Skip to main content

Posts

Machine Learning Lab Internal Questions

 Internal Lab Programs 1. Read a CSV File, apply preprocessing, apply a few data visualizations, and train SVM model for a dataset and calculate its accuracy. Download DATASET 2. Read the CSV File, apply preprocessing, and train the data decision tree-based ID3 algorithm. Calculate each attribute value and display  3. Create a data and save it CSV, apply preprocessing by using that file demonstrate the FIND-S algorithm for finding the most specific hypothesis based on a given set of training data samples. 4. Read the super Market CSV file apply relevant visualizations (Box plot, Scatter plot, Bargraphs), linear regression and display performance metrics 5. Apply EM algorithm to cluster a set of data stored in a .CSV file. Use the same data set for clustering using k-Means algorithm. Compare the results of these two algorithms and comment on the quality of clustering. 6. Write a program for implementing Density based clustering algorithm.  7. Write a pr...

Swapping Private data of classes

  CASE 1:  Given two numbers a & b, swap these two numbers using the friend function of C++.  Examples:   Input : a = 5, b = 9 Output : a = 9, b = 5 Input : a = 4, b = 6 Output : a= 6, b = 4 Approach:  Create a class Swap, declare one variable in it, i.e., num, and create a constructor for inputs. Declare a friend function in it. Define the friend function outside the class scope by taking arguments as call by reference to pass the copy of Swap Object. Perform the swap operation.

Static Member Functions

  What is static member functions? A static member function can access static data members and static member functions inside or outside of the class. Static member functions have a scope inside the class and cannot access the current object pointer. You can also use a static member function to determine how many objects of the class have been created. Static Member Function in a class is the function that is declared as static because of which function attains certain properties as defined below: A static member function is independent of any object of the class.  A static member function can be called even if no objects of the class exist. A static member function can also be accessed using the class name through the scope resolution operator. A static member function can access static data members and static member functions inside or outside of the class. Static member functions have a scope inside the class and cannot access the current object pointer. You can also u...

Static Data Member

 A data member of a class can be qualified as statics. The properties of a static member variable are similar to that of a C static variable. A static member variable has certain special characteristics. These are: It is initialized to zero when the first object of its class is created. No other initialization is permitted. Only one copy of that member is created for the entire class and is shared by all the objectives of that class, no matter how many objects are created. It is visible only within the class, but its lifetime is the entire program. #include <iostream> using namespace std; class item {        static int count;        int number;        public:        void getdata(int a)        {            number=a;            count ++;        }        void getcount(void)   ...

Array of Objects

An array can be of any data type including struct. Similarly, we can also have arrays of variables of the type class. Such variables are called arrays of objects. Class Definition: class employee {           char name[30];          float age;     public:          void getdata(void);           void putdata(void); }; The identifier employee is a user-defined data type and can be used to create objects related to different employee categories. employee manage[3];          //aray of managers employee foreman[15];       //array of foreman employee worker[75];        // array of worker the array manager contains three objects(managers), namely, manager[0],  manager[1], and manager[2], of type employee class similarly, the foreman array contains 15 objects. and the worker array contains 75 objectives.(work...

Lab 2

 Ethical Hacking Lab programs 1.        Write the steps for installing Kali Linux in windows? 2.       Write a program for Phishing Attacks 3.       The real-time practice of Injections which mainly includes SQL Injection 4.       Write a program for TCP/IP High Jacking 5.       Write a program for Social Engineering 6.       Write a program for Administrative password cracking 7.       Write a program for Hacking windows 7, windows 8, and windows 10 using Metasploit 8.       Write a program for Hacking Windows 7, 8 , and 10 using backdoor 9.       Write a program for Google Hacking 10.   Write a program for Email Spoofing

LAB

 Big Data Analytics Lab Programs 1.        Implement the following Data structures in Java for Linked Lists 2.    Perform setting up and Installing Hadoop in its three operating modes: Standalone, Pseudo distributed, Fully distributed 3.        Implement the following Data structures in Java for Stack 4.        Install and Run Pig then write Pig Latin scripts to sort, group, join, project, and filter your data 5.        Implement the following Data structures in Java for Queues 6.        Write a MapReduce program to search for a specific keyword in a file 7.        Implement the following Data structures in Java for Set 8.      Write a MapReduce program to count the occurrence of similar words in a file. Use partitioner to partition key based on alphabets 9.    ...

DevOps

  What is DevOps? Devops is an investment that spans the entire life cycle. Devops is a collaborative effort. Better software development and delivery processes are enabled by Devops. Devops helps you get to the last mile of continuous delivery faster. "DevOps is the combination of Cultural Philosophies , practices and tools that increases an organizations ability to deliver applications and services at high velocity." -AWS "DevOps is a collaborate and multidisciplinary effort within an organization to automate continuous delivery of new software versions, while guaranteeing their correctness and reliability." -L Leite "DevOps is the outcome of applying the most trusted principles from the domain of physical manufacturing and leadership to the IT value stream." The Devops Hand book -Gene Kim, Patrick Debois, et al. What is the process of Devops? From the design phase to production release and support, DevOps aims to combine the skills of operations...

Google Hacking

 Google Hacking using Google to fetch confidential information is called Google Hacking. Google dorks can be defined as keywords that can get you confidential information like Admin panel of web pages Passwords of premium accounts Access to confidential information What's not? Good dorks make your task easy. Let's discuss some dorks which I found out to be important out of 1000's. filetype: It is one of the dorks which provides information on the search with the file type you mentioned. Site: this dork provides the information you wish to see on a particular site Calc: it provides accurate answers within milliseconds to your mathematical operations Cache: Retrieves the copy of websites from google servers and presents how it was when google bot crawled. Obtaining Credit cards information: This dork provides the information of credit card pins. which are saved in the .sql dump file CCTV: It broadcasts live streaming of CCTVs in various locations. Weather: These particu...

Ethical Hacking Programs

ETHICAL HACKING PROGRAMS 1.    Installing Kali Linux, windows 7, windows 10 2.       PhishingAttacks 3.       The real-time practice of Injections which mainly includes SQL Injection 4.       TCP/IP High Jacking 5.       SocialEngineering 6.       Administrativepassword cracking 7.       Hackingwindows 7, windows 8, windows 10 using metasploit 8.       Hackingwindows 7, 8 ,10 using backdoor 9.       GoogleHacking 10.   EmailSpoofing

Big Data Analytics Programs

  List of Programs for Big Data Analytics   CLICK ON ME 1.  Implement the following Data structures in Java       a)  Linked Lists            b)   Stacks       c)  Queues     d)   Set            e)   Map 2.  Perform setting up and Installing Hadoop in its three operating modes:      Standalone,     Pseudo distributed,     Fully distributed. 3.  Implement the following file management tasks in Hadoop:    a) Adding files and directories    b) Retrieving files    c) Deleting files 4. Run a basic Word Count Map Reduce program to understand Map Reduce Paradigm. 5. Write a Map Reduce program that mines weather data.     Weather sensors collecting data every hour at many locations across the globe gather a large volume of log data, which is a ...

TYPES OF DATA

In order to understand the nature of data it is necessary to categorize them into various types.  Different categorizations of data are possible.  The first such categorization may be on the basis of disciplines, e.g., Sciences, Social Sciences, etc. in which they are generated.  Within each of these fields, there may be several ways in which data can be categorized into types. There are four types of data:  Nominal  Ordinal  Interval  Ratio  Each offers a unique set of characteristics, which impacts the type of analysis that can be performed. The distinction between the four types of scales center on three different characteristics: The order of responses – whether it matters or not The distance between observations – whether it matters or is interpretable The presence or inclusion of a true zero Nominal Scales Nominal scales measure categories and have the following characteristics: Order: The order of the responses or observations does not mat...

What is Changing in the Realms of Big Data

Today, it is an era of a tight handshake between business, IT, and yet another class called Data Scientists. Here, we are citing there vital reasons why companies should compulsorily consider leveraging big data. Competitive advantage: The most important resource with any organization today is their data. What they do with it will determine their fate in the market. Decision Making: It has shifted from the hands of the elite few to the empowered many. Good decisions play a significant role in furthering customer engagement, reducing operating margins in retail, cutting and other expenditures in the health sector. Value of data: The value of data continues to see a steep rise. As an all-important resource, it is time to look at newer architecture, tools, and practices to leverage this.

Binning Method by Data smoothing in python

 Binning Method Binning is a technique for smoothing data or dealing with noisy data. The data is sorted first, and then the sorted values are dispersed into a number of buckets or bins in this approach. Binning methods provide local smoothing since they consult the vicinity of values.  Smoothing can be accomplished in three ways: Bin smoothing entails:  Each value in a bin is replaced by the bin's mean value when smoothing by bin means is used.  Smoothing by bin median:  Each bin value is replaced by its bin median value in this method.  Smoothing by bin borders:  In smoothing by bin boundaries, the bin boundaries are determined as the minimum and maximum values in a given bin. The nearest boundary value is then used to replace each bin value. Example: Sorted data for price (in dollars): 4, 8, 9, 15, 21, 21, 24, 25, 26, 28, 29, 34 Smoothing by bin means:       - Bin 1: 9, 9, 9, 9       - Bin 2: 23, 23, 23, 23   ...

Hadoop installation in Windows

  Installing Hadoop 3.2.1 on Windows 1.Prerequisites First, we need to make sure that the following prerequisites are installed: Java 8 runtime environment (JRE): Hadoop 3 requires a Java 8 installation. I prefer using the offline installer. Java 8 development Kit (JDK) To unzip downloaded Hadoop binaries, we should install 7zip   I will create a folder on my local machine to store downloaded Hadoop files "Drive_Name:\Hadoop_evn" 2. Download Hadoop Barriers The first step is to download Hadoop binaries from the official website . The binary package size is about 342 MB. or  Better to download Hadoop Binaries from the nonofficial . you can directly utilize these file.  After finishing the file download, we should unpack the package using 7zip int two steps. First, we should extract the hadoop-3.2.1.tar.gz library, and then, we should unpack the extracted tar file 3. Setting up environmental Variables After installing Hadoop and its prerequisites, we should configure...