Credits: Think360 Studios There are many websites, books, and other resources that teach us programming but not all of them tell us that how to learn programming and moreover how to get consistency in this learning period. That’s exactly what, we are going to cover today.   Set Your  Goal : Credits: Northbound Sales Training   First of all, you need a goal, for what you want to learn programming otherwise if you will start learning t...

1 Comment Shubham Yadav Read More

Android is leading the smartphone market as a champion with the leadership rate of 84 %, over 3.3 billion smartphones are running on the Android operating system because of its efficiency and performance.   Android : It is an open source operating system which is made on Linux-kernel. Today Android is featured in almost 70% of smart electronics globally but the primary sector that has hooked with this operating system is the smartphone ma...

1 Comment Shubham Yadav Read More

Decision Tree:Overview in different kinds of supervised data mining techniques the Decision Tree are one of the most popular classification and prediction technique. basically the training data samples are organized in form of tree data structure. where the nodes of tree shows the attributes of the data set and edges can be used for demonstrating the values of these attributes. additionally the leaf node of the tree contains the decisions of t...

18 Comments munishmishra04_3od47tgp Read More
Heart of India Madhya Pradesh (MP)
Culture , Food , History , Travel and Destinations / October 25, 2017

Introduction: Madhya Pradesh (MP) India is a country located in southern Asia. India is the most populous democracy in the world. It is a federal constitutional republic governed under a parliamentary system consisting of 29 states and 7 union territories [1]. Among them Madhya Pradesh (MP) located in the heart of India. Madhya Pradesh has everything. From ancient forests with wildlife, many imposing forts and palaces, numerous templ...

What is Intrusion Detection System (IDS)

Internet is a global public network. With the growth of the Internet and its potential, there has been subsequent change in business model of organizations across the world. More and more people are getting connected to the Internet every day to take advantage of the new business model popularly known as e-Business. Internetwork connectivity has therefore become very critical aspect of today’s e-business. “Intrusion is an unaut...

Wireless Network Routing Protocol
Networking , Technology & Science / October 23, 2017

Due to the severe energy constraints of large number of densely deployed sensor nodes, it requires a suite of network protocols to implement various network control and management functions such as synchronization, node localization, and network security. A routing protocol is a set of rules used by routers to determine the most appropriate paths into which they should forward packets towards their intended destinations. Routing Prot...

Self Organizing Map (SOM)

What is Self Organizing Map (SOM) A neural network is called a mapping network if it is able to compute some functional relationship between its input and its output. For example if the input to a network is the value of an angle and the output is the cosine of that angle, the network perform the mapping θ =cos (θ). For such a simple function, we do not need a Neural Network. However we might want to perform a complicated mapping whe...

Privacy Preserving Data Mining

Privacy is a matter of individual perception, an infallible and universal solution to this dichotomy is infeasible. The common term of privacy in the general, limits the information that is leaked by the distributed computation to be the information that can be learned from the designated output of the computation. The current state-of-the-art paradigm for privacy-preserving data mining is differential privacy, which allows un-truste...

Virtual Machine Scheduling in Cloud

Virtualization plays an important role in providing resources to the users efficiently in cloud environment. Virtualization can be done in various ways like server virtualization, memory virtualization, storage virtualization, etc. For efficiently achieving virtualization, virtual machines (VM) are designed. Although virtual machine (VM) migration has been used to avoid conflicts on traditional system resources like CPU and memory, m...

Face Recognition

Information and Communication Technologies are increasingly entering in all aspects of our life and in all sectors, opening a world of unprecedented scenarios where people interact with electronic devices embedded in environments that are sensitive and responsive to the presence of users. Indeed, since the first examples of “intelligent” buildings featuring computer aided security and fire safety systems, the request for more sophist...

Vehicular Ad-hoc Network (VANET)
Networking , Technology & Science / October 17, 2017

There has been significant interest and progress in the field of vehicular ad hoc networks over the last several years. VANETs comprise vehicle-to-vehicle and vehicle-to-infrastructure communications based on wireless local area network technologies. vehicular ad hoc networks: Overview The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and efficient movement of traffic. Consequently, year ...

Digital Image Processing
Image Processing , Technology & Science / October 16, 2017

Digital image processing is concerned primarily with extracting useful information from images. Ideally, this is done by computers, with little or no human intervention. Image processing algorithms may be placed at three levels. At the lowest level are those techniques which deal directly with the raw, possibly noisy pixel values, with de-noising and edge detection being good examples. Digital image processing : Definition Digital im...

What is Cryptography

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications. ...

Insert math as
Block
Inline
Additional settings
Formula color
Text color
#333333
Type math using LaTeX
Preview
\({}\)
Nothing to preview
Insert