Crawl a Web Page and Get Most Frequent Words in Python

Samual Sam
Updated on 30-Jul-2019 22:30:23

497 Views

Our task is to crawl a web page and count the frequency of the word. And ultimately retrieving most frequent words. First we are using request and beautiful soup module and with the help of these module creating web-crawler and extract data from web page and store in a list. Example code import requests from bs4 import BeautifulSoup import operator from collections import Counter def my_start(url): my_wordlist = [] my_source_code = requests.get(url).text my_soup = BeautifulSoup(my_source_code, 'html.parser') for each_text in my_soup.findAll('div', {'class':'entry-content'}): ... Read More

Instruction Type INR R in 8085 Microprocessor

Samual Sam
Updated on 30-Jul-2019 22:30:23

10K+ Views

In 8085 Instruction set, INR is a mnemonic that stands for ‘INcRement’ and ‘R’ stands for any of the following registers or memory location M pointed by HL pair. R = A, B, C, D, E, H, L, or M This instruction is used to add 1 with the contents of R. So the previous value in R will get increased by amount 1 only. The result of increment will be stored in R updating its previous content. All flags, except Cy flag, are affected depending on the result thus produced. In different assembly language core, this instruction ... Read More

Purpose of Access Specifier in C#

Arjun Thakur
Updated on 30-Jul-2019 22:30:23

525 Views

To define the scope and visibility of a class member, use an access specifier. C# supports the following access specifiers. Public Private Protected Internal Protected internal Let us learn about them one by one. Public Access Specifier It allows a class to expose its member variables and member functions to other functions and objects. Private Access Specifier Private access specifier allows a class to hide its member variables and member functions from other functions and objects. Only functions of the same class can access its private members. Protected Access Specifier Protected access specifier allows a child class to ... Read More

Fetching Top News Using News API in Python

Samual Sam
Updated on 30-Jul-2019 22:30:23

716 Views

News API is very famous API for searching and fetching news articles from any web site, using this API anyone can fetch top 10 heading line of news from any web site. But using this API, one thing is required which is the API key. Example Code import requests def Topnews(): # BBC news api my_api_key="Api_number” my_url = = " https://newsapi.org/v1/articles?source=bbc-news&sortBy=top&apiKey=my_api_key" my_open_bbc_page = requests.get(my_url).json() my_article = my_open_bbc_page["articles"] my_results = [] for ar in my_article: ... Read More

Sort HashMap According to Values in Java

Rishi Raj
Updated on 30-Jul-2019 22:30:23

706 Views

As we know that Hash map in Java does not maintain insertion order either by key or by order.Also it does not maintain any other order while adding entries to it. Now in order to sort a hash map according to the values mapped to its corresponding keys we first need to get all values of map considering that hash map has unique values only.Now put all the values in a list and sort this list with the comparator or comparable interface of Java. As we get sorted list of unique values now get corresponding keys from the map and ... Read More

Create a Sorted Merged List of Two Unsorted Lists in Python

karthikeya Boyini
Updated on 30-Jul-2019 22:30:23

627 Views

Here two user input list is given, the elements of two lists are unsorted. Our task is to merged these two unsorted array and after that sort the list. Example Input: A [] = {100, 50, 150} B [] = {200, 30, 20} Output: Merge List:{20, 30, 50, 100, 150, 200} Algorithm Step 1: first we create two user input list. Step 2: Final merge list size is (size of the first list + the size of the second list). Step 3: then sort two list using sort() method. Step ... Read More

Python Program to Cyclic Redundancy Check

Samual Sam
Updated on 30-Jul-2019 22:30:23

7K+ Views

For detecting errors in digital data CRC is used, this is a good technique in detecting the transmission errors. In this technique mainly binary division is applied. In these technique, cyclic redundancy check bits are present which is a sequence of redundant bits, these bits are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second which is predetermined binary number. At the destination side, the incoming data is divided by the same number, if there is no remainder then assumed that data is correct and it’s ready to accept. A ... Read More

Find Factorial of a Number Using Dynamic Programming in C++

Ankith Reddy
Updated on 30-Jul-2019 22:30:23

6K+ Views

The factorial of a positive integer n is equal to 1*2*3*...n. Factorial of a negative number does not exist. Here a C++ program is given to find out the factorial of a given input using dynamic programming.AlgorithmBegin    fact(int n):       Read the number n       Initialize       i = 1, result[1000] = {0}       result[0] = 1       for i = 1 to n          result[i] = I * result[i-1]    Print result EndExample Code#include using namespace std; int result[1000] = {0}; int fact(int n) {    if (n >= 0) {       result[0] = 1;       for (int i = 1; i

C++11 Features in Visual Studio 2015

George John
Updated on 30-Jul-2019 22:30:23

383 Views

C++11 is a version of standard C++ language. It was approved by International Organization for Standardization (ISO) on 12 August 2011 then C++14 and C++17. C++11 makes several additions to the core language. Visual C++ implements the vast majority of features in C++11. Some of the following C++11 features in Visual Studio 2015 − nullptr − In the previous nullptr, zero used to be the value and it had a drawback ofimplicit conversion to integral value. The null pointer literal is represented by std::nullptr_t. In this nullptr, no implicit conversion exists. Lambdas − The lambda expression allows to ... Read More

Instruction Type ADC R in 8085 Microprocessor

karthikeya Boyini
Updated on 30-Jul-2019 22:30:23

7K+ Views

In 8085 assembly language coding, sometimes there is a requirement to add two numbers and where each of these numbers are having several Bytes in size. As example, let us add the following two 16-bit numbers. 1 10 50H A0 F1H ------ B1 01H In this example, the addition of 50H and F1H results in a sum of 01H with a carry of 1. Now, we are supposed to add 10H and A0H along with this carry of 1. To carry out ... Read More

Advertisements