title stringlengths 3 221 | text stringlengths 17 477k | parsed listlengths 0 3.17k |
|---|---|---|
Data Cleaning, Detection and Imputation of Missing Values in R Markdown — Part 2 | by Wendy Wong | Towards Data Science | Data cleaning and transforming variables in R using Australian Tennis Open data on the Men’s tour from 2000 to 2018.
Today is Day 4 and marks the continuation of my #29dayproject bootcamp of data science and things I have learnt in data science. This is a tutorial guide of cleaning and pre-processing the tennis data fr... | [
{
"code": null,
"e": 289,
"s": 172,
"text": "Data cleaning and transforming variables in R using Australian Tennis Open data on the Men’s tour from 2000 to 2018."
},
{
"code": null,
"e": 687,
"s": 289,
"text": "Today is Day 4 and marks the continuation of my #29dayproject bootcam... |
Building a Text Normalizer using NLTK ft. POS tagger | by Nabanita Roy | Towards Data Science | Tokenization and text normalization are the two most fundamental steps of Natural Language Processing (NLP) techniques. Text normalization is the technique which transforms a word into its root or basic form in order to standardize text representation. Note that the basic form is not necessarily a meaningful word and w... | [
{
"code": null,
"e": 765,
"s": 172,
"text": "Tokenization and text normalization are the two most fundamental steps of Natural Language Processing (NLP) techniques. Text normalization is the technique which transforms a word into its root or basic form in order to standardize text representation. No... |
Extends vs Implements in Java - GeeksforGeeks | 22 May, 2020
Inheritance is an important pillar of OOP(Object Oriented Programming). It is the mechanism in Java by which one class is allowed to inherit the features(fields and methods) of another class. There are two main keywords, “extends” and “implements” which are used in Java for inheritance. In this article, th... | [
{
"code": null,
"e": 24324,
"s": 24296,
"text": "\n22 May, 2020"
},
{
"code": null,
"e": 24689,
"s": 24324,
"text": "Inheritance is an important pillar of OOP(Object Oriented Programming). It is the mechanism in Java by which one class is allowed to inherit the features(fields an... |
6 New Awesome Features in Python 3.10 | by Sara A. Metwalli | Towards Data Science | Python is one of the most popular programming languages today. It is used in a wide variety of fields and applications, from learning the basics of computer science to performing complex and straightforward scientific computing tasks to building games. It is even used in advanced areas like data science and quantum com... | [
{
"code": null,
"e": 500,
"s": 172,
"text": "Python is one of the most popular programming languages today. It is used in a wide variety of fields and applications, from learning the basics of computer science to performing complex and straightforward scientific computing tasks to building games. It... |
How to Configure IT Automation Management Using Ansible | This article provides a basic understanding of Ansible technology along with steps to install it. Ansible is an open source IT automation software for configuring, managing and installing software’s on the clients or nodes without any downtime and agent installed on the nodes. It uses SSH to communicate with the client... | [
{
"code": null,
"e": 1385,
"s": 1062,
"text": "This article provides a basic understanding of Ansible technology along with steps to install it. Ansible is an open source IT automation software for configuring, managing and installing software’s on the clients or nodes without any downtime and agent... |
Add AD authentication to your Dash app | by Erik Petrovski | Towards Data Science | In most organizations, login credentials are managed by a directory service like Active Directory. If you manage to integrate Dash with your organization’s directory service then users can simply log in to your Dash app with their existing credentials. A common way of doing this is by way of LDAP (an open protocol for ... | [
{
"code": null,
"e": 735,
"s": 172,
"text": "In most organizations, login credentials are managed by a directory service like Active Directory. If you manage to integrate Dash with your organization’s directory service then users can simply log in to your Dash app with their existing credentials. A ... |
JQuery | parseHTML() method - GeeksforGeeks | 27 Apr, 2020
This parseHTML() Method in jQuery is used to parses a string into an array of DOM nodes.
Syntax:
jQuery.parseHTML(data [, context ] [, keepScripts ])
Parameters: The parseXML() method accepts three parameter that is mentioned above and described below:
data: This parameter is the HTML string to be parsed.... | [
{
"code": null,
"e": 24759,
"s": 24731,
"text": "\n27 Apr, 2020"
},
{
"code": null,
"e": 24848,
"s": 24759,
"text": "This parseHTML() Method in jQuery is used to parses a string into an array of DOM nodes."
},
{
"code": null,
"e": 24856,
"s": 24848,
"text": "S... |
Tryit Editor v3.7 | CSS Grid Item
Tryit: Using grid-area to name grid items | [
{
"code": null,
"e": 23,
"s": 9,
"text": "CSS Grid Item"
}
] |
How to compare two columns in an R data frame for an exact match? | Sometimes analysis requires the user to check if values in two columns of an R data frame are exactly the same or not, this is helpful to analyze very large data frames if we suspect the comparative values in two columns. This can be easily done with the help of ifelse function.
Consider the below data frame −
Live De... | [
{
"code": null,
"e": 1342,
"s": 1062,
"text": "Sometimes analysis requires the user to check if values in two columns of an R data frame are exactly the same or not, this is helpful to analyze very large data frames if we suspect the comparative values in two columns. This can be easily done with th... |
strace - Unix, Linux Command | strace -c [
-eexpr ]
...
[
-Ooverhead ]
[
-Ssortby ]
[
command [
arg ...
]
]
In the simplest case
strace runs the specified
command until it exits.
It intercepts and records the system calls which are called
by a process and the signals which are received by a process.
The name of each system call, its arguments and ... | [
{
"code": null,
"e": 10656,
"s": 10577,
"text": "\nstrace -c [\n-eexpr ]\n...\n[\n-Ooverhead ]\n[\n-Ssortby ]\n[\ncommand [\narg ...\n]\n]\n"
},
{
"code": null,
"e": 10991,
"s": 10656,
"text": "\nIn the simplest case\nstrace runs the specified\ncommand until it exits.\nIt interce... |
MySQL query to set current date in the datetime field for all the column values | Let us first create a table −
mysql> create table DemoTable821(AdmissionDate datetime);
Query OK, 0 rows affected (1.24 sec)
Insert some records in the table using insert command −
mysql> insert into DemoTable821 values('2019-01-21');
Query OK, 1 row affected (0.08 sec)
mysql> insert into DemoTable821 values('2018-11-0... | [
{
"code": null,
"e": 1092,
"s": 1062,
"text": "Let us first create a table −"
},
{
"code": null,
"e": 1187,
"s": 1092,
"text": "mysql> create table DemoTable821(AdmissionDate datetime);\nQuery OK, 0 rows affected (1.24 sec)"
},
{
"code": null,
"e": 1243,
"s": 1187... |
MS SQL Server - Drop Database | To remove your database from MS SQL Server, use drop database command. Following two methods can be used for this purpose.
Following is the basic syntax for removing database from MS SQL Server.
Drop database <your database name>
To remove database name ‘Testdb’, run the following query.
Drop database Testdb
Connect ... | [
{
"code": null,
"e": 2358,
"s": 2235,
"text": "To remove your database from MS SQL Server, use drop database command. Following two methods can be used for this purpose."
},
{
"code": null,
"e": 2430,
"s": 2358,
"text": "Following is the basic syntax for removing database from MS... |
Getter and Setter in Python | For the purpose of data encapsulation, most object oriented languages use getters and setters method. This is because we want to hide the attributes of a object class from other classes so that no accidental modification of the data happens by methods in other classes.
As the name suggests, getters are the methods whic... | [
{
"code": null,
"e": 1332,
"s": 1062,
"text": "For the purpose of data encapsulation, most object oriented languages use getters and setters method. This is because we want to hide the attributes of a object class from other classes so that no accidental modification of the data happens by methods i... |
Serverless - Layer Creation | Layers are a way of isolating code blocks. Say you want to import the NumPy library in your application. You trust the library and there's hardly any chance that you will be making changes in the source code of that library. Therefore, you won't like it if the source code of NumPy clutters your application workspace. S... | [
{
"code": null,
"e": 2863,
"s": 2003,
"text": "Layers are a way of isolating code blocks. Say you want to import the NumPy library in your application. You trust the library and there's hardly any chance that you will be making changes in the source code of that library. Therefore, you won't like it... |
Binary Search | Practice | GeeksforGeeks | Given a sorted array of size N and an integer K, find the position at which K is present in the array using binary search.
Example 1:
Input:
N = 5
arr[] = {1 2 3 4 5}
K = 4
Output: 3
Explanation: 4 appears at index 3.
Example 2:
Input:
N = 5
arr[] = {11 22 33 44 55}
K = 445
Output: -1
Explanation: 445 is not presen... | [
{
"code": null,
"e": 361,
"s": 238,
"text": "Given a sorted array of size N and an integer K, find the position at which K is present in the array using binary search."
},
{
"code": null,
"e": 373,
"s": 361,
"text": "\nExample 1:"
},
{
"code": null,
"e": 458,
"s":... |
How to format number in JSP? | The <fmt:formatNumber> tag is used to format numbers, percentages, and currencies.
The <fmt:formatNumber> tag has the following attributes −
<%@ taglib prefix = "c" uri = "http://java.sun.com/jsp/jstl/core" %>
<%@ taglib prefix = "fmt" uri = "http://java.sun.com/jsp/jstl/fmt" %>
<html>
<head>
<title>JSTL fmt:f... | [
{
"code": null,
"e": 1145,
"s": 1062,
"text": "The <fmt:formatNumber> tag is used to format numbers, percentages, and currencies."
},
{
"code": null,
"e": 1203,
"s": 1145,
"text": "The <fmt:formatNumber> tag has the following attributes −"
},
{
"code": null,
"e": 1973... |
Android Material Tabs in Kotlin - GeeksforGeeks | 30 Aug, 2021
In Android, TabLayout is a new element introduced in the Design Support library. It provides a horizontal layout to display tabs on the screen. We can display more screens on a single screen using tabs. We can quickly swipe between the tabs. TabLayout is basically ViewClass required to be added into our la... | [
{
"code": null,
"e": 24106,
"s": 24078,
"text": "\n30 Aug, 2021"
},
{
"code": null,
"e": 24451,
"s": 24106,
"text": "In Android, TabLayout is a new element introduced in the Design Support library. It provides a horizontal layout to display tabs on the screen. We can display more... |
Create an italic text in HTML | The HTML <i> tag is used to display the content in italic.You can try to run the following code to create an italic text in HTML −
<!DOCTYPE html>
<html>
<head>
<title>HTML i Tag</title>
</head>
<body>
<p>We liked the movie <i>Avengers</i></p>
</body>
</html> | [
{
"code": null,
"e": 1193,
"s": 1062,
"text": "The HTML <i> tag is used to display the content in italic.You can try to run the following code to create an italic text in HTML −"
},
{
"code": null,
"e": 1346,
"s": 1193,
"text": "<!DOCTYPE html>\n<html>\n <head>\n <title>HT... |
Dynamic ProgressBar in Kotlin - GeeksforGeeks | 23 Feb, 2021
Android ProgressBar is user interface control that is used to show some kind of progress. For instance, loading of some page, downloading of some file or waiting for some event to complete.
In this article we will be discussing how to programmatically create a progress bar in Kotlin .
Firstly, we need to c... | [
{
"code": null,
"e": 23627,
"s": 23599,
"text": "\n23 Feb, 2021"
},
{
"code": null,
"e": 23817,
"s": 23627,
"text": "Android ProgressBar is user interface control that is used to show some kind of progress. For instance, loading of some page, downloading of some file or waiting f... |
Python + Selenium | How to locate elements in span class & not unique ID | We can locate elements in span class and not unique id with the help of the Selenium webdriver. We can identify an element having a class attribute with the help of the locator xpath, css or class name.
To locate elements with these locators we have to use the By.xpath, By.xpath or By.cssSelector method. Then pass the ... | [
{
"code": null,
"e": 1265,
"s": 1062,
"text": "We can locate elements in span class and not unique id with the help of the Selenium webdriver. We can identify an element having a class attribute with the help of the locator xpath, css or class name."
},
{
"code": null,
"e": 1427,
"s"... |
Building Snowpipe on Azure Blob Storage Using Azure Portal Web UI for Snowflake Data Warehouse | by Christopher Tao | Towards Data Science | Snowpipe is a built-in data ingestion mechanism of Snowflake Data Warehouse. It is able to monitor and automatically pick up flat files from cloud storage (e.g. Azure Blob Storage, Amazon S3) and use the “COPY INTO” SQL command to load the data into a Snowflake table.
In the official documentation, you’ll find a nice t... | [
{
"code": null,
"e": 441,
"s": 172,
"text": "Snowpipe is a built-in data ingestion mechanism of Snowflake Data Warehouse. It is able to monitor and automatically pick up flat files from cloud storage (e.g. Azure Blob Storage, Amazon S3) and use the “COPY INTO” SQL command to load the data into a Sno... |
How to display HTML element with JavaScript? | Use the visibility property in JavaScript to show an element. You can try to run the following code to learn how to work with visibility property:
<!DOCTYPE html>
<html>
<body>
<p id="pid">Demo Text</p>
<button type = "button" onclick = "displayHide()"> Hide </button>
<button type = "button" onclic... | [
{
"code": null,
"e": 1209,
"s": 1062,
"text": "Use the visibility property in JavaScript to show an element. You can try to run the following code to learn how to work with visibility property:"
},
{
"code": null,
"e": 1703,
"s": 1209,
"text": "<!DOCTYPE html>\n<html>\n <body>\... |
Angular CLI - ng test Command | This chapter explains the syntax, argument and options of ng test command along with an example.
The syntax for ng test command is as follows −
ng test <project> [options]
ng t <project> [options]
ng test run the unit test cases on angular app code.
The argument for ng test command is as follows −
Options are optiona... | [
{
"code": null,
"e": 2172,
"s": 2075,
"text": "This chapter explains the syntax, argument and options of ng test command along with an example."
},
{
"code": null,
"e": 2219,
"s": 2172,
"text": "The syntax for ng test command is as follows −"
},
{
"code": null,
"e": 2... |
How to add a margin to a tkinter window? - GeeksforGeeks | 18 Nov, 2021
In this article, we will see how to add a margin to the Tkinter window.
We will use the frame for adding the margin:
Syntax:
Frame(root, options)
Approach:
Importing the module.
Create the main window (container)
Use frame and frame.pack()
Apply the event Trigger on the widgets.
Without using frame method... | [
{
"code": null,
"e": 23901,
"s": 23873,
"text": "\n18 Nov, 2021"
},
{
"code": null,
"e": 23974,
"s": 23901,
"text": "In this article, we will see how to add a margin to the Tkinter window. "
},
{
"code": null,
"e": 24019,
"s": 23974,
"text": "We will use the f... |
AWS DynamoDB - Read Data from a Table - GeeksforGeeks | 22 Mar, 2021
AWS DynamoDB is a NoSQL managed database that stores semi-structured data i.e. key-value and document data. It stores data in form of an item. An item consists of attributes. Upon table creation in DynamoDB, it only requires a primary key to differentiate between items and no schema is to be defined. Each ... | [
{
"code": null,
"e": 25156,
"s": 25128,
"text": "\n22 Mar, 2021"
},
{
"code": null,
"e": 25512,
"s": 25156,
"text": "AWS DynamoDB is a NoSQL managed database that stores semi-structured data i.e. key-value and document data. It stores data in form of an item. An item consists of ... |
Exploring Brent Oil Prices Data using Python | by Sadrach Pierre, Ph.D. | Towards Data Science | In this post, we will perform some simple exploratory analysis on the Brent Oil Prices dataset. We start by importing the pandas library and reading the data into a pandas data frame:
import pandas as pddf = pd.read_csv("BrentOilPRices.csv")
We can also display the first five rows:
print(df.head())
Next, we can convert... | [
{
"code": null,
"e": 356,
"s": 172,
"text": "In this post, we will perform some simple exploratory analysis on the Brent Oil Prices dataset. We start by importing the pandas library and reading the data into a pandas data frame:"
},
{
"code": null,
"e": 414,
"s": 356,
"text": "im... |
Obj-C Memory Management | Memory management is one of the most important process in any programming language. It is the process by which the memory of objects are allocated when they are required and deallocated when they are no longer required.
Managing object memory is a matter of performance; if an application doesn't free unneeded objects, ... | [
{
"code": null,
"e": 2780,
"s": 2560,
"text": "Memory management is one of the most important process in any programming language. It is the process by which the memory of objects are allocated when they are required and deallocated when they are no longer required."
},
{
"code": null,
"... |
Face Detection, Recognition and Emotion Detection in 8 lines of code! | by Priya Dwivedi | Towards Data Science | Humans have always had the innate ability to recognize and distinguish between faces. Now computers are able to do the same. This opens up tons of applications. Face detection and Recognition can be used to improve access and security like the latest Apple Iphone does (see gif below), allow payments to be processed wit... | [
{
"code": null,
"e": 1037,
"s": 171,
"text": "Humans have always had the innate ability to recognize and distinguish between faces. Now computers are able to do the same. This opens up tons of applications. Face detection and Recognition can be used to improve access and security like the latest App... |
Serving TensorFlow models with TF Serving | by Álvaro Bartolomé | Towards Data Science | TensorFlow Serving is a flexible, high-performance serving system for machine learning models, designed for production environments. TensorFlow Serving makes it easy to deploy new algorithms and experiments, while keeping the same server architecture and APIs. TensorFlow Serving provides out-of-the-box integration with... | [
{
"code": null,
"e": 580,
"s": 172,
"text": "TensorFlow Serving is a flexible, high-performance serving system for machine learning models, designed for production environments. TensorFlow Serving makes it easy to deploy new algorithms and experiments, while keeping the same server architecture and ... |
Lodash _.strContains() Method - GeeksforGeeks | 30 Sep, 2020
The Lodash _.strContains() method checks whether the given string contains the searched string or not and returns the corresponding boolean value.
Syntax:
_.strContains( string, searched_str);
Parameters: This method accepts two parameters as mentioned above and described below:
String: This method takes ... | [
{
"code": null,
"e": 24909,
"s": 24881,
"text": "\n30 Sep, 2020"
},
{
"code": null,
"e": 25056,
"s": 24909,
"text": "The Lodash _.strContains() method checks whether the given string contains the searched string or not and returns the corresponding boolean value."
},
{
"c... |
Viewing & Clipping | The primary use of clipping in computer graphics is to remove objects, lines, or line segments that are outside the viewing pane. The viewing transformation is insensitive to the position of points relative to the viewing volume − especially those points behind the viewer − and it is necessary to remove these points be... | [
{
"code": null,
"e": 2265,
"s": 1919,
"text": "The primary use of clipping in computer graphics is to remove objects, lines, or line segments that are outside the viewing pane. The viewing transformation is insensitive to the position of points relative to the viewing volume − especially those point... |
Power BI Functions — (List.Contains, List.ContainsAny, List.ContainsAll) | by Peter Hui | Towards Data Science | ...usefully tools for your data journey.
This article will introduce you to the Contains functions with lists. It’s a great function to use in Power Query. There are little nuances for each but I hope this article will help you get started.
Lists in Power Query are written with {} brackets. They can be {1,2,3} or even ... | [
{
"code": null,
"e": 213,
"s": 172,
"text": "...usefully tools for your data journey."
},
{
"code": null,
"e": 413,
"s": 213,
"text": "This article will introduce you to the Contains functions with lists. It’s a great function to use in Power Query. There are little nuances for e... |
Java BeanUtils - Basic Property Access | You can access the basic properties by using the following ways:
Simple Property
Simple Property
Indexed Property
Indexed Property
Mapped Property
Mapped Property
You can get and set the simple property values by using the below API signatures:
PropertyUtils.getSimpleProperty(Object, String)
PropertyUtils.getSimpleProp... | [
{
"code": null,
"e": 2221,
"s": 2156,
"text": "You can access the basic properties by using the following ways:"
},
{
"code": null,
"e": 2237,
"s": 2221,
"text": "Simple Property"
},
{
"code": null,
"e": 2253,
"s": 2237,
"text": "Simple Property"
},
{
... |
One Potential Cause of Overfitting That I Never Noticed Before | by Yufeng | Towards Data Science | “Why is my tuned model still overfitting?”
“Did you use cross-validation?”
“Of course yes.”
“What model did you use and what are the hyperparameters you tuned?”
“Random Forest regressor and I tuned tree number and maximum feature numbers per tree.”
“I need to check your code.”
This was the dialogue between my wife and ... | [
{
"code": null,
"e": 215,
"s": 172,
"text": "“Why is my tuned model still overfitting?”"
},
{
"code": null,
"e": 247,
"s": 215,
"text": "“Did you use cross-validation?”"
},
{
"code": null,
"e": 264,
"s": 247,
"text": "“Of course yes.”"
},
{
"code": nul... |
numpy.delete() in Python - GeeksforGeeks | 28 Mar, 2022
The numpy.delete() function returns a new array with the deletion of sub-arrays along with the mentioned axis.
Syntax:
numpy.delete(array, object, axis = None)
Parameters :
array : [array_like]Input array.
object : [int, array of ints]Sub-array to delete
axis : Axis along which we want to delete ... | [
{
"code": null,
"e": 24266,
"s": 24238,
"text": "\n28 Mar, 2022"
},
{
"code": null,
"e": 24379,
"s": 24266,
"text": "The numpy.delete() function returns a new array with the deletion of sub-arrays along with the mentioned axis. "
},
{
"code": null,
"e": 24387,
"s... |
Split a number into 3 parts such that none of the parts is divisible by 3 | 24 Jun, 2022
You are given a number ‘N’. Your task is to split this number into 3 positive integers x, y, and z, such that their sum is equal to ‘N’ and none of the 3 integers is a multiple of 3. Given that N>=2.
Examples:
Input : N = 10 Output : x = 1, y = 2, z = 7 Note that x + y + z = N and x, y & z are not divis... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n24 Jun, 2022"
},
{
"code": null,
"e": 253,
"s": 52,
"text": "You are given a number ‘N’. Your task is to split this number into 3 positive integers x, y, and z, such that their sum is equal to ‘N’ and none of the 3 integers is a multip... |
Variation of Pressure With Depth | 21 Jul, 2021
It’s reasonable to assume that the deeper a person travels into a liquid or gas, the higher the pressure exerted on him by the surrounding fluid. The reason for the increasing pressure is that the deeper a person goes into a fluid, the more fluid he has over top of him, and therefore the more weight he has... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n21 Jul, 2021"
},
{
"code": null,
"e": 361,
"s": 52,
"text": "It’s reasonable to assume that the deeper a person travels into a liquid or gas, the higher the pressure exerted on him by the surrounding fluid. The reason for the increasin... |
How to check version of python modules? | When you install Python, you also get the Python package manager, pip. You can use pip to get the versions of python modules. If you want to list all installed Python modules with their version numbers, use the following command:
$ pip freeze
You will get the output:
asn1crypto==0.22.0
astroid==1.5.2
attrs==16.3.0
Auto... | [
{
"code": null,
"e": 1417,
"s": 1187,
"text": "When you install Python, you also get the Python package manager, pip. You can use pip to get the versions of python modules. If you want to list all installed Python modules with their version numbers, use the following command:"
},
{
"code": n... |
Node.js crypto.createCipheriv() Method | 17 Nov, 2021
The crypto.createCipheriv() method is an inbuilt application programming interface of the crypto module which is used to create a Cipher object, with the stated algorithm, key and initialization vector (iv).Syntax:
crypto.createCipheriv( algorithm, key, iv, options )
Parameters: This method accept four pa... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n17 Nov, 2021"
},
{
"code": null,
"e": 244,
"s": 28,
"text": "The crypto.createCipheriv() method is an inbuilt application programming interface of the crypto module which is used to create a Cipher object, with the stated algorithm, key... |
Intellij Idea - Debugging | Debugger makes application debugging much easier. Using debugger, we can stop the execution of program at a certain point, inspect variables, step into function and do many things. IntelliJ provides inbuilt Java debugger.
Breakpoint allows stopping program execution at certain point. Breakpoints can be set by hovering ... | [
{
"code": null,
"e": 2445,
"s": 2223,
"text": "Debugger makes application debugging much easier. Using debugger, we can stop the execution of program at a certain point, inspect variables, step into function and do many things. IntelliJ provides inbuilt Java debugger."
},
{
"code": null,
... |
Find the count of even odd pairs in a given Array | 08 Apr, 2021
Given an array arr[], the task is to find the count even-odd pairs in the array.Examples:
Input: arr[] = { 1, 2, 1, 3 } Output: 2 Explanation: The 2 pairs of the form (even, odd) are {2, 1} and {2, 3}.
Input: arr[] = { 5, 4, 1, 2, 3} Output: 3
Naive Approach:
Run two nested loops to get all the possi... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n08 Apr, 2021"
},
{
"code": null,
"e": 119,
"s": 28,
"text": "Given an array arr[], the task is to find the count even-odd pairs in the array.Examples: "
},
{
"code": null,
"e": 232,
"s": 119,
"text": "Input: arr[] = ... |
Program for Octal to Decimal Conversion | 05 Apr, 2022
Given an octal number as input, we need to write a program to convert the given octal number into equivalent decimal number.
Examples:
Input : 67
Output: 55
Input : 512
Output: 330
Input : 123
Output: 83
The idea is to extract the digits of a given octal number starting from the rightmost digit and keep ... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n05 Apr, 2022"
},
{
"code": null,
"e": 177,
"s": 52,
"text": "Given an octal number as input, we need to write a program to convert the given octal number into equivalent decimal number."
},
{
"code": null,
"e": 187,
"s"... |
How to upload images in MySQL using PHP PDO ? | 10 Jun, 2022
In this article, we will upload images to the MySQL database using PHP PDO and display them on the webpage.
Approach: Make sure you have a XAMPP server or WAMP server installed on your machine. In this tutorial, we will be using the WAMP server.
Article content:
Table StructureDatabase configuration using... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n10 Jun, 2022"
},
{
"code": null,
"e": 161,
"s": 52,
"text": "In this article, we will upload images to the MySQL database using PHP PDO and display them on the webpage. "
},
{
"code": null,
"e": 299,
"s": 161,
"text... |
Python program to convert time from 12 hour to 24 hour format | Given a PC's time and it converted to 24 hour format. Here we are applying string slicing.
Here we follow the rules if time is PM then add 12 with hour part and if time is AM then don't add.
Input: 12:20:20 PM
Output: 24:20:20
Step 1: Input current datetime.
Step 2: Extract only time from datetime format.
Step 3: Using... | [
{
"code": null,
"e": 1278,
"s": 1187,
"text": "Given a PC's time and it converted to 24 hour format. Here we are applying string slicing."
},
{
"code": null,
"e": 1378,
"s": 1278,
"text": "Here we follow the rules if time is PM then add 12 with hour part and if time is AM then do... |
Javascript | Window confirm() Method | 01 Jun, 2022
The confirm() method is used to display a modal dialog with an optional message and two buttons, OK and Cancel. It returns true if the user clicks “OK”, and false otherwise. It prevents the user from accessing other parts of the page until the box is closed.
Syntax:
confirm(message)
message is the optiona... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n01 Jun, 2022"
},
{
"code": null,
"e": 288,
"s": 28,
"text": "The confirm() method is used to display a modal dialog with an optional message and two buttons, OK and Cancel. It returns true if the user clicks “OK”, and false otherwise. I... |
How to create a line chart with mean and standard deviation using ggplot2 in R? | Sometimes we have mean and standard deviation given for groups or factors, these are generally obtained from previous research studies and is referred to as the secondary data. In this case. the line chart with mean and standard deviation using ggplot2 can be created by defining the minimum and maximum inside geom_erro... | [
{
"code": null,
"e": 1745,
"s": 1187,
"text": "Sometimes we have mean and standard deviation given for groups or factors, these are generally obtained from previous research studies and is referred to as the secondary data. In this case. the line chart with mean and standard deviation using ggplot2 ... |
PLSQL | REMAINDER Function | 18 Oct, 2019
The REMAINDER function is an inbuilt function in PLSQL which is used to return the remainder of a divided by b.
Syntax:
REMAINDER(a, b)
Parameters Used:This function accepts two parameters a and b which is used in calculating the remainder when a is divided by b.
Return Value:This function returns a numeri... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n18 Oct, 2019"
},
{
"code": null,
"e": 140,
"s": 28,
"text": "The REMAINDER function is an inbuilt function in PLSQL which is used to return the remainder of a divided by b."
},
{
"code": null,
"e": 148,
"s": 140,
"te... |
Prefix Sum Array – Implementation and Applications in Competitive Programming | 02 Jul, 2022
Given an array arr[] of size n, its prefix sum array is another array prefixSum[] of the same size, such that the value of prefixSum[i] is arr[0] + arr[1] + arr[2] ... arr[i].
Examples :
Input : arr[] = {10, 20, 10, 5, 15}
Output : prefixSum[] = {10, 30, 40, 45, 60}
Explanation : While traversing the ar... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n02 Jul, 2022"
},
{
"code": null,
"e": 230,
"s": 54,
"text": "Given an array arr[] of size n, its prefix sum array is another array prefixSum[] of the same size, such that the value of prefixSum[i] is arr[0] + arr[1] + arr[2] ... arr[i]... |
Java.io.Console class in Java | 09 Jan, 2017
The Java.io.Console class provides methods to access the character-based console device, if any, associated with the current Java virtual machine. The Console class was added to java.io by JDK 6.
Important Points:
It is used to read from and write to the console, if one exists.
Console is primarily a conve... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n09 Jan, 2017"
},
{
"code": null,
"e": 250,
"s": 54,
"text": "The Java.io.Console class provides methods to access the character-based console device, if any, associated with the current Java virtual machine. The Console class was added... |
How to Change Axis Intervals in R Plots? | 19 Dec, 2021
In this article, we will be looking at the different approaches to change axis intervals in the R programming language.
In this method of changing the axis intervals, the user needs to call the xlim() and ylim() functions, passing the arguments of the range of the axis intervals required by the user in for... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n19 Dec, 2021"
},
{
"code": null,
"e": 148,
"s": 28,
"text": "In this article, we will be looking at the different approaches to change axis intervals in the R programming language."
},
{
"code": null,
"e": 480,
"s": 148,... |
Merge multiple CSV files using R | 06 Jun, 2021
In this article, we will be looking at the approach to merge multiple CSV files in the R programming language.
In this approach to merge multiple CSV files, the user needs to install and import three different packages namely- dplyr,plyr, and readr in the R programming language console to call the function... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n06 Jun, 2021"
},
{
"code": null,
"e": 139,
"s": 28,
"text": "In this article, we will be looking at the approach to merge multiple CSV files in the R programming language."
},
{
"code": null,
"e": 551,
"s": 139,
"tex... |
Minimum Steps to obtain N from 1 by the given operations | 05 Jul, 2022
Given an integer N, the task is to find the minimum number of operations needed to obtain the number N starting from 1. Below are the operations:
Add 1 to the current number.
Multiply the current number by 2.
Multiply the current number by 3.
Print the minimum number of operations required and the corresp... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n05 Jul, 2022"
},
{
"code": null,
"e": 199,
"s": 52,
"text": "Given an integer N, the task is to find the minimum number of operations needed to obtain the number N starting from 1. Below are the operations: "
},
{
"code": null,... |
Lodash _.chain() Method | 16 Sep, 2020
The Lodash _.chain() method used to wrap the value with explicit method chain sequences enabled.
Syntax:
_.chain(value)
Parameter: This method accept a single a parameter as mentioned above and described below:
value: This parameter holds the value to wrap.
Return value: This method returns the wrapped v... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n16 Sep, 2020"
},
{
"code": null,
"e": 126,
"s": 28,
"text": "The Lodash _.chain() method used to wrap the value with explicit method chain sequences enabled. "
},
{
"code": null,
"e": 134,
"s": 126,
"text": "Syntax:"... |
Python program to convert meters in yards and vice versa | 03 Jan, 2021
Given the distance in either meter or yard, the task here is to generate a Python program that converts distance given in meters to yards and vice versa.
Examples:
Input: Length in Meter: 245
Length in Yard : 100
Output: 245 Meter in Yard = 267.9344
100 Yards in Meter = 91.4403
Input: Le... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n03 Jan, 2021"
},
{
"code": null,
"e": 182,
"s": 28,
"text": "Given the distance in either meter or yard, the task here is to generate a Python program that converts distance given in meters to yards and vice versa."
},
{
"code":... |
Python | Visualize missing values (NaN) values using Missingno Library | 04 Jul, 2019
In the case of a real-world dataset, it is very common that some values in the dataset are missing. We represent these missing values as NaN (Not a Number) values. But to build a good machine learning model our dataset should be complete. That’s why we use some imputation techniques to replace the NaN valu... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n04 Jul, 2019"
},
{
"code": null,
"e": 478,
"s": 28,
"text": "In the case of a real-world dataset, it is very common that some values in the dataset are missing. We represent these missing values as NaN (Not a Number) values. But to buil... |
Selenium – Search for text on page | 03 Mar, 2021
Prerequisite:- Selenium
Selenium is a powerful tool for controlling web browsers through programs and performing browser automation. It is functional for all browsers, works on all major OS and its scripts are written in various languages i.e Python, Java, C#, etc, we will be working with Python.
In this a... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n03 Mar, 2021"
},
{
"code": null,
"e": 52,
"s": 28,
"text": "Prerequisite:- Selenium"
},
{
"code": null,
"e": 326,
"s": 52,
"text": "Selenium is a powerful tool for controlling web browsers through programs and perfor... |
Largest number that divides x and is co-prime with y | 12 Apr, 2021
Given two positive numbers x and y. Find the maximum valued integer a such that:
a divides x i.e. x % a = 0a and y are co-prime i.e. gcd(a, y) = 1
a divides x i.e. x % a = 0
a and y are co-prime i.e. gcd(a, y) = 1
Examples :
Input : x = 15
y = 3
Output : a = 5
Explanation: 5 is the max integer... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n12 Apr, 2021"
},
{
"code": null,
"e": 135,
"s": 52,
"text": "Given two positive numbers x and y. Find the maximum valued integer a such that: "
},
{
"code": null,
"e": 201,
"s": 135,
"text": "a divides x i.e. x % a... |
Virtual Function in C++ | 08 Jul, 2022
A virtual function is a member function which is declared within a base class and is re-defined (overridden) by a derived class. When you refer to a derived class object using a pointer or a reference to the base class, you can call a virtual function for that object and execute the derived class’s version... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n08 Jul, 2022"
},
{
"code": null,
"e": 380,
"s": 54,
"text": "A virtual function is a member function which is declared within a base class and is re-defined (overridden) by a derived class. When you refer to a derived class object usin... |
Program for sum of geometric series | 22 Jun, 2022
A Geometric series is a series with a constant ratio between successive terms. The first term of the series is denoted by a and common ratio is denoted by r. The series looks like this :- a, ar, ar2, ar3, ar4, . . .. The task is to find the sum of such a series. Examples :
Input : a = 1
r = 0.5
... | [
{
"code": null,
"e": 53,
"s": 25,
"text": "\n22 Jun, 2022"
},
{
"code": null,
"e": 327,
"s": 53,
"text": "A Geometric series is a series with a constant ratio between successive terms. The first term of the series is denoted by a and common ratio is denoted by r. The series looks... |
Python Program to Sort the list according to the column using lambda | 11 May, 2020
Given a list, the task is to sort the list according to the column using the lambda approach.
Examples:
Input :array = [[1, 3, 3], [2, 1, 2], [3, 2, 1]]Output :Sorted array specific to column 0, [[1, 3, 3], [2, 1, 2], [3, 2, 1]]Sorted array specific to column 1, [[2, 1, 2], [3, 2, 1], [1, 3, 3]]Sorted arra... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n11 May, 2020"
},
{
"code": null,
"e": 148,
"s": 54,
"text": "Given a list, the task is to sort the list according to the column using the lambda approach."
},
{
"code": null,
"e": 158,
"s": 148,
"text": "Examples:"
... |
Python | shutil.chown() method | 12 Oct, 2021
Shutil module in Python provides many functions of high-level operations on files and collections of files. It comes under Python’s standard utility modules. This module helps in automating process of chowning and removal of files and directories.shutil.chown() method in Python is used to change the owner ... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n12 Oct, 2021"
},
{
"code": null,
"e": 374,
"s": 28,
"text": "Shutil module in Python provides many functions of high-level operations on files and collections of files. It comes under Python’s standard utility modules. This module helps... |
What are jQuery string methods? | jQuery string methods helps in string manipulation and makes your work easier while using strings. String methods find the length of the string, a string in a string, extract string parts, etc. jQuery is a JavaScript library, so using JavaScript String functions in it is perfectly fine.
You can try to run the following... | [
{
"code": null,
"e": 1350,
"s": 1062,
"text": "jQuery string methods helps in string manipulation and makes your work easier while using strings. String methods find the length of the string, a string in a string, extract string parts, etc. jQuery is a JavaScript library, so using JavaScript String ... |
Extract Video Frames from Webcam and Save to Images using Python - GeeksforGeeks | 19 Aug, 2021
OpenCV library can be used to perform multiple operations on videos. Let’s try to do something interesting using CV2. Le’s record a video as form webcam and break the video into the frame by frame and save those frames.
This module does not come built-in with Python. To install it type the below command i... | [
{
"code": null,
"e": 25665,
"s": 25637,
"text": "\n19 Aug, 2021"
},
{
"code": null,
"e": 25886,
"s": 25665,
"text": "OpenCV library can be used to perform multiple operations on videos. Let’s try to do something interesting using CV2. Le’s record a video as form webcam and break ... |
How to plot a Histogram in MATLAB ? - GeeksforGeeks | 06 Sep, 2021
A Histogram is a diagrammatic representation of a group of data over user-specified ranges. Basically, the histogram contains several bins. Bins are non-overlapping intervals in which the data is spread. In MATLAB we have a function named hist() which allows us to plot a bar graph.
Syntax:
hist(X)
where X... | [
{
"code": null,
"e": 25899,
"s": 25871,
"text": "\n06 Sep, 2021"
},
{
"code": null,
"e": 26183,
"s": 25899,
"text": "A Histogram is a diagrammatic representation of a group of data over user-specified ranges. Basically, the histogram contains several bins. Bins are non-overlappin... |
Python os.unlink() Method | Python method unlink() removes (deletes) the file path.If the path is a directory, OSError is raised.
Following is the syntax for unlink() method −
os.unlink(path)
path − This is the path, which is to be removed.
path − This is the path, which is to be removed.
This method does not return any value.
The following exam... | [
{
"code": null,
"e": 2346,
"s": 2244,
"text": "Python method unlink() removes (deletes) the file path.If the path is a directory, OSError is raised."
},
{
"code": null,
"e": 2392,
"s": 2346,
"text": "Following is the syntax for unlink() method −"
},
{
"code": null,
"e... |
Program to print Reverse Floyd’s triangle in C | Floyd's triangle is a right-angled triangular array of natural numbers, used in computer science education. It is named after Robert Floyd. It is defined by filling the rows of the triangle with consecutive numbers, starting with a 1 in the top left corner
1 15 14 13 12 11
2 3 ... | [
{
"code": null,
"e": 1319,
"s": 1062,
"text": "Floyd's triangle is a right-angled triangular array of natural numbers, used in computer science education. It is named after Robert Floyd. It is defined by filling the rows of the triangle with consecutive numbers, starting with a 1 in the top left cor... |
How to add, delete, change ownership (of files) of a group in Linux? | We know that Linux is a multiuser operating system so every file or directory belongs to an owner and group. To change ownership of files or directories we use chown (change ownership) command and to change the group ownership of files or directories we use the chgrp command.
The chgrp (change group) command is used to... | [
{
"code": null,
"e": 1339,
"s": 1062,
"text": "We know that Linux is a multiuser operating system so every file or directory belongs to an owner and group. To change ownership of files or directories we use chown (change ownership) command and to change the group ownership of files or directories we... |
How to Deploy Web Apps with Azure | by James Briggs | Towards Data Science | Azure — or any other cloud service — has made sharing the fruits of our creative labor easier than ever.
We can take an app built with Angular (an incredibly easy framework to pick-up) and deploy it to the world quicker than the time it takes to make coffee.
That, to me, is truly phenomenal; the ease and speed at which... | [
{
"code": null,
"e": 277,
"s": 172,
"text": "Azure — or any other cloud service — has made sharing the fruits of our creative labor easier than ever."
},
{
"code": null,
"e": 431,
"s": 277,
"text": "We can take an app built with Angular (an incredibly easy framework to pick-up) a... |
Count ways to reach the nth stair using step 1, 2 or 3 in C++ | We are given a total number of steps in a staircase that is n. A person can reach the next floor by skipping 1, 2 or 3 steps at a time. The goal is to find the number of ways in which the next floor can be reached by doing so.
We will use the recursive method by keeping in mind that to reach any i’th step, a person has... | [
{
"code": null,
"e": 1289,
"s": 1062,
"text": "We are given a total number of steps in a staircase that is n. A person can reach the next floor by skipping 1, 2 or 3 steps at a time. The goal is to find the number of ways in which the next floor can be reached by doing so."
},
{
"code": null... |
How to set the grid color of a table in Java? | To set the grid color of a table, use the setGridColor() method.
table.setGridColor(Color.yellow);
Above, we have used the Color class to set the color.
The following is an example to set the grid color of a table −
package my;
import java.awt.Color;
import javax.swing.BorderFactory;
import javax.swing.JFrame;
import j... | [
{
"code": null,
"e": 1127,
"s": 1062,
"text": "To set the grid color of a table, use the setGridColor() method."
},
{
"code": null,
"e": 1161,
"s": 1127,
"text": "table.setGridColor(Color.yellow);"
},
{
"code": null,
"e": 1215,
"s": 1161,
"text": "Above, we ha... |
Multitenant DB Container Management | SAP HANA system can be configured in a single container database system or multiple container system. To set up tenant databases, your system should be configured in multiple container mode. You can also convert a single container mode to multiple container mode, before you create and configure tenant database.
When SA... | [
{
"code": null,
"e": 2637,
"s": 2324,
"text": "SAP HANA system can be configured in a single container database system or multiple container system. To set up tenant databases, your system should be configured in multiple container mode. You can also convert a single container mode to multiple conta... |
How to change the figsize for matshow() in Jupyter notebook using Matplotlib? | To change the figsize for mathshow, we can use figsize in figure method argument and use fignum in
matshow() method.
Create a new figure or activate an existing figure using figure() method.
Create a dataframe using Pandas.
Use matshow() method to display an array as a matrix in a new figure window.
The argument fignum... | [
{
"code": null,
"e": 1179,
"s": 1062,
"text": "To change the figsize for mathshow, we can use figsize in figure method argument and use fignum in\nmatshow() method."
},
{
"code": null,
"e": 1253,
"s": 1179,
"text": "Create a new figure or activate an existing figure using figure(... |
How to move a file into a different folder on the server using PHP? - GeeksforGeeks | 24 May, 2019
The move_uploaded_file() function and rename() function is used to move a file into a different folder on the server. In this case, we have a file already uploaded in the temp directory of server from where the new directory is assigned by the method. The file temp is fully moved to a new location. The mov... | [
{
"code": null,
"e": 24972,
"s": 24944,
"text": "\n24 May, 2019"
},
{
"code": null,
"e": 25463,
"s": 24972,
"text": "The move_uploaded_file() function and rename() function is used to move a file into a different folder on the server. In this case, we have a file already uploaded... |
How can we add a JSONArray within JSONObject in Java? | A JSONObject can parse text from a String to produce a map-like object and a JSONArray can parse text from a String to produce a vector-like object. We can also add a JSONArray within JSONObject by first creating a JSONArray with few items and add these array of items to the put() method of JSONObject class.
public JSO... | [
{
"code": null,
"e": 1372,
"s": 1062,
"text": "A JSONObject can parse text from a String to produce a map-like object and a JSONArray can parse text from a String to produce a vector-like object. We can also add a JSONArray within JSONObject by first creating a JSONArray with few items and add these... |
Flatten a Stream of Map in Java using forEach loop - GeeksforGeeks | 11 Dec, 2018
Given a Stream of Map in Java, the task is to Flatten the Stream using forEach() method.
Examples:
Input: map = {1=[1, 2], 2=[3, 4, 5, 6], 3=[7, 8, 9]}
Output: [1, 2, 3, 4, 5, 6, 7, 8, 9]
Input: map = {1=[G, e, e, k, s], 2=[F, o, r], 3=[G, e, e, k, s]}
Output: [G, e, e, k, s, F, o, r]
Approach:
Get the M... | [
{
"code": null,
"e": 25495,
"s": 25467,
"text": "\n11 Dec, 2018"
},
{
"code": null,
"e": 25584,
"s": 25495,
"text": "Given a Stream of Map in Java, the task is to Flatten the Stream using forEach() method."
},
{
"code": null,
"e": 25594,
"s": 25584,
"text": "E... |
Charset toString() method in Java with Examples - GeeksforGeeks | 28 Mar, 2019
The toString() method is a built-in method of the java.nio.charset returns a string which describes the charset involved.
Syntax:
public final String toString()
Parameters: The function does not accepts any parameter.
Return Value: The function returns a string describing this charset.
Below is the impleme... | [
{
"code": null,
"e": 24126,
"s": 24098,
"text": "\n28 Mar, 2019"
},
{
"code": null,
"e": 24248,
"s": 24126,
"text": "The toString() method is a built-in method of the java.nio.charset returns a string which describes the charset involved."
},
{
"code": null,
"e": 2425... |
C# program to Reverse words in a string | Let’s say the following is the string −
Hello World
After reversing the string, the words should be visible like −
olleH dlroW
Use the reverse() method and try the following code to reverse words in a string.
Live Demo
using System;
using System.Linq;
class Demo {
static void Main() {
// original string
... | [
{
"code": null,
"e": 1102,
"s": 1062,
"text": "Let’s say the following is the string −"
},
{
"code": null,
"e": 1114,
"s": 1102,
"text": "Hello World"
},
{
"code": null,
"e": 1177,
"s": 1114,
"text": "After reversing the string, the words should be visible lik... |
XML DOM - Get Node | In this chapter, we will study about how to get the node value of a XML DOM object. XML documents have a hierarchy of informational units called nodes. Node object has a property nodeValue, which returns the value of the element.
In the following sections, we will discuss −
Getting node value of an element
Getting node... | [
{
"code": null,
"e": 2518,
"s": 2288,
"text": "In this chapter, we will study about how to get the node value of a XML DOM object. XML documents have a hierarchy of informational units called nodes. Node object has a property nodeValue, which returns the value of the element."
},
{
"code": n... |
Modulus of two float or double numbers using C | Here we will see how to get the modulus of two floating or double type data in C. The modulus is basically finding the remainder. For this, we can use the remainder() function in C. The remainder() function is used to compute the floating point remainder of numerator/denominator.
So the remainder(x, y) will be like bel... | [
{
"code": null,
"e": 1343,
"s": 1062,
"text": "Here we will see how to get the modulus of two floating or double type data in C. The modulus is basically finding the remainder. For this, we can use the remainder() function in C. The remainder() function is used to compute the floating point remainde... |
Classes and Objects in C++ | Classes are the prime features of C++ as they support OOPS concepts and are user defined data types. Classes provide the specification for an object and contain data variables as well as functions to manipulate the data in a single package.
A class definition starts with the keyword class and then the class name. After... | [
{
"code": null,
"e": 1303,
"s": 1062,
"text": "Classes are the prime features of C++ as they support OOPS concepts and are user defined data types. Classes provide the specification for an object and contain data variables as well as functions to manipulate the data in a single package."
},
{
... |
Atbash cipher in Python | Suppose we have a lowercase alphabet string called text. We have to find a new string where every character in text is mapped to its reverse in the alphabet. As an example, a becomes z, b becomes y and so on.
So, if the input is like "abcdefg", then the output will be "zyxwvut"
To solve this, we will follow these steps... | [
{
"code": null,
"e": 1271,
"s": 1062,
"text": "Suppose we have a lowercase alphabet string called text. We have to find a new string where every character in text is mapped to its reverse in the alphabet. As an example, a becomes z, b becomes y and so on."
},
{
"code": null,
"e": 1341,
... |
Feature Engineering — Recursive Feature Elimination With Cross-Validation | by Kaushik Choudhury | Towards Data Science | During the survey and data collection step, we do not know which feature/attribute have a strong influence on the output and the ones which do not have that much effect. Due to this, we collect or measure as many logical attributes as possible in this stage.
The machine learning model becomes complex, and also computat... | [
{
"code": null,
"e": 431,
"s": 172,
"text": "During the survey and data collection step, we do not know which feature/attribute have a strong influence on the output and the ones which do not have that much effect. Due to this, we collect or measure as many logical attributes as possible in this sta... |
Using R for Exploratory Data Analysis (EDA) — Analyzing Golf Stats | by Jeff Griesemer | Towards Data Science | Whether you’re a Data Architect, Data Engineer, Data Analyst, or Data Scientist, we have to work with unfamiliar datasets when starting a new data project. It’s a little like having a blind date with a new dataset. You’ll want to get to know more about it before feeling comfortable.
So, how do we get there? The answer ... | [
{
"code": null,
"e": 455,
"s": 171,
"text": "Whether you’re a Data Architect, Data Engineer, Data Analyst, or Data Scientist, we have to work with unfamiliar datasets when starting a new data project. It’s a little like having a blind date with a new dataset. You’ll want to get to know more about it... |
Categorical encoding using Label-Encoding and One-Hot-Encoder | by Dinesh Yadav | Towards Data Science | In many Machine-learning or Data Science activities, the data set might contain text or categorical values (basically non-numerical values). For example, color feature having values like red, orange, blue, white etc. Meal plan having values like breakfast, lunch, snacks, dinner, tea etc. Few algorithms such as CATBOAST... | [
{
"code": null,
"e": 636,
"s": 171,
"text": "In many Machine-learning or Data Science activities, the data set might contain text or categorical values (basically non-numerical values). For example, color feature having values like red, orange, blue, white etc. Meal plan having values like breakfast... |
Difference Between Scanner and BufferedReader Class in Java | 08 Apr, 2022
In Java, Scanner and BufferedReader class are sources that serve as ways of reading inputs. Scanner class is a simple text scanner that can parse primitive types and strings. It internally uses regular expressions to read different types while on the other hand BufferedReader class reads text from a charac... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n08 Apr, 2022"
},
{
"code": null,
"e": 471,
"s": 52,
"text": "In Java, Scanner and BufferedReader class are sources that serve as ways of reading inputs. Scanner class is a simple text scanner that can parse primitive types and strings.... |
Functional Programming Paradigm | 28 Jun, 2022
Introduction Functional programming is a programming paradigm in which we try to bind everything in pure mathematical functions style. It is a declarative type of programming style. Its main focus is on “what to solve” in contrast to an imperative style where the main focus is “how to solve”. It uses expre... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n28 Jun, 2022"
},
{
"code": null,
"e": 549,
"s": 52,
"text": "Introduction Functional programming is a programming paradigm in which we try to bind everything in pure mathematical functions style. It is a declarative type of programming... |
Ways to form a group from three groups with given constraints | 31 May, 2022
Given three numbers(x, y and z) which denote the number of people in the first group, the second group, and third group. We can form groups by selecting people from the first group, the second group and third group such that the following conditions are not void.
A minimum of one people has to be selecte... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n31 May, 2022"
},
{
"code": null,
"e": 294,
"s": 28,
"text": "Given three numbers(x, y and z) which denote the number of people in the first group, the second group, and third group. We can form groups by selecting people from the first ... |
Sending HTTP Request Using cURL Set-1 | 01 Aug, 2021
Whenever we are dealing with HTTP requests, cURL simplifies our tasks to a great extent and is the easiest tool to get our hands dirty on.
cURL: It stands for “client URL” and is used in command line or scripts to transfer data. It is a great tool for dealing with HTTP requests like GET, POST, PUT, DELETE,... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n01 Aug, 2021"
},
{
"code": null,
"e": 167,
"s": 28,
"text": "Whenever we are dealing with HTTP requests, cURL simplifies our tasks to a great extent and is the easiest tool to get our hands dirty on."
},
{
"code": null,
"e":... |
Iterative Fast Fourier Transformation for polynomial multiplication | 08 Jun, 2022
Given two polynomials, A(x) and B(x), find the product C(x) = A(x)*B(x). In the previous post, we discussed the recursive approach to solve this problem which has O(nlogn) complexity. Examples:
Input :
A[] = {9, -10, 7, 6}
B[] = {-5, 4, 0, -2}
Output :
C(x) =
In real-life applications such as sign... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n08 Jun, 2022"
},
{
"code": null,
"e": 250,
"s": 54,
"text": "Given two polynomials, A(x) and B(x), find the product C(x) = A(x)*B(x). In the previous post, we discussed the recursive approach to solve this problem which has O(nlogn) co... |
XML full form | 19 Oct, 2021
XML stands for Extensible Markup Language that is used to encode the document that can be understandable by humans and machines both. A data is stored in XML format is easy to understand and easy to modify. This format was designed to transport and store data in a specific format. There are three main thin... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n19 Oct, 2021"
},
{
"code": null,
"e": 659,
"s": 28,
"text": "XML stands for Extensible Markup Language that is used to encode the document that can be understandable by humans and machines both. A data is stored in XML format is easy to... |
Creating a PortScanner in C | 29 May, 2016
Picture a bay where lots of private boats are docked. The location is called a seaport, literally a port at or on the sea. Everyone wanting to dock there, requesting landing services uses the same port. Seaports work with berth numbers assigned to individual boats. The port name and the berth number combin... | [
{
"code": null,
"e": 54,
"s": 26,
"text": "\n29 May, 2016"
},
{
"code": null,
"e": 419,
"s": 54,
"text": "Picture a bay where lots of private boats are docked. The location is called a seaport, literally a port at or on the sea. Everyone wanting to dock there, requesting landing ... |
Reverse a LinkedList in Java | 11 Dec, 2018
Assuming you have gone through LinkedList in java and know about linked list. This post contains different examples for reversing a linked list which are given below:
1. By writing our own function(Using additional space): reverseLinkedList() method contains logic for reversing string objects in a linked l... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n11 Dec, 2018"
},
{
"code": null,
"e": 219,
"s": 52,
"text": "Assuming you have gone through LinkedList in java and know about linked list. This post contains different examples for reversing a linked list which are given below:"
},
... |
Bokeh – Multiple Plots | 08 Feb, 2022
Prerequisites: Introduction to Bokeh in Python
In this article, we will discuss how to plot multiple plots using Bokeh in Python. We are going to use the row() method of the bokeh.layouts module, it is used in show() method of bokeh.io library as an argument to depict multiple plots in using bokeh.
Synta... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n08 Feb, 2022"
},
{
"code": null,
"e": 76,
"s": 28,
"text": "Prerequisites: Introduction to Bokeh in Python "
},
{
"code": null,
"e": 330,
"s": 76,
"text": "In this article, we will discuss how to plot multiple plots ... |
Count possible binary strings of length N without P consecutive 0s and Q consecutive 1s | 21 Jun, 2021
Given three integers N, P, and Q, the task is to count all possible distinct binary strings of length N such that each binary string does not contain P times consecutive 0’s and Q times consecutive 1’s.
Examples:
Input: N = 5, P = 2, Q = 3Output: 7Explanation: Binary strings that satisfy the given conditio... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n21 Jun, 2021"
},
{
"code": null,
"e": 255,
"s": 52,
"text": "Given three integers N, P, and Q, the task is to count all possible distinct binary strings of length N such that each binary string does not contain P times consecutive 0’s ... |
Find Kth largest number in a given Binary Tree | 24 Aug, 2021
Given a Binary Tree consisting of N nodes and a positive integer K, the task is to find the Kth largest number in the given tree.Examples:
Input: K = 3 1 / \ 2 3 / \ / \ 4 5 6 7Output: 5Explanation: The third largest element in the given bina... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n24 Aug, 2021"
},
{
"code": null,
"e": 167,
"s": 28,
"text": "Given a Binary Tree consisting of N nodes and a positive integer K, the task is to find the Kth largest number in the given tree.Examples:"
},
{
"code": null,
"e":... |
Replace every character of string by character whose ASCII value is K times more than it | 27 May, 2022
Given string str consisting of lowercase letters only and an integer k, the task is to replace every character of the given string with a character whose ASCII value is k times more than it. If the ASCII value exceeds ‘z’, then start checking from ‘a’ in a cyclic manner.
Examples:
Input: str = “abc”, k =... | [
{
"code": null,
"e": 52,
"s": 24,
"text": "\n27 May, 2022"
},
{
"code": null,
"e": 324,
"s": 52,
"text": "Given string str consisting of lowercase letters only and an integer k, the task is to replace every character of the given string with a character whose ASCII value is k tim... |
Reverse a linked list | Difficulty Level :
Medium
Given pointer to the head node of a linked list, the task is to reverse the linked list. We need to reverse the list by changing the links between nodes.
Examples:
Input: Head of following linked list 1->2->3->4->NULL Output: Linked list should be changed to, 4->3->2->1->NULL
Input: Head of f... | [
{
"code": null,
"e": 26,
"s": 0,
"text": "Difficulty Level :\nMedium"
},
{
"code": null,
"e": 180,
"s": 26,
"text": "Given pointer to the head node of a linked list, the task is to reverse the linked list. We need to reverse the list by changing the links between nodes."
},
{... |
How to find the MySQL data directory from command line in Windows? | To find the MySQL data directory, we can simply use the variable datadir. Let us see how to use the variable with select statement.
The query is as follows −
mysql> select @@datadir;
Here is the output
+---------------------------------------------+
| @@datadir |
+---------------------... | [
{
"code": null,
"e": 1319,
"s": 1187,
"text": "To find the MySQL data directory, we can simply use the variable datadir. Let us see how to use the variable with select statement."
},
{
"code": null,
"e": 1345,
"s": 1319,
"text": "The query is as follows −"
},
{
"code": nu... |
Strings in Octave GNU | 06 Jun, 2022
In Octave GNU, A string is basically the collection of characters enclosed between double quotes (“) or single quotes (‘).
Example of strings
“This is a string”
‘This is also a string’
In Octave, there is no limit for the length of the string. i.e. It can be of any size. Character array is used to represen... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n06 Jun, 2022"
},
{
"code": null,
"e": 151,
"s": 28,
"text": "In Octave GNU, A string is basically the collection of characters enclosed between double quotes (“) or single quotes (‘)."
},
{
"code": null,
"e": 170,
"s": 1... |
SQL | ENCRYPT Function | 31 Oct, 2019
The SQL Encrypt function is used to encrypt a string using UNIX crypt(). The function is based on Unix crypt() system call, hence it returns NULL on Windows systems. The Encrypt function accepts two parameters which are the string and the salt to be encrypted.The Encrypt function returns a binary string.
S... | [
{
"code": null,
"e": 28,
"s": 0,
"text": "\n31 Oct, 2019"
},
{
"code": null,
"e": 334,
"s": 28,
"text": "The SQL Encrypt function is used to encrypt a string using UNIX crypt(). The function is based on Unix crypt() system call, hence it returns NULL on Windows systems. The Encry... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.