |
Location Tracker | location-tracker | Python, Flask, Google Maps API, MySQL, Git | Visual Studio Code, Windows 10 |
Terminal | terminal | C, C++, Linux, Bash, Git | Vim, Ubuntu |
User Info Collector | user-info-collector | Python, Scrapy, BeautifulSoup, MongoDB, Git | PyCharm, Ubuntu |
Movieml | movieml | Python, TensorFlow, Keras, OpenCV, Git | Jupyter Notebook, macOS |
Instead of trying to write perfect code from the start
Break down the task into smaller, manageable chunks
Focus on delivering a working solution quickly
Then, iterate and refine the code based on feedback and testing