Decision Tree:Overview in different kinds of supervised data mining techniques the Decision Tree are one of the most popular classification and prediction technique. basically the training data samples are organized in form of tree data structure. where the nodes of tree shows the attributes of the data set and edges can be used for demonstrating the values of these attributes. additionally the leaf node of the tree contains the decisions of t...

16 Comments munishmishra04_3od47tgp Read More
Top Religious places in Madhyapradesh (MP)
Technology & Science / June 24, 2018

There’s always a time in our life when we look for a vacation to seek blessings of God, console our depressed souls and find the strength to face all the challenges. And trust me this once in a lifetime experience can be rejuvenating and it may change the course of your life. So, If you’re spiritually inclined and seeking a tour to reconnect with God, and fill your mind with positivity, then Madhya Pradesh is a must visit place for y...

What is Red Green Blue (RGB) Color Model?

Colors are important for human for communicating with the daily encountered objects as well as his species, these colors should be represented formally and numerically within a mathematical formula so it can be projected on device/ computer storage and applications, this mathematical representation is known as color model that can hold the color space, by the means of color’s primary components (Red, Green, and Blue) the computer can...

What is Hue Saturation Value (HSV) color Model?

To utilize color as a visual cue in multimedia, image processing, graphics and computer vision applications, an appropriate method for representing the color signal is needed. The different color specification systems or color models address this need. Color spaces provide a rational method to specify order, manipulate and effectively display the object colors taken into consideration. The purpose of a color model is to facilitate th...

International Yoga Day
Culture , History / June 21, 2018

The richness of a culture is always traced by looking at its longevity and prevalence of its practice in a society and to enrich this culture there is always need to promote and propagate this culture both within the society and to the outside world. In the same way to further enrich the yoga philosophy, there is the need to reach out to those who hitherto remained deprived of this heavenly bliss. The yogis of India have to enrich th...

What is 3D Secure Protocol in Web Security?

E-commerce represents a web-based Internet economy that has risen from zero, to over a trillion dollars worldwide, in just seventeen years. However, the security challenges faced by the world’s largest open (and effectively anonymous) network, have meant that the growth of the Internet – and e-commerce – has been met with an equally rapid growth in the activities of those intent on using the Internet as a vehicle for malicious and cr...

What is different Steganography Technique in Image Steganography?
Computer Graphics , Cyber Security / June 19, 2018

Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the normal. The word steganography comes from the Greek Steganos, which mean covered or secret and –graphy mean writing or drawing. Therefore, steganography means, literally, covered writing Over the past few years, numerous steganography techniques that embed hidden messages in multimedia objects have been ...

Happy Father’s Day
Culture , History / June 17, 2018

Fathers, do not provoke or irritate or fret your children [do not be hard on them or harass them], lest they become discouraged and sullen and morose and feel inferior and frustrated. Do not break their spirit. One of the greatest gifts a father can give his child is time! Time spent playing, reading, talking, laughing. Children crave that attention and become downcast when it doesn’t happen. Father’s Day is celebrated worldwide to r...

What are Cryptocurrencies in Digital World?
Technology & Science / June 16, 2018

Cryptocurrencies have increasingly become all the rage in digital currency market. Although blockchain’s decentralise and unregulated platform has resulted in the creation of hundreds of new cryptocurrencies, this has also led to the digital currency market becoming somewhat unstable. Over the past couple of years, popular cryptocurrencies such as Bitcoin, Ethereum, Monero, and ZCash, among others saw massive fluctuations in their va...

What is Classless Inter-Domain Routing (CIDR) in Networking?
Networking , Technology & Science / June 14, 2018

Understanding networking is a fundamental part of configuring complex environments on the internet. This has implications when trying to communicate between servers efficiently, developing secure network policies, and keeping your nodes organized. CIDR (Classless Inter-Domain Routing) was introduced in 1993 replacing the previous generation of IP address syntax – classful networks. CIDR allowed for more efficient use of IPv4 address ...

What is Proxy Server, advantage & disadvantage in Networking?
Networking , Technology & Science / June 12, 2018

A computer can act on the behalf of other computers to request content from the Internet or an intranet. Proxy Server is placed between a user’s machine and the Internet. It can act as a firewall to provide protection and as a cache area to speed up Web page display. It is a computer that sits between a client computer and the Internet, and provides indirect network services to a client. It may reside on the user’s local ...

Insert math as
Block
Inline
Additional settings
Formula color
Text color
#333333
Type math using LaTeX
Preview
\({}\)
Nothing to preview
Insert