Java Programming Examples and Code Snippets

1. Prime Number via Command-Line Argument

This program checks if a number provided via command-line arguments is a prime number.

class PrimeCheck {
    public static void main(String[] args) {
        int n = Integer.parseInt(args[0]);
        boolean isPrime = true;
        if (n <= 1) isPrime = false;
        for (int i = 2; i <= n / 2; i++) {
            if (n % i == 0) {
                isPrime = false;
                break;
            }
        }
        if (isPrime)
            System.
Read More

Advanced Concepts in Information Retrieval and Recommendation Systems

Information Retrieval Evaluation and Relevance

Weighting Schemes in Weighted Cohen’s Kappa

Weighted Cohen’s Kappa uses specific weighting schemes (linear vs. quadratic) to measure inter-annotator agreement when categories are ordered.

  • Linear Weighting: Penalizes disagreements proportionally to category distance. This is suitable when graded differences are modest. Linear weights are simpler but less sensitive.
  • Quadratic Weighting: Penalizes larger disagreements more strongly, emphasizing severe
Read More

Machine Learning Fundamentals and Core Data Science Concepts

Machine Learning Definition and Related Fields

Machine Learning (ML) is a field of computer science that enables systems to learn from data and improve performance without being explicitly programmed.

ML Relationship with AI, Data Science, and Statistics

ML and Artificial Intelligence (AI)

  • ML is a subfield of AI that provides systems the ability to learn automatically.
  • AI focuses on building intelligent machines, while ML focuses on learning patterns from data to achieve intelligence.

ML and Data Science

Read More

High-Security IoT Automation for Industry and Mining

Role of High Security in IoT Automation

m5) Explain the role of high-security requirements in IoT automation systems. Why is security more critical today?

  1. IoT automation systems control physical processes, so security failures can cause real-world damage.
  2. High security ensures that only trusted devices, users, and services can access the system.
  3. Authentication is used to verify the identity of IoT devices and users.
  4. Authorization controls what actions an authenticated system is allowed to perform.
  5. Secure
Read More

Internet and Intranet Technologies: Protocols and Architecture

Unit 3: Internet Fundamentals and Services

The Global Internet System

The Internet is a global system of interconnected computer networks that enables communication, information sharing, and access to countless online services. It works by linking millions of private, public, academic, and government networks through standardized communication protocols like TCP/IP. The Internet provides a platform for browsing websites, sending emails, streaming videos, online shopping, banking, cloud computing,

Read More

Compiler Design: Analysis and Synthesis Phases

Compiler Phases: Analysis, Optimization, and Synthesis

A compiler translates a high-level program (like C or Java) into machine code understood by the hardware.
The compilation process is divided into multiple phases, each with a specific role. These phases work together to convert source code into an efficient executable program.

The phases are generally grouped into:

  1. Front End – Analysis Phases
  2. Middle End – Optimization Phase
  3. Back End – Synthesis Phases

Below is the complete flow:

Source Program

Read More