Skip to content
View Akhil-2001's full-sized avatar

Block or report Akhil-2001

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Multithreaded-Loadbalancer Multithreaded-Loadbalancer Public

    A simple Multithreaded Load Balancer using POSIX threads and Socket Programming. The load balancing algorithm used is round robin in order to ensure that the load is distributed equally across all …

    C 1 2

  2. Distributed-Cache Distributed-Cache Public

    A distributed cache implemented in Go using the principles of memberlist for peer communication. Multiple instances of the cache can be initalized and a load balancer can be used to route subsequen…

    Go

  3. swarm-learning swarm-learning Public

    Forked from HewlettPackard/swarm-learning

    A simplified library for decentralized, privacy preserving machine learning

    Shell 1

  4. DecentralizedML-Cancer-Prediction DecentralizedML-Cancer-Prediction Public

    Medical data generated at Hospitals and Research centers cannot leave its place of origin due to privacy norms. With Edge Computing and a decentralised approach, the data will never leave the devic…

    Python 2

  5. ResNet50-Cancer-Cell-Classifier ResNet50-Cancer-Cell-Classifier Public

    Forked from Shashankhon1/ResNet50-Cancer-cell-Classifier

    Cancer Histology Images are one of the more widely used preferred methods to identify cancer. In this project, we train a robust ResNet-50 model to classify breast cancer histology images as benign…

    Jupyter Notebook 1

  6. InceptionNet-Malware-Analysis InceptionNet-Malware-Analysis Public

    Modern malware is designed to evade signature-based detection techniques. Thus, we can use Deep Convoluted Neural Networks in order to classify malware depicted by its binary malware image. In this…

    Python 4 1