Posts

New Post

Salp Swarm Algorithm || Step-By-Step || Bio-Inspired Optimizer || ~xRay ...

Image
Learn the Salp Swarm Algorithm step-by-step with examples. Video Chapters: Salp Swarm Algorithm (SSA)  00:00 Introduction 00:14 Topics Covered in this Video 00:53  Introduction to Salp Swarm Algorithm 03:56 SSA Working 05:17 SSA Mathematical Models 10:27 SSA Advantages  10:51 SSA Disadvantages 11:08 SSA Structure 11:38 SSA Applications 12:20 Real-Life Application using SSA 12:55 Optimizing Routing in Sensor Networks Using Salp Swarm Algorithm  18:15 Conclusion

Particle Swarm Optimization (PSO)

Image
Particle Swarm Optimization (PSO) is a p opulation-based stochastic search algorithm. PSO is inspired by the Social Behavior of Birds flocking. PSO is a computational method that Optimizes a problem. PSO searches for Optima by updating generations. It is popular is an intelligent metaheuristic algorithm.  In Particle Swarm Optimization the solution of the problem is represented using Particles. [Flocking birds are replaced with particles for algorithm simplicity]. Objective Function is used for the performance evaluation for each particle / agent in the current population. After a number of iterations agents / particles will find out optimal solution in the search space. Q. What is PSO? A. PSO is a computational method that Optimizes a problem. Q. How PSO will optimize? A. By Improving a Candidate Solution. Q. How PSO Solve Problems? A. PSO solved problems by having a Population (called Swarms) of Candidate Solutions (Particles). Local and global optimal solutions are used to upda

Information Security Law and legal Framework

Image
Information Security means Data Protection. Information Security Laws deal with Creating, Storing, and Acquiring Information. Q. What is the Indian IT Act? A. It is an Act of the Indian Parliament. This is Law in India that deal with Cyber Crimes and Electronic Commerce.  Cyber Crime: [IT Act 200] Crime that involves computers and Networks. Cyber Crime involves crimes related to Computers. For Example-  Theft and Hacking.   Privacy Concerns Involved in Cyber Crime:  - Data/Information Privacy  - Financial Theft/Frauds Related Crimes  - Online Harassment - Online transaction Frauds    Q. What is a Patent Law? A.  It is the branch of  intellectual property law. Patent law deals with new scientific inventions. Patent Law in India starts in 1911.  Q. What is a Copyright Law? A . Law for copyright protection. Copy right law protects the original work of the creator. This law provides protection to sound recording, musical work, artwork, dramatic and film work.  Q. What is Privacy on the I

3D Translation Example

Image
 Consider the effect of a translation in the x,y,z direction by -2, -4, and -6 respectively on the homogenous coordinate position vectors [1, 6, 4].  Solution. 3D Translation Matrix is given as: Here, Tx = -2, Ty = -4, and Tz = -6. As We know, 3D translation is performed as: Therefore, we got  New co-ordinates are [-1  2  -2 ]

Three Dimensional Transformations and Viewing

Image
 Three Dimensional Transformations  Q. What is 3D Translation? A. Translation means shifting a point or moving the whole object. In 3D we need 3 Translatio factors. Translation Matrix for 3D:  Q. How to perform 3D Transformation? A.  To perform 3D Transformation. Multiply point with translation Matrix. Here, Q. What is 3D Scaling? A. Scaling changes the size of the object. Scaling in 3D is similar to scaling in 2D. The Matrix for 3D scaling transformation given as:

NTA UGC NET 2020 (Paper-2) | Ugc-Net Computer Science & Applications

Image
 Learn, Explore and Create ~ Ritika xRay Pixy https://www.youtube.com/channel/UC5kiAu42ZR8GD1KxNtLEO7w Computer Science & Applications  NTA UGC NET 2020  Paper-2
More posts