### Random variables and Probability Distribution Functions

To understand random variable first you have to know about events.  I will make you understand using examples. What are events? Example Tossing three coins on which one head turns up {HT,HH} A random variable quantify   events of  occurence. In Read more…

### Mutually Exclusive and Independent Events

Mutually Exclusive Events- Two or more events events are said to be mutually exclusive if only one can happen at a time. Example-1 In tossing a coin, event of tail up (T) and even of heads up (H) can not Read more…

### Linear Dependence and Independence of Vectors

Linear  Independence of Vectors Suppose α1, α2, α3, α4…………αn are vectors  of V(F) where F is field.  And there exist scalers a1, a2, a3, a4………..an which belong to field F. α1, α2, α3, α4…………αn vectors are called lineary independent if Read more…

### Create Bootable Pendrive and Install Ubuntu

Ubuntu only provides an iso image of the operating system and you need to make a pen drive bootable to install ubuntu. I will show  step-by-step how to make a pen drive bootable using  USB Installer. Step-1 Download USB installer  Read more…

### Divide and Conquer and Dynamic Programming Algorithms

Often students get confused what are differences between divide and conquer and dynamic programming. Since they solve problems in similar nature. Divide the problem into sub-problems combine them to get solution. Here I list the differences  between divide and conquer Read more…

### Mathematics for Machine Learning

Mathematics is an essential part for machine learning  without maths it is hard to get into core concepts. In addition, machine learning uses concepts from different branches, however, these branch of mathematics are the backbone of the machine learning. 1- Read more…

### Datasets for Machine Learning

For machine learning and data science projects data sets are necessary to train and test model. Furthermore, several datasets repository is available on the Internet. Some of them are freely available some need to pay money. Here I will list Read more…

### Theory of Computation

Theory of computation by Nimisha Pandey

### Operating System

An Operating System is a system software which uses the software and hardware resources and provides an environment for application programs to execute appropriately.     Operating System Types 1.  Distributed Operating System With a distributed system, memory and clock Read more…

### Tips to Crack UGC-NET

The National Eligibility Test (NET) is conducted to determine the eligibility of Indian Nationals for Assistant Professor or award of Junior Research Fellowship and Assistant Professor both in Indian Universities and Colleges. No doubt, the level of the exam is Read more…

### Matplotlib in Python

Matplot is a very powerful python library to visualize the datasets. It is built upon the SciPy and the NumPy library. Further, it would be better to give examples that make you understand the matplot library.   Example-1 import matplotlib.pyplot Read more…

### Machine Learning

Machine learning is the study of algorithms that use the mathematical and statistical model and historical data that allows software and programs to predict without being explicitly programmed. Furthermore, machine learning is being used by a variety of applications. 1- Email Read more…

### Big Data

Big data can be characterized as a data set having four V’s. Which are 1- Volume- Internet, sensors, actuators and other digital platforms generate a huge volume of data.  These data can be considered as big data. 2- Variety- Data variety refers to Read more…

### Install and Run NS-2.35 on Ubuntu 16.04

NS-2 is a very popular network simulation platform. Further, you can install it on windows. However, Linux provides all environments for network simulator version 2. In addition, it was developed considering the Linux environment. Such as it needs GCC compiler. Moreover, Read more…

### Markov Chain

A Markov chain describes the sequence of events and probability of happening each event depends only on the previous event.     In figure-1, you can see two states Markov chain. In which there are two states A and B. Read more…

### Proxy Server Setting in Linux

When you try to update your Linux operating system and you get the error. Because you have not set the proxy server. In this post, I will show that how to set the proxy on your Linux operating system. Step-1  Read more…

### Proxy Servers

Proxy servers work as an intermediary system between a browser and a server. Further, it requests on the behalf of the browser from the server. From the figure-1 you can understand that process. Between the client (Browser) and server another Read more…

### Latent Semantic Indexing Keywords

Before to know  “Latent Semantic Indexing(LSI) Keywords” you have to Latent Semantic Analysis. LSI refers to the keywords which are close and relevant to the keyword. A very popular example is  Apple keyword. If you write about apple how will Read more…

### How Do API Key Work?

Before, to know about  “How  API Key Works”  you should know about API.   API stands for Application Programming Interface and generally, compilers or interpreters provide inbuilt modules to application developers.  Furthermore, in a client-server computing environment.  A compiler or an interpreter Read more…