SOCIAL NEWS

PLACE FOR THE SUBTITLE
  • in public key cryptography there should be two key called private key and public key private key kept in secret and public key put in public in public key cryptography the its should be easy to encrypt and decrypt the files using keys either of these keys can used to ...
  • Fermat's states that if p is a prime number and a is an integer not divisible by p then a^(p-1)=1(mod p) or the modification of fermat's theorem is that a^p=a (mod p) we have given 3^12mod11 , we know that 11 is prime number , so using fermat's theorem we ...
  • Ransomware is a type of malware which restrict the access to the infected system in some way and demand a ransom to lift the restriction. Ransomware usually installed when clicking a malicious link through email or when visiting a infected website or intentionally designed website Usually they demand to pay ...
  • Slide 2: text preprocessing Stopwords removal Stemming Basic stemming methods remove ending transform words Digits Hyphens Punctuation Marks Case of Letters Identifying different text fields Identifying anchor text: Removing HTML tags Identifying main content blocks Partitioning based on visual cues Tree matching slide 9:Duplicate Detection : ngrams slide 11:Inverted index ...
  • slide1:Introduction to  Information Retrieval (IR) slide 4: Information Retrieval (IR) Architecture slide 6:IR queries types Keyword queries Boolean queries (using AND, OR, NOT) Phrase queries Proximity queries Full document queries Natural language questions Slide 13: Information retrieval models Boolean model Vector space model Statistical language model Probabilistic Model Slide 15: Boolean ...

Life Style

PLACE FOR THE SUBTITLE

Latest Articles

HERE IS THE MODULE SUBTITLE
Load More