Category

Article Level

Publish Year

Tuhin Paul's articles

Building Real-World Data Models in Python: From Structs to Smart Classes

3w 433 0 100

Accessing Structure Elements in Python: Building a Real-Time Flight Tracki...

3w 427 0 100

Finding the Centroid of a Polygon: Powering Real-Time Wildfire Response Sy...

3w 435 0 100

Calculating 3D Distance Between Two Points: Enabling Real-Time Collision A...

3w 366 0 100

Debug Like a SRE: Build a Real-Time JSON Log Aggregator for Critical Syste...

3w 439 0 100

Real-Time Array Initialization in Python: Powering Live Disaster Response ...

3w 423 0 100

From Farm to Shelf: Build a Real-Time Fruit & Vegetable Classifier wit...

3w 519 0 100

Compute FFT for Audio Pitch Detection: Real-Time Guitar Tuner in Python

3w 503 0 100

Rate Limiting Using the Token Bucket Algorithm for API Gateway Protection ...

3w 475 0 100

Simulate Distributed Consensus with the Raft Protocol (Simplified) Using P...

3w 482 0 100

Generate and Verify TOTP (Time-Based One-Time Passwords): Securing Banking...

3w 446 0 100

Build a Log Aggregator with Structured JSON Parsing Using Python

3w 456 0 100

Implement Rate Limiting Using the Token Bucket Algorithm Using Python

3w 584 0 100

Generate and Verify TOTP (Time-Based One-Time Passwords) Using Python

3w 537 0 100

How to Filter Noise from ECG Signals Using a Butterworth Filter Using Pyth...

3w 568 0 100

Perform Edge Detection Using Sobel Operator from Scratch Using Python

3w 428 0 100

Extract Dominant Colors from an Image Using K-Means Clustering Using Pytho...

3w 428 0 100

How to Implement Connected Component Labeling for Object Counting Using Py...

3w 435 0 100

Compute FFT for Audio Pitch Detection: Real-Time Vocal Coach for Singers U...

3w 440 0 100

Design a Circuit Breaker for Microservices (Like Hystrix) Using Python

3w 442 0 100

Build a Drone-Ready Edge Detector from Scratch: Sobel Operator in Pure Pyt...

3w 403 0 100

How to Anonymize Geospatial Data Using k-Anonymity Using Python

3w 394 0 100

Stopping Ghost Commands: How to Detect Replay Attacks in Life-Critical IoT...

3w 389 0 100

Protecting Riders, Not Just Rides: How k-Anonymity Safeguards Privacy in M...

3w 378 0 100

Count Every Car: Build a Traffic-Smart Vehicle Counter with Connected Comp...

3w 287 0 100
 51 - 75 of 253