Home
Service
Software
Job
Blog
Contact
Freelancers
Freelancers
Services
Jobs
Software's
Sign in
Register
Remoterise
Home
Service
Software
Job
Blog
Contact
Sign in
Register
Log in to RemoteRise
Username / Email*
Password*
Forgot Password?
Login Now
Don't have an account?
Register Now
Portfolio Preview
×
Job Title
Category
Select Category
Information Technology
Phone
City
Select City
Clare
Galway
Kerry
Laois
Leitrim
Limerick
Mayo
Meath
Offaly
Westmeath
Athenry
Balla
Ballaghaderreen
Ballina
Ballinamore
Ballinasloe
Ballinrobe
Ballisodare
Ballygar
Ballyhaunis
Ballymote
Bearna
Belmullet
Boyle
Carraroe
Carrick-on-Shannon
Castlebar
Castlerea
Charlestown
Claregalway
Claremorris
Clifden
Collooney
Coolaney
Corrofin
Craughwell
Crossmolina
Dooagh
Dromahair
Drumshanbo
Dunmore
Elphin
Foxford
Gaillimh
Gort
Grange
Headford
Inishcrone
Killala
Kiltamagh
Kinlough
Kinvarra
Knock
Knocknalower
Lackagh
Loughrea
Manorhamilton
Mohill
Mountbellew
Moycullen
Moylough
Newport
Oranmore
Oughterard
Portumna
Roosky
Roscommon
Rosses Point
Sligo
Strandhill
Strokestown
Swinford
Tobercurry
Tuam
Westport
Abbeyleix
Allenwood Cross Roads
An Muileann gCearr
An Ros
Ardee
Arklow
Artane
Ashbourne
Ashford
Athboy
Athgarvan
Athlone
Athy
Aughrim
Avoca
Bagenalstown
Balally
Balbriggan
Baldoyle
Ballinroad
Ballinteer
Ballitore
Ballivor
Ballon
Ballyboden
Ballycanew
Ballyfermot
Ballygerry
Ballylinan
Ballymahon
Ballymore Eustace
Ballymun
Ballyragget
Balrothery
Baltinglass
Banagher
Bayside
Beaumont
Bennettsbridge
Birr
Blackrock
Blackwood
Blanchardstown
Blessington
Bonnybrook
Booterstown
Borris
Bray
Brownstown Cross Roads
Bunclody
Cabinteely
Cabra
Callan
Calverstown
Carlanstown
Carlingford
Carlow
Carnew
Carragh
Castlebellingham
Castlebridge
Castlecomer
Castledermot
Castleknock
Castlepollard
Castletown
Celbridge
Chapelizod
Charlesland
Cherry Orchard
Cherryville
Clane
Clara
Cloghan
Clogherhead
Clonaslee
Clondalkin
Clonee
Clonmellon
Clonskeagh
Collon
Confey
Coolock
Courtown
Crumlin
Daingean
Dalkey
Darndale
Delvin
Derrinturn
Dollymount
Donabate
Donaghmede
Donnybrook
Donnycarney
Donore
Drogheda
Droichead Nua
Dromiskin
Drumcondra
Drumlish
Dublin
Duleek
Dún Laoghaire
Dunboyne
Dundalk
Dundrum
Dunlavin
Dunleer
Dunshaughlin
Durrow
Eadestown
Edenderry
Edgeworthstown
Enfield
Enniscorthy
Enniskerry
Fairview
Ferbane
Ferns
Finglas
Firhouse
Ford
Foxrock
Freshford
Glasnevin
Glenealy
Gorey
Gowran
Graiguenamanagh
Granard
Greenhills
Greystones
Hacketstown
Hartstown
Howth
Jobstown
Johnstown
Johnstown Bridge
Julianstown
Kells
Kentstown
Kilbeggan
Kilcock
Kilcoole
Kilcormac
Kilcullen
Kildalkey
Kildare
Kilkenny
Kill
Killenard
Killester
Kilmacanoge
Kilmacow
Kilmeage
Kilmessan
Kilpedder
Kilquade
Kilrane
Kinnegad
Kinsealy-Drinan
Knockbridge
Knocklyon
Lanesborough
Laytown
Leighlinbridge
Leixlip
Little Bray
Longford
Longwood
Loughlinstown
Loughshinny
Louth
Lucan
Lusk
Malahide
Marino
Maynooth
Milltown
Moate
Monasterevin
Moneenroe
Monkstown
Mooncoin
Moone
Mount Merrion
Mountmellick
Mountrath
Mucklagh
Naas
Navan
New Ross
Newcastle
Newtown Trim
Newtownforbes
Newtownmountkennedy
Old Kilcullen
Oldbawn
Oldcastle
Omeath
Palmerstown
Paulstown
Piercetown
Piltown
Portarlington
Portlaoise
Portmarnock
Portraine
Prosperous
Raheny
Rathangan
Rathcoole
Rathdowney
Rathdrum
Rathgar
Rathmines
Rathnew
Rathvilly
Rathwire
Ratoath
Rhode
Rialto
Ringsend
Rivermeade
Robertstown
Rochfortbridge
Rosslare
Roundwood
Saggart
Sallins
Sallynoggin
Sandyford
Sandymount
Shankill
Shinrone
Skerries
Slane
Stamullin
Stradbally
Straffan
Summerhill
Suncroft
Sutton
Swords
Taghmon
Tallaght
Tallanstown
Templeogue
Terenure
Termonfeckin
Thomastown
Tinahely
Trim
Tullamore
Tullow
Tullyallen
Tyrrellspass
Urlingford
Valleymount
Wexford
Wicklow
Abbeyfeale
Adare
Aghada
Annacotty
Ardfert
Ardfinnan
Ardnacrusha
Askeaton
Baile an Mhuilinn
Ballina
Ballingarry
Ballybunnion
Ballycannan
Ballyclerahan
Ballyduff
Ballygarvan
Ballyheige
Bandon
Bantry
Belgooly
Blarney
Borrisokane
Borrisoleigh
Boston
Bruff
Bruree
Buttevant
Caherconlish
Cahersiveen
Cahir
Cappamore
Cappoquin
Carrick-on-Suir
Carrigaline
Carrigtwohill
Cashel
Castleconnell
Castleisland
Castlemartyr
Charleville
Churchtown
Cill Airne
Clonakilty
Clonlara
Cloughjordan
Cloyne
Cluain Meala
Cobh
Cork
Corofin
Courtbrack
Courtmacsherry
Cratloe
Croom
Crosshaven
Dingle
Doneraile
Doon
Dromcollogher
Drommahane
Dungarvan
Dunmanway
Dunmore East
Ennis
Enniskeane
Ennistimon
Fenit
Fermoy
Fethard
Fountainstown
Foynes
Glanmire
Glanworth
Glin
Grenagh
Holycross
Hospital
Innishannon
Kanturk
Kenmare
Kilfinnane
Kilkishen
Killaloe
Killeagh
Killenaule
Killorglin
Killumney
Kilmacthomas
Kilmallock
Kilrush
Kilsheelan
Kilworth
Kinsale
Lehinch
Lisdoonvarna
Listowel
Lixnaw
Luimneach
Macroom
Mallow
Midleton
Millstreet
Miltown Malbay
Mitchelstown
Moroe
Moyross
Nenagh
Nenagh Bridge
Newcastle West
Newmarket
Newmarket on Fergus
Newport
Pallasgreen
Pallaskenry
Passage East
Passage West
Patrickswell
Portlaw
Quin
Rathard
Rathcormac
Rathkeale
Rathmore
Riverstick
Roscrea
Ross Carbery
Scarriff
Schull
Shannon
Sixmilebridge
Skibbereen
Tallow
Tarbert
Templemore
Thurles
Tipperary
Tower
Trá Mhór
Tralee
Tulla
Twomileborris
Waterford
Watergrasshill
Whitechurch
Whitegate
Youghal
Ardara
Bailieborough
Ballinagh
Ballybay
Ballybofey
Ballybofey-Stranorlar
Ballyconnell
Ballyhaise
Ballyjamesduff
Ballyshannon
Belturbet
Buncrana
Bundoran
Carndonagh
Carrickmacross
Castleblayney
Castlefin
Cavan
Clones
Convoy
Cootehill
Derrybeg
Donegal
Dungloe
Dunlewy
Emyvale
Fahan
Falcarragh
Glenties
Greencastle
Gweedore
Kildrum
Killybegs
Killygordon
Kilmacrenan
Kingscourt
Leifear
Letterkenny
Manorcunningham
Millford
Monaghan
Moville
Muff
Mullagh
Newtown Cunningham
Ramelton
Raphoe
Rathmullan
Shercock
St Johnston
Virginia
Hourly Rate
$
About
Core Skills & Expertise
Git
Jenkins
Travis CI
CircleCI
Azure Devops CI pipelines
Ansible
Chef
Puppet
SaltStack
Azure Devops CD pipeline
Terraform
CloudFormation
Ansible
Puppet
Docker Compose
Kubernetes
Helm
OpenShift
Docker
Kubernetes
OpenShift
Rancher
VMware
VirtualBox
Hyper-V
KVM
AWS
Azure
Google Cloud Platform
Oracle Cloud
AWS CloudFormation
Azure Resource Manager
Google Cloud Deployment Manager
Oracle Cloud Infrastructure Terraform Provider
Nagios
Zabbix
Datadog
New Relic
ELK Stack
Fluentd
Graylog
Logrotate
Veeam
Veritas NetBackup
Commvault
Acronis
Business Continuity Planning
Disaster Recovery as a Service (DRaaS)
Site Recovery Manager (SRM)
Cloud-based Disaster Recovery
Nessus
OpenVAS
Qualys
Nexpose
SOC 2
PCI DSS
HIPAA
NIST
Scrum
Kanban
XP (Extreme Programming)
Crystal
Slack
Microsoft Teams
Zoom
Skype
MySQL
PostgreSQL
Microsoft SQL Server
Oracle Database
MongoDB
Cassandra
CouchDB
Amazon DynamoDB
Azure Cosmos Db
TCP/IP
DNS
DHCP
VPN
Firewall
Intrusion Detection and Prevention System
(IDPS)
SSL/TLS certificates
Network Access Control (NAC)
AWS
Microsoft Azure
Google Cloud
OpenStack
VMWare
Hyper-V
Oracle VirtualBox
Cisco
Juniper
F5
AWS VPC
Microsoft Azure VNet
Google Cloud VPC
Linux
Windows
Unix
Amazon EC2
Microsoft Azure VM
Google Compute Engine
Java
Ruby on Rails
.NET
Python
Node.js
Go
Heroku
AppFog
Google App Engine
AWS Elastic Beanstalk
Microsoft Azure App Service
iOS
Android
Xamarin
Flutter
React Native
Salesforce
Microsoft Dynamics
SugarCRM
Hubspot
Workday
ADP
Oracle HCM
BambooHR
Asana
Trello
Microsoft Project
Jira
AWS Lambda
Google Cloud Functions
Microsoft Azure Functions
OpenFaaS
Knative
AWS EventBridge
Google Cloud Pub/Sub
Microsoft Azure Event Grid
Apache Kafka
RabbitMQ
Veritas
Acronis
Commvault
AWS Backup
Microsoft Azure Backup
Google Cloud Backup
Veeam
Carbonite
DRP
BCP
RTO
High Availability
Load Balancing
Fault Tolerance
AWS Auto Scaling
Microsoft Azure Traffic Manager
Google Cloud Load Balancer
AWS S3
Microsoft Azure Storage
Google Cloud Storage
AWS S3
Microsoft Azure Blob
Google Cloud Storage
Ceph
Minio
MySQL
Microsoft SQL Server
Oracle
PostgreSQL
MariaDB
MongoDB
Cassandra
Couchbase
Amazon DynamoDB
Google Cloud Firestore
Cosmos Database
AWS
Azure
Google Cloud Platform
Kubernetes
Docker
Infrastructure as Code (IaC)
RabbitMQ
Apache Kafka
Apache ActiveMQ
Apache Pulsar
Apache Flink
Apache Spark
Azure Service Bus
Clustering
Sharding
Elasticity
Auto-scaling
SSL/TLS encryption
Authentication and authorization
Firewall management
Linux administration
Network administration
Virtualization
Server hardware maintenance
Network security
RabbitMQ
Apache Kafka
Apache ActiveMQ
Apache Pulsar
Apache Flink
Apache Spark
Azure Service Bus
Load balancing
Failover and disaster recovery
Monitoring and alerting
SSL/TLS encryption
Authentication and authorization
Firewall management
Encryption at rest
Data backup and recovery
Load balancing
Failover and disaster recovery
Monitoring and alerting
Clustering
Sharding
Elasticity
Auto-scaling
Domain-Driven Design (DDD)
Command Query Responsibility Segregation (CQRS)
Event Sourcing
Microservices architecture
Routing algorithms
Event-driven rules
Message filtering
Event correlation
Data streaming
Data processing
Data storage
Hadoop
Spark
MQTT
CoAP
AMQP
LoRaWAN
Zigbee
Natural Language Processing (NLP)
Information Retrieval (IR)
Machine Learning (ML)
Text Mining
Query Expansion
Query Refinement
PageRank
HITS
BM25
Link Analysis
Collaborative Filtering
Distributed Systems
Scalability
URL Management
Data Collection
Web Data Extraction
Web Data Integration
Computer Vision
Object Recognition
Image Classification
Image Analysis
Object Detection
Metadata Management
Image Hashing
Content-Based Image Retrieval (CBIR)
Image Search Optimization
Image Database Management
Video Compression
Video Segmentation
Video Summarization
Video Format Conversion
Video Streaming
Video Metadata Management
Video Hashing
Video Content Analysis
Video Search Optimization
Video Database Management
Web Scraping
Data Crawling
Data Parsing
Data Integration
News Feed Management
Text Classification
Named Entity Recognition (NER)
Sentiment Analysis
News Topic Modelling
News Clustering
Metadata Management
Bibliographic Data Management
Digital Library Management
Scientific Document Retrieval
Scientific Document Summarization
Network Analysis
Bibliometrics
Scientific Impact Analysis
Scientific Literature Review
Scientific Knowledge Discovery
Taxonomy Management
Product Classification
Catalogue Management
Product Taxonomy Optimization
Product Data Management
Relevance Ranking
Faceted Search
Product Recommendation
Product Search Optimization
Product Sales Analysis
Data Mining
Web Scraping
Data Crawling
Domain-Specific Data Collection
Domain-Specific Data Integration
Metadata Management
Text Classification
Faceted Search
Domain-Specific Data Retrieval
Domain-Specific Data Summarization
Spring Boot
Node.js
Django
Ruby on Rails
RESTful API Development
GraphQL API Development
SOAP API Development
API Security
npm
pip
RubyGems
Maven
Domain Modelling
Bounded Context
Aggregate
Entity
SOLID Principles
Code Refactoring
Code Reviews
Design Patterns
Unit Testing
Integration Testing
End-to-End Testing
Behavior Driven Development (BDD)
Jenkins
Travis CI
CircleCI
GitHub Actions
Azure Devops
Docker
Kubernetes
OpenShift
Amazon ECS
Eureka
Consul
Zookeeper
etcd
HAProxy
NGINX
Amazon ELB
OpenStack
OAuth
JWT
SSL/TLS
Amazon IAM
gRPC
Apache Kafka
RabbitMQ
Amazon SQS
Circuit Breaker
Retry Logic
Health Checks
Chaos Engineering
Chaos Engineering
Amazon CloudWatch
Nagios
Datadog
New Relic
Profiling and Debugging
Load Testing
Performance Monitoring
Auto Scaling
Network topology
Router configuration
Firewall configuration
TCP/IP
DNS
DHCP
Intrusion detection/prevention systems (IDS/IPS)
Virtual Private Networks (VPN)
Wireless security
Data encryption
Data backup and recovery
User authentication
User authorization
Role-based access control (RBAC)
Threat assessment
Vulnerability assessment
Malware
Phishing
Social engineering
Firewall
Antivirus
Sandboxing
Ethical hacking
Vulnerability scanning
Web application security
Secure coding practices
Threat modelling
Software testing
Web application firewall (WAF)
API security
Microservices security
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Encryption
Identity and access management (IAM)
Network segmentation
Regulatory compliance
Industry standards
Auditing
Antivirus
Firewall
Endpoint detection and response (EDR)
Mobile device security
Mobile app management (MAM)
Mobile threat defence (MTD)
IoT device management
IoT network security
IoT device security protocols
Multi-factor authentication (MFA)
Single Sign-On (SSO)
Federation
Role-based access control (RBAC)
Attribute-based access control (ABAC)
Policy-based access control
User provisioning
User provisioning
Identity lifecycle management
Compliance management
Risk assessment
Threat identification
Vulnerability analysis
Data backup and recovery
Infrastructure recovery
Application recovery
Incident response
Business process continuity
Communication and notification planning
SSL offloading
URL rewriting
Content filtering
Authentication and authorization
Load balancing
High availability
Traffic management
Content caching
Bandwidth optimization
User experience improvement
Resource utilization reduction
SSL/TLS decryption
Traffic management
Content filtering
Authentication and authorization
Security
Performance optimization
Traffic management
Geo-restriction and geo-redirection
Traffic filtering
Security policies enforcement
Secure connection
Data compression and optimization
Access control
Security policies enforcement
API usage visibility
Analytics and monitoring
Routing and orchestration
Security
Caching and rate limiting
Service discovery and registration
Security
Performance optimization
API traffic management
Mobile device-specific optimization
SQL
Oracle
Microsoft SQL Server
ER modelling
Indexing
MongoDB
Cassandra
CouchDB
Cosmos DB
JSON
BSON
Dynamic schema
Java
Python
Object-Relational Mapping (ORM)
Object-Relational Database Management System (ORDBMS)
Object Database Management System (ODBMS)
InfluxDB
TimescaleDB
KairosDB
Time series analysis
Event data management
Neo4j
OrientDB
ArangoDB
Graph theory
Link analysis
Redis
Memcached
Hazelcast
In-memory caching
Low latency data access
Apache Cassandra
Amazon Redshift
Google Bigtable
Business Intelligence (BI)
Data warehousing techniques
Apache Kafka
RabbitMQ
Apache Pulsar
Event streaming architecture
Stream processing frameworks
Amazon Relational Database Service (RDS)
Google Cloud SQL
Microsoft Azure Database
Cloud database security
Disaster recovery in cloud databases
Google Cloud Spanner
Amazon Aurora
CockroachDB
NewSQL database architecture
Data consistency in NewSQL database
Linear Regression
Logistic Regression
Ridge Regression
Lasso Regression
Elastic Net Regression
Bayesian Linear Regression
Support Vector Regression (SVR)
K-Nearest Neighbors (KNN)
Decision Trees
Random Forest
Gradient Boosting
Neural Networks
Convolutional Neural Networks (CNNs)
Multilayer Perceptron (MLP)
K-Means
Hierarchical Clustering
DBSCAN
DBSCAN
Gaussian Mixture Models (GMM)
Spectral Clustering
Affinity Propagation
Market Basket Analysis
Frequent Itemset Mining
Association Rule Mining
Fuzzy Association Rule Mining
Self-training
Co-training
Graph-based methods
Label Propagation
Q-Learning
SARSA
Deep Q-Networks (DQN)
Policy Gradients
Deep Deterministic Policy Gradients (DDPG)
Proximal Policy Optimization (PPO)
BERT
GPT
XLNet
ULMFiT
Transfer Learning
Multi-Head Attention
Multi-Task DNNs
Multi-Task Learning with Low-level Tasks
Bagged Decision Trees
Random Patches
Bagged Logistic Regression
Random Subspaces
XGBoost
LightGBM
Extreme Gradient Boosting (XGBoost)
Stochastic Gradient Boosting (SGD)
Convolutional operations
Pooling
ReLU activation
Backpropagation
Anchor boxes
Intersection over Union (IoU)
Non-maximum suppression (NMS)
R-CNN, YOLO, Faster R-CNN
Time distributed dense layers
Bidirectional RNN
GRU and LSTM units
Text classification
Named entity recognition
Machine Translation
Sentiment Analysis
Encoder-Decoder Architecture
Latent Space representation
Data denoising
Variational Autoencoders (VAEs)
Reconstruction error
One-class SVM
Isolation Forest
Generative Model
Discriminative Model
Adversarial Loss
DCGAN, Pix2Pix, StyleGAN
Label-preserving transformations
Image-to-image translation
CycleGAN
Window-based approach
Stateful LSTMs
Sequence-to-Sequence (Seq2Seq) models
Acoustic modelling
Connectionist Temporal Classification (CTC) loss
Attention-based models
Restricted Boltzmann Machines (RBMs)
Greedy layer-wise training
Fine-tuning with backpropagation
Sampling from the learned distribution
MNIST digit generation
Markov Decision Process (MDP)
Policy optimization
Value-based methods (Q-Learning)
Policy-based methods (REINFORCE)
Model-based methods
Model-free methods
Deep Reinforcement Learning (DRL)
Multi-Agent Reinforcement Learning (MARL)
Java
Java
Add another
Experience
Title
Company
Country
Select Country
Afghanistan
Armenia
Azerbaijan
Bahrain
Bangladesh
Bhutan
Brunei
Cambodia
China
Cyprus
East Timor
Georgia
Hong Kong
India
Indonesia
Iran
Iraq
Israel
Japan
Jordan
Kazakhstan
Kuwait
Kyrgyzstan
Laos
Lebanon
Macau
Malaysia
Maldives
Mongolia
Myanmar
Nepal
North Korea
Oman
Pakistan
Palestine
Philippines
Qatar
Saudi Arabia
Singapore
South Korea
Sri Lanka
Syria
Taiwan
Tajikistan
Thailand
Turkey
Turkmenistan
United Arab Emirates
Uzbekistan
Vietnam
World Wide
Yemen
Aland Islands
Albania
Andorra
Austria
Belarus
Belgium
Bosnia Herzegovina
Bulgaria
Croatia
Czech
Denmark
Estonia
Faroe Islands
Finland
France
Germany
Gibraltar
Greece
Guernsey
Hungary
Iceland
Ireland
Isle of Man
Italy
Jersey
Kosovo
Latvia
Liechtenstein
Lithuania
Luxembourg
Malta
Moldova
Monaco
Montenegro
Netherlands
North Macedonia
Norway
Poland
Portugal
Romania
Russia
San Marino
Serbia
Slovakia
Slovenia
Spain
Svalbard and Jan Mayen Islands
Sweden
Switzerland
Ukraine
United Kingdom
Vatican City State
Algeria
Angola
Benin
Botswana
British Indian Ocean Territory
Burkina Faso
Burundi
Cabo Verde
Cameroon
Central African Republic
Chad
Comoros
Congo
Cote d’Ivoire
Djibouti
DR Congo
Egypt
Equatorial Guinea
Eritrea
Eswatini
Ethiopia
French Southern Territories
Gabon
Gambia
Ghana
Guinea
Guinea-Bissau
Kenya
Lesotho
Liberia
Libya
Madagascar
Malawi
Mali
Mauritania
Mauritius
Mayotte
Morocco
Mozambique
Namibia
Niger
Nigeria
Reunion
Rwanda
Saint Helena
Sao Tome and Principe
Senegal
Seychelles
Sierra Leone
Somalia
South Africa
South Sudan
Sudan
Tanzania
Togo
Tunisia
Uganda
Western Sahara
Zambia
Zimbabwe
American Samoa
Australia
Christmas Island
Cocos (Keeling) Islands
Cook Islands
Fiji
French Polynesia
Guam
Heard Island and McDonald Islands
Kiribati
Marshall Islands
Micronesia
Nauru
New Caledonia
New Zealand
Niue
Norfolk Island
Northern Mariana Islands
Palau
Papua New Guinea
Pitcairn
Samoa
Solomon Islands
Tokelau
Tonga
Tuvalu
United States Minor Outlying Islands
Vanuatu
Wallis and Futuna Islands
Anguilla
Bermuda
Bonaire, Sint Eustatius and Saba
British Virgin Islands
Canada
Costa Rica
Cuba
Curaçao
Dominica
Dominican
El Salvador
Greenland
Guadeloupe
Guatemala
Honduras
Mexico
Nicaragua
Panama
Puerto Rico
Saint Barthélemy
Saint Lucia
Saint Martin
Saint Vincent and the Grenadines
Sint Maarten
Turks and Caicos Islands
United States
United States Virgin Islands
Antigua and Barbuda
Argentina
Aruba
Bahamas
Barbados
Belize
Bolivia
Bouvet Island
Brazil
Cayman Islands
Chile
Colombia
Ecuador
Falkland Islands (Malvinas)
French Guiana
Grenada
Guyana
Haiti
Jamaica
Martinique
Montserrat
Netherlands Antilles
Paraguay
Peru
Saint Kitts and Nevis
Saint Pierre and Miquelon
South Georgia and the South Sandwich Islands
Suriname
Trinidad and Tobago
Uruguay
Venezuela
Start Date
End Date
I'm currently working here
Description
Cancel
Save
Testimonial Request
Your Name
Your Email
Client LinkedIn Profile URL
Your Project Type
Your Message
Strengthen your profile with client testimonials
Showcase your skills and success from clients outside RemoteRise
your clients will get an email within instructions for submitting your success story
The testimonial will display on your profile once it's verified by RemoteRise
Request
Cancel
Education
School / College / University
Degree
Select Degree
Associate of Arts (AA)
Associate of Arts and Sciences (AAS)
Associate of Science (AS)
Bachelor of Applied Science (BASc)
Bachelor of Architecture (BArch)
Bachelor of Science in Information Technology
Bachelor of Arts (BA)
Bachelor of Business Administration (BBA)
Bachelor of Commerce (BCom)
Bachelor of Education (BEd)
Bachelor of Engineering (BEng)
Bachelors of Software Engineering (BSE)
Bachelor of Fine Arts (BFA)
Bachelor of Laws (LLB)
Bachelor of Medicine, Bachelor of Surgery (MBBS)
Bachelor of Pharmacy (BPharm)
Bachelor of Science (BS)
Bachelor of Technology (BTech)
Bachelor of Accountancy (BAcc)
Bachelor of Science in Nursing (BSN)
Bachelor of Computer Science (BCompSc)
Bachelor of Computer Applications
Bachelor of Music (BM)
Bachelor of Science in Journalism
Bachelor of Visual Communication Design
Master's degree
Master of Architecture (MArch)
Master of Arts (MA)
Master of Business Administration (MBA)
Master of Computer Applications (MCA)
Master of Divinity (MDiv)
Master of Fine Arts (MFA)
Master of Education (MEd)
Master of Laws (LLM)
Master of Library & Information Science (MLIS)
Master of Philosophy (MPhil)
Master of Commerce (MCom)
Master of Public Health (MPH)
Master of Science (MS)
Master of Social Work (MSW)
Master of Technology (MTech)
Doctor of Engineering (DEng)
Doctor of Musical Arts (DMA)
Bachelor of Industrial Design
Doctor of Healthcare Administration (DHA)
Doctor of Education (EdD)
Doctor of Law (JD)
Doctor of Medicine (MD)
Doctor of Pharmacy (PharmD)
Doctor of Philosophy (PhD)
Engineer's degree
Foundation degree
Licentiate degree
High school degree
Doctor of Business Administration (DBA)
Master of public Administration (MPA)
Master of Design (MDes)
Master of Industrial Design
Master of Engineering (MEng)
Master of Science in Project Management (MSPM)
Master of Science in Information Technology (MSc(IT))
Master of Information Technology (MIT)
Master of Philosophy (MPhil)
Master of Computer Science (MSCS)
Master of Mass Communication and Journalism
Master of Educational Technology
Master of Accountancy (MAcc)
Master of Music (MM)
Other
Field Of Study
Dates Attended
From Date
To Date
I'm currently enroll here
Description
Cancel
Save
Portfolio Request
Project Name *
Project name is required
Description
What was your Role in the Project?
Project Images
View File Upload Guidelines
Drag or Drop to Upload
Browse
Skills
Git
Jenkins
Travis CI
CircleCI
Azure Devops CI pipelines
Ansible
Chef
Puppet
SaltStack
Azure Devops CD pipeline
Terraform
CloudFormation
Ansible
Puppet
Docker Compose
Kubernetes
Helm
OpenShift
Docker
Kubernetes
OpenShift
Rancher
VMware
VirtualBox
Hyper-V
KVM
AWS
Azure
Google Cloud Platform
Oracle Cloud
AWS CloudFormation
Azure Resource Manager
Google Cloud Deployment Manager
Oracle Cloud Infrastructure Terraform Provider
Nagios
Zabbix
Datadog
New Relic
ELK Stack
Fluentd
Graylog
Logrotate
Veeam
Veritas NetBackup
Commvault
Acronis
Business Continuity Planning
Disaster Recovery as a Service (DRaaS)
Site Recovery Manager (SRM)
Cloud-based Disaster Recovery
Nessus
OpenVAS
Qualys
Nexpose
SOC 2
PCI DSS
HIPAA
NIST
Scrum
Kanban
XP (Extreme Programming)
Crystal
Slack
Microsoft Teams
Zoom
Skype
MySQL
PostgreSQL
Microsoft SQL Server
Oracle Database
MongoDB
Cassandra
CouchDB
Amazon DynamoDB
Azure Cosmos Db
TCP/IP
DNS
DHCP
VPN
Firewall
Intrusion Detection and Prevention System
(IDPS)
SSL/TLS certificates
Network Access Control (NAC)
AWS
Microsoft Azure
Google Cloud
OpenStack
VMWare
Hyper-V
Oracle VirtualBox
Cisco
Juniper
F5
AWS VPC
Microsoft Azure VNet
Google Cloud VPC
Linux
Windows
Unix
Amazon EC2
Microsoft Azure VM
Google Compute Engine
Java
Ruby on Rails
.NET
Python
Node.js
Go
Heroku
AppFog
Google App Engine
AWS Elastic Beanstalk
Microsoft Azure App Service
iOS
Android
Xamarin
Flutter
React Native
Salesforce
Microsoft Dynamics
SugarCRM
Hubspot
Workday
ADP
Oracle HCM
BambooHR
Asana
Trello
Microsoft Project
Jira
AWS Lambda
Google Cloud Functions
Microsoft Azure Functions
OpenFaaS
Knative
AWS EventBridge
Google Cloud Pub/Sub
Microsoft Azure Event Grid
Apache Kafka
RabbitMQ
Veritas
Acronis
Commvault
AWS Backup
Microsoft Azure Backup
Google Cloud Backup
Veeam
Carbonite
DRP
BCP
RTO
High Availability
Load Balancing
Fault Tolerance
AWS Auto Scaling
Microsoft Azure Traffic Manager
Google Cloud Load Balancer
AWS S3
Microsoft Azure Storage
Google Cloud Storage
AWS S3
Microsoft Azure Blob
Google Cloud Storage
Ceph
Minio
MySQL
Microsoft SQL Server
Oracle
PostgreSQL
MariaDB
MongoDB
Cassandra
Couchbase
Amazon DynamoDB
Google Cloud Firestore
Cosmos Database
AWS
Azure
Google Cloud Platform
Kubernetes
Docker
Infrastructure as Code (IaC)
RabbitMQ
Apache Kafka
Apache ActiveMQ
Apache Pulsar
Apache Flink
Apache Spark
Azure Service Bus
Clustering
Sharding
Elasticity
Auto-scaling
SSL/TLS encryption
Authentication and authorization
Firewall management
Linux administration
Network administration
Virtualization
Server hardware maintenance
Network security
RabbitMQ
Apache Kafka
Apache ActiveMQ
Apache Pulsar
Apache Flink
Apache Spark
Azure Service Bus
Load balancing
Failover and disaster recovery
Monitoring and alerting
SSL/TLS encryption
Authentication and authorization
Firewall management
Encryption at rest
Data backup and recovery
Load balancing
Failover and disaster recovery
Monitoring and alerting
Clustering
Sharding
Elasticity
Auto-scaling
Domain-Driven Design (DDD)
Command Query Responsibility Segregation (CQRS)
Event Sourcing
Microservices architecture
Routing algorithms
Event-driven rules
Message filtering
Event correlation
Data streaming
Data processing
Data storage
Hadoop
Spark
MQTT
CoAP
AMQP
LoRaWAN
Zigbee
Natural Language Processing (NLP)
Information Retrieval (IR)
Machine Learning (ML)
Text Mining
Query Expansion
Query Refinement
PageRank
HITS
BM25
Link Analysis
Collaborative Filtering
Distributed Systems
Scalability
URL Management
Data Collection
Web Data Extraction
Web Data Integration
Computer Vision
Object Recognition
Image Classification
Image Analysis
Object Detection
Metadata Management
Image Hashing
Content-Based Image Retrieval (CBIR)
Image Search Optimization
Image Database Management
Video Compression
Video Segmentation
Video Summarization
Video Format Conversion
Video Streaming
Video Metadata Management
Video Hashing
Video Content Analysis
Video Search Optimization
Video Database Management
Web Scraping
Data Crawling
Data Parsing
Data Integration
News Feed Management
Text Classification
Named Entity Recognition (NER)
Sentiment Analysis
News Topic Modelling
News Clustering
Metadata Management
Bibliographic Data Management
Digital Library Management
Scientific Document Retrieval
Scientific Document Summarization
Network Analysis
Bibliometrics
Scientific Impact Analysis
Scientific Literature Review
Scientific Knowledge Discovery
Taxonomy Management
Product Classification
Catalogue Management
Product Taxonomy Optimization
Product Data Management
Relevance Ranking
Faceted Search
Product Recommendation
Product Search Optimization
Product Sales Analysis
Data Mining
Web Scraping
Data Crawling
Domain-Specific Data Collection
Domain-Specific Data Integration
Metadata Management
Text Classification
Faceted Search
Domain-Specific Data Retrieval
Domain-Specific Data Summarization
Spring Boot
Node.js
Django
Ruby on Rails
RESTful API Development
GraphQL API Development
SOAP API Development
API Security
npm
pip
RubyGems
Maven
Domain Modelling
Bounded Context
Aggregate
Entity
SOLID Principles
Code Refactoring
Code Reviews
Design Patterns
Unit Testing
Integration Testing
End-to-End Testing
Behavior Driven Development (BDD)
Jenkins
Travis CI
CircleCI
GitHub Actions
Azure Devops
Docker
Kubernetes
OpenShift
Amazon ECS
Eureka
Consul
Zookeeper
etcd
HAProxy
NGINX
Amazon ELB
OpenStack
OAuth
JWT
SSL/TLS
Amazon IAM
gRPC
Apache Kafka
RabbitMQ
Amazon SQS
Circuit Breaker
Retry Logic
Health Checks
Chaos Engineering
Chaos Engineering
Amazon CloudWatch
Nagios
Datadog
New Relic
Profiling and Debugging
Load Testing
Performance Monitoring
Auto Scaling
Network topology
Router configuration
Firewall configuration
TCP/IP
DNS
DHCP
Intrusion detection/prevention systems (IDS/IPS)
Virtual Private Networks (VPN)
Wireless security
Data encryption
Data backup and recovery
User authentication
User authorization
Role-based access control (RBAC)
Threat assessment
Vulnerability assessment
Malware
Phishing
Social engineering
Firewall
Antivirus
Sandboxing
Ethical hacking
Vulnerability scanning
Web application security
Secure coding practices
Threat modelling
Software testing
Web application firewall (WAF)
API security
Microservices security
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Encryption
Identity and access management (IAM)
Network segmentation
Regulatory compliance
Industry standards
Auditing
Antivirus
Firewall
Endpoint detection and response (EDR)
Mobile device security
Mobile app management (MAM)
Mobile threat defence (MTD)
IoT device management
IoT network security
IoT device security protocols
Multi-factor authentication (MFA)
Single Sign-On (SSO)
Federation
Role-based access control (RBAC)
Attribute-based access control (ABAC)
Policy-based access control
User provisioning
User provisioning
Identity lifecycle management
Compliance management
Risk assessment
Threat identification
Vulnerability analysis
Data backup and recovery
Infrastructure recovery
Application recovery
Incident response
Business process continuity
Communication and notification planning
SSL offloading
URL rewriting
Content filtering
Authentication and authorization
Load balancing
High availability
Traffic management
Content caching
Bandwidth optimization
User experience improvement
Resource utilization reduction
SSL/TLS decryption
Traffic management
Content filtering
Authentication and authorization
Security
Performance optimization
Traffic management
Geo-restriction and geo-redirection
Traffic filtering
Security policies enforcement
Secure connection
Data compression and optimization
Access control
Security policies enforcement
API usage visibility
Analytics and monitoring
Routing and orchestration
Security
Caching and rate limiting
Service discovery and registration
Security
Performance optimization
API traffic management
Mobile device-specific optimization
SQL
Oracle
Microsoft SQL Server
ER modelling
Indexing
MongoDB
Cassandra
CouchDB
Cosmos DB
JSON
BSON
Dynamic schema
Java
Python
Object-Relational Mapping (ORM)
Object-Relational Database Management System (ORDBMS)
Object Database Management System (ODBMS)
InfluxDB
TimescaleDB
KairosDB
Time series analysis
Event data management
Neo4j
OrientDB
ArangoDB
Graph theory
Link analysis
Redis
Memcached
Hazelcast
In-memory caching
Low latency data access
Apache Cassandra
Amazon Redshift
Google Bigtable
Business Intelligence (BI)
Data warehousing techniques
Apache Kafka
RabbitMQ
Apache Pulsar
Event streaming architecture
Stream processing frameworks
Amazon Relational Database Service (RDS)
Google Cloud SQL
Microsoft Azure Database
Cloud database security
Disaster recovery in cloud databases
Google Cloud Spanner
Amazon Aurora
CockroachDB
NewSQL database architecture
Data consistency in NewSQL database
Linear Regression
Logistic Regression
Ridge Regression
Lasso Regression
Elastic Net Regression
Bayesian Linear Regression
Support Vector Regression (SVR)
K-Nearest Neighbors (KNN)
Decision Trees
Random Forest
Gradient Boosting
Neural Networks
Convolutional Neural Networks (CNNs)
Multilayer Perceptron (MLP)
K-Means
Hierarchical Clustering
DBSCAN
DBSCAN
Gaussian Mixture Models (GMM)
Spectral Clustering
Affinity Propagation
Market Basket Analysis
Frequent Itemset Mining
Association Rule Mining
Fuzzy Association Rule Mining
Self-training
Co-training
Graph-based methods
Label Propagation
Q-Learning
SARSA
Deep Q-Networks (DQN)
Policy Gradients
Deep Deterministic Policy Gradients (DDPG)
Proximal Policy Optimization (PPO)
BERT
GPT
XLNet
ULMFiT
Transfer Learning
Multi-Head Attention
Multi-Task DNNs
Multi-Task Learning with Low-level Tasks
Bagged Decision Trees
Random Patches
Bagged Logistic Regression
Random Subspaces
XGBoost
LightGBM
Extreme Gradient Boosting (XGBoost)
Stochastic Gradient Boosting (SGD)
Convolutional operations
Pooling
ReLU activation
Backpropagation
Anchor boxes
Intersection over Union (IoU)
Non-maximum suppression (NMS)
R-CNN, YOLO, Faster R-CNN
Time distributed dense layers
Bidirectional RNN
GRU and LSTM units
Text classification
Named entity recognition
Machine Translation
Sentiment Analysis
Encoder-Decoder Architecture
Latent Space representation
Data denoising
Variational Autoencoders (VAEs)
Reconstruction error
One-class SVM
Isolation Forest
Generative Model
Discriminative Model
Adversarial Loss
DCGAN, Pix2Pix, StyleGAN
Label-preserving transformations
Image-to-image translation
CycleGAN
Window-based approach
Stateful LSTMs
Sequence-to-Sequence (Seq2Seq) models
Acoustic modelling
Connectionist Temporal Classification (CTC) loss
Attention-based models
Restricted Boltzmann Machines (RBMs)
Greedy layer-wise training
Fine-tuning with backpropagation
Sampling from the learned distribution
MNIST digit generation
Markov Decision Process (MDP)
Policy optimization
Value-based methods (Q-Learning)
Policy-based methods (REINFORCE)
Model-based methods
Model-free methods
Deep Reinforcement Learning (DRL)
Multi-Agent Reinforcement Learning (MARL)
Java
Java
Completion Date *
Completion date cannot be in the future.
Public URL
YouTube URL
Save Project
View File Upload Guidelines
Images (.jpg, .gif, .png, up to 10 MB, no more than 4000 px in any dimension)
Edit Portfolio
Project Name *
Description
What was your Role in the Project?
Project Images
View File Upload Guidelines
Drag or Drop to Upload
Browse
Skills
Git
Jenkins
Travis CI
CircleCI
Azure Devops CI pipelines
Ansible
Chef
Puppet
SaltStack
Azure Devops CD pipeline
Terraform
CloudFormation
Ansible
Puppet
Docker Compose
Kubernetes
Helm
OpenShift
Docker
Kubernetes
OpenShift
Rancher
VMware
VirtualBox
Hyper-V
KVM
AWS
Azure
Google Cloud Platform
Oracle Cloud
AWS CloudFormation
Azure Resource Manager
Google Cloud Deployment Manager
Oracle Cloud Infrastructure Terraform Provider
Nagios
Zabbix
Datadog
New Relic
ELK Stack
Fluentd
Graylog
Logrotate
Veeam
Veritas NetBackup
Commvault
Acronis
Business Continuity Planning
Disaster Recovery as a Service (DRaaS)
Site Recovery Manager (SRM)
Cloud-based Disaster Recovery
Nessus
OpenVAS
Qualys
Nexpose
SOC 2
PCI DSS
HIPAA
NIST
Scrum
Kanban
XP (Extreme Programming)
Crystal
Slack
Microsoft Teams
Zoom
Skype
MySQL
PostgreSQL
Microsoft SQL Server
Oracle Database
MongoDB
Cassandra
CouchDB
Amazon DynamoDB
Azure Cosmos Db
TCP/IP
DNS
DHCP
VPN
Firewall
Intrusion Detection and Prevention System
(IDPS)
SSL/TLS certificates
Network Access Control (NAC)
AWS
Microsoft Azure
Google Cloud
OpenStack
VMWare
Hyper-V
Oracle VirtualBox
Cisco
Juniper
F5
AWS VPC
Microsoft Azure VNet
Google Cloud VPC
Linux
Windows
Unix
Amazon EC2
Microsoft Azure VM
Google Compute Engine
Java
Ruby on Rails
.NET
Python
Node.js
Go
Heroku
AppFog
Google App Engine
AWS Elastic Beanstalk
Microsoft Azure App Service
iOS
Android
Xamarin
Flutter
React Native
Salesforce
Microsoft Dynamics
SugarCRM
Hubspot
Workday
ADP
Oracle HCM
BambooHR
Asana
Trello
Microsoft Project
Jira
AWS Lambda
Google Cloud Functions
Microsoft Azure Functions
OpenFaaS
Knative
AWS EventBridge
Google Cloud Pub/Sub
Microsoft Azure Event Grid
Apache Kafka
RabbitMQ
Veritas
Acronis
Commvault
AWS Backup
Microsoft Azure Backup
Google Cloud Backup
Veeam
Carbonite
DRP
BCP
RTO
High Availability
Load Balancing
Fault Tolerance
AWS Auto Scaling
Microsoft Azure Traffic Manager
Google Cloud Load Balancer
AWS S3
Microsoft Azure Storage
Google Cloud Storage
AWS S3
Microsoft Azure Blob
Google Cloud Storage
Ceph
Minio
MySQL
Microsoft SQL Server
Oracle
PostgreSQL
MariaDB
MongoDB
Cassandra
Couchbase
Amazon DynamoDB
Google Cloud Firestore
Cosmos Database
AWS
Azure
Google Cloud Platform
Kubernetes
Docker
Infrastructure as Code (IaC)
RabbitMQ
Apache Kafka
Apache ActiveMQ
Apache Pulsar
Apache Flink
Apache Spark
Azure Service Bus
Clustering
Sharding
Elasticity
Auto-scaling
SSL/TLS encryption
Authentication and authorization
Firewall management
Linux administration
Network administration
Virtualization
Server hardware maintenance
Network security
RabbitMQ
Apache Kafka
Apache ActiveMQ
Apache Pulsar
Apache Flink
Apache Spark
Azure Service Bus
Load balancing
Failover and disaster recovery
Monitoring and alerting
SSL/TLS encryption
Authentication and authorization
Firewall management
Encryption at rest
Data backup and recovery
Load balancing
Failover and disaster recovery
Monitoring and alerting
Clustering
Sharding
Elasticity
Auto-scaling
Domain-Driven Design (DDD)
Command Query Responsibility Segregation (CQRS)
Event Sourcing
Microservices architecture
Routing algorithms
Event-driven rules
Message filtering
Event correlation
Data streaming
Data processing
Data storage
Hadoop
Spark
MQTT
CoAP
AMQP
LoRaWAN
Zigbee
Natural Language Processing (NLP)
Information Retrieval (IR)
Machine Learning (ML)
Text Mining
Query Expansion
Query Refinement
PageRank
HITS
BM25
Link Analysis
Collaborative Filtering
Distributed Systems
Scalability
URL Management
Data Collection
Web Data Extraction
Web Data Integration
Computer Vision
Object Recognition
Image Classification
Image Analysis
Object Detection
Metadata Management
Image Hashing
Content-Based Image Retrieval (CBIR)
Image Search Optimization
Image Database Management
Video Compression
Video Segmentation
Video Summarization
Video Format Conversion
Video Streaming
Video Metadata Management
Video Hashing
Video Content Analysis
Video Search Optimization
Video Database Management
Web Scraping
Data Crawling
Data Parsing
Data Integration
News Feed Management
Text Classification
Named Entity Recognition (NER)
Sentiment Analysis
News Topic Modelling
News Clustering
Metadata Management
Bibliographic Data Management
Digital Library Management
Scientific Document Retrieval
Scientific Document Summarization
Network Analysis
Bibliometrics
Scientific Impact Analysis
Scientific Literature Review
Scientific Knowledge Discovery
Taxonomy Management
Product Classification
Catalogue Management
Product Taxonomy Optimization
Product Data Management
Relevance Ranking
Faceted Search
Product Recommendation
Product Search Optimization
Product Sales Analysis
Data Mining
Web Scraping
Data Crawling
Domain-Specific Data Collection
Domain-Specific Data Integration
Metadata Management
Text Classification
Faceted Search
Domain-Specific Data Retrieval
Domain-Specific Data Summarization
Spring Boot
Node.js
Django
Ruby on Rails
RESTful API Development
GraphQL API Development
SOAP API Development
API Security
npm
pip
RubyGems
Maven
Domain Modelling
Bounded Context
Aggregate
Entity
SOLID Principles
Code Refactoring
Code Reviews
Design Patterns
Unit Testing
Integration Testing
End-to-End Testing
Behavior Driven Development (BDD)
Jenkins
Travis CI
CircleCI
GitHub Actions
Azure Devops
Docker
Kubernetes
OpenShift
Amazon ECS
Eureka
Consul
Zookeeper
etcd
HAProxy
NGINX
Amazon ELB
OpenStack
OAuth
JWT
SSL/TLS
Amazon IAM
gRPC
Apache Kafka
RabbitMQ
Amazon SQS
Circuit Breaker
Retry Logic
Health Checks
Chaos Engineering
Chaos Engineering
Amazon CloudWatch
Nagios
Datadog
New Relic
Profiling and Debugging
Load Testing
Performance Monitoring
Auto Scaling
Network topology
Router configuration
Firewall configuration
TCP/IP
DNS
DHCP
Intrusion detection/prevention systems (IDS/IPS)
Virtual Private Networks (VPN)
Wireless security
Data encryption
Data backup and recovery
User authentication
User authorization
Role-based access control (RBAC)
Threat assessment
Vulnerability assessment
Malware
Phishing
Social engineering
Firewall
Antivirus
Sandboxing
Ethical hacking
Vulnerability scanning
Web application security
Secure coding practices
Threat modelling
Software testing
Web application firewall (WAF)
API security
Microservices security
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Encryption
Identity and access management (IAM)
Network segmentation
Regulatory compliance
Industry standards
Auditing
Antivirus
Firewall
Endpoint detection and response (EDR)
Mobile device security
Mobile app management (MAM)
Mobile threat defence (MTD)
IoT device management
IoT network security
IoT device security protocols
Multi-factor authentication (MFA)
Single Sign-On (SSO)
Federation
Role-based access control (RBAC)
Attribute-based access control (ABAC)
Policy-based access control
User provisioning
User provisioning
Identity lifecycle management
Compliance management
Risk assessment
Threat identification
Vulnerability analysis
Data backup and recovery
Infrastructure recovery
Application recovery
Incident response
Business process continuity
Communication and notification planning
SSL offloading
URL rewriting
Content filtering
Authentication and authorization
Load balancing
High availability
Traffic management
Content caching
Bandwidth optimization
User experience improvement
Resource utilization reduction
SSL/TLS decryption
Traffic management
Content filtering
Authentication and authorization
Security
Performance optimization
Traffic management
Geo-restriction and geo-redirection
Traffic filtering
Security policies enforcement
Secure connection
Data compression and optimization
Access control
Security policies enforcement
API usage visibility
Analytics and monitoring
Routing and orchestration
Security
Caching and rate limiting
Service discovery and registration
Security
Performance optimization
API traffic management
Mobile device-specific optimization
SQL
Oracle
Microsoft SQL Server
ER modelling
Indexing
MongoDB
Cassandra
CouchDB
Cosmos DB
JSON
BSON
Dynamic schema
Java
Python
Object-Relational Mapping (ORM)
Object-Relational Database Management System (ORDBMS)
Object Database Management System (ODBMS)
InfluxDB
TimescaleDB
KairosDB
Time series analysis
Event data management
Neo4j
OrientDB
ArangoDB
Graph theory
Link analysis
Redis
Memcached
Hazelcast
In-memory caching
Low latency data access
Apache Cassandra
Amazon Redshift
Google Bigtable
Business Intelligence (BI)
Data warehousing techniques
Apache Kafka
RabbitMQ
Apache Pulsar
Event streaming architecture
Stream processing frameworks
Amazon Relational Database Service (RDS)
Google Cloud SQL
Microsoft Azure Database
Cloud database security
Disaster recovery in cloud databases
Google Cloud Spanner
Amazon Aurora
CockroachDB
NewSQL database architecture
Data consistency in NewSQL database
Linear Regression
Logistic Regression
Ridge Regression
Lasso Regression
Elastic Net Regression
Bayesian Linear Regression
Support Vector Regression (SVR)
K-Nearest Neighbors (KNN)
Decision Trees
Random Forest
Gradient Boosting
Neural Networks
Convolutional Neural Networks (CNNs)
Multilayer Perceptron (MLP)
K-Means
Hierarchical Clustering
DBSCAN
DBSCAN
Gaussian Mixture Models (GMM)
Spectral Clustering
Affinity Propagation
Market Basket Analysis
Frequent Itemset Mining
Association Rule Mining
Fuzzy Association Rule Mining
Self-training
Co-training
Graph-based methods
Label Propagation
Q-Learning
SARSA
Deep Q-Networks (DQN)
Policy Gradients
Deep Deterministic Policy Gradients (DDPG)
Proximal Policy Optimization (PPO)
BERT
GPT
XLNet
ULMFiT
Transfer Learning
Multi-Head Attention
Multi-Task DNNs
Multi-Task Learning with Low-level Tasks
Bagged Decision Trees
Random Patches
Bagged Logistic Regression
Random Subspaces
XGBoost
LightGBM
Extreme Gradient Boosting (XGBoost)
Stochastic Gradient Boosting (SGD)
Convolutional operations
Pooling
ReLU activation
Backpropagation
Anchor boxes
Intersection over Union (IoU)
Non-maximum suppression (NMS)
R-CNN, YOLO, Faster R-CNN
Time distributed dense layers
Bidirectional RNN
GRU and LSTM units
Text classification
Named entity recognition
Machine Translation
Sentiment Analysis
Encoder-Decoder Architecture
Latent Space representation
Data denoising
Variational Autoencoders (VAEs)
Reconstruction error
One-class SVM
Isolation Forest
Generative Model
Discriminative Model
Adversarial Loss
DCGAN, Pix2Pix, StyleGAN
Label-preserving transformations
Image-to-image translation
CycleGAN
Window-based approach
Stateful LSTMs
Sequence-to-Sequence (Seq2Seq) models
Acoustic modelling
Connectionist Temporal Classification (CTC) loss
Attention-based models
Restricted Boltzmann Machines (RBMs)
Greedy layer-wise training
Fine-tuning with backpropagation
Sampling from the learned distribution
MNIST digit generation
Markov Decision Process (MDP)
Policy optimization
Value-based methods (Q-Learning)
Policy-based methods (REINFORCE)
Model-based methods
Model-free methods
Deep Reinforcement Learning (DRL)
Multi-Agent Reinforcement Learning (MARL)
Java
Java
Completion Date *
Public URL
Youtube URL
View File Upload Guidelines
Images (.jpg, .gif, .png, up to 10 MB, no more than 4000 px in any dimension)
View Portfolio
Active - 10:51 am
Peter Lee
$0.00 / h
Ireland
...
local time
Relevant Skills
Language
Experience
Portfolio
Education & Certifications
Testimonials
Experience
Portfolio
My Portfolio > Add New
Education & Certifications
Testimonials
Cookie Policy
×
We may use cookies or any other tracking technologies when you visit our website, including any other media form, mobile website, or mobile application related or connected to help customize the Site and improve your experience.
Read Policy