Code Monkey home page Code Monkey logo

Hi, I'm Haider Ali, a Software Engineer πŸ‘¨β€πŸ’»


πŸ”­ I’m currently working as a Software Engineer at Conovo developing high performance back end applications with Django, Python and Golang.
πŸ‘― I’m looking to collaborate on any Python related projects specially in AI and DL.
🀝 I’m looking for help with my projects in AI.
🌱 I’m currently learning all about Deep Learning and Generative AI.
πŸ’¬ Ask me anything related to Python.


Skills

Languages

Python JavaScript C++ CSS3 GraphQL HTML5 Go

Frameworks

Django DjangoREST Flask GIN Flask FastAPI React Next JS

Databases

MySQL Postgres Redis SQLite AmazonDynamoDB MongoDB

Machine Learning and AI

Keras NumPy Pandas scikit-learn TensorFlow

Cloud Deployments

AWS Azure Heroku Vercel Netlify DigitalOcean

Other Tools

Docker NPM JWT Chart.js Nginx Apache LINUX Postman

Badges

My GitHub Stats

Socials

Syed Haider Ali Zaidi's Projects

at-cupid-website icon at-cupid-website

Data privacy is one of the biggest difficulties that every organization faces nowadays. All organizations should provide security protections on personal data against unauthorized access and modifications of any data. Healthcare is such an example where patient data should be handled properly and the leakage or alteration of this data assists in a huge privacy-neglecting issue. Immutability can be provided by adopting the blockchain technology in healthcare. Encryption is a key baseline to data privacy protection. This code introduces a new approach to secure keyword search over encrypted data in the blockchain. In this code, we propose the implementation of the bit-string signatures in the design of a data structure to secure search and access data while hiding the search pattern and share the patient data records between authorized organizations, while ensuring the privacy and im- mutability of the data. Besides, the secure cryptographic protocol - proxy re-encryption is applied to support proper encryption and decryption without revealing the keys and access control over secret data. The goal of this code is the evaluation of the keyword search using bloom filters over encrypted data in the blockchain.

car-simulation-of-torcs-using-ai icon car-simulation-of-torcs-using-ai

This is a AI based game in which the car will run on its own. The model has been trained and directed to follow the path given by the AI.

cisco-computer-network- icon cisco-computer-network-

You are given the network design with minimal technical documentation; your task is to make this up and run in 4 hrs. Use all your mind capabilities to solve this. 1. Following are the steps you need to perform in the topology according to the given layout. Configure this scenario and find your given IP address in the file " IP address " attached with this. Find out the Network Addresses and start working with them. And use them as required. 2. Please find the number of required hosts per subnet in the given file. Each student is given a different number of required hosts per subnet. Networks are labeled alphabetically in the given file of IP ADDRESSES. The networks with Router23 are not labeled so you can choose any number of hosts for those subnets. 3. Use EIGRP in First Block for Routing , OSPF with area 1 in Second Block , Rip in Block Third and OSPF with area 0 in the last block as mentioned on the top of each block. 4. Use Redistribution on Router6 and Router13 for connecting EIGRP with OSPF and OSPF with RIP. Use Redistribution on Router11 for connecting OSPF area 1 with OSPF area 0. 5. All hosts in EIGRP, OSPF area 1 and RIP will get IP addresses from "DHCP Server" present in the first block. 6. All hosts in OSPF area 0 will get hosts from β€œDHCP Server” present in its own block. (named as web server in the picture) 7. You have to use VLSM in each network of the topology. 8. You have to IMPLEMENT NAT in Router7 with the NetworkG. Use the Private IP Address given to you in the attached file for Natting. 9. One of the PCs of Network L will not be allowed to access the TFTP server. One of the PCs of Network E will not be allowed to access the Data server in the 1st block. All hosts connected in network A will not be allowed to access "Web Server". 10. The TFTP and Data servers do not need to have running services. They will simply be treated as hosts. You just need to block the access of those servers from respective networks. (Access List)

driving-school-management-system icon driving-school-management-system

A web-based application that can be used to manage the day-to-day operations of a driving school. Tracks student enrollment, schedules classes, manages instructor schedules, and generates reports. Features student management, instructor management, class scheduling, fee management, and report generation.

fyp-speechtocontract icon fyp-speechtocontract

This is speech to contract project which will convert call recording into smart contract which can be digitall signed and authorized.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.