## How to learn Programming?

Credits: Think360 Studios There are many websites, books, and other resources that teach us programming but not all of them tell us that how to learn programming and moreover how to get consistency in this learning period. That’s exactly what, we are going to cover today.   Set Your  Goal : Credits: Northbound Sales Training   First of all, you need a goal, for what you want to learn programming otherwise if you will start learning t...

## Android : The Flexible Operating System

Android is leading the smartphone market as a champion with the leadership rate of 84 %, over 3.3 billion smartphones are running on the Android operating system because of it’s efficiency and performance.   Android : It is an open source operating system which is made on Linux-kernel. Today Android is featured in almost 70% of smart electronics globally but the major sector that has hooked with this operating system is the smartpho...

## Introduction of Decision Trees

Decision Tree:Overview in different kinds of supervised data mining techniques the Decision Tree are one of the most popular classification and prediction technique. basically the training data samples are organized in form of tree data structure. where the nodes of tree shows the attributes of the data set and edges can be used for demonstrating the values of these attributes. additionally the leaf node of the tree contains the decisions of t...

What is Intrusion Detection System (IDS)
/ October 24, 2017

Internet is a global public network. With the growth of the Internet and its potential, there has been subsequent change in business model of organizations across the world. More and more people are getting connected to the Internet every day to take advantage of the new business model popularly known as e-Business. Internetwork connectivity has therefore become very critical aspect of today’s e-business. “Intrusion is an unaut...

Wireless Network Routing Protocol
/ October 23, 2017

Due to the severe energy constraints of large number of densely deployed sensor nodes, it requires a suite of network protocols to implement various network control and management functions such as synchronization, node localization, and network security. A routing protocol is a set of rules used by routers to determine the most appropriate paths into which they should forward packets towards their intended destinations. Routing Prot...

Self Organizing Map (SOM)
/ October 23, 2017

What is Self Organizing Map (SOM) A neural network is called a mapping network if it is able to compute some functional relationship between its input and its output. For example if the input to a network is the value of an angle and the output is the cosine of that angle, the network perform the mapping θ =cos (θ). For such a simple function, we do not need a Neural Network. However we might want to perform a complicated mapping whe...

Privacy Preserving Data Mining
/ October 22, 2017

Privacy is a matter of individual perception, an infallible and universal solution to this dichotomy is infeasible. The common term of privacy in the general, limits the information that is leaked by the distributed computation to be the information that can be learned from the designated output of the computation. The current state-of-the-art paradigm for privacy-preserving data mining is differential privacy, which allows un-truste...

Virtual Machine Scheduling in Cloud
/ October 20, 2017

Virtualization plays an important role in providing resources to the users efficiently in cloud environment. Virtualization can be done in various ways like server virtualization, memory virtualization, storage virtualization, etc. For efficiently achieving virtualization, virtual machines (VM) are designed. Although virtual machine (VM) migration has been used to avoid conflicts on traditional system resources like CPU and memory, m...

Face Recognition
/ October 18, 2017

Information and Communication Technologies are increasingly entering in all aspects of our life and in all sectors, opening a world of unprecedented scenarios where people interact with electronic devices embedded in environments that are sensitive and responsive to the presence of users. Indeed, since the first examples of “intelligent” buildings featuring computer aided security and fire safety systems, the request for more sophist...

/ October 17, 2017

There has been significant interest and progress in the field of vehicular ad hoc networks over the last several years. VANETs comprise vehicle-to-vehicle and vehicle-to-infrastructure communications based on wireless local area network technologies. vehicular ad hoc networks: Overview The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and efficient movement of traffic. Consequently, year ...

Digital Image Processing
/ October 16, 2017

Digital image processing is concerned primarily with extracting useful information from images. Ideally, this is done by computers, with little or no human intervention. Image processing algorithms may be placed at three levels. At the lowest level are those techniques which deal directly with the raw, possibly noisy pixel values, with de-noising and edge detection being good examples. Digital image processing : Definition Digital im...

What is Cryptography
/ October 13, 2017

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications. ...

Cloud Computing Introduction
/ October 12, 2017

Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the most discussed among all of these is Cloud Computing. Over the last few years, cloud computing paradigm has witnessed an enormous shift towards its adoption and it has become a trend in the information technology space as it promises significant cost reductions and new business potential to its users and providers. This s...

Insert math as
$${}$$