UNIVERSITY GRANTS COMMISSION NET BUREAU NET SYLLABUS Subject : COMPUTER SCIENCE AND APPLICATIONS Code No.:(87) Unit – 1 : Discrete Structures and Optimization Mathematical Logic: Propositional and Predicate Logic, Propositional Equivalences, Normal Forms, Predicates and…

CSIR-UGC National Eligibility Test (NET) for Junior Research Fellowship and Lecturer-ship COMMON SYLLABUS FOR PART ‘B’ AND ‘C’ MATHEMATICAL SCIENCES UNIT – 1 Analysis: Elementary set theory, finite, countable and uncountable sets, Real number system…

Vector Space- A set V is called vector space on which two operations are defined. 1- Vector Addition 2- Scalar Multiplication Further, vector addition must follow the following properties and laws for vector addition. 1-…

To understand random variable first you have to know about events. I will make you understand using examples. What are events? Example Tossing three coins on which one head turns up {HT,HH} A random variable…

Mutually Exclusive Events- Two or more events events are said to be mutually exclusive if only one can happen at a time. Example-1 In tossing a coin, event of tail up (T) and even of…

Linear Independence of Vectors Suppose α1, α2, α3, α4…………αn are vectors of V(F) where F is field. And there exist scalers a1, a2, a3, a4………..an which belong to field F. α1, α2, α3, α4…………αn vectors…

Ubuntu only provides an iso image of the operating system and you need to make a pen drive bootable to install ubuntu. I will show step-by-step how to make a pen drive bootable using USB…

Often students get confused what are differences between divide and conquer and dynamic programming. Since they solve problems in similar nature. Divide the problem into sub-problems combine them to get solution. Here I list the…

Mathematics is an essential part for machine learning without maths it is hard to get into core concepts. In addition, machine learning uses concepts from different branches, however, these branch of mathematics are the backbone…

For machine learning and data science projects data sets are necessary to train and test model. Furthermore, several datasets repository is available on the Internet. Some of them are freely available some need to pay…

Matplot is a very powerful python library to visualize the datasets. It is built upon the SciPy and the NumPy library. Further, it would be better to give examples that make you understand the matplot…

Machine learning is the study of algorithms that use the mathematical and statistical model and historical data that allows software and programs to predict without being explicitly programmed. Furthermore, machine learning is being used by a…

Big data can be characterized as a data set having four V’s. Which are 1- Volume- Internet, sensors, actuators and other digital platforms generate a huge volume of data. These data can be considered as big data. 2-…

NS-2 is a very popular network simulation platform. Further, you can install it on windows. However, Linux provides all environments for network simulator version 2. In addition, it was developed considering the Linux environment. Such as…

A Markov chain describes the sequence of events and probability of happening each event depends only on the previous event. In figure-1, you can see two states Markov chain. In which there are…

When you try to update your Linux operating system and you get the error. Because you have not set the proxy server. In this post, I will show that how to set the proxy on…

Proxy servers work as an intermediary system between a browser and a server. Further, it requests on the behalf of the browser from the server. From the figure-1 you can understand that process. Between the…

Before to know “Latent Semantic Indexing(LSI) Keywords” you have to Latent Semantic Analysis. LSI refers to the keywords which are close and relevant to the keyword. A very popular example is Apple keyword. If you…

Before, to know about “How API Key Works” you should know about API. API stands for Application Programming Interface and generally, compilers or interpreters provide inbuilt modules to application developers. Furthermore, in a client-server computing environment. …

38

1

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy policy