Techniques Articles

Found 28 articles

Techniques to find similarities in recommendation system

Mithilesh Pradhan
Mithilesh Pradhan
Updated on 26-Sep-2023 499 Views

Introduction Similarity metrics are crucial in Recommendation Systems to find users with similar behavior, pattern, or taste. Nowadays Recommendation systems are found in lots of useful applications such as Movie Recommendations as in Netflix, Product Recommendations as in Ecommerce, Amazon, etc. Organizations use preference matrices to capture use behavioral and feedback data on products on specific attributes. They also capture the sequence and trend of users purchasing products and users with similar behavior are captured in the process. In this article, let's understand in brief the idea behind a recommendation system and explore the similar techniques and measures involved in ...

Read More

Difference Between AES and RC4

Md. Sajid
Md. Sajid
Updated on 16-Aug-2023 1K+ Views

The cryptographic algorithms AES (Advanced Encryption Standard) and RC4 (Rivest Cipher 4) are both used for encryption; however, they differ significantly in terms of security, usage, and design. Read this article to find out more about AES and RC4 and how they are different from each other. What is AES? AES (Advanced Encryption Standard) is a popular symmetric block cipher encryption algorithm for protecting sensitive data. It was chosen in 2001 by the United States National Institute of Standards and Technology (NIST) to replace the outdated Data Encryption Standard (DES) as the new encryption standard. Key Features of AES ...

Read More

Difference Between UTF-8 and UTF-16

Md. Sajid
Md. Sajid
Updated on 02-Aug-2023 9K+ Views

The encoding techniques UTF-8 and UTF-16 are both used to represent characters from the Unicode character set. They are commonly used to manage text in many scripts and languages in computer systems and programming languages. Read this article to find out more about UTF-8 and UTF-16 and how they are different from each other. What is UTF-8? UTF-8 (Unicode Transformation Format-8) is a character encoding system with varying lengths that is extensively used to represent Unicode characters. It has been developed to be ASCII (American Standard Code for Information Interchange) compatible while also supporting the whole Unicode character set. ...

Read More

Difference Between Optical Zoom and Digital Zoom

Md. Sajid
Md. Sajid
Updated on 02-Aug-2023 522 Views

Optical zoom and digital zoom are two separate methods for magnification and bringing distant subjects closer in photography and filming. While they both make the subject of the image appear larger, the underlying methods and quality of the zoom differ significantly. Optical zoom is a true zoom method that magnifies the image using the camera's lens. Digital zoom is a software-based technique that enlarges the core region of an image or video. Read this article to find out more about Optical Zoom and Digital Zoom and how they are different from each other. What is Optical Zoom? Optical zoom ...

Read More

The Right Cross-Validation Technique for Time Series Dataset

Premansh Sharma
Premansh Sharma
Updated on 24-Jul-2023 717 Views

Introduction Whenever working with time series data, it is critical to employ a cross−validation approach that accounts for the data's temporal ordering. This is because time series data displays autocorrelation, which means that the values of the data points are connected with their prior values. As a result, unlike in many other machine learning applications, the data cannot be deemed independent and identically distributed (iid). The standard k−fold cross−validation technique, which splits the data into k−folds at random and trains the model on k−1 folds before testing it on the remaining fold, is inadequate for time series data. ...

Read More

The Art of Influence: Persuasive Leadership Techniques

Anurag Gummadi
Anurag Gummadi
Updated on 14-Jul-2023 729 Views

Leadership is defined as the act of influencing individuals, groups, and organizations to realize their goals. At its core, persuasive leadership consists of the use of communication strategies to engage others to achieve desired outcomes. Through this approach, leaders can drive progress and foster a shared vision with stakeholders that produce positive effects on an organization’s operations and mission-driven activity. There are a number of factors influencing how effective persuasive leadership may be in different contexts – such as relationships between leaders and followers or specific cultural norms associated with persuasion. By exploring the role of persuasive leadership within organizational ...

Read More

Spotting Intelligence in a Matter of Minutes: Quick Techniques for Identification

Anurag Gummadi
Anurag Gummadi
Updated on 14-Jul-2023 259 Views

First impressions are extremely important. They set the tone for future conversations, meetings, and relationships. A person’s intelligence is one attribute that can be assessed fairly quickly when a first impression is created. Studies have shown that people draw connections between a person's physical attributes and his or her intellectual capabilities only seconds after an initial introduction has been made. People generally consider individuals with certain common intelligent characteristics — good posture, attractive facial features, calming voice tones to be more intelligent than others even though there are other factors besides those mentioned which could contribute to a person's actual ...

Read More

What is Propositional Logic Based Agent?

Sohail Tabrez
Sohail Tabrez
Updated on 13-Jul-2023 4K+ Views

Introduction An agent learns to make decisions by interacting with its surroundings in a type of machine learning known as reinforcement learning. By getting feedback for its activities in the form of incentives or penalties, the agent learns. Robotics, video games, and self-driving cars are just a few examples of the many applications for reinforcement learning. We will thoroughly examine the theories and methods underlying reinforcement learning in this article. Propositional Logic based Agent: A Comprehensive Overview Throughout the last few decades, the field of artificial intelligence (AI) has experienced significant advancement. Scientists and researchers are developing a variety of ...

Read More

Multilevel Association Rule in data mining

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 18-May-2023 21K+ Views

In this article, we will discuss concepts of Multilevel Association Rule mining and its algorithms, applications, and challenges. Data mining is the process of extracting hidden patterns from large data sets. One of the fundamental techniques in data mining is association rule mining. To identify relationships between items in a dataset, Association rule mining is used. These relationships can then be used to make predictions about future occurrences of those items. Multilevel Association Rule mining is an extension of Association Rule mining. Multilevel Association Rule mining is a powerful tool that can be used to discover patterns and trends. Association ...

Read More

Multiversion Timestamp Ordering

Mithlesh Upadhyay
Mithlesh Upadhyay
Updated on 17-May-2023 2K+ Views

Multiversion Timestamp Ordering (MVTO) is a popular concurrency control technique used in database management systems (DBMSs). MVTO allows multiple versions of a data item to coexist at the same time, providing high concurrency and data consistency while preventing conflicts and deadlocks. In this article, we will discuss the definition and components of MVTO, as well as how it works. Multiversion Timestamp Ordering (MVTO) In MVTO, each version of the data item has a unique timestamp associated with it. Transactions that access the data item are assigned timestamps as well. There are three components of MVTO: timestamps, versions, and ordering − ...

Read More
Showing 1–10 of 28 articles
« Prev 1 2 3 Next »
Advertisements