- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Introduction This tutorial delves into active portfolio strategy, a proactive investment approach aimed at outperforming benchmarks. We examine its workings, including research, security selection, active trading, risk management, and performance monitoring. We emphasize the importance of an active portfolio strategy in generating superior returns and aligning investments with individual goals. Key features covered are active security selection, market timing, flexibility, research-driven decisions, risk management, and the potential for outperformance. What is an Active Portfolio Strategy? An investment method known as an active portfolio strategy is one in which portfolio managers actively choose to outperform a given benchmark or market index. ... Read More
In Python, permutation is a process representing a possible order. It plays with the items in a list by periodically changing the possible positions of the commands. In Python, we can use different methods to create and print the configuration. Here we have several ways to find the permutation of a string. Method 1: Using itertools method Example import itertools def Permutation(string): permut = itertools.permutations(string) result = [''.join(p) for p in permut] return result string = "Tutor" print("Original String: ", string) permutations = ... Read More
The Pearson Correlation Test is a simple statistical method in Python that measures the relationship between two parameter variables. It is useful to measure the relationship between two variables graphically, so you can know how strong the relationship is between the variables and whether they are related or not. To find Pearson Correlation we can use pearsonr() function. Its value falls between -1 and 1, with -1 being a perfect negative correlation, 0 representing no relationship, and 1 representing a perfect positive correlation. Syntax This syntax is used in all the following examples. pearsonr(variable1, variable2) Algorithm Step ... Read More
The Pearson Type-3 Distribution is a continuous probability distribution that is widely used in statistics. It has a skewed distribution. Three parameters determined the shape of distribution: location, scale, and shape. Discovering this type of distribution would enable statisticians to analyse their data more effectively and make more precise predictions. We can use pearson3.rvs function to generate random numbers from the distribution, and calculate the pdf (probability density function) at a given point with the help of pearson3.pdf function. Parameters of Pearson type-3 distribution Shape parameter − This parameter determines the spread through the probability density of the distribution. ... Read More
The Pi method or Pi Syntax is used to decorate a function or method in Python, and is known as a decorator. The pie method is used to modify the behaviour of a function or method. Pie Syntax (@) can be used by simply placing the @ symbol and the name of the decorator function above the definition of the function. When the function is invoked, Python is instructed to use the decorator. Pie Syntax (@) has the benefit of allowing for more adaptability in function calls. When working with complicated data structures or when you need to put in ... Read More
The Pendulum Module is used in Python for datetime manipulation and time zone management. Using this module, you can manage date, time, and other related things over time. The Pendulum Module's ability to manage time zones easily is one of its main advantages. It makes it simple to deal with dates and times from all around the world since it can instantly convert between various time zones. The Pendulum Module is a powerful tool for anyone who is dealing with time-sensitive data. You can install this module with following command − pip install pendulum We have some methods in Pendulum ... Read More
The bezier is an inbuilt drawing function in python. It is used to draw curves in python according to given points. The quadratic bezier is a Python function that draws a path through vertices( control points) for a quadratic bezier wind. A quadratic Bezier wind is a parametric wind that defines a path in 2- dimensional space. This wind is linked by a control point with two ending points. In a visualisation programme, you may construct and draw easily using this function. With the use of the time parameter, you may locate two control points and determine their locations. You ... Read More
Introduction A File Transfer Protocol (FTP) server is a network protocol that allows users to transfer files between computers over internet or a local area network (LAN). FTP servers are commonly used in businesses and organizations for file sharing and storage. In this article, we will discuss how to configure an FTP server using Cisco Packet Tracer. Setting up FTP server Before configuring an FTP server, we need to have a server machine and an FTP client machine. In this example, we will be using two virtual machines (VMs) on Cisco Packet Tracer, one acting as FTP server and other ... Read More
Introduction In distributed systems, file service architecture is an essential component that enables users to access and manipulate files remotely. file service architecture enables multiple users to access a shared file system over a network. This article will explore file service architecture in distributed systems, including its design, components, and examples of implementations. Design of File Service Architecture The design of file service architecture is based on a client-server model. client sends a request to server, and server processes request and sends back requested data. client-server model provides a scalable, fault-tolerant, and reliable file service architecture in distributed systems. The ... Read More
In a distributed system, multiple computers work together to provide a cohesive service to users. One of most critical components of a distributed system is ability to access files stored on different computers in network. Different file accessing models have been developed to manage this complexity and ensure efficient and secure file sharing. In this article, we will explore various file accessing models in a distributed system. Centralized File Accessing Model In a centralized file accessing model, all files are stored on a single server or node, and users access these files through server. This model is simple to implement ... Read More