Trends
t Architecture of the internet of things Fog / edge computing Summary
t Architecture of the internet of things Fog / edge computing Summary
Big Data What is MapReduce? MapReduce Distributed file system Summary
A Layered Cloud Architecture Taxonomy of Cloud Models Cloud Architecture Virtual Infrastructure Manager Virtual Machines versus Containers Clou...
Distributed Computing Paradigms Cloud computing – Definition Cloud data centers Virtualized infrastructures – Benefits The vision of cloud A (l...
Dependability – Requirements Terminology Failure models Failure Masking by Redundancy Groups and Failure Masking The Byzantine Generals problem
Time in Distributed System Synchronization model Synchronization algorithms Cristian’s Algorithm Berkeley Algorithm Election Al...
Domain Name System (DNS) DNS Zone Data Attribute-base Naming: Directory Services LDAP: Lightweight Directory Access Protocol* Java Naming and Dire...
Namespaces Name Resolution Mounting Namespace implementation Name resolution (navigation) methods Iterative resolution Recursive...
Function of a naming system** Flat naming systems 1. Broadcasting 2. Forwarding pointers 3. Home-based approach 4. Distrib...
The Rest way of implementing the Web Service The SOAP way of implementing the Web Service Data Encoding and RPC Steps
What is REST? The REST way of implementing the Web Services Claimed Benefits REST vs SOAP differences
Definition of Web Service Available libraries Writing a client Developing a server using JAX-WS Summary
Service Oriented Architecture What are Web Services? What are Web Services Protocols? The Big picture SOAP: Simple Object Access Protocol WSDL:...
Architectures One-tier Architectures Two-tier Architectures Three-tier Architectures N-tier Architectures Service-O...
Layered Protocols Middleware Protocols Types of Communications Remote Procedure Call (RPC) RPC operation Interaction using Asynchro...
Architectural Style 1. Layered Architecture 2. Object based style 3. Resource based Architectures 4. Event based architecture...
Centralised vs decentralised systems Types of distributed Systems** 1 - High performance distributed computing systems** 2 - Distribute...
Definition of a Distributed System Examples of Dist. sys Middleware Challenges for Distributed Systems Goals for Distributed Systems Scaling Tec...
In this series of notes, various aspects of distributed systems are covered. The books referenced includes: Tanenbaum A & van Steen M, Di...
18. K means
17. Markov Decision Processes
16. Support Vector Machines IV
15. Support Vector Machines III
14. Support Vector Machines II
13. Support Vector Machines
12. Decision Trees
11. Linear Models for Regression
10. Multi-Layer Neural Networks
9. Convolutional Neural Networks
8. Multi Layer Neural Networks
7. Perceptron III
6. Neural Networks: Perceptron II
5. Elements of Local Optimisation
4. Neural Networks: Perceptron
3. Nearest Neighbour Methods
2. Machine Learning Evaluation
1. Introduction
In this series of notes, you will will: List the principle algorithms used in machine learning and derive their update rules Appreciate the capabilities...
15. Intrusion Detection & incident response
14. Finding, reporting and avoiding vulnerabilities
13. Low-level vulnerabilities
12. Buffer Overrun
11. Command injection & input validation
10. Abuse of DNS, ARP & application protocols
9. Network defences
8. TCP/IP networking threats
7. User authentication
6. Randomness
5. Public key cryptography
4. Message authentication
3. Symmetric Ciphers
2. Threat modelling
1. Introduction
In this series of notes, it will cover contents about software security, such as: Cryptography: the role of cryptography in security, modern cryptograph...
At what stage is the system that you are evaluating? Layered evaluation 1. Collection of input data – information about the user 2. ...
Part 1 – Static approaches Adaptive content presentation – two steps Page based approaches Fragment based approaches Par...
Main steps for group recommendations Aggregation Strategies Aggregation strategies: Average Aggregation strategies: Multiplicative ...
Data driven evaluation - Rating Accuracy Data driven evaluation - Usage Prediction
Hybridization Sources for recommendations Recommender algorithms Comparing recommender algorithms Pros and cons of recommender algor...
Collaborative filtering 1.1 Step 1 - Represent input data 1.2 Step 2 - Find nearest neighbours 1.3 Step 3 - Predictions/ recommendations Pros and...
CHIP tools Discovering connections via reasoning User profile building Summary: Knowledge based filtering
CBF when user model is based on keywords CBF when user model is based on Facets, values, ratings CBF when user model is based on Graphs/ concepts
Concept of a ‘stereotype’ Stereotype: Structure Limitations of stereotyping Combining stereotypes Building stereotypes Resolving stereotype cont...
1. User engagement 2. Metrics 3. Interpretations
User Information Collection 1.1 Explicit user information collection 1.2 Implicit user information collection 1.3 Techniques for implicit user ...
What can be modelled in a user model/ user profile Knowledge Interests – came from recommender system, profile of the user Goals and tasks Backgroun...
Schema of user-Adaptive Systems Main definitions Examples
The personalisation buzz Why do we need personalisation? Two Types of personalisation Personalisation from consumer perspective Personalisation o...
User Adaptive Systems personalises and tailors the vast amount of information into what we need, want and what best fits our current needs. The notes wi...
https://leetcode.com/problems/number-of-1-bits/
Explanation 링크드 리스트 뒤집기는 기본적이고, 정말 많이 나오는 알고리즘중 하나입니다. 시간복잡도는 O(n)이며, 총 3개의 스텝으로 이루어집니다. 이미지와 함께하면 이해가 빠를겁니다. 출처
Problem Given an integer array nums, find the contiguous subarray (containing at least one number) which has the largest sum and return its sum.
Problem Statement TreeConstructor(strArr) take the array of strings stored in strArr, which will contain pairs of integers in the following format: (i1,i2), ...
Problem Statement Given a string strParam with numeric words, perform the calculation and return value as a string. if the value is <=0, say negative xx.
Problem Statement Reverse Polish Notation: It is a mathematical notation in which operators follow their operands. Watch this video for more detailed explana...
Problem Statement Given a string s containing just the characters ‘(‘, ‘)’, ‘{‘, ‘}’, ‘[’ and ‘]’, determine if the input string is valid.
Problem Statement Merge two sorted linked lists and return it as a sorted list. The list should be made by splicing together the nodes of the first two lists.
2021년 카카오 블라인드 채용 코딩테스트중, 기본 문제 “카카오 신규 아이디 추천”의 코드와 풀이입니다. 정규식을 사용하면 원하는 문자열 그룹을 아주 쉽게 정의할 수 있습니다. 쉽게 풀어놨으니 꼭 찬찬히 보고 이해해보세요!
Problem Statement
Table of Contents Q: Find a missing number and duplicates in a given array Find a missing number in a given array 1.1 Example 1.2 Code Implementation...
Python implementation will be linked below.
Table of Contents Q: Implement a function that counts the set bit of a binary tree in C. What is a Binary Tree? 1.1 Binary Search Tree Steps and Pseud...
NFTs Are Coming to Instagram, Zuckerberg Says How the shift to edge computing is impacting enterprises How AI will change the data center and the IT ...
Microsoft Makes Big Bet on Health-Care AI Technology With Nuance - Digitizing Healthcare 오케스트로, KETI와 차세대 AI옵스 기술 개발 Dell Technologies Unlocks Value ...
Table of Contents Carmakers wake up to new pecking order as chip crunch intensifies Google, Facebook battle Australia over proposed revenue-sharing law...
Table of Contents Los Angeles to offer vaccine record on iPhones UK competition watchdog to probe Nvidia’s Arm takeover Apple, Hyundai set to agree e...
December’s Tech Updates December’s Tech Updates Brazilian soy farmers try 5G technology with Huawei equipment EU sets out search ranking guidelines fo...
November’s Tech Updates
September/ October’s Tech Updates
August’s Tech Updates
July’s Tech Updates
This category includes a summary of daily technology news. It will cover current trends, new issues or technology of the month. It will follow the 6-W’s writ...
👩🏻💻 A Final Year Project on Edge Computing that simulates and evaluates different edge architectures
🚲 Hire bicycle from main spots of Leeds - view, book, and pay all in one go!
🌱 A full-stack Springboot-React web application that implements a User control system
👩🏻💻 Rate and view your professors from various modules, semesters and years!
🏰 Renders the landmarks of Leeds! - Millennium square, a carousel and Leeds University’s Bacon statue
💃 Search the kind of event you want to attend, and scroll through Yelp’s recommendations of places to go, eat, and drink nearby!
👩🏻💻 A Final Year Project on Edge Computing that simulates and evaluates different edge architectures
🔎 A Search tool that crawls the ‘webscraping’ website to provide you with country search functionality!
🧠 Correctly classify the fashion images from Zalando’s Fashion-MNIST dataset.
엔터프라이즈 등급의 지능형 자동화의 특징 1. 연결성 2. 개방성 - Tech Expansion 3. 인간과 협업 - Interactivity AI/ML을 접목한 지능형 자동화 성공사례 1 - 화이자...
모바일 산업의 대폭적인 성장 5G vs 4G 엣지 영역으로 흐르는 데이터 다양한 혁신 서비스 5g, edge and cloud 5g network edge use case의 진화
MEC(Mobile Edge Computing) DELL Technology의 엣지 솔루션 사례 엣지 데이터의 특징 5G 시장의 발전 방향 - Telecom/Enterprise MEC 엣지 컴퓨팅의 장점 MEC 구축 방식 적용사례- 2020년 한국판 디...
As the era of the 5th generation mobile communication (5G) accelerates, various services using it are being activated. 5G’s characteristics being low-latency...
Edge computing deploys computing resources outside the data center that is closer to end devices, such as IoT elements. This leads to the loss of the physica...
Edge computing is expected to undergo explosive growth over the next few decades, due to the developments in 5G and Internet of Things (IoT).
Table of Contents Recommender System at Ground Zero Breeds of Recommender System Challenges and Solutions of Recommender System Link to the Paper
In this series of notes, it will cover contents about software security, such as: Cryptography: the role of cryptography in security, modern cryptograph...
User Adaptive Systems personalises and tailors the vast amount of information into what we need, want and what best fits our current needs. The notes wi...
In this series of notes, you will will: List the principle algorithms used in machine learning and derive their update rules Appreciate the capabilities...
In this series of notes, various aspects of distributed systems are covered. The books referenced includes: Tanenbaum A & van Steen M, Di...
안녕하세요. 오늘은 깃허브 블로그의 포스트들을 카테고리 별 폴더로 나누는법을 알아볼게요.
안녕하세요. 오늘은 깃허브 블로그의 폰트를 바꾸는 법을 알아볼게요! 폰트는 블로그 첫 인상이나 가독성에 큰 영향을 주는 것 같아요. 그만큼 블로그의 디자인이나 특성을 고려해서 여러가지 폰트로 바꿔보는 것도 중요하구요.
안녕하세요. 오늘은 깃허브 블로그의 상단 메뉴바에 드롭다운, 또는 서브메뉴 만드는 법을 알아볼게요.
🗺 안녕하세요, 오늘은 사이트가 서치에 걸리게 하기 위해선 필수! 인 사이트맵 추가 방법을 다뤄보겠습니다. 추가로 구글 서치 콘솔에 사이트맵 등록하는 법과 몇가지 주의점을 추가해 봤어요.
Hi! I recently started a course on Agile Certified Practitioner offered by PMI from LinkedIn learning. I found Agile to be a very effective framework when it...
👋🏼 Hi! I’ve graduated with a degree in Computer Science from Leeds University last year, and had a pretty successful project (in my opinion 😅) so I thought I...
##1. Introduction to Information Storage
Dell Information Storage and Management ISM V4 - Virtual Classroom By 조문영 부장님 교육 일정: 2021/8/2 ~ 2021/8/6 (5일) 교육 시간: 09:30 ~ 17:30 (하루 7시간, 총 35시간) 교육...
Hi! I recently started a course on Agile Certified Practitioner offered by PMI from LinkedIn learning. I found Agile to be a very effective framework when it...