Every Machine Learning engineer wants to achieve accurate predictions with their algorithms. Such learning algorithms are generally broken down into two types — supervised and unsupervised. K-means clustering is one of the unsupervised algorithms where the available input data does not have a labeled response.
K-Means clustering is an unsupervised learning algorithm. There is no labeled data for this clustering, unlike in supervised learning. K-Means performs the division of objects into clusters that share similarities and are dissimilar to the objects belonging to another cluster.
The term ‘K’ is…
We Create a Python program for Vehicle Number plate Detection and Recognition to Identify Owner of Vehicle
we use numpy
Download and Install Tesseract-OCR software from https://digi.bib.uni-mannheim.de/tesseract/tesseract-ocr-w64-setup-v5.0.0-alpha.20210506.exe
Download pytesseract python package:- pip install pytesseract
Import packages in your python code
Now set your tesseract.exe path where you extract it
pytesseract.pytesseract.tesseract_cmd = r’C:\Program Files\Tesseract-OCR\tesseract.exe’
In this article, we have created a web application for Docker and we will run all the docker commands
What is Docker?
What is Kubernetes ?
Kubernetes is a portable, extensible, open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation. It has a large, rapidly growing ecosystem. Kubernetes services, support, and tools are widely available.
What is CGI?
CGI is a Python server site program that helps to execute internal commands of the Operating System. CGI stands for Common Gateway Interface, Its helps to make API program in python.
How to Integrate K8s with python CGI?
First, we have to install and start ‘minikube’ as:
After that, we start a webserver.
In this article, I have tried to small talk about of confusion matrix and intrusion detection system and the relation of IDS and confusion matrix
Intrusion Detection Systems (IDS) have been a popular defensive strategy used in protecting entire enterprise networks, hosts in a network, or processes on a host from cyber attacks
The main task of an IDS is the analysis and classification of the network activity, which is aimed to discriminate the normal network events from the intrusion ones. The concept of intrusion can be related to a software activity, such as malware(e.g., spyware, virus, rootkit, etc.) …