Algorithms and Complexity

*** LOOP INVARIANTS ***

Initialization:  
1. The loop invariant states that after the 0th iteration…
2. Loop Invariant at alpha = 0 
3. Before the first iteration … 
4. Explanation of all the code before the loop
5. Thus the invariant is true after the 0th iteration (before first) 
Maintenance:
1. Assume that the loop invariant is true after the (alpha – 1)th iteration. I will prove that after the (alpha)th iteration…
2. State loop invariant at alpha = alpha 
3. On the (alpha)th iteration…
4.
Read More

Readiris Pro 11 Corporate Edition Release Notes

MMMM

MMMMM

JMMMM

MMMM
JMMM


MMMMM

MMMM

JMM` ‘MM


.;JMMMMMML.

MMMMM

JMMMM MMMM JMMM, T`


MMMMMMMMMMML

MMMMM JML, JMMF MMM MMMM MMMMMMMm_


MMMM TMMMM

__ MMMMMMMMMML MMM MMMF MMMM TMMMMMMMMM


MMMM MMMML

JMMMML MMMMM`TMMMM MMMM MMMM MMMM ‘MMMMMMMM


MMMM MMMML

MMM TMML MMMMM MMMM MMMMMMMMMM MMMM JL `MMMF


MMMM MMMM

JMMf MMM MMMMM MMMM MMMMMMF’ MMMM MM. JMM’


MMMM JMMMF

MMML MMM MMMMM MMMM MMMMM MM MMMM ‘MMMM”


MMMM JMMMF

JMMML MMM MMMMM MMMM MMMMM MM MMMM


MMMMMMMMMC

MMMMNMMMMM

Read More

Java Programming Examples: 2D Arrays, Recursion, Interfaces, Loops, and HashMaps

2D Arrays

Getting a Column from a 2D Array

The getCol method takes a 2D integer array (nos) and an integer (col) representing the column index as input. It returns an integer array containing the elements of the specified column. If the col value is out of bounds, it throws an Exception with the message “invalid column.”


public static int[] getCol(int[][] nos, int col) throws Exception {
    if (col < 0 || col >= nos[0].length) {
        throw new Exception("invalid column");
    }
    int[]
Read More

Database Design

Day 1

Data

  • Raw, unorganized facts
  • (Unformatted Data)

Information

  • Organized data with context
  • (Formatted Data)

Metadata

  • DATA that describes your DATA
  • The “lens” we use to understand what data means
  • Describes properties of data so we can infer information

Day 2

“Old” Way Process of Filing Systems

  • Data stored in files managed by the application
  • EX:
    • STUDENT Files <-> Student Processing Applications <-> Users
    • FACULTY and STAFF Files <-> Faculty and Staff Processing Applications <-> Users
    • ALUMNI
Read More

Understanding Computer Architecture and Number Systems

NAND

AND

OR

NOT

A B C

Base System Numbers

Binary (Base 2): 0, 1

Octal (Base 8): 0, 1, 2, 3, 4, 5, 6, 7

Decimal (Base 10): 0, 1, 2, 3, 4, 5, 6, 7, 8, 9

Hexadecimal (Base 16): 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F

Decimal to Other Number Systems

To convert a decimal number to another base, repeatedly divide the decimal number by the desired base (e.g., 16 for hexadecimal, 8 for octal). The remainders, written in reverse order, form the converted number. Don’t forget to include the base at the end.

Other Number

Read More

Comprehensive Guide to Clustering, Anomaly Detection, and Stream Mining in Data Mining

Clustering

What is Clustering?

Clustering is an unsupervised machine learning technique used to group similar data points into clusters, making it easier to analyze and interpret large datasets. There are several methods of clustering, each with its own approach and use cases.

1. Partitioning Methods

K-Means Clustering:

Concept: This method partitions the dataset into K clusters, where each data point belongs to the cluster with the nearest mean (centroid).

Algorithm:

  1. Initialize K centroids randomly.
  2. Assign
Read More