Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Server Side Programming Articles
Page 1575 of 2109
Deep Neural Net with forward and Back Propagation
Introduction Artificial intelligence and machine learning have experienced a transformation since to Deep Neural Networks (DNN), which have empowered exceptional progressions over a assortment of areas. In this article, we'll look at the thoughts of forward and backward propagation and how they relate to the advancement and advancement of advanced neural systems. Python librariеs likе TеnsorFlow havе incredibly streamlined thе execution of thе systеms, making thеm morе opеn to analysts and professionals. Approach 1 : Tensorflow In this approach, we utilize the control of the TensorFlow library to execute a profound neural arrange with forward and backpropagation. ...
Read MoreThe Optimal Number of Epochs to Train a Neural Network in Keras
Introduction Training a neural network includes finding the proper adjustment between under fitting and overfitting. In this article, we'll learn the epochs’s concept and dive into deciding the epoch’s number, a well−known deep−learning library. By understanding the trade−off between underfitting and overfitting, utilizing methods like early ceasing and cross−validation, and considering learning curves, we are able successfully to decide the perfect number of epochs. Understanding Epochs An epoch alludes to one total pass of the whole preparing dataset through a neural network. Amid each epoch, the network learns from the training information and updates its internal parameters, such as ...
Read MoreUsing Interquartile Range to Detect Outliers in Data
Introduction Data analysis plays a significant part in different areas, counting commerce, back, healthcare, and investigation. One common challenge in data analysis is the nearness of outliers, which are data focuses that essentially deviate from the overall design of the data. These outliers can distort statistical measures and influence the exactness of our examination. Hence, it gets to be imperative to distinguish and handle outliers appropriately. In this article, the user will understand the concept of IQR and its application in identifying outliers in data. Python Program to Detect Outliers Algorithm Step 1 :Calculate the mean and deviation of the ...
Read MoreVisual representations of Outputs/Activations of each CNN layer
Introduction Convolutional neural networks offer remarkable insight into mimicking human−like visual processing through their sophisticated multi−layer architectures. This article has taken you on a creative journey through each layer's function and provided visual representations of their outputs or activations along the way. As researchers continue to unlock even deeper levels of understanding within CNNs, we move closer toward unraveling the mysteries behind complex intelligence exhibited by these futuristic machines. In this article, we embark on a fascinating journey through the layers of CNNs to unravel how these remarkable machines work. Visual representation of Outputs The Input Layer − Where ...
Read MorePerceptron Algorithm for NOT Logic Gate
Introduction Within the domain of artificial intelligence and machine learning, the Perceptron Algorithm holds a special put as one of the foundational building blocks. Although it could seem basic in comparison to present−day complex neural networks, understanding the Perceptron Algorithm is basic because it shapes the premise for many modern learning techniques. In this article, we are going to investigate the Perceptron Algorithm with a center on its application to the NOT logic gate. We are going to dig into the hypothesis behind the algorithm, its components, and how it can be used to implement the logical NOT operation. ...
Read MorePerceptron Algorithm for NAND Logic Gate with 2-bit Binary Input
Introduction Within the domain of Artificial Intelligence and Machine Learning, one of the foremost basic components is the Artificial Neural Network (ANN). ANNs are motivated by the human brain's neural systems and are designed to imitate the way neurons prepare data. At the center of an ANN lies the perceptron, an essential building square that serves as a basic numerical model of a neuron. In this article, we'll investigate the Perceptron NAND Logic Gate with 2−bit Binary Input, and basic however fundamental concept within the world of ANNs. Understanding the Perceptron The perceptron, proposed by Frank Rosenblatt in 1957, could ...
Read MoreMaximum sum of lengths of a pair of strings with no common characters from a given array
The aim of this article is to implement a program to maximize the sum of lengths of a pair of strings with no common characters from a given array. By definition, a string is a collection of characters. Problem Statement Implement a program to maximize the sum of lengths of a pair of strings with no common characters from a given array. Sample Example 1 Let us consider the Input array: a[] = [“efgh”, “hat”, “fto”, “car”, “wxyz”, “fan”] Output obtained: 8 Explanation There are no characters in the strings "abcd" and "wxyz" in common. As a ...
Read MoreThe camel case character present in a given string
The aim of this article is to implement a program to print the number of camel case character present in a given string. As you all know, a string is a collection of characters. Now let us see what camel case letters are. Programming languages like Java utilise a naming style called camel case. That is, It includes entering multi-word identities without spaces or underscores, having the initial word in lowercase with successive words in uppercase. Code written in this manner is easier to read and understand. The inner uppercase letters, which resemble camel humps, are what give the name ...
Read MoreProgram to perform a letter frequency attack on a monoalphabetic substitution cipher
The challenge is to display the top five probable plain texts which could be decrypted from the supplied monoalphabetic cypher utilizing the letter frequency attack from a string Str with size K representing the given monoalphabetic cypher. Let us see what exactly is frequency attack. The very foundation for frequency analysis is the certainty that specific letters and letter combinations appear with varied frequencies all through any given section of written language. Additionally, matter-of-factly every sample of that language shares a common pattern in the distribution of letters. To make it more clear, The English alphabet has 26 letters, ...
Read MoreMaximum possible balanced binary substring splits with at most cost k
The array in the C programming language has a fixed size, which means that once the size is specified, it cannot be changed; you can neither shrink it or extend it. As we know, an array is a group of identically data-typed elements kept in consecutive memory regions. Given an array of values v[] and a binary array a[]. The objective is to use as many k coins to divide the binary array as much as is possible while ensuring that each segment has an equal amount of 0s and 1s. i and j are the neighboring indices of the ...
Read More