Narmadeshwar Mahadev : The Residence of Lord Shiva on the earth
Culture , History , Travel and Destinations / October 7, 2018

In Hinduism it is said that the Lord Shiva the primary source of all the energy and this whole universe and thus the mighty God is worshipped across the globe and the shiv linga is the abstract representation of Lord Shiva and as a matter of fact the Shiv Linga is described as a center of concentration that, if you look at the Linga, it will help you to focus. Today, in most of the Hindu Temples in India, the Shiva is worshipped in the form of linga rather than a statue. In this article, Narmadeshwar Mahadev and their place are explained. The Narmadeshwar Mahadev is a form of shiv linga which is assumed as the most spiritual and pure form of Shiva Linga and it is believed that the mighty lord himself resides in the Narmadeshwar Mahadev shiv linga. The story of Narmadeshwar Mahadev: It is believed that once upon a time Lord Shiva was Penancing on the mountain Maikal in Amarkantak. Meanwhile due to the sun heat a drop of sweat of Lord Shiva fell on the ground and thus took a form of a holy river which today is known as the Narmada river  and when Shiva awoke…

What is Feature Selection and it’s techniques

Suppose there is a real-life problem as to put a nail on a wall, so what are the steps to complete the process of putting that nail, we need a nail and a hammer so this selection of attribute according to the problem is the same thing in the Feature selection in machine learning. The reduction of the problem depends on the selection of the variables included in the process, and thus the feature selection plays an essential role in the creation of a model of a problem. This article covers some of the following topics: Introduction Techniques of Features Selection Advantage and use of feature selection Introduction of Feature selection In machine learning Feature selection is a process of selecting the essential and useful variables for the particular problem model and feature selection is the process where the complexity and the performance of the model will be decided, as if the features or not appropriately selected, then model will be complicated, slower and bulky and thus performance will be decreased. The feature selection compares and selects the best features that are relevant to the associated problem and removes the unwanted features according to the comparison to the other useful…

What is Agile Software Development in Software Engineering?
Technology & Science / July 24, 2018

The field of software development is not shy about introducing new methodologies. Indeed, in the last 25 years, a large number of different approaches to software development have been introduced, of which only a few have survived to be used today. While no agreement on what the concept of “agile” actually refers to exists, it has generated a lot of interest among practitioners and lately also in the academia. The introduction of the extreme programming method has been widely acknowledged as the starting point for the various agile software development approaches. General Description of Agile Methodology Agile – denoting “the quality of being agile; readiness for motion; nimbleness, activity, dexterity in motion” – software development methods are attempting to offer once again an answer to the eager business community asking for lighter weight along with faster and nimbler software development processes. This is especially the case with the rapidly growing and volatile Internet software industry as well as for the emerging mobile application environment. Agile is an iterative approach to project management and software development that helps teams deliver value to their customers faster and with fewer headaches. Agile methodology is a practice that promotes continuous iteration of development and testing throughout…

What is Token Ring in Networking?
Networking , Technology & Science / July 22, 2018

The robustness of token ring has won it a place in the heart of many large enterprise network The communication capabilities provided by local-area networks (LANs) are affected, to a large extent, by the performance of the medium access control protocol. In geographically concentrated areas, communication subnetworks usually realize a bus or ring topology. The IEEE 802 standardization body has established e.g. three standards for LAN medium access control protocols: CSMA/CD, token bus and token ring. The term “token ring” is used to describe a computer network configuration where each computer is linked to the computer next to it to form a closed ring. Basic Overview of Token Ring Token ring or IEEE 802.5 is a network where all computers are connected in a circular fashion. The term token is used to describe a segment of information that is sent through that circle; when a computer on the network can decode that token, it receives data. A token ring network is a local area network (LAN) topology where nodes/stations are arranged in a ring topology. Data passes sequentially between nodes on the network until it returns to the source station. To prevent congestion and collision, a token ring topology uses a token to…

What is Linear Search in Data Structure?

The study of data structures for facilitating rapid searching is a fascinating subject of both practical and theoretical interest. Sorting and Searching are two fundamental operations in a computer science. Sorting means arranging on data in given order such that increment or decrement. Searching means find out location or find out an element of a given item in a collection of item. Searching element is any type of a numerical data, alphabet, String, character data. Every searching algorithm depends on specific problem, property of data and algorithm complexity. A search algorithm is the step by step procedure used to locate specific data among the collections of data. Searching is considered as the most fundamental procedure in computer science. When the data is to be searched, the difference between a fast application and a slower one lies in the use of proper search algorithms. Definition of Linear Search Linear search, also known as sequential search, is a process that checks every element in the list sequentially until the desired element is found. The computational complexity for linear search is O(n), making it generally much less efficient than binary search (O(log n)). Linear search (sequential search) is the most simple approach to…

What is Information Resource Management?
Technology & Science / July 20, 2018

Growing awareness and consideration of the dependence of organizations upon their internal and external information systems and practices for continuing operational effectiveness is one of the key strands in recent management literature. This new sensitivity to informational contributions to organizational success has pushed into prominence cause and claims of information management. Information resource management (IRM) is currently favored concept linking managerial effectiveness and information acquisition and use. That represents latest synthesis of a range of ideas based on the premise that effective decision-making and strategic thinking cannot be divorced from information consideration. Basic Overview of Information Resource Management Information-based organizations depend upon computer databases and information systems for their ongoing operation and management. Information Resource Management (IRM) is a program of activities directed at making effective use of information technology within an organization. These activities range from global corporate information planning to application system development, operation, and maintenance and support of end-user computing. A foundational component of public administration, Information Resource Management (IRM) can be understood as a philosophy of management that recognizes and calls for the creation, identification, capture and management of information resources as corporate assets to enable and support the development of policy and effective decision making….

What is Information Visualization?
Technology & Science / July 19, 2018

There are several situations in the real world where we try to understand some phenomena, data, and events by graphics. People considerate the world is driven by our access to information. So, we collect it on our finances, health, sporting events of interest to us. In fact, we collect it on pretty much anything we can think of. It’s almost to the point where we are overwhelmed by the volume. Some would say it’s not worth much, and they’d be right! We need some means to glean understanding from this excess of information. One way we might do that is through information visualization. Information Visualization is essential reading for researchers and practitioners of information visualization and is of interest to computer scientists and data analysts working on related specialisms. Definition of Information Visualization Information visualization focuses on the development and empirical analysis of methods for presenting abstract information in visual form. The visual display of information allows people to become more easily aware of essential facts, to quickly see regularities and outliers in data, and therefore to develop a deeper understanding of data. Interactive visualization additionally takes advantage of people’s ability to also identify interesting facts when the visual display…

What is Web access Management?
Technology & Science / July 18, 2018

Organizations need proven and efficient ways to successfully implement secure, web-based access to data and systems. Web Access Management (WAM) is a software solution that integrates with your web servers to secure access to your custom and commercial web applications. Integrate common commercial web applications. WAM solutions provided enterprises much needed control to ensure that the appropriate users had access to the right web-based applications. However, with the rise of APIs, mobile and cloud-based applications, WAM solutions are becoming less able to handle modern enterprise business demands. Basic Overview of Web Access Management Web access management (WAM) offers integrated identity and access management for Web-based applications. Initial implementations focused on external user access. However, the growing use of portals for employee access is also driving demand for WAM solutions. Most products offer self-service password reset, delegated administration (including user self-service), a role-based access control model, workflow and automated fulfillment of the access request. Web access management (WAM) is a form of access management that authorizes users for web applications. Web Access Management (WAM) systems are the key to enabling business over the Web while limiting security risks. A WAM system protects and controls access to web applications, records user and administrator…

What is Management Information System (MIS)?
Technology & Science / July 17, 2018

Information system managers typically move up to such a position from other areas of information technology. The Management Information System (MIS) is a concept of the last decade or two. It has been understood and described in a number ways. It is also known as the Information System, the Information and Decision System, the Computer- based information System. MIS is the use of information technology, people, and business processes to record, store and process data to produce information that decision makers can use to make day to day decisions. Management Information Systems (MIS), referred to as Information Management and Systems, is the discipline covering the application of people, technologies, and procedures collectively called information systems, to solving business problems. Basic Overview of MIS MIS is the acronym for Management Information Systems. In a nutshell, MIS is a collection of systems, hardware, procedures and people that all work together to process, store, and produce information that is useful to the organization. “’MIS’ is a planned system of collecting, storing and disseminating data in the form of information needed to carry out the functions of management.” Academically, the term is commonly used to refer to the group of information management methods tied to the…

What is Cache Memory in Computer Architecture?
Technology & Science / July 15, 2018

Processors are generally able to perform operations on operands faster than the access time of large capacity main memory. Though semiconductor memory which can operate at speeds comparable with the operation of the processor exists, it is not economical to provide all the main memory with very high speed semiconductor memory. The most frequently used data or instructions are kept in cache so that it can be accessed at a very fast rate improving overall performance of the computer. There are multiple level of cache with last level being largest and slowest to the first level being fastest and smallest. Basic Description about Cache memory Cache memory is a small-sized type of volatile computer memory that provides high-speed data access to a processor and stores frequently used computer programs, applications and data. It is the fastest memory in a computer, and is typically integrated onto the motherboard and directly embedded in the processor or main random access memory (RAM). Cache memories are small fast memories used to temporarily hold the contents of portions of main memory that are (believed to be) likely to be used. The idea of cache memories is similar to virtual memory in that some active portion…

Insert math as
Block
Inline
Additional settings
Formula color
Text color
#333333
Type math using LaTeX
Preview
\({}\)
Nothing to preview
Insert