- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 36 Articles for Techniques
50 Views
What is DP? Data processing is a technique in which raw data is converted into useful information that organizations can use to run their business successfully. The team of data scientists is responsible for data processing. Raw data is provided to the data scientists and they follow the data processing life cycle to complete the task. DP Lifecycle DP lifecycle consists of six processes and they are discussed below in detail. Collection Data collection is the first step in the data processing life cycle. There are many sources in an organization from where raw data can be collected. Raw data ... Read More
114 Views
Introduction Similarity metrics are crucial in Recommendation Systems to find users with similar behavior, pattern, or taste. Nowadays Recommendation systems are found in lots of useful applications such as Movie Recommendations as in Netflix, Product Recommendations as in Ecommerce, Amazon, etc. Organizations use preference matrices to capture use behavioral and feedback data on products on specific attributes. They also capture the sequence and trend of users purchasing products and users with similar behavior are captured in the process. In this article, let's understand in brief the idea behind a recommendation system and explore the similar techniques and measures involved in ... Read More
270 Views
The cryptographic algorithms AES (Advanced Encryption Standard) and RC4 (Rivest Cipher 4) are both used for encryption; however, they differ significantly in terms of security, usage, and design. Read this article to find out more about AES and RC4 and how they are different from each other. What is AES? AES (Advanced Encryption Standard) is a popular symmetric block cipher encryption algorithm for protecting sensitive data. It was chosen in 2001 by the United States National Institute of Standards and Technology (NIST) to replace the outdated Data Encryption Standard (DES) as the new encryption standard. Key Features of AES ... Read More
1K+ Views
The encoding techniques UTF-8 and UTF-16 are both used to represent characters from the Unicode character set. They are commonly used to manage text in many scripts and languages in computer systems and programming languages. Read this article to find out more about UTF-8 and UTF-16 and how they are different from each other. What is UTF-8? UTF-8 (Unicode Transformation Format-8) is a character encoding system with varying lengths that is extensively used to represent Unicode characters. It has been developed to be ASCII (American Standard Code for Information Interchange) compatible while also supporting the whole Unicode character set. ... Read More
183 Views
Optical zoom and digital zoom are two separate methods for magnification and bringing distant subjects closer in photography and filming. While they both make the subject of the image appear larger, the underlying methods and quality of the zoom differ significantly. Optical zoom is a true zoom method that magnifies the image using the camera's lens. Digital zoom is a software-based technique that enlarges the core region of an image or video. Read this article to find out more about Optical Zoom and Digital Zoom and how they are different from each other. What is Optical Zoom? Optical zoom ... Read More
255 Views
Introduction Whenever working with time series data, it is critical to employ a cross−validation approach that accounts for the data's temporal ordering. This is because time series data displays autocorrelation, which means that the values of the data points are connected with their prior values. As a result, unlike in many other machine learning applications, the data cannot be deemed independent and identically distributed (iid). The standard k−fold cross−validation technique, which splits the data into k−folds at random and trains the model on k−1 folds before testing it on the remaining fold, is inadequate for time series data. ... Read More
4K+ Views
Introduction Two well−liked machine learning techniques, KNN and k−means clustering, are employed for various tasks. Both methods employ the k parameter, but they are applied to distinct problems and work in different ways. During classification and regression problems, KNN is a supervised learning method, whereas k−means clustering is an unsupervised learning approach. We shall examine the main distinctions between KNN and k−means clustering in this article, including the learning style, task, input, distance calculation, output, application, and restrictions of each method. We can select the best algorithm for a task at hand and steer clear of typical ... Read More
350 Views
In an operating system, segmentation is termed a memory management technique where the memory is divided into segments that can be allocated to a process. These segments may not be in fixed length and not stored in a contagious manner. This approach has been developed after the paging process which takes multiple pages for a process to get loaded into main memory, whereas segmentation divided the code into segments as its relative code can be merged to form a single block. The segment table holds all the details relating to the segments and the processes. Generating a logical address which ... Read More
135 Views
Leadership is defined as the act of influencing individuals, groups, and organizations to realize their goals. At its core, persuasive leadership consists of the use of communication strategies to engage others to achieve desired outcomes. Through this approach, leaders can drive progress and foster a shared vision with stakeholders that produce positive effects on an organization’s operations and mission-driven activity. There are a number of factors influencing how effective persuasive leadership may be in different contexts – such as relationships between leaders and followers or specific cultural norms associated with persuasion. By exploring the role of persuasive leadership within organizational ... Read More
44 Views
First impressions are extremely important. They set the tone for future conversations, meetings, and relationships. A person’s intelligence is one attribute that can be assessed fairly quickly when a first impression is created. Studies have shown that people draw connections between a person's physical attributes and his or her intellectual capabilities only seconds after an initial introduction has been made. People generally consider individuals with certain common intelligent characteristics — good posture, attractive facial features, calming voice tones to be more intelligent than others even though there are other factors besides those mentioned which could contribute to a person's actual ... Read More