Programming Articles

Page 1909 of 2547

Golang program to get keys from a hash collection

Akhil Sharma
Akhil Sharma
Updated on 27-Mar-2023 746 Views

A hash collection is a data structure that contains key-value pairs in Go and enables quick lookups, additions, and deletions. The value that corresponds to the key can be accessed by hashing the key into an index. Hash collections in the form of maps have built-in support in Go. Here, a map is a reference type that is declared by using the map keyword, followed by the key type and value type in the format. In tis example, we will use two methods to get keys from a hash collection, in the first example we will use append method to ...

Read More

Golang program to add items into the hash collection

Akhil Sharma
Akhil Sharma
Updated on 27-Mar-2023 325 Views

In Golang, we can use a simple indexing method and slicing method to add items to the hash collections. A hash function is used for retrieving and storing the data. In this article are going to see two different examples where we are going to use the above-mentioned methods to add items to a hash collection in go programming language. Syntax func make ([] type, size, capacity) The make function in go language is used to create an array/map it accepts the type of variable to be created, its size and capacity as arguments. Algorithm Import the required ...

Read More

How to Use cd Command in Bash Scripts

Satish Kumar
Satish Kumar
Updated on 24-Mar-2023 17K+ Views

The cd command is one of most fundamental commands in Bash shell. It is used to change current working directory to a specified location. This command is particularly useful when navigating through file system, especially in situations where you need to access files or directories in a different location. In this article, we will explore how to use cd command in Bash scripts. What is cd Command? Before diving into usage of cd command, it is important to understand what it does. cd command is a built-in command in Bash that is used to change current working directory. When you ...

Read More

What is the difference between a weak reference and an unowned reference?

Nitin Aggarwal
Nitin Aggarwal
Updated on 24-Mar-2023 5K+ Views

Understanding iOS memory management is essential for iOS and macOS development. The concept of weak self and unowned self is challenging to understand, especially for beginners. ARC (Automatic Reference Counting) may have solved many problems for us. Swift still requires that you manage references a lot of the time when you are not working with value types. ARC or Automatic Reference Counting Automatic Reference Counting (ARC) is used for tracking and managing the app’s memory usage. In most cases, this means that memory management “just works” in Swift, and you don’t need to think about memory management yourself. ARC automatically ...

Read More

Non-Negative Matrix Factorization

Mithilesh Pradhan
Mithilesh Pradhan
Updated on 23-Mar-2023 674 Views

Introduction Non-Negative Matrix Factorization (NMF) is a supervised algorithm used to represent data into lower dimensions which reduces the number of features while preserving enough basic information to construct the original matrix from the reduced feature space. In this article, we will be going explore more about NMF and how it can be useful. Non-Negative Matrix Factorization NMF is used to reduce the dimensions of the input matrix or corpus. It uses factor analysis which gives less importance to less relevant words. The decomposition of the original matrix(which is a non-negative matrix) thus creates a product of two non-negative coefficients ...

Read More

Implementation of Particle Swarm Optimization

Mithilesh Pradhan
Mithilesh Pradhan
Updated on 23-Mar-2023 937 Views

Introduction The Particle Swarm Optimization algorithm is inspired by nature and is based on the social behavior of birds in a flock or the behavior of fish and is a population-based algorithm for search. It is a simulation to discover the pattern in which birds fly and their formations and grouping during flying activity. Particle Swarm Optimization Algorithm In the PSO Algorithm, each individual is considered to be a particle in some high-dimensional search space. Inspired by the social and psychological behavior of people, which they tend to copy from other people's success, similar changes are made to the particles ...

Read More

How to Become an RPA Developer?

Mithilesh Pradhan
Mithilesh Pradhan
Updated on 23-Mar-2023 538 Views

Introduction RPA stands for Robotic Process Automation. An RPA developer is a person who designs, maintains, builds, and implements RPA systems. In an organization, an RPA developer has the role to create optimized workflow processes and work cross-functionally with operations and business analysts. Scope of an RPA Developer Today the world is moving towards automation where organizations maximum repetitive processes to be automated as much as possible. Thus the demand for highly skilled RPA professionals has gained pace. With the right skill set, RPA developers can fill the in the respective domains. An RPA developer is essentially a software developer ...

Read More

Exploratory Data Analysis (EDA) - Types and Tools

Mithilesh Pradhan
Mithilesh Pradhan
Updated on 23-Mar-2023 4K+ Views

Introduction Exploratory Data Analysis (EDA) is the process of summarization of a dataset by analyzing it. It is used to investigate a dataset and lay down its characteristics. EDA is a fundamental process in many Data Science or Analysis tasks. Different types of Exploratory Data Analysis There are broadly two categories of EDA Univariate Exploratory Data Analysis – In Univariate Data Analysis we use one variable or feature to determine the characteristics of the dataset. We derive the relationships and distribution of data concerning only one feature or variable. In this category, we have the liberty to use either ...

Read More

Document Retrieval using Boolean Model and Vector Space Model

Mithilesh Pradhan
Mithilesh Pradhan
Updated on 23-Mar-2023 8K+ Views

Introduction Document Retrieval in Machine Learning is part of a larger aspect known as Information Retrieval, where a given query by the user, the system tries to find relevant documents to the search query as well as rank them in order of relevance or match. They are different ways of Document retrieval, two popular ones are − Boolean Model Vector Space Model Let us have a brief understanding of each of the above methods. Boolean Model It is a set-based retrieval model.The user query is in boolean form. Queries are joined using AND, OR, NOT, etc. A document ...

Read More

DeepWalk Algorithm

Mithilesh Pradhan
Mithilesh Pradhan
Updated on 23-Mar-2023 744 Views

Introduction The graph is a very useful data structure that can represent co-interactions. These co-interactions can be encoded by neural networks as embeddings to be used in different ML Algorithms. This is where the DeepWalk algorithm shines. In this article, we are going to explore the DeepWalk algorithm with a Word2Vec example. Let us learn more about Graph Networks on which the core of this algorithm is based. The Graph If we consider a particular ecosystem, a graph generally represents the interaction between two or more entities. A Graph Network has two objects – node or vertex and edge. ...

Read More
Showing 19081–19090 of 25,466 articles
Advertisements