Arnav Shah (arnavsshah)

arnavsshah

Geek Repo

Company:Johns Hopkins University

Home Page:https://arnavsshah.github.io/

Github PK Tool:Github PK Tool

Arnav Shah's repositories

Meeting-Summarization

Leveraging extractive summarization techniques for abstractive summarization.

Language:Jupyter NotebookStargazers:5Issues:2Issues:0

Semantic-Search-Engine-for-COVID-19-literature

COVID-19 Open Research Dataset Challenge (CORD-19)

Language:Jupyter NotebookLicense:MITStargazers:5Issues:2Issues:0

Alpha-Q

COC Inheritance- Spoiler blocker

Language:JavaScriptStargazers:2Issues:2Issues:0

OCR-AWS-Textract

Cloud based OCR for Statutory Forms and Documents

Language:JavaScriptStargazers:2Issues:2Issues:0

Sentence-Classification-using-1D-ConvNets

Implementation of 1D Convolutional Neural Network for Sentence Classification based on the paper by Yoon Kim(2014)

Language:Jupyter NotebookLicense:MITStargazers:2Issues:2Issues:0
Language:JavaScriptStargazers:2Issues:3Issues:0

DocuSync

Real-time suggestions for internal and external product documentation.

Language:TypeScriptLicense:Apache-2.0Stargazers:1Issues:2Issues:0

Ethereum-2.0-Danksharding

Implementation of Danksharding, Ethereum 2.0's future!

Language:PythonLicense:MITStargazers:1Issues:2Issues:0
Stargazers:0Issues:1Issues:0

Alohomora

A novel approach for security and user experience of Graphical Password Authentication.

Language:JavaScriptStargazers:0Issues:1Issues:0
Language:PythonLicense:MITStargazers:0Issues:1Issues:0
Language:JavaScriptStargazers:0Issues:1Issues:0
Stargazers:0Issues:2Issues:0

arnavsshah.github.io

Arnav's Personal Website

Language:CSSStargazers:0Issues:2Issues:0

Crime-Analysis-Databases-601.615-JHU

Final Project for the Databases (601.615) at Johns Hopkins University, fall '22

Language:JavaScriptLicense:Apache-2.0Stargazers:0Issues:2Issues:0

Deep-learning-basics

Fundamentals of deep learning

Language:Jupyter NotebookStargazers:0Issues:2Issues:0

Enigma-Machine

The Enigma machine is an encryption device developed and used in the early- to mid-20th century to protect commercial, diplomatic and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the German military. This is a Java GUI representation of it.

Language:JavaStargazers:0Issues:2Issues:0
License:Apache-2.0Stargazers:0Issues:3Issues:0
Language:TypeScriptStargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:2Issues:0