Skip to content
View Chittesh195's full-sized avatar
🎯
Focusing
🎯
Focusing
  • 12:36 (UTC -12:00)

Block or report Chittesh195

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Triangular_Wave_Generator_Using_Op-Amp_LM741 Triangular_Wave_Generator_Using_Op-Amp_LM741 Public

    Design and implement a circuit using op-amp to generate a triangular wave with variable frequency 250 Hz to 2.5 kHz.

    Prolog 1

  2. VLSI_FPGA_Based_Obstacle_Avoidance_System_Using_Verilog VLSI_FPGA_Based_Obstacle_Avoidance_System_Using_Verilog Public

    FPGA-Based Obstacle Avoidance System Using Verilog

    Verilog 1

  3. Voltage_Regulator_Using_Zener_Diode Voltage_Regulator_Using_Zener_Diode Public

    Using a 3.6 V Zener diode, design a voltage regulator to provide a constant voltage of 4.1 V, from a rectified pulsating DC between 6 and 8 V, and with the load drawing any current from 0-70 mA.

  4. Machine_Learning_Telecom_Service_Churn_Prediction Machine_Learning_Telecom_Service_Churn_Prediction Public

    Customer churn prediction in telecom sector using machine learning techniques from research paper. Extra Implementation: KNN , Naive Bayes, SVM and Optimization Techniques: SGD and ADAM .

    Jupyter Notebook

  5. Impact-Control-System-Inspired-from-Mantis-Shrimp-Case-Study Impact-Control-System-Inspired-from-Mantis-Shrimp-Case-Study Public

    It is Case study base on Impact control on Vehicles inspired from Mantis Shrimp.

  6. Digital-Locking-System-with-Unauthorized-Access-Alert Digital-Locking-System-with-Unauthorized-Access-Alert Public

    A digital security system that unlocks only on the correct code and triggers an alert for unauthorized attempts. Built with simple, reliable digital logic for real-time access control.