Python Data Analysis and Machine Learning Techniques
Program 1: Data Manipulation with Pandas
This program demonstrates various data manipulation techniques using the Pandas library in Python.
Merging and Concatenating Data
import pandas as pd
import numpy as np
sales_data_1 = pd.DataFrame({
'OrderID': [1, 2, 3, 4],
'Product': ['Laptop', 'Tablet', 'Smartphone', 'Headphones'],
'Sales': [100, 200, 2000, 800]
})
sales_data_2 = pd.DataFrame({
'OrderID': [3, 4, 5, 6],
'Product': ['Headphones', 'Laptop', 'Smartwatch', 'Tablet'],
Read More
Mastering Microsoft Office and Tally: Essential Skills
1. Documentation Using MS Word
Introduction to MS Word
MS Word is a widely used word processing software developed by Microsoft. It allows users to create, edit, format, and manage documents efficiently. With features like spell check, templates, and collaboration tools, MS Word is essential in various fields, including education, business, and personal use.
2. Tool Bars and Menus
Tool Bars
- Ribbon: The primary interface element that organizes commands into tabs.
- Home Tab: Contains basic formatting tools
Implementing Menu-Driven Programs for Data Structures in C
1. Circular Singly Linked List Operations
Develop and implement a menu-driven program in C for the following operations on Circular Singly Linked List (CSLL):
- Insertion at front of SLL
- Deletion at end of SLL
- Display the status of SLL
- Exit
#include
#include
struct Node {
int info;
struct Node* link;
};
typedef struct Node* NODE;
NODE last = NULL;
NODE getnode() {
NODE newNode = (NODE)malloc(sizeof(struct Node));
if (newNode == NULL) {
printf("Memory allocation failed\n");
Read More
Database Concurrency, Locking, and Optimization Techniques
Concurrency Control in Databases
Concurrency control addresses issues arising when multiple transactions access a shared database simultaneously. Key problems include:
- Lost Update Problem: Occurs when two transactions update the same record concurrently, leading to one update being overwritten.
- Uncommitted Dependency: Happens when a transaction reads data modified by another uncommitted transaction.
- Inconsistent Analysis: Arises when a transaction reads multiple values, and another transaction modifies
Requirements Engineering: Key Concepts and Practices
Single Statement of Need (SSON) and Non-Functional Requirements (NFR)
SSON (Single Statement of Need) | (Invariant) Forbidden transformations (failure description). NFR: Qualities a system must have: Usability, International, Performance, Environmental, Legal, Security.
Clear, concise, system’s overall goal. Must have: Usability, International, Performance, Environmental, Legal, Security.
How it will accomplish. Stakeholder: Development, Deployment, Maintenance. NFR has two parts:
Source of knowledge.
Read MoreJava Code Examples: Network Algorithms & Protocols
Bellman-Ford Algorithm in Java
This code implements the Bellman-Ford algorithm, which is used to find the shortest paths from a single source vertex to all other vertices in a weighted directed graph. It can handle graphs with negative edge weights.
import java.util.Scanner;
public class BellmanFord {
private int distances[];
private int numberofvertices;
public static final int MAX_VALUE = 999;
public BellmanFord(int numberofvertices) {
this.numberofvertices = numberofvertices;
Read More