Mahdi Hassanzadeh's repositories
Traveling-Salesman-Problem-using-Genetic-Algorithm
Genetic algorithms are heuristic search algorithms inspired by the process that supports the evolution of life. The algorithm is designed to replicate the natural selection process to carry generation, i.e. survival of the fittest of beings.
Romanian-problem-using-Astar-and-GBFS
Using A * search algorithm and GBFS search algorithm to solve the Romanian problem
N-Queen-Problem-using-Genetic-Algorithm
The N Queen is the problem of placing N chess queens on an N×N chessboard so that no two queens attack each other.
River-Crossing-Puzzle
This is a variation of the classical river crossing puzzle. In these kinds of puzzles, the limitations to the solution is defined by the constraints placed on the different objects involved.
Scientific-Calculator
A scientific calculator program that gets infix expressions from input, converts them to postfix and prefix notation, and shows the result by evaluating the postfix expression.
AND-OR-Gates-using-Neural-Networks
In this project, I used Hebbian, Perceptron and Adaline neural networks to implement AND gate, and OR gate.
Sarcasm-detection-in-social-networks-in-Persian-language
This is an NLP project, where I am attempting to detect sarcasm in social networks in Persian language.
X-and-O-Character-Recognition-using-Neural-Networks
In this project, I used Hebbian, Perceptron, Adaline, MultiClassPerceptron and MultiClassAdaline neural networks to implement X and O character recognition.
Classifying-Thyroid-Disease-Dataset-using-Multi-Layer-Perceptron
An implementation of multi-layer perceptron for classifying thyroid disease dataset
nextjs-course-demo
This website code is built with Next.js, a popular React-based framework for server-side rendering and static site generation.
Rank-estimation
In this program, I used the KNN model to estimate Iranian universities' entrance exam (konkur) rank, and I also developed a telegram bot so users could use it.
RSA-Algorithm-in-Cryptography
RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key. As the name describes that the Public Key is given to everyone and Private key is kept private.
Sentiment-analysis-on-movie-reviews
In this project, I used Bert transformer for analyzing movie reviews.
BFS-and-DFS-Algorithms
Breadth First Search and Depth First Search implementation in python.
Maximum-X-power-2-using-Genetic-Algorithm
In this project, I am trying to find the maximum F(x) = x^2 over the interval 0-255, we can represent each possible solution as a binary string of 8 bits.
BioPersianWikiAnalyzer
Persian Wikipedia Bioinformatics Page Crawler and Text Preprocessor
mode-of-inheritance-detection
Mode of Inheritance detection with multiple datasets.
Text-Classification-with-Prompt-Based-LLM
Using the Group News 20 dataset, this project employs the microsoft/phi1.5 model for text classification via prompting. We redefine classification as label generation, evaluating results with standard metrics and uploading the model on HuggingFace