Linux Linux piping and redirection In this article we discuss piping and redirection whereby we can alter the flow of input or output streams. This technique enables a user to create custom commands by combining multiple smaller commands.
Algorithms Find starting point of loop in linked list In this article, we have explored three different algorithmic techniques to find starting point of loop in linked list.
C++ Compiling a C program using GCC In this article, we have covered how to compile a C program using the GCC compiler along with the different stages such as Preprocessing, compiling, assembling and linking.
Linux Linux user management Linux is a multiuser operating system and thus can support several users working on a given system concurrently. User management entails adding, modification(editing, suspension) and removal of user accounts along with their permissions.
Linux Linux process management commands: top, ps, kill, jobs, fg, bg A process is a program in execution, it is created by any command executed by a user, In this article we discuss types of processes and the common commands used for process management.
TensorFlow Dropout operation in TensorFlow (tf.nn.dropout) This article discusses about a special kind of layer called the Dropout layer in TensorFlow (tf.nn.dropout) which is used in Deep Neural Networks as a measure for preventing or correcting the problem of over-fitting.
Software Engineering Rumbaugh, Booch and Jacobson Methodologies In this article, we have explored three object modeling techniques namely Rumbaugh, Booch and Jacobson Methodologies along with code examples.
Linux Mounting and unmounting in Linux Mounting is simply making a file system accessible in a computer system. In this article we discuss mounting and unmounting in the Linux operating System.
Linux Linux memory management: An overview Since the beginning of computing there has existed a need for more memory, today it is solved by various strategies virtual memory is the most successful, it makes the system appear to have more than it actually has. In this article we go over other memory management strategies in the Linux system.
Machine Learning (ML) Interview questions on Data Science In this article, we have presented 40 Interview questions on Data Science covering several topics including Multiple choice questions (MCQs) and Descriptive questions with answers.
Linux Linux file hierarchy The Linux OS has a hierarchical file structure defined by the FHS. In this article we go over the file hierarchy exploring responsibilities of various directories and the part they play to make the whole OS work.
Linux Linux file system - an overview A file system is responsible for file storage, retrieval and management. In this article we go over a simple to understand overview of the Linux file system.
Linux Linux networking: ip, whois, dig, ss, ssh, telnet, scp, sftp Linux runs two-thirds of all servers on the internet and networking is a very important aspect for computers. In this article we have discussed Linux commands that handle important computer networking aspects such as IP addressing, DNS lookups, secure and insecure remote peer to peer connections.
Linux Linux text filtering: split, join, comm, cmp, fmt, paste Text filtering is the process of taking an input stream, processing it and sending it to the output stream, this article is a continuation of the first and second parts, here we learn more text processing commands.
Linux Linux text filtering: diff, uniq, sdiff, less, more, tr, expand, unexpand Text filtering is the process of taking an input stream, processing it and sending it to the output stream, this article is a continuation of the first part, here we learn more text processing commands.
Linux Linux text filtering: cat, tac, od, wc, head, tail, sort, cut Text filtering is the process of taking an input stream, processing it and sending it to the output stream, in this article we discuss Linux commands you can use to manipulate text files for organization and efficiency.
Linux Linux file permissions (chmod) Linux systems are not only multitasking but also multi-user and this raises security concerns fortunately permissions exist to control the power of different users over files and directories. In this article we discuss these permissions, different classes of users and commands involving permissions.
Linux Cron in Linux (crontab) In every system a lot of repetitive tasks need doing and doing this tasks manually takes up time and is prone to mistakes, In this article we discuss cron, a Linux utility used to automate or schedule these tasks.
computational geometry Mathematics for Computational Geometry: Circle Theorems, Polygon In this article, we have covered Mathematics for Computational Geometry focused on 2D Shapes such as Circle properties/ theorems, Polygons and more.
computational geometry Mathematics for Computational Geometry: Points, Lines, Angles, Circle, Triangle In this article, we have explored the basics of Mathematics for Computational Geometry including Points, Lines, Angles, Circle, Triangle and other topics.
Algorithms Mathematics for Analyzing Algorithms In this article, we are going to explore about mathematics involved in analyzing algorithms and calculate Time Complexity.
Time Complexity Recurrence Tree Method for Time Complexity In this article, we have explored Recurrence Tree Method for calculating Time Complexity of different algorithms.
Machine Learning (ML) Scaled-YOLOv4 model The authors of YOLOv4 pushed the YOLOv4 model forward by scaling it's design and scale and thus outperforming the benchmarks of EfficientDet. This resulted in Scaled-YOLOv4 model.
Time Complexity Substitution Method for Time Complexity In this article, we have presented the Substitution method for finding the Time complexity of an algorithm in detail.
System Design Memento, Command and Iterator Design Pattern This article covers the Memento, Command, and Iterator design patterns and their respective applications in software/systems development.