Credits: Think360 Studios There are many websites, books, and other resources that teach us programming but not all of them tell us that how to learn programming and moreover how to get consistency in this learning period. That’s exactly what, we are going to cover today.   Set Your  Goal : Credits: Northbound Sales Training   First of all, you need a goal, for what you want to learn programming otherwise if you will start learning t...

1 Comment Shubham Yadav Read More

Android is leading the smartphone market as a champion with the leadership rate of 84 %, over 3.3 billion smartphones are running on the Android operating system because of it’s efficiency and performance.   Android : It is an open source operating system which is made on Linux-kernel. Today Android is featured in almost 70% of smart electronics globally but the major sector that has hooked with this operating system is the smartpho...

1 Comment Shubham Yadav Read More

Decision Tree:Overview in different kinds of supervised data mining techniques the Decision Tree are one of the most popular classification and prediction technique. basically the training data samples are organized in form of tree data structure. where the nodes of tree shows the attributes of the data set and edges can be used for demonstrating the values of these attributes. additionally the leaf node of the tree contains the decisions of t...

19 Comments munishmishra04_3od47tgp Read More
What is Deep Learning

Machine-learning technology powers many aspects of modern society: from web searches to content filtering on social networks to recommendations on e-commerce websites, and it is increasingly present in consumer products such as cameras and smartphones. Machine-learning systems are used to identify objects in images, transcribe speech into text, match news items, posts or products with users’ interests, and select relevant results of ...

Introduction of Cyber Security
Technology & Science , Web Security / December 5, 2017

The term cyber security is often used interchangeably with the term information security. Cyber security is the activity of protecting information and information systems (networks, computers, data bases, data centres and applications) with appropriate procedural and technological security measures. Cyber security has become a matter of global interest and importance. Cyber security refers to a set of techniques used to protect the i...

Cloud Storage and Data De-Duplication

Rendering efficient storage and security for data is very important for cloud. With the rapidly increasing data produced worldwide, networked and multi-user storage systems are becoming very popular. However, concerns over data security still prevent many users from migrating data to remote storage. Data deduplication refers to a technique for eliminating redundant data in a data set. In the process of deduplication, extra copies of ...

Top 5 Haunted Places in MP, India
Culture , Travel and Destinations / December 3, 2017

The term ‘haunting’ is generally applied to cases involving recurrent phenomena, of a supposedly paranormal nature, that are associated with particular places. Madhya Pradesh is known for its Hindu and Jain temples at Khajuraho, which are renowned for their carvings of erotic scenes, most prominently Kandariya Mahadeva, a temple with more than 800 sculptures. The eastern Bandhavgarh and Kanha national parks, noted Bengal tiger sanctu...

The Place of Hinduism Faith : Omkareshwar
Culture , Food , History , Travel and Destinations / November 30, 2017

Sometimes, beliefs in our land are based on a seamless meld of epics, legends and reality. The tales that wreath Omkareshwar in haloes of worship have their origins in such lore. Omkareshwar Jyotirlinga a shiv temple on Omkar Mountain an island in mid Narmada, revered Hindu temple is the center of extreme faith. There are 12 jyotirlinga temples in world and Omkareshwar is one of them. Omkareshwar : Inroduction Omkareshwar is consider...

What is ACO (Ant Colony Optimization) Algorithm

There are even increasing efforts in searching and developing algorithms that can find solutions to combinatorial optimization problems. In this way, the Ant Colony Optimization Meta-heuristic takes inspiration from biology and proposes different versions of still more efficient algorithms. Ant Colony Optimization (ACO): Overview Ant Colony Optimization (ACO) is a paradigm for designing metaheuristic algorithms for combinatorial opti...

Random Forests in Data Mining

Data analysis and machine learning have become an integrative part of the modern scientific methodology, offering automated procedures for the prediction of a phenomenon based on past observations, unraveling underlying patterns in data and providing insights about the problem. Since always, artificial intelligence has been driven by the ambition to understand and uncover complex relations in data. That is, to find models that can no...

Evaluation of Image Edges using Gabor Filter
Image Processing , Technology & Science / November 27, 2017

In the field of image processing, filters play an extremely important role. All image processing operations can be viewed as applying a series of filters to an image and transforming it in some way. Gabor filter is a particular type of filter, and it happens to be an important one. Gabor filter responses are widely and successfully used as general purpose features in many computer vision tasks, such as in texture segmentation, face d...

Introduction of Canny Edge Detection
Image Processing , Technology & Science / November 26, 2017

The early stages of vision processing identify features in images that are relevant to estimating the structure and properties of objects in a scene. Edges are one such feature. Edges are significant local changes in the image and are important features for analyzing images. Edges typically occur on the boundary between two different regions in an image. Edge detection is frequently the first step in recovering information from image...

Local Binary Pattern For Image Texture Analysis
Image Processing , Technology & Science / November 25, 2017

Nowadays, applications in the field of surveillance, banking and multimedia equipment are becoming more important, but since each application related to face analysis demands different requirements on the analysis process, almost all algorithms and approaches for face analysis are application dependent and a standardization or generalization is quite difficult. Local Binary Patterns (LBP) is a non-parametric descriptor whose aim is t...

Insert math as
Additional settings
Formula color
Text color
Type math using LaTeX
Nothing to preview