Skip to main content

Posts

One hot encoding, what it is , when to use it and how to do it!!!

 One hot encoding approach is used to encode category data as numerical variables. It is also known as "dummy encoding" or "one-of-K encoding." The procedure entails establishing a new binary variable for each category in the categorical variable. This can be beneficial in machine learning and data analysis when working with categorical variables that do not have a natural order or ranking. When is it appropriate to execute one hot encoding? One hot encoding is appropriate for usage when the categorical variable is not ordinal, which means the categories do not have a natural order or ranking. It is also beneficial when the category variable has numerous levels or categories. For example, a variable with the levels "red", "green", and "blue" would be a good candidate for one hot encoding. One popular top category encoding When working with huge datasets, encoding all levels of a category variable with a single hot might result in a sign
Recent posts

getting GPU and anaconda ready to use GPU with tensorflow

 Hello there and welcome  As the title suggests this post is about updating you GPU driver(Nvidia) and updating Anaconda to be able to use GPU with tensorflow(or any other) Let's start first off go to search bar and type Geforce Experience then open that applications If u have a nvidia Gpu card but don't have that driver go to  https://www.nvidia.com/en-us/geforce/geforce-experience/   to download it Then go to Drivers  and if the update is available it should so something like this           Go ahead and update  after downloading be sure to install it Next is to upgrade conda(Anaconda) be sure that when we are installing GPU support in tensorflow we will be using virtual enviroment for doing so Open up powershell as admin mode You can either go to Search  bar and type powershell, right click it then click start as administrator or press windows_key +x  and then press a   then type conda update conda  This is is to prepare your graphics driver and conda for it 

Helping Cars See Dangers That Humans Can’t

  -Imagine this. You are driving through a dark tunnel on a stormy night with the glare from rain and headlights making it difficult to see. What if your car could see for you and detect a motorcyclist who’s waiting out the rain on the side of the road in the tunnel? Well, the good news is that the mobility tech company, Magna, is the first company to design a digital radar technology that can do just that.ICON Radar offers drivers an added layer of safety and security on the road. Your car might already have sensors that flash in your rearview mirror when a car is in your blind spot, or that beep when someone passes behind you in a parking lot. ICON Radar takes this kind of vehicle-sensing technology to a whole new level. It can scan a car’s environment 50 times faster than the blink of a human eye. And because it’s digital, the signal is sure to be strong and reliable — such as cell phones when they shifted from using analog signals to digital ones.A vehicle with ICON Radar can actua

Save Money With Cloud Computing

  Can Your Small Business Can Save Money With Cloud Computing 10 Benefits, 5 Drawbacks, Examples The term "cloud" is simply a metaphor for the Internet. All your small business needs to access cloud computing is a browser and Internet access. At the foundation of cloud computing are online infrastructures that deliver services through shared data centers. Cloud computing gives your business a single point of access for your computing needs. Even the United States Government is considering the cloud as part of its IT infrastructure to reduce spending. Cloud Computing Saves Money for a Small business Without a doubt, cloud computing can save your business money. Cloud computing sets your business free from all the expenses of operating an IT department. The costs you pay for the bank of servers, the backup issues, software purchases, human resources, training, implementation and upgrades, and protecting valuable data can be a thing of the past. Your business invests substantial

using your fancy GPU with tensorflow

 welcome to my first post . since this blog was mostly focused on cyber security  i think it's  time to change it i will be focusing on problems that arised  with me .  so we all have  Graphical Processing Unit(GPU)  which we use to play games with , ever wondered why that setup of your gets so hot  while doing it . Answer , simple  your GPU has 1000  of  simple cores compared to few complex cores of CPU solution:  1. install anaconda  (trust me )  setup path automatically from the installer (easy that way) https://www.anaconda.com/products/individual 2. open powershell  if you are on windows 10  press windows +x  and press a type    conda create --name tfgpu tensorflow-gpu press y if prompted wait for few minutes for installation to complete 3. type  conda activate tfgpu this is activate your virtual env named tfgpu 4. type  pip install jupyter notebook pip install ipykernel (you need this for it to  work with jupyter notebook) 5 now final step to create kernel ipython kernel ins

VR - aka virtual reality experience

Have you ever thought about what it might be like to relive the best moments of your life, and be able to share them with others? Maybe it’s the dance floor at your wedding. Or the birth of your child or his or her first birthday. Maybe it’s that touchdown that led your team to victory in the last seconds of a game. With today’s mobile virtual reality technology, it’s possible to create virtual memories and it has never been easier to get started. Humaneyes Technologies, an innovator in camera technology, has developed a user-friendly, dual camera that combines 360-degree photography with immersive 3-D Virtual Reality (VR), all in one simple-to-use solution that costs about the same as a decent DSLR camera. “360-degree pictures and video continue to change how we use cameras to capture the world around us,” says media expert Jim Malcolm of Humaneyes Technologies. “And the global adoption of VR headsets, combined with 3-D cameras, is providing even more ways to create

so what is phising

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information. This article will talk about the types of phishing techniques and the prevention. Phishing techniques Here's a brief look at five common phishing threats that often arise in enterprise settings. Each example features "Bob," a mid-level employee in the finance department who is trying to get through his busy day and respond to hundreds of emails. Breach of Trust - Bob gets an email from what he thinks is his bank asking him to confirm a wire transfer. The email takes him to a link that looks l