Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Pranay Arora
Page 4 of 4
Java program to extract a single quote enclosed string from a larger string using Regex
Regex or Regular Expression is the language used for pattern-matching and string manipulation. It consists of a sequence of characters that define a search pattern and can be used for performing actions like search, replace, and even validate on text input. A regular expression consists of a series of characters and symbols that amount to form a search pattern. In this article, we are going to see how to write a Java program to extract a single quote-enclosed string from a larger string using Regex. Java provides support for regex from the java.util.regex package. The pattern class represents a compiled ...
Read MoreShow Uniform Discrete Distribution in Statistics using Python
In the field of statistics, there is a major role played by probability distributions in modeling and analyzing various random phenomena. Uniform Discrete Distribution is one of them. It is particularly used when dealing with discrete random variables which have equally likely outcomes. Ahead in this article, we will explore Uniform Discrete Distribution in the light of Python programming, using the scipy.stats.randint() function. Scipy is a powerful python library for scientific analysis and calculations. The stats module provides tools for statistical analysis including probability distributions. The randint() function in the scipy.stats module represents the uniform discrete variable, which inherits its ...
Read MoreShow Tukey-Lambda Distribution in Statistics using Python
Introduction Statisticians skillfully mesh probability distributions with relevant data sources, thereby lending (or disavowing) plausibility to wide-ranging, though pertinent, hypotheses regarding variable complexities within those databases. In this realm, the Tukey Lambada distribution distinguishes itself via distinct features. With its versatility, the Tukey distribution efficiently models diverse datasets showcasing varied shapes, tails, and degrees of asymmetry. As we dive into Python implementation, it's crucial to understand the Tukey-Lambda distribution's fundamental traits first. Understanding the Tukey-Lambda Distribution In 1960s, John W. Tukey developed the Tukey-Lambda distribution – a statistical constant probability distribution. Flexible enough to accommodate multiple shape variances, this distribution ...
Read MoreCleaning Data with Apache Spark in Python
In today's time, when we have high volume and velocities of data flowing, Apache Spark, an open source big data processing framework, is a common choice as it allows parallel and distributed processing of data. Cleaning of such data is an important step and Apache Spark provides us with a variety of tools and methods for the cleaning of data. In this method, we are going to be seeing how to clean data with Apache Spark in Python and the steps to do so are as follows: Loading the data into a Spark DataFrame − The SparkSession.read method allows ...
Read MoreJava Program to Demonstrate How User Authentication is Done
Authentication refers to the process of verifying the identity of an individual to make sure the user is exactly who they are claiming to be before giving access to a system. It is very important to authenticate a user to ensure the security as well as integrity of the system. Over the course of time, authentication has developed into much more advanced and secure methods. The methods of authentication now range from credentials like user id, password and OTP to finger print scan, face ID scan and much more. Authentication ensures that no sensitive resources are being shared with unauthorised ...
Read MoreJava Program to Encode a Message Using Playfair Cipher
Encrypting is the task of transforming information into an unreadable format or cipher text. It is usually done to protect the confidentiality of information. There are many ways and algorithms to encrypt data. One such example is the Playfair cipher algorithm. In this article, we are going to see how to write a Java program to encode a message using Playfair cipher. Playfair cipher makes use of a 5X5 grid or matrix and a set of pre-defined rules. To encrypt, we require a key and the plain text to be encrypted. Steps Now let us see the steps to encrypt ...
Read More