title
stringlengths
3
221
text
stringlengths
17
477k
parsed
listlengths
0
3.17k
What is the difference between UNIX TIMESTAMPS and MySQL TIMESTAMPS?
In MySQL, UNIX TIMESTAMPS are stored as 32-bit integers. On the other hand MySQL TIMESTAMPS are also stored in similar manner but represented in readable YYYY-MM-DD HH:MM:SS format. mysql> Select UNIX_TIMESTAMP('2017-09-25 02:05:45') AS 'UNIXTIMESTAMP VALUE'; +---------------------+ | UNIXTIMESTAMP VALUE | +-----------...
[ { "code": null, "e": 1244, "s": 1062, "text": "In MySQL, UNIX TIMESTAMPS are stored as 32-bit integers. On the other hand MySQL TIMESTAMPS are also stored in similar manner but represented in readable YYYY-MM-DD HH:MM:SS format." }, { "code": null, "e": 1466, "s": 1244, "text": "...
How do I display the current date and time in an Android application?
This example demonstrates about How do I display the current date and time in an Android application Step 1 βˆ’ Create a new project in Android Studio, go to File β‡’ New Project and fill all required details to create a new project. Step 2 βˆ’ Add the following code to res/layout/activity_main.xml. <?xml version="1.0" encod...
[ { "code": null, "e": 1163, "s": 1062, "text": "This example demonstrates about How do I display the current date and time in an Android application" }, { "code": null, "e": 1292, "s": 1163, "text": "Step 1 βˆ’ Create a new project in Android Studio, go to File β‡’ New Project and fil...
Kotlin Get Started
The easiest way to get started with Kotlin, is to use an IDE. An IDE (Integrated Development Environment) is used to edit and compile code. In this chapter, we will use IntelliJ (developed by the same people that created Kotlin) which is free to download from https://www.jetbrains.com/idea/download/. Once IntelliJ is d...
[ { "code": null, "e": 62, "s": 0, "text": "The easiest way to get started with Kotlin, is to use an IDE." }, { "code": null, "e": 140, "s": 62, "text": "An IDE (Integrated Development Environment) is used to edit and compile code." }, { "code": null, "e": 302, "s":...
What MySQL COALESCE() function returns if all the arguments provided to it are NULL?
If all the values in MySQL COALESCE() function are NULL then it returns NULL as the output. It means that this function does not find any non-NULL value in the list. mysql> Select COALESCE(NULL, NULL, NULL, NULL); +----------------------------------+ | COALESCE(NULL, NULL, NULL, NULL) | +-------------------------------...
[ { "code": null, "e": 1228, "s": 1062, "text": "If all the values in MySQL COALESCE() function are NULL then it returns NULL as the output. It means that this function does not find any non-NULL value in the list." }, { "code": null, "e": 1486, "s": 1228, "text": "mysql> Select CO...
java.time.LocalDate.atTime() Method Example
The java.time.LocalDate.atTime(OffsetTime time) method combines this date with an offset time to create an OffsetDateTime. Following is the declaration for java.time.LocalDate.atTime(OffsetTime time) method. public OffsetDateTime atTime(OffsetTime time) time βˆ’ the time to combine with, not null. the offset date-time f...
[ { "code": null, "e": 2038, "s": 1915, "text": "The java.time.LocalDate.atTime(OffsetTime time) method combines this date with an offset time to create an OffsetDateTime." }, { "code": null, "e": 2123, "s": 2038, "text": "Following is the declaration for java.time.LocalDate.atTime...
Vim - Using Vim As Ide
We can configure Vim to use it as an IDE. In this section, we will discuss following items Syntax highlighting Smart indentation Bounce Execute shell commands Configuring ctags and csope Auto-completion and auto-suggestion Syntax highlighting is one of the important features of IDE. To enable syntax highlighting use βˆ’ ...
[ { "code": null, "e": 2061, "s": 1970, "text": "We can configure Vim to use it as an IDE. In this section, we will discuss following items" }, { "code": null, "e": 2081, "s": 2061, "text": "Syntax highlighting" }, { "code": null, "e": 2099, "s": 2081, "text": "...
C# | Char.ToString() Method - GeeksforGeeks
01 Feb, 2019 In C#, Char.ToString() is a System.Char struct method which is used to convert the value of this instance to its equivalent string representation. This method can be overloaded by passing different type of arguments to it. Char.ToString(IFormatProvider) MethodChar.ToString(Char) MethodChar.ToString() Metho...
[ { "code": null, "e": 23192, "s": 23164, "text": "\n01 Feb, 2019" }, { "code": null, "e": 23415, "s": 23192, "text": "In C#, Char.ToString() is a System.Char struct method which is used to convert the value of this instance to its equivalent string representation. This method can ...
NLP: Contextualized word embeddings from BERT | by Andreas Pogiatzis | Towards Data Science
Undoubtedly, Natural Language Processing (NLP) research has taken enormous leaps after being relatively stationary for a couple of years. Firstly, Google’s Bidirectional Encoder Representations from Transformer (BERT) [1] becoming the highlight by the end of 2018 for achieving state-of-the-art performance in many NLP t...
[ { "code": null, "e": 812, "s": 172, "text": "Undoubtedly, Natural Language Processing (NLP) research has taken enormous leaps after being relatively stationary for a couple of years. Firstly, Google’s Bidirectional Encoder Representations from Transformer (BERT) [1] becoming the highlight by the end...
C++ File Writer-Reader application using Windows Threads - GeeksforGeeks
01 May, 2020 In this article, we will create a simple Writer-Reader application, which uses two threads, one for Writing into the file and another for Reading from the file. Here we will discuss the approach using Win32 Threads in C/C++. A windows thread can be created using the CreateThread() method. Approach: Create ...
[ { "code": null, "e": 24396, "s": 24368, "text": "\n01 May, 2020" }, { "code": null, "e": 24686, "s": 24396, "text": "In this article, we will create a simple Writer-Reader application, which uses two threads, one for Writing into the file and another for Reading from the file. He...
How to print Superscript and Subscript in Python? - GeeksforGeeks
24 Jan, 2021 Whenever we are working with formulas there may be a need of writing the given formula in a given format which may require subscripts or superscripts. There are several methods available to print subscripts and superscripts in Python. We will be discussing two of them below – Using maketrans() and translat...
[ { "code": null, "e": 24212, "s": 24184, "text": "\n24 Jan, 2021" }, { "code": null, "e": 24489, "s": 24212, "text": "Whenever we are working with formulas there may be a need of writing the given formula in a given format which may require subscripts or superscripts. There are se...
How to display PDF file in web page from Database in PHP
Theory of Computation In this article, you will learn how to display the PDF file on a webpage using PHP. PDF is one of the most trusted document format. PHP provides simple functionality to embed PDF files. It has a very simple implementation. Here, we have mentioned two ways to display PDF in a web page. It demands ...
[ { "code": null, "e": 112, "s": 90, "text": "Theory of Computation" }, { "code": null, "e": 197, "s": 112, "text": "In this article, you will learn how to display the PDF file on a webpage using PHP.\n" }, { "code": null, "e": 661, "s": 197, "text": "PDF is one...
DB2 - Backup and Recovery
This chapter describes backup and restore methods of database. Backup and recovery methods are designed to keep our information safe. In Command Line Interface (CLI) or Graphical User Interface (GUI) using backup and recovery utilities you can take backup or restore the data of databases in DB2 UDB. Log files consist o...
[ { "code": null, "e": 1991, "s": 1928, "text": "This chapter describes backup and restore methods of database." }, { "code": null, "e": 2229, "s": 1991, "text": "Backup and recovery methods are designed to keep our information safe. In Command Line Interface (CLI) or Graphical Use...
Handle missing data with R: 10 daily used idioms | by Pavlo Horbonos | Towards Data Science
Data cleaning is one of the most time-consuming stages of the Data Analysis process. Many of its steps include acquainting the dataset, search of the missing values, their imputation or removing, and possibly a lot of repetitions of the same code lines but for different variables or their combinations. So, we have to s...
[ { "code": null, "e": 551, "s": 171, "text": "Data cleaning is one of the most time-consuming stages of the Data Analysis process. Many of its steps include acquainting the dataset, search of the missing values, their imputation or removing, and possibly a lot of repetitions of the same code lines bu...
Tryit Editor v3.7
Tryit: HTML image map - execute a function
[]
Object Detection Using YOLOv3 on Colab with questions for interview preparation | by Manish Sharma | Towards Data Science
This blog will help you to train a model which can identify different objects in an image. It’s fun and exciting to observe how the model can behave better than humans in certain conditions. It can differentiate between car and pickup truck even if the rear of the truck is not clear in an image, personally, I wasn’t ab...
[ { "code": null, "e": 832, "s": 172, "text": "This blog will help you to train a model which can identify different objects in an image. It’s fun and exciting to observe how the model can behave better than humans in certain conditions. It can differentiate between car and pickup truck even if the re...
Map in C++ Standard Template Library (STL) - GeeksforGeeks
17 Jan, 2022 Maps are associative containers that store elements in a mapped fashion. Each element has a key value and a mapped value. No two mapped values can have the same key values. Some basic functions associated with Map: begin() – Returns an iterator to the first element in the map. end() – Returns an iterator ...
[ { "code": null, "e": 26962, "s": 26934, "text": "\n17 Jan, 2022" }, { "code": null, "e": 27135, "s": 26962, "text": "Maps are associative containers that store elements in a mapped fashion. Each element has a key value and a mapped value. No two mapped values can have the same ke...
Folium: Create Interactive Leaflet Maps | by Himanshu Sharma | Towards Data Science
In this article, we will explore Folium, a Python library which makes it easy to visualize data that’s been manipulated in Python on an interactive leaflet map. The maps created using folium are highly interactive which makes it even more useful for dashboard building. So let’s start exploring Folium and learn on our w...
[ { "code": null, "e": 332, "s": 171, "text": "In this article, we will explore Folium, a Python library which makes it easy to visualize data that’s been manipulated in Python on an interactive leaflet map." }, { "code": null, "e": 511, "s": 332, "text": "The maps created using fo...
CSS Layout - The z-index Property
The z-index property specifies the stack order of an element. When elements are positioned, they can overlap other elements. The z-index property specifies the stack order of an element (which element should be placed in front of, or behind, the others). An element can have a positive or negative stack order: Because ...
[ { "code": null, "e": 63, "s": 0, "text": "The z-index property specifies the \nstack order of an element." }, { "code": null, "e": 126, "s": 63, "text": "When elements are positioned, they can overlap other elements." }, { "code": null, "e": 256, "s": 126, "te...
8051 Program to Subtract two 8 Bit numbers
Here we will see how to subtract two 8-bit numbers using this microcontroller. The register A(Accumulator) is used as one operand in the operations. There are seven registers R0 – R7 in different register banks. We can use any of them as the second operand. We are taking two number73H and BDH at location 20H and 21H, A...
[ { "code": null, "e": 1320, "s": 1062, "text": "Here we will see how to subtract two 8-bit numbers using this microcontroller. The register A(Accumulator) is used as one operand in the operations. There are seven registers R0 – R7 in different register banks. We can use any of them as the second oper...
LISP - Lambda Functions
At times you may need a function in only one place in your program and the function is so trivial that you may not give it a name, or may not like to store it in the symbol table, and would rather write an unnamed or anonymous function. LISP allows you to write anonymous functions that are evaluated only when they are ...
[ { "code": null, "e": 2297, "s": 2060, "text": "At times you may need a function in only one place in your program and the function is so trivial that you may not give it a name, or may not like to store it in the symbol table, and would rather write an unnamed or anonymous function." }, { "c...
Check if a File exists in C#
Use the File.exists method in C# to check if a file exits in C# or not. Firstly, check whether the file is present in the current directory. if (File.Exists("MyFile.txt")) { Console.WriteLine("The file exists."); } After that check whether the file exist in a directory or not. if (File.Exists(@"D:\myfile.txt")) { ...
[ { "code": null, "e": 1134, "s": 1062, "text": "Use the File.exists method in C# to check if a file exits in C# or not." }, { "code": null, "e": 1203, "s": 1134, "text": "Firstly, check whether the file is present in the current directory." }, { "code": null, "e": 1280...
override identifier in C++
13 Jun, 2022 Function overriding is a redefinition of the base class function in its derived class with the same signature i.e. return type and parameters. But there may be situations when a programmer makes a mistake while overriding that function. So, to keep track of such an error, C++11 has come up with the overrid...
[ { "code": null, "e": 54, "s": 26, "text": "\n13 Jun, 2022" }, { "code": null, "e": 657, "s": 54, "text": "Function overriding is a redefinition of the base class function in its derived class with the same signature i.e. return type and parameters. But there may be situations whe...
PLSQL | UPPER Function
11 Oct, 2019 The PLSQL UPPER function is used for converting all letters in the specified string to uppercase. If there are characters in the string that are not letters, they are unaffected by this function. The char to be converted can be any of the datatypes such as CHAR, VARCHAR2, NCHAR, NVARCHAR2, CLOB, or NCLOB. ...
[ { "code": null, "e": 28, "s": 0, "text": "\n11 Oct, 2019" }, { "code": null, "e": 224, "s": 28, "text": "The PLSQL UPPER function is used for converting all letters in the specified string to uppercase. If there are characters in the string that are not letters, they are unaffect...
How to Solve java.lang.NoSuchMethodError in Java?
28 Jul, 2021 A java.lang.NoSuchMethodError as the name suggests, is a runtime error in Java which occurs when a method is called that exists at compile-time, but does not exist at runtime. The java.lang.NoSuchMethodError can occur in case application code is partially compiled, or in case an external dependency in a pr...
[ { "code": null, "e": 53, "s": 25, "text": "\n28 Jul, 2021" }, { "code": null, "e": 512, "s": 53, "text": "A java.lang.NoSuchMethodError as the name suggests, is a runtime error in Java which occurs when a method is called that exists at compile-time, but does not exist at runtime...
How to get list of parameters name from a function in Python?
29 Dec, 2020 In this article, we are going to discuss how to get list parameters from a function in Python. The inspect module helps in checking the objects present in the code that we have written. We are going to use two methods i.e. signature() and getargspec() methods from the inspect module to get the list of para...
[ { "code": null, "e": 53, "s": 25, "text": "\n29 Dec, 2020" }, { "code": null, "e": 439, "s": 53, "text": "In this article, we are going to discuss how to get list parameters from a function in Python. The inspect module helps in checking the objects present in the code that we ha...
settextstyle function in C
01 Dec, 2021 The header file graphics.h contains settextstyle() function which is used to change the way in which text appears. Using it we can modify the size of text, change direction of text and change the font of text. Syntax : void settextstyle(int font, int direction, int font_size); where, font argument speci...
[ { "code": null, "e": 52, "s": 24, "text": "\n01 Dec, 2021" }, { "code": null, "e": 273, "s": 52, "text": "The header file graphics.h contains settextstyle() function which is used to change the way in which text appears. Using it we can modify the size of text, change direction o...
Python – Convert Snake Case String to Camel Case
01 Oct, 2020 Given a snake case string, convert to camel case. Input : test_str = β€˜geeksforgeeks_is_best_for_geeks’ Output : geeksforgeeksIsBestForGeeks Explanation : String converted to Camel Case. Input : test_str = β€˜geeksforgeeks_best_for_geeks’ Output : geeksforgeeksBestForGeeks Explanation : String converted to Ca...
[ { "code": null, "e": 28, "s": 0, "text": "\n01 Oct, 2020" }, { "code": null, "e": 78, "s": 28, "text": "Given a snake case string, convert to camel case." }, { "code": null, "e": 214, "s": 78, "text": "Input : test_str = β€˜geeksforgeeks_is_best_for_geeks’ Outpu...
How to set the dropdown button in the center?
26 Aug, 2020 Dropdown menu is a menu that offers a list of options to choose from. The title of the menu is always in display and the rest of the items are hidden. It is a toggleable menu in which all the items can be shown by clicking on it. Dropdown button can be positioned in the center of the page by setting the β€œt...
[ { "code": null, "e": 28, "s": 0, "text": "\n26 Aug, 2020" }, { "code": null, "e": 258, "s": 28, "text": "Dropdown menu is a menu that offers a list of options to choose from. The title of the menu is always in display and the rest of the items are hidden. It is a toggleable menu ...
Main thread in Java
21 Sep, 2021 Java provides built-in support for multithreaded programming. A multi-threaded program contains two or more parts that can run concurrently. Each part of such a program is called a thread, and each thread defines a separate path of execution.When a Java program starts up, one thread begins running immediat...
[ { "code": null, "e": 52, "s": 24, "text": "\n21 Sep, 2021" }, { "code": null, "e": 483, "s": 52, "text": "Java provides built-in support for multithreaded programming. A multi-threaded program contains two or more parts that can run concurrently. Each part of such a program is ca...
Removing the object from the top of the Stack in C#
28 Jan, 2019 Stack<T>.Pop Method is used to remove and returns the object at the top of the Stack<T>. This method comes under the System.Collections.Generic namespace. Syntax: public T Pop (); Return Value: It returns the Object which is to be removed from the top of the Stack. Exception : This method will give Invalid...
[ { "code": null, "e": 28, "s": 0, "text": "\n28 Jan, 2019" }, { "code": null, "e": 183, "s": 28, "text": "Stack<T>.Pop Method is used to remove and returns the object at the top of the Stack<T>. This method comes under the System.Collections.Generic namespace." }, { "code"...
Python | Set 3 (Strings, Lists, Tuples, Iterations)
13 Jul, 2022 In the previous article, we read about the basics of Python. Now, we continue with some more python concepts. A string is a sequence of characters that can be a combination of letters, numbers, and special characters. It can be declared in python by using single quotes, double quotes, or even triple quotes...
[ { "code": null, "e": 52, "s": 24, "text": "\n13 Jul, 2022" }, { "code": null, "e": 162, "s": 52, "text": "In the previous article, we read about the basics of Python. Now, we continue with some more python concepts." }, { "code": null, "e": 589, "s": 162, "tex...
Counting frequencies of array elements
21 Jun, 2022 Given an array which may contain duplicates, print all elements and their frequencies. Examples: Input : arr[] = {10, 20, 20, 10, 10, 20, 5, 20} Output : 10 3 20 4 5 1 Input : arr[] = {10, 20, 20} Output : 10 1 20 2 A simple solution is to run two loops. For every item count...
[ { "code": null, "e": 52, "s": 24, "text": "\n21 Jun, 2022" }, { "code": null, "e": 139, "s": 52, "text": "Given an array which may contain duplicates, print all elements and their frequencies." }, { "code": null, "e": 150, "s": 139, "text": "Examples: " }, ...
How to swap two bits in a given integer?
07 Jun, 2022 Given an integer n and two-bit positions p1 and p2 inside it, swap bits at the given positions. The given positions are from the least significant bit (lsb). For example, the position for lsb is 0.Examples: Input: n = 28, p1 = 0, p2 = 3Output: 21Explaination: 28 in binary is 11100. If we swap 0’th and 3r...
[ { "code": null, "e": 54, "s": 26, "text": "\n07 Jun, 2022" }, { "code": null, "e": 262, "s": 54, "text": "Given an integer n and two-bit positions p1 and p2 inside it, swap bits at the given positions. The given positions are from the least significant bit (lsb). For example, the...
while loop in Julia
19 Feb, 2020 In Julia, while loop is used to execute a block of statements repeatedly until a given condition is satisfied. And when the condition becomes false, the line immediately after the loop in the program is executed. If the condition is false when the while loop is executed first time, then the body of the loo...
[ { "code": null, "e": 28, "s": 0, "text": "\n19 Feb, 2020" }, { "code": null, "e": 371, "s": 28, "text": "In Julia, while loop is used to execute a block of statements repeatedly until a given condition is satisfied. And when the condition becomes false, the line immediately after...
HTML | <img> vspace Attribute
06 Jan, 2022 The HTML <img> vspace Attribute is used to specify the number of whitespaces on bottom and top side of an image. Note: The HTML vspace Attribute not supported by HTML5 Syntax: <img vspace="pixels"> Attribute Values: pixels: It specifies the number of whitespaces on top and bottom of an image in terms of p...
[ { "code": null, "e": 53, "s": 25, "text": "\n06 Jan, 2022" }, { "code": null, "e": 166, "s": 53, "text": "The HTML <img> vspace Attribute is used to specify the number of whitespaces on bottom and top side of an image." }, { "code": null, "e": 222, "s": 166, "...
Predicting Amazon review scores using Hierarchical Attention Networks with PyTorch and Apache Mxnet | by Javier Rodriguez Zaurin | Towards Data Science
This post and the code here are part of a larger repo that I have (very creatively) called β€œNLP-stuff”. As the name indicates, I include in that repo projects that I do and/or ideas that I have β€” as long as there is code associated with those ideas β€” that are related to NLP. In every directory, I have included a README...
[ { "code": null, "e": 843, "s": 171, "text": "This post and the code here are part of a larger repo that I have (very creatively) called β€œNLP-stuff”. As the name indicates, I include in that repo projects that I do and/or ideas that I have β€” as long as there is code associated with those ideas β€” that...
Reading and Writing to text files in Python
Like other languages, Python provides some inbuilt functions for reading, writing, or accessing files. Python can handle mainly two types of files. The normal text file and the binary files. For the text files, each lines are terminated with a special character '\n' (It is known as EOL or End Of Line). For the Binary ...
[ { "code": null, "e": 1253, "s": 1062, "text": "Like other languages, Python provides some inbuilt functions for reading, writing, or accessing files. Python can handle mainly two types of files. The normal text file and the binary files." }, { "code": null, "e": 1487, "s": 1253, ...
Set.clear() function in JavaScript
The clear() function of the Set object removes all elements from the current Set object. Its Syntax is as follows setObj.clear() Live Demo <html> <head> <title>JavaScript Example</title> </head> <body> <script type="text/javascript"> const setObj = new Set(); setObj.add('Java'); setObj.add('Jav...
[ { "code": null, "e": 1151, "s": 1062, "text": "The clear() function of the Set object removes all elements from the current Set object." }, { "code": null, "e": 1176, "s": 1151, "text": "Its Syntax is as follows" }, { "code": null, "e": 1191, "s": 1176, "text"...
How to Eliminate Duplicate User Defined Objects as a Key from Java LinkedHashMap? - GeeksforGeeks
04 Jan, 2021 Duplicate user-defined objects as a key from Java LinkedHashMap can be removed and achieved by implementing equals and hashcode methods at the user-defined objects. Example: Input : LinkedHashMap = [{[Apple, 40], Kashmir}, {[Grapes, 80], Nashik}] Duplicate key = {[Grapes, 80], Delhi} Output: LinkedHash...
[ { "code": null, "e": 23557, "s": 23529, "text": "\n04 Jan, 2021" }, { "code": null, "e": 23722, "s": 23557, "text": "Duplicate user-defined objects as a key from Java LinkedHashMap can be removed and achieved by implementing equals and hashcode methods at the user-defined objects...
How to Create a Git Hook to Push to Your Server and Github Repo | by Shinichi Okada | Towards Data Science
Git hooks are scripts that Git executes before or after commit, push, and receive. Setting up a Git hook makes your development and deployment easy. In this article, you will learn how to create a post-receive Git hook that executes when you use the git push command. I use $ for a local terminal prompt and # for a remo...
[ { "code": null, "e": 321, "s": 172, "text": "Git hooks are scripts that Git executes before or after commit, push, and receive. Setting up a Git hook makes your development and deployment easy." }, { "code": null, "e": 440, "s": 321, "text": "In this article, you will learn how t...
Maximum sum Rectangle | Practice | GeeksforGeeks
Given a 2D matrix M of dimensions RxC. Find the maximum sum submatrix in it. Example 1: Input: R=4 C=5 M=[[1,2,-1,-4,-20], [-8,-3,4,2,1], [3,8,10,1,3], [-4,-1,1,7,-6]] Output: 29 Explanation: The matrix is as follows and the blue rectangle denotes the maximum sum rectangle. Example 2: Input: R=2 C=2 M=[[-1,-2],[-3,-4...
[ { "code": null, "e": 315, "s": 238, "text": "Given a 2D matrix M of dimensions RxC. Find the maximum sum submatrix in it." }, { "code": null, "e": 326, "s": 315, "text": "Example 1:" }, { "code": null, "e": 515, "s": 326, "text": "Input:\nR=4\nC=5\nM=[[1,2,-1,...
Using keyword extraction for unsupervised text classification in NLP | by Evan Hu | Towards Data Science
Text classification is a common task in Natural Language Processing. The main approach tends toward representing the text in a meaningful way β€” whether through TF-IDF, Word2Vec, or more advanced models like BERT β€” and training models on the representations as labelled inputs. Sometimes, however, either labelling the da...
[ { "code": null, "e": 718, "s": 172, "text": "Text classification is a common task in Natural Language Processing. The main approach tends toward representing the text in a meaningful way β€” whether through TF-IDF, Word2Vec, or more advanced models like BERT β€” and training models on the representation...
Autoboxing and Unboxing in Java
Autoboxing refers to the automatic conversion of a primitive type variable to its corresponding wrapper class object. The compiler automatically handles the conversion when a primitive value is βˆ’ Passed as an argument to a function which is expecting a wrapper class object. Passed as an argument to a function which is ...
[ { "code": null, "e": 1258, "s": 1062, "text": "Autoboxing refers to the automatic conversion of a primitive type variable to its corresponding wrapper class object. The compiler automatically handles the conversion when a primitive value is βˆ’" }, { "code": null, "e": 1337, "s": 1258,...
Bayesian Hierarchical Modeling (or β€œmore reasons why autoML cannot replace Data Scientists yet”) | by Alain Tanguy | Towards Data Science
In this article, we will use a Probabilistic Programming library developed for python, pymc3. A first introduction to the efficiency of Bayesian approaches in basic statistics and to pymc3 can be found here and there. Since early 2018, Automated Machine Learning has become one of the trendiest topic in data science. Am...
[ { "code": null, "e": 389, "s": 171, "text": "In this article, we will use a Probabilistic Programming library developed for python, pymc3. A first introduction to the efficiency of Bayesian approaches in basic statistics and to pymc3 can be found here and there." }, { "code": null, "e": ...
Apache NiFi - Quick Guide
Apache NiFi is a powerful, easy to use and reliable system to process and distribute data between disparate systems. It is based on Niagara Files technology developed by NSA and then after 8 years donated to Apache Software foundation. It is distributed under Apache License Version 2.0, January 2004. The latest version...
[ { "code": null, "e": 2665, "s": 2318, "text": "Apache NiFi is a powerful, easy to use and reliable system to process and distribute data between disparate systems. It is based on Niagara Files technology developed by NSA and then after 8 years donated to Apache Software foundation. It is distributed...
Explain abstract class in PHP.
PHP5 comes with the object-oriented model with it, Some of the concepts of object-oriented model are: class, object, encapsulation, polymorphism, abstract and final classes, and methods, interfaces and inheritance, etc... In this article, we will discuss Abstract Class and it's features related to the object-oriented ...
[ { "code": null, "e": 1302, "s": 1062, "text": "PHP5 comes with the object-oriented model with it, Some of the concepts of object-oriented model are: class, object, encapsulation, polymorphism, abstract and final classes, and methods, interfaces and inheritance, etc... In this article, " }, { ...
Advanced Excel Financial - PMT Function
The PMT function calculates the payment for a loan based on constant payments and a constant interest rate. PMT (rate, nper, pv, [fv], [type]) The present value, or the total amount that a series of future payments is worth now. Also known as the principal. The future value, or a cash balance you want to attain after ...
[ { "code": null, "e": 1962, "s": 1854, "text": "The PMT function calculates the payment for a loan based on constant payments and a constant interest rate." }, { "code": null, "e": 1998, "s": 1962, "text": "PMT (rate, nper, pv, [fv], [type])\n" }, { "code": null, "e": ...
How to explain your ML model with SHAP | by Yifei Huang | Towards Data Science
With exception of simple linear models like linear regression where you can easily look at the feature coefficients, machine learning models can often be a bit of a blackbox. It can be very difficult to understand why the model predicts a particular output, or to verify that the output makes intuitive sense. Model expl...
[ { "code": null, "e": 552, "s": 172, "text": "With exception of simple linear models like linear regression where you can easily look at the feature coefficients, machine learning models can often be a bit of a blackbox. It can be very difficult to understand why the model predicts a particular outpu...
CouchDB - Quick Guide
Database management system provides mechanism for storage and retrieval of data. There are three main types of database management systems namely RDBMS (Relational Database management Systems), OLAP (Online Analytical Processing Systems) and NoSQL. RDBMS stands for Relational Database Management System. RDBMS is the ba...
[ { "code": null, "e": 2087, "s": 1838, "text": "Database management system provides mechanism for storage and retrieval of data. There are three main types of database management systems namely RDBMS (Relational Database management Systems), OLAP (Online Analytical\nProcessing Systems) and NoSQL." ...
Make Unordered list with Bootstrap
For unordered list in Bootstrap, you can try to run the following code βˆ’ Live Demo <!DOCTYPE html> <html> <head> <title>Bootstrap lists</title> <meta name = "viewport" content = "width=device-width, initial-scale = 1"> <link rel = "stylesheet" href = "https://stackpath.bootstrapcdn.com/bootstrap/4....
[ { "code": null, "e": 1135, "s": 1062, "text": "For unordered list in Bootstrap, you can try to run the following code βˆ’" }, { "code": null, "e": 1145, "s": 1135, "text": "Live Demo" }, { "code": null, "e": 1946, "s": 1145, "text": "<!DOCTYPE html>\n<html>\n ...
How to populate a Map using a lambda expression in Java?
A Map is a collection object that maps keys to values in Java. The data can be stored in key/value pairs and each key is unique. These key/value pairs are also called map entries. In the below example, we can populate a Map using a lambda expression. We have passed Character and Runnable arguments to Map object and pas...
[ { "code": null, "e": 1242, "s": 1062, "text": "A Map is a collection object that maps keys to values in Java. The data can be stored in key/value pairs and each key is unique. These key/value pairs are also called map entries." }, { "code": null, "e": 1586, "s": 1242, "text": "In...
PyQt5 Label – Getting Blur effect object - GeeksforGeeks
10 May, 2020 In this article we will see how we can get blur effect object of the label by default there is no blur effect to the label although we can create blur effect then add it to the label with the help of setGraphicsEffect method. In order to do this we have to do the following – 1. Create a label2. Set geometr...
[ { "code": null, "e": 23901, "s": 23873, "text": "\n10 May, 2020" }, { "code": null, "e": 24127, "s": 23901, "text": "In this article we will see how we can get blur effect object of the label by default there is no blur effect to the label although we can create blur effect then ...
Spring Security - OAuth2
OAuth2.0 Fundamentals OAuth2.0 Getting started(Practical Guide) OAuth 2.0 was developed by IETF OAuth Working Group and published in October of 2012. It serves as an open authorization protocol for enabling a third party application to get limited access to an HTTP service on behalf of the resource owner. It can do so ...
[ { "code": null, "e": 1857, "s": 1835, "text": "OAuth2.0 Fundamentals" }, { "code": null, "e": 1899, "s": 1857, "text": "OAuth2.0 Getting started(Practical Guide)" }, { "code": null, "e": 2492, "s": 1899, "text": "OAuth 2.0 was developed by IETF OAuth Working G...
How to Migrate Your Python Machine Learning model to Other Languages | by Roman Orac | Towards Data Science
I recently worked on a project, where I needed to train a Machine Learning model that would run on the Edge β€” meaning, the processing and prediction occur on the device that collects the data. As usual, I did my Machine Learning part in Python and I haven’t thought much about how we’re going to port my ML stuff to the ...
[ { "code": null, "e": 364, "s": 171, "text": "I recently worked on a project, where I needed to train a Machine Learning model that would run on the Edge β€” meaning, the processing and prediction occur on the device that collects the data." }, { "code": null, "e": 531, "s": 364, "t...
How to change file extension in Python?
When changing the extension, you're basically just renaming the file and changing the extension. In order to do that, you need to split the filename by '.' and replace the last entry by the new extension you want. You can do this using the os.rename method. >>> import os >>> my_file = 'my_file.txt' >>> base = os.path....
[ { "code": null, "e": 1321, "s": 1062, "text": "When changing the extension, you're basically just renaming the file and changing the extension. In order to do that, you need to split the filename by '.' and replace the last entry by the new extension you want. You can do this using the os.rename met...
How to Create an Infinite Loop in Windows Batch File? - GeeksforGeeks
23 Mar, 2020 An infinite loop in Batch Script refers to the repetition of a command infinitely. The only way to stop an infinitely loop in Windows Batch Script is by either pressing Ctrl + C or by closing the program. Syntax: Suppose a variable β€˜a’ :a your command here goto a Here, you need to know how to create a bat...
[ { "code": null, "e": 24801, "s": 24773, "text": "\n23 Mar, 2020" }, { "code": null, "e": 25006, "s": 24801, "text": "An infinite loop in Batch Script refers to the repetition of a command infinitely. The only way to stop an infinitely loop in Windows Batch Script is by either pre...
Broken Pipe Error in Python - GeeksforGeeks
23 Sep, 2021 In this article, we will discuss Pipe Error in python starting from how an error is occurred in python along with the type of solution needed to be followed to rectify the error in python. So, let’s go into this article to understand the concept well. With the advancement of emerging technologies in the I...
[ { "code": null, "e": 24212, "s": 24184, "text": "\n23 Sep, 2021" }, { "code": null, "e": 24465, "s": 24212, "text": "In this article, we will discuss Pipe Error in python starting from how an error is occurred in python along with the type of solution needed to be followed to rec...
Hadoop - Enviornment Setup
Hadoop is supported by GNU/Linux platform and its flavors. Therefore, we have to install a Linux operating system for setting up Hadoop environment. In case you have an OS other than Linux, you can install a Virtualbox software in it and have Linux inside the Virtualbox. Before installing Hadoop into the Linux environm...
[ { "code": null, "e": 2123, "s": 1851, "text": "Hadoop is supported by GNU/Linux platform and its flavors. Therefore, we have to install a Linux operating system for setting up Hadoop environment. In case you have an OS other than Linux, you can install a Virtualbox software in it and have Linux insi...
Creating fractals with Python. Try it yourself in this post! | by Dhanesh Budhrani | Towards Data Science
First of all, what is a geometric fractal? A geometric fractal is a geometric shape with a repeating structure at different scales: it doesn’t matter whether you get closer to the image or not, you’ll always see the same pattern. Or, as defined by Benoit Mandelbrot, β€œa rough or fragmented geometric shape that can be sp...
[ { "code": null, "e": 584, "s": 171, "text": "First of all, what is a geometric fractal? A geometric fractal is a geometric shape with a repeating structure at different scales: it doesn’t matter whether you get closer to the image or not, you’ll always see the same pattern. Or, as defined by Benoit ...
Tryit Editor v3.7
Tryit: Style the ::marker pseudo-element
[]
How to convert Integer array list to float array in Java?
To convert integer array list to float array, let us first create an integer array list βˆ’ ArrayList < Integer > arrList = new ArrayList < Integer > (); arrList.add(25); arrList.add(50); arrList.add(100); arrList.add(200); arrList.add(300); arrList.add(400); arrList.add(500); Now, convert integer array list to float arr...
[ { "code": null, "e": 1152, "s": 1062, "text": "To convert integer array list to float array, let us first create an integer array list βˆ’" }, { "code": null, "e": 1338, "s": 1152, "text": "ArrayList < Integer > arrList = new ArrayList < Integer > ();\narrList.add(25);\narrList.add...
\strut - Tex Command
\strut - Used to create an invisible box with no width, height 8.6pt and depth 3pt. { \strut} \strut command creates an invisible box with no width, height 8.6pt and depth 3pt. \sqrt{(\ )} \sqrt{\mathstrut\rm mathstrut} \sqrt{\strut\rm strut} ( )(mathstrutstrut \Tiny \sqrt{(\ )} \sqrt{\mathstrut\rm mathstrut} \sqr...
[ { "code": null, "e": 8070, "s": 7986, "text": "\\strut - Used to create an invisible box with no width, height 8.6pt and depth 3pt." }, { "code": null, "e": 8080, "s": 8070, "text": "{ \\strut}" }, { "code": null, "e": 8163, "s": 8080, "text": "\\strut command...
Constants in C/C++ - GeeksforGeeks
03 Aug, 2021 As the name suggests the name constants are given to such variables or values in C/C++ programming language which cannot be modified once they are defined. They are fixed values in a program. There can be any types of constants like integer, float, octal, hexadecimal, character constants, etc. Every consta...
[ { "code": null, "e": 24362, "s": 24334, "text": "\n03 Aug, 2021" }, { "code": null, "e": 24955, "s": 24362, "text": "As the name suggests the name constants are given to such variables or values in C/C++ programming language which cannot be modified once they are defined. They ar...
ggplot2 - Bubble Plots & Count Charts
Bubble plots are nothing but bubble charts which is basically a scatter plot with a third numeric variable used for circle size. In this chapter, we will focus on creation of bar count plot and histogram count plots which is considered as replica of bubble plots. Following steps are used to create bubble plots and coun...
[ { "code": null, "e": 2286, "s": 2022, "text": "Bubble plots are nothing but bubble charts which is basically a scatter plot with a third numeric variable used for circle size. In this chapter, we will focus on creation of bar count plot and histogram count plots which is considered as replica of bub...
Google AMP - Html Page to Amp Page
In this chapter, we will understand how to convert a normal html page to an amp page. We will also validate the page for amp and check the output at the last. To start with, let us take the normal html page as shown below βˆ’ <!DOCTYPE html> <html> <head> <meta charset = "utf-8"> <title>Tutorials</title> ...
[ { "code": null, "e": 2579, "s": 2420, "text": "In this chapter, we will understand how to convert a normal html page to an amp page. We will also validate the page for amp and check the output at the last." }, { "code": null, "e": 2644, "s": 2579, "text": "To start with, let us t...
How to turn Android device screen on and off programmatically?
This example demonstrate about How to turn Android device screen on and off programmatically. Step 1 βˆ’ Create a new project in Android Studio, go to File β‡’ New Project and fill all required details to create a new project. Step 2 βˆ’ Add the following code to res/layout/activity_main.xml <? xml version= "1.0" encoding= "...
[ { "code": null, "e": 1156, "s": 1062, "text": "This example demonstrate about How to turn Android device screen on and off programmatically." }, { "code": null, "e": 1285, "s": 1156, "text": "Step 1 βˆ’ Create a new project in Android Studio, go to File β‡’ New Project and fill all r...
Binary Heap Operations | Practice | GeeksforGeeks
A binary heap is a Binary Tree with the following properties: 1) Its a complete tree (All levels are completely filled except possibly the last level and the last level has all keys as left as possible). This property of Binary Heap makes them suitable to be stored in an array. 2) A Binary Heap is either Min Heap or Ma...
[ { "code": null, "e": 517, "s": 238, "text": "A binary heap is a Binary Tree with the following properties:\n1) Its a complete tree (All levels are completely filled except possibly the last level and the last level has all keys as left as possible). This property of Binary Heap makes them suitable t...
M_Expensive statement in SAP HANA
This can be checked using system view M_EXPENSIVE_STATEMENTS. SELECT * FROM M_EXPENSIVE_STATEMENTS In SAP HANA, the M_EXPENSIVE_STATEMENTS view provides convenient access to the most expensive statements that were executed on the system. A statement is considered being expensive if its runtime exceeds a particular thre...
[ { "code": null, "e": 1124, "s": 1062, "text": "This can be checked using system view M_EXPENSIVE_STATEMENTS." }, { "code": null, "e": 1161, "s": 1124, "text": "SELECT * FROM M_EXPENSIVE_STATEMENTS" }, { "code": null, "e": 1591, "s": 1161, "text": "In SAP HANA,...
Creating Index in Column based tables in SAP HANA
Note that an index not necessary to be NOT NULL. You can create an Index in SAP HANA database by using below query: CREATE INDEX IDX_MY_INDEX ON TABLE1 (MY_COLUMN); To know more about SAP HANA database, Modeling, and Administration features, you can refer our SAP HANA Text and Video tutorials: https://www.tutorialspoin...
[ { "code": null, "e": 1178, "s": 1062, "text": "Note that an index not necessary to be NOT NULL. You can create an Index in SAP HANA database by using below query:" }, { "code": null, "e": 1227, "s": 1178, "text": "CREATE INDEX IDX_MY_INDEX ON TABLE1 (MY_COLUMN);" }, { "co...
Difference Between ArrayList and HashMap in Java - GeeksforGeeks
20 Jan, 2022 ArrayList is a part of the collection framework and is present in java.util package. It provides us with dynamic arrays in Java. Though, it may be slower than standard arrays but can be helpful in programs where lots of manipulation in the array is needed. HashMap is a part of Java’s collection since Java ...
[ { "code": null, "e": 24360, "s": 24332, "text": "\n20 Jan, 2022" }, { "code": null, "e": 24909, "s": 24360, "text": "ArrayList is a part of the collection framework and is present in java.util package. It provides us with dynamic arrays in Java. Though, it may be slower than stan...
How to change the legend shape using ggplot2 in R?
By default, the shape of legend is circular but we can change it by using the guides function of ggplot2 package. For example, if we have a data frame with two numerical columns say x and y, and one categorical column Group then the scatterplot between x and y for different color values of categories in categorical col...
[ { "code": null, "e": 1470, "s": 1062, "text": "By default, the shape of legend is circular but we can change it by using the guides function of ggplot2 package. For example, if we have a data frame with two numerical columns say x and y, and one categorical column Group then the scatterplot between ...
Java - String substring() Method
This method has two variants and returns a new string that is a substring of this string. The substring begins with the character at the specified index and extends to the end of this string or up to endIndex – 1, if the second argument is given. Here is the syntax of this method βˆ’ public String substring(int beginInde...
[ { "code": null, "e": 2624, "s": 2377, "text": "This method has two variants and returns a new string that is a substring of this string. The substring begins with the character at the specified index and extends to the end of this string or up to endIndex – 1, if the second argument is given." }, ...
Java - Covariant Method Overriding with Examples - GeeksforGeeks
05 Feb, 2021 The covariant method overriding approach, implemented in Java 5, helps to remove the client-side typecasting by enabling you to return a subtype of the overridden method’s actual return type. Covariant Method overriding means that when overriding a method in the child class, the return type may vary. Befor...
[ { "code": null, "e": 23948, "s": 23920, "text": "\n05 Feb, 2021" }, { "code": null, "e": 24140, "s": 23948, "text": "The covariant method overriding approach, implemented in Java 5, helps to remove the client-side typecasting by enabling you to return a subtype of the overridden ...
Classification Algorithms - Logistic Regression
Logistic regression is a supervised learning classification algorithm used to predict the probability of a target variable. The nature of target or dependent variable is dichotomous, which means there would be only two possible classes. In simple words, the dependent variable is binary in nature having data coded as ei...
[ { "code": null, "e": 2541, "s": 2304, "text": "Logistic regression is a supervised learning classification algorithm used to predict the probability of a target variable. The nature of target or dependent variable is dichotomous, which means there would be only two possible classes." }, { "c...
How to extract date from text using Python regular expression?
The following code using Python regex extracts the date from given string import datetime from datetime import date import re s = "Jason's birthday is on 1991-09-21" match = re.search(r'\d{4}-\d{2}-\d{2}', s) date = datetime.datetime.strptime(match.group(), '%Y-%m-%d').date() print date This gives the output 1991-09-21
[ { "code": null, "e": 1136, "s": 1062, "text": "The following code using Python regex extracts the date from given string" }, { "code": null, "e": 1350, "s": 1136, "text": "import datetime\nfrom datetime import date\nimport re\ns = \"Jason's birthday is on 1991-09-21\"\nmatch = re...
EJB - Packaging Applications
Requirement of Packaging applications using EJB 3.0 are similar to that of J2EE platform. EJB components are packaged into modules as jar files and are packaged into application enterprise archive as ear file. There are majorly three components of any enterprise application βˆ’ jar βˆ’ Java Application aRchive, containing ...
[ { "code": null, "e": 2257, "s": 2047, "text": "Requirement of Packaging applications using EJB 3.0 are similar to that of J2EE platform. EJB components are packaged into modules as jar files and are packaged into application enterprise archive as ear file." }, { "code": null, "e": 2324, ...
Deep dive into Parameters and Arguments in Python - GeeksforGeeks
24 Oct, 2020 There is always a little confusion among budding developers between a parameter and an argument, this article focuses to clarify the difference between them and help you to use them effectively. A parameter is the variable defined within the parentheses during function definition. Simply they are written w...
[ { "code": null, "e": 24316, "s": 24288, "text": "\n24 Oct, 2020" }, { "code": null, "e": 24511, "s": 24316, "text": "There is always a little confusion among budding developers between a parameter and an argument, this article focuses to clarify the difference between them and he...
Find all close matches of input string from a list in Python
Suppose we are given a word and we want to find its closest matches. Not an exact match but other words which have some close resemblance in pattern with the given word. For this we use a module called difflib and use its method named get_close_matches. This method is part of the module difflib and gives us the match w...
[ { "code": null, "e": 1316, "s": 1062, "text": "Suppose we are given a word and we want to find its closest matches. Not an exact match but other words which have some close resemblance in pattern with the given word. For this we use a module called difflib and use its method named get_close_matches....
How to Install and Configure Ansible on CentOS 7
In this article, we will learn how to configure Ansible on CentOS 7 which is an Automation configuration management system. This system can control a large number of client machines with an easy administration, which can be automated from a central location. Ansible communicates over SSH tunnels and it doesn’t need to ...
[ { "code": null, "e": 1321, "s": 1062, "text": "In this article, we will learn how to configure Ansible on CentOS 7 which is an Automation configuration management system. This system can control a large number of client machines with an easy administration, which can be automated from a central loca...
Checkbox verification with Cypress
Cypress handles checking and unchecking of checkbox with the help of its in built functions. For a checkbox, the tagname of the element should be input and the type attribute in the html code should be checkbox. The command used is check(). This command needs to be chained with a command that gives DOM elements and the...
[ { "code": null, "e": 1274, "s": 1062, "text": "Cypress handles checking and unchecking of checkbox with the help of its in built\nfunctions. For a checkbox, the tagname of the element should be input and the\ntype attribute in the html code should be checkbox." }, { "code": null, "e": 14...
MongoDB inverse of query to return all items except specific documents?
To get documents except some specific documents, use noralongwithand. Let us first create a collection with documents βˆ’ > db.demo1.insertOne({"StudentName":"Chris","StudentMarks":38}); { "acknowledged" : true, "insertedId" : ObjectId("5e08a4f025ddae1f53b62216") } > db.demo1.insertOne({"StudentName":"David","Stude...
[ { "code": null, "e": 1182, "s": 1062, "text": "To get documents except some specific documents, use noralongwithand. Let us first create a collection with documents βˆ’" }, { "code": null, "e": 1631, "s": 1182, "text": "> db.demo1.insertOne({\"StudentName\":\"Chris\",\"StudentMarks...
Solidity - Cryptographic Functions
Solidity provides inbuilt cryptographic functions as well. Following are important methods βˆ’ keccak256(bytes memory) returns (bytes32) βˆ’ computes the Keccak-256 hash of the input. keccak256(bytes memory) returns (bytes32) βˆ’ computes the Keccak-256 hash of the input. ripemd160(bytes memory) returns (bytes20) βˆ’ compute R...
[ { "code": null, "e": 2648, "s": 2555, "text": "Solidity provides inbuilt cryptographic functions as well. Following are important methods βˆ’" }, { "code": null, "e": 2735, "s": 2648, "text": "keccak256(bytes memory) returns (bytes32) βˆ’ computes the Keccak-256 hash of the input." ...
Tryit Editor v3.7
Tryit: Responsive webdesign intro
[]
Apache Kafka - Consumer Group Example
Consumer group is a multi-threaded or multi-machine consumption from Kafka topics. Consumers can join a group by using the samegroup.id. Consumers can join a group by using the samegroup.id. The maximum parallelism of a group is that the number of consumers in the group ← no of partitions. The maximum parallelism of a ...
[ { "code": null, "e": 2050, "s": 1967, "text": "Consumer group is a multi-threaded or multi-machine consumption from Kafka topics." }, { "code": null, "e": 2104, "s": 2050, "text": "Consumers can join a group by using the samegroup.id." }, { "code": null, "e": 2158, ...
Go - Nested for Loops
Go programming language allows to use one loop inside another loop. The following section shows a few examples to illustrate the concept βˆ’ The syntax for a nested for loop statement in Go is as follows βˆ’ for [condition | ( init; condition; increment ) | Range] { for [condition | ( init; condition; increment ) | Ra...
[ { "code": null, "e": 2076, "s": 1937, "text": "Go programming language allows to use one loop inside another loop. The following section shows a few examples to illustrate the concept βˆ’" }, { "code": null, "e": 2141, "s": 2076, "text": "The syntax for a nested for loop statement ...
Visualising Global Population Datasets with Python | by Parvathy Krishnan | Towards Data Science
This work has been done entirely using publicly available data, and was co-authored with Kai Kaiser. All errors and omissions are those of the author(s). Mapping information concerning distribution of people is vital to a host of public policy questions across our planet’s different country settings. The ability to cap...
[ { "code": null, "e": 326, "s": 172, "text": "This work has been done entirely using publicly available data, and was co-authored with Kai Kaiser. All errors and omissions are those of the author(s)." }, { "code": null, "e": 887, "s": 326, "text": "Mapping information concerning d...
Difference between on() and live() or bind() in jQuery - GeeksforGeeks
17 Dec, 2021 jQuery offers various event handlers like on(), live() and bind(). Though, there are some minor differences which are discussed below. bind() method: This method only attaches events to elements which exist beforehand i.e. state of initialized document before the events are attached. If the selector condit...
[ { "code": null, "e": 24566, "s": 24538, "text": "\n17 Dec, 2021" }, { "code": null, "e": 24701, "s": 24566, "text": "jQuery offers various event handlers like on(), live() and bind(). Though, there are some minor differences which are discussed below." }, { "code": null, ...
Print all Strong numbers less than or equal to N
15 Mar, 2021 Given a number N, print all the Strong Numbers less than or equal to N. Strong number is a special number whose sum of the factorial of digits is equal to the original number. For Example: 145 is strong number. Since, 1! + 4! + 5! = 145. Examples: Input: N = 100 Output: 1 2 Explanation: Only 1 and 2 are...
[ { "code": null, "e": 52, "s": 24, "text": "\n15 Mar, 2021" }, { "code": null, "e": 125, "s": 52, "text": "Given a number N, print all the Strong Numbers less than or equal to N. " }, { "code": null, "e": 292, "s": 125, "text": "Strong number is a special numbe...
Python – Negative index of Element in List
20 Oct, 2020 Given a list of elements, find its negative index in the List. Input : test_list = [5, 7, 8, 2, 3, 5, 1], K = 2 Output : -4 Explanation : 2 is 4th element from rear. Input : test_list = [5, 7, 8, 2, 3, 5, 1], K = 5 Output : -2 Explanation : 5 is 2nd element from rear. Method #1 : Using index() + len() In ...
[ { "code": null, "e": 54, "s": 26, "text": "\n20 Oct, 2020" }, { "code": null, "e": 117, "s": 54, "text": "Given a list of elements, find its negative index in the List." }, { "code": null, "e": 220, "s": 117, "text": "Input : test_list = [5, 7, 8, 2, 3, 5, 1],...
Projection Profile method
25 Jun, 2019 In Image Processing, projection profile refers to projection of sum of hits/positives along an axis from bi-dimensional image. Projection profile method is majorly used for segmentation of text objects present inside text documents. Solution: Note: Projection profile is calculated for a thresholded image o...
[ { "code": null, "e": 28, "s": 0, "text": "\n25 Jun, 2019" }, { "code": null, "e": 261, "s": 28, "text": "In Image Processing, projection profile refers to projection of sum of hits/positives along an axis from bi-dimensional image. Projection profile method is majorly used for se...
How to initialize array in Ruby
24 Oct, 2019 In this article, we will learn how to initialize the array in Ruby. There are several ways to create an array. Let’s see each of them one by one. new method can be used to create the arrays with the help of dot operator. Using arguments we can provide the size to array and elements to array. Without any ar...
[ { "code": null, "e": 28, "s": 0, "text": "\n24 Oct, 2019" }, { "code": null, "e": 174, "s": 28, "text": "In this article, we will learn how to initialize the array in Ruby. There are several ways to create an array. Let’s see each of them one by one." }, { "code": null, ...
Statistics with Python
27 Sep, 2021 Statistics, in general, is the method of collection of data, tabulation, and interpretation of numerical data. It is an area of applied mathematics concern with data collection analysis, interpretation, and presentation. With statistics, we can see how data can be used to solve complex problems. In this t...
[ { "code": null, "e": 52, "s": 24, "text": "\n27 Sep, 2021" }, { "code": null, "e": 350, "s": 52, "text": "Statistics, in general, is the method of collection of data, tabulation, and interpretation of numerical data. It is an area of applied mathematics concern with data collecti...
Gauss’s Forward Interpolation
17 Jun, 2021 Interpolation refers to the process of creating new data points given within the given set of data. The below code computes the desired data point within the given range of discrete data sets using the formula given by Gauss and this method known as Gauss’s Forward Method. Gauss’s Forward Method: The g...
[ { "code": null, "e": 28, "s": 0, "text": "\n17 Jun, 2021" }, { "code": null, "e": 304, "s": 28, "text": "Interpolation refers to the process of creating new data points given within the given set of data. The below code computes the desired data point within the given range of di...
Disease Prediction Using Machine Learning
30 Jan, 2022 This article aims to implement a robust machine learning model that can efficiently predict the disease of a human, based on the symptoms that he/she posses. Let us look into how we can approach this machine learning problem: Gathering the Data: Data preparation is the primary step for any machine learning...
[ { "code": null, "e": 52, "s": 24, "text": "\n30 Jan, 2022" }, { "code": null, "e": 278, "s": 52, "text": "This article aims to implement a robust machine learning model that can efficiently predict the disease of a human, based on the symptoms that he/she posses. Let us look into...
How to convert speech into text using JavaScript ?
05 Jan, 2021 In this article, we will learn to convert speech into text using HTML and JavaScript. Approach: We added a content editable β€œdiv” by which we make any HTML element editable. HTML <div class="words" contenteditable> <p id="p"></p></div> We use the SpeechRecognition object to convert the speech into text...
[ { "code": null, "e": 54, "s": 26, "text": "\n05 Jan, 2021" }, { "code": null, "e": 141, "s": 54, "text": "In this article, we will learn to convert speech into text using HTML and JavaScript. " }, { "code": null, "e": 229, "s": 141, "text": "Approach: We added...
Python Tkinter – ListBox Widget
26 Mar, 2020 Tkinter is a GUI toolkit used in python to make user-friendly GUIs.Tkinter is the most commonly used and the most basic GUI framework available in python. Tkinter uses an object-oriented approach to make GUIs. Note: For more information, refer to Python GUI – tkinter The ListBox widget is used to display d...
[ { "code": null, "e": 53, "s": 25, "text": "\n26 Mar, 2020" }, { "code": null, "e": 263, "s": 53, "text": "Tkinter is a GUI toolkit used in python to make user-friendly GUIs.Tkinter is the most commonly used and the most basic GUI framework available in python. Tkinter uses an obj...
Graph Plotting in Python | Set 2
27 Oct, 2021 Graph Plotting in Python | Set 1 Subplots Subplots are required when we want to show two or more plots in same figure. We can do it in two ways using two slightly different methods.Method 1 Python # importing required modulesimport matplotlib.pyplot as pltimport numpy as np # function to generate coordi...
[ { "code": null, "e": 54, "s": 26, "text": "\n27 Oct, 2021" }, { "code": null, "e": 89, "s": 54, "text": "Graph Plotting in Python | Set 1 " }, { "code": null, "e": 99, "s": 89, "text": " Subplots" }, { "code": null, "e": 247, "s": 99, "tex...
Sort an array of 0s, 1s and 2s | Practice | GeeksforGeeks
Given an array of size N containing only 0s, 1s, and 2s; sort the array in ascending order. Example 1: Input: N = 5 arr[]= {0 2 1 2 0} Output: 0 0 1 2 2 Explanation: 0s 1s and 2s are segregated into ascending order. Example 2: Input: N = 3 arr[] = {0 1 0} Output: 0 0 1 Explanation: 0s 1s and 2s are segregated into...
[ { "code": null, "e": 330, "s": 238, "text": "Given an array of size N containing only 0s, 1s, and 2s; sort the array in ascending order." }, { "code": null, "e": 342, "s": 330, "text": "\nExample 1:" }, { "code": null, "e": 457, "s": 342, "text": "Input: \nN =...
JMS - Quick Guide
The term JMS stands for Java Message Service, a Java API which acts as a interface between applications to create, send, receive and read messages between them. Java Message Service is developed by Sun Microsystems as a part of Java Platform Enterprise Edition. The first version of JMS i.e. JMS 1.0.2b was released in ...
[ { "code": null, "e": 2123, "s": 1961, "text": "The term JMS stands for Java Message Service, a Java API which acts as a interface between applications to create, send, receive and read messages between them. " }, { "code": null, "e": 2359, "s": 2123, "text": "Java Message Service...
How to generate and read QR code with Java using ZXing Library
08 Oct, 2020 QRCode is abbreviated as Quic Response Code and we are quite familiar with QRCodes now a days. It is used for authenticated and quick online payments. A QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary, and kanji) to store data efficiently; extensions may also be used.A QRC...
[ { "code": null, "e": 54, "s": 26, "text": "\n08 Oct, 2020" }, { "code": null, "e": 531, "s": 54, "text": "QRCode is abbreviated as Quic Response Code and we are quite familiar with QRCodes now a days. It is used for authenticated and quick online payments. A QR code uses four sta...