Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View RamaLingeswaraRao950's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report RamaLingeswaraRao950

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Infosys_Energy_Consumption_and_Prediction Infosys_Energy_Consumption_and_Prediction Public

    It develop a predictive model for forecasting energy consumption using historical data and relevant influencing factors. By leveraging python and machine learning techniques, the model analyzes pat…

    Jupyter Notebook 2

  2. Task-Manager Task-Manager Public

    Designed to help users organize and manage their tasks efficiently by categorizing them into three priority levels: High, Medium, Low. Ensures that users can focus on what matters most and keep tra…

    JavaScript 1

  3. ShopPlusPlus ShopPlusPlus Public

    ShopPlusPlus is a Full-Stack web application for an online bookstore. It is Designed to serve as an online bookstore, online bookshelf, offering to explore, interact with a vast array of books.It a…

    JavaScript

  4. HTML-CSS-App-Assembler HTML-CSS-App-Assembler Public

    It's an All-In-One website containing all types of apps which we can use daily. The categories of apps include Information, Entertainment, Marketing, Food, Personal.

    HTML

  5. False-Data-Injection-Attacks-on-Remote-Distributed-Consensus-Estimation False-Data-Injection-Attacks-on-Remote-Distributed-Consensus-Estimation Public

    Article explores detecting and analyzing stealthy data attacks in remote sensor networks using relative entropy and evaluates the tradeoff between attack stealthiness and performance degradation.

    Java

  6. A-Fast-Nearest-Neighbor-Search-Scheme-over-Outsourced-Encrypted-Medical-Images A-Fast-Nearest-Neighbor-Search-Scheme-over-Outsourced-Encrypted-Medical-Images Public

    Aims to develop a secure and efficient method for searching similar medical images stored in encrypted form on a remote server, ensuring patient privacy and data confidentiality while enabling quic…

    Java