Notes, summaries, assignments, exams, and problems for Other courses

Sort by
Subject
Level

Optimal Estimators, Dice Posterior & Statistical Problems

Posted by Anonymous and classified in Mathematics

Written on in English with a size of 63.89 KB

Combine Independent Unbiased Estimators

Let d1 and d2 be independent unbiased estimators of θ with variances σ12 and σ22, respectively:

  • E[di] = θ for i = 1,2.
  • Var(di) = σi2.

Any estimator of the form d = λ d1 + (1 - λ) d2 is also unbiased for any constant λ.

The variance (mean square error for an unbiased estimator) is
Var(d) = λ2σ12 + (1 - λ)2σ22.

To minimize Var(d) with respect to λ, differentiate and set to zero:

d/dλ Var(d) = 2λσ12 - 2(1 - λ)σ22 = 0.

Solving gives the optimal weight

λ* = σ22 / (σ12 + σ22).


Question 1: Posterior PMF for a Third Dice Roll

Assume there are five dice with sides {4, 6, 8, 12, 20}. One of these five dice is selected uniformly at random (probability 1/5) and rolled twice. The two observed results are... Continue reading "Optimal Estimators, Dice Posterior & Statistical Problems" »

Assembly Language Programming: Code Analysis and Solutions

Posted by Anonymous and classified in Computers

Written on in English with a size of 4.63 KB

Assembly Language Code Analysis and Solutions

Section 1: Instruction Correctness Check

.data

calculate WORD 100
wVal DWORD 2

Instructions:

  1. mov bl, calculate
  2. mov ax, wVal

Question 1: Are the above two instructions correct? If not, justify your claim. [2 marks]

Answer:

Both instructions are incorrect.

  • For the mov operation, the operands must generally be of the same size.
  • In instruction 1, bl is 8 bits (1 byte), but calculate is defined as a WORD (16 bits or 2 bytes). The operand sizes do not match.
  • In instruction 2, ax is 16 bits (2 bytes), but wVal is defined as a DWORD (32 bits or 4 bytes). The operand sizes do not match.

Section 2: Loop Pseudo-code

Question 2: Write the pseudo-code for the loop that calculates the sum of the integers 3 + 2 + 1. [2 marks]

... Continue reading "Assembly Language Programming: Code Analysis and Solutions" »

Cloud Machine Learning Workflow and Content Delivery Optimization

Posted by Anonymous and classified in Computers

Written on in English with a size of 3.81 KB

Steps for Training a Machine Learning Project in the Cloud

Definition: Cloud ML Project Training

Training an ML Project in the Cloud means utilizing cloud-based resources and services to build, train, and optimize a Machine Learning model.

The Seven Key Steps in Cloud ML Training

  1. Data Collection: Gather and upload the dataset to cloud storage.
  2. Data Preprocessing: Clean and prepare data using cloud notebooks or specialized processing services.
  3. Model Selection: Choose the appropriate algorithm or utilize a pre-built model architecture.
  4. Training: Use scalable cloud compute resources (GPUs/TPUs) for intensive model training.
  5. Evaluation: Test model accuracy and performance using validation data.
  6. Hyperparameter Tuning: Optimize model parameters for better
... Continue reading "Cloud Machine Learning Workflow and Content Delivery Optimization" »

Essential Network Packet Filtering Syntax Reference

Posted by Anonymous and classified in Computers

Written on in English with a size of 12.41 KB

Basic Protocol Filters

Use these filters to quickly isolate traffic based on common protocols:

  • arp (Address Resolution Protocol)
  • dns (Domain Name System)
  • http (Hypertext Transfer Protocol)
  • https (HTTP Secure)
  • icmp (Internet Control Message Protocol)
  • ip (Internet Protocol)
  • ipv6 (Internet Protocol Version 6)
  • ntp (Network Time Protocol)
  • smtp (Simple Mail Transfer Protocol)
  • ftp (File Transfer Protocol)
  • ssh (Secure Shell)
  • tls (Transport Layer Security)
  • udp (User Datagram Protocol)
  • tcp (Transmission Control Protocol)
  • dhcp (Dynamic Host Configuration Protocol)
  • bootp (Bootstrap Protocol)
  • radius (Remote Authentication Dial-In User Service)
  • snmp (Simple Network Management Protocol)
  • kerberos
  • smb (Server Message Block)
  • nbns (NetBIOS Name Service)
  • nbss (NetBIOS Session Service)
... Continue reading "Essential Network Packet Filtering Syntax Reference" »

Essential English Vocabulary for News, Law, and Verb Structures

Classified in Spanish

Written on in English with a size of 7.81 KB

Crimes and Criminal Acts Vocabulary

  • blackmailcoercion by threat of revealing embarrassing information
  • briberyoffering money or gifts to influence someone
  • burglaryillegal entry into a building with intent to commit a crime
  • drug dealingselling or distributing illegal drugs
  • frauddeception for personal or financial gain
  • hackinggaining unauthorized access to computer systems
  • hijackingillegally seizing control of a vehicle, especially an aircraft
  • kidnappingabducting and holding someone captive
  • mugginga street robbery, often involving violence
  • murderthe unlawful premeditated killing of one human being by another
  • rapenon-consensual sexual penetration
  • robberytaking property from a person by force or threat
  • smuggling
... Continue reading "Essential English Vocabulary for News, Law, and Verb Structures" »

Aircraft Identification Features and Aerospace Composites

Classified in Technology

Written on in English with a size of 2.12 MB

0x2tV7+WJthvnHKBJxetd6bDt4HGFRMUjKVYAkcpjUtUWL9j3gNmYqJno4oRbrQGEYppr6f6HxU4t1t6PHAAAAAElFTkSuQmCC dJX3ra+dx9QAAAAASUVORK5CYII= gAAAAASUVORK5CYII= h83gsXK+4otxAAAAABJRU5ErkJggg==

Aircraft Identification Features

Learn to distinguish different aircraft models by their key visual characteristics:

  • A330 vs B777: The B777 doesn’t have winglets, has three wheels per main landing gear strut, and the end of the fuselage is distinct.
  • A320 vs B737: Standard Airbus/Boeing differences; B737s have a distinct engine shape (flattened bottom).
  • B737 Series: Differences between -200, -300, -400, -500, -600, -700, -800, -900ER are primarily by size.
  • B747: All have 4 engines. -200 and -300 do not have winglets, but the -300 has a larger upper deck hump. The -400 has winglets. The SP variant has no winglets and is shorter than others.
  • B757: The -300 is significantly larger than the -200.
  • B767: The -200 has no winglets. The -400 and -300 have
... Continue reading "Aircraft Identification Features and Aerospace Composites" »

Essential Machine Learning Algorithms and Metrics

Classified in Mathematics

Written on in English with a size of 106.59 KB

Evaluation Metrics for ML Models

  • Accuracy: The ratio of correctly predicted instances.

  • Precision: Correct positive predictions divided by total predicted positives.

  • Recall: Correct positive predictions divided by actual positives.

  • F1 Score: The harmonic mean of precision and recall.

    AF4gf7O8RoPFAAAAAElFTkSuQmCC

K-Nearest Neighbors (KNN) Algorithm

  • A classification algorithm that works by finding the 'k' closest training examples to a data point.

  • Strengths: Simple to understand, effective for smaller datasets.

  • Weaknesses: Sensitive to irrelevant features and the scale of the data.

  • Applications: Image recognition, recommendation systems.

Ensemble Learning Techniques

  • Combines multiple models to improve predictive performance.

  • Methods:

    • Bagging (e.g., Random Forests)
    • Boosting (e.g., AdaBoost)
... Continue reading "Essential Machine Learning Algorithms and Metrics" »

Nmap, Netcat, and Metasploit Commands Cheat Sheet

Classified in Computers

Written on in English with a size of 7.67 KB

Nmap Options

-PE: Quickly check if host is up.

-sn: Disable port scanning (host discovery).

-n: Disables DNS resolution (checks IP online without looking up hostnames).

-O: OS detection.

-A: OS detection, Version detection, Script scanning, traceroute.

-sV: Service detection (banner info, version).

-vV: Provides verbose output.

-sC: Scan with default scripts for additional info gathering.

--min-rate=5000: Ensures scan sends at least 5k packets per second.

nmap --script smb-enum-shares.nse -p 445 (ip): List shares and their properties.


To see scripts starting with X: ls /path/X

To execute script with script tracing: sudo nmap -script=smb-os-discovery -script-trace target_ip

To enumerate the SMB share files: sudo nmap -script=smb-enum-shares target_ip

Vulnerability... Continue reading "Nmap, Netcat, and Metasploit Commands Cheat Sheet" »

Dental Development Stages and Orthodontic Occlusion Criteria

Classified in Biology

Written on in English with a size of 5.59 KB

First Stage: Gum Pad (Birth to 2 Years)

This stage lasts from birth until the completion of the deciduous maxillary gum pad.

  • Maxillary Gum Pad: Horseshoe shape.
  • Mandibular Gum Pad: U shape.
  • Transverse Division: Elevated ridges are divided into segments for future deciduous teeth.
  • Lateral Sulcus: Located distal to the canine area.

Gum Pad Occlusion

Gum Pad at Rest: The pads are not in contact, and the tongue is projecting.

Occlusal relationships are described in three dimensions:

  1. Anteroposteriorly (Overjet): Anterior overjet; the mandibular lateral sulcus is posterior to the maxillary.
  2. Vertically: Anterior open bite; posterior segments (Segment D) touch.
  3. Transversely: The maxillary gum pad is wider than the mandibular (resulting in overjet).

Second Stage:

... Continue reading "Dental Development Stages and Orthodontic Occlusion Criteria" »

Comprehensive SEO Strategies for Website Success

Classified in Arts and Humanities

Written on in English with a size of 4.79 KB

Understanding Your Audience & Buyer Journey

Target Audience & Buyer Persona

  • Target Audience (TA): Defines the broad group of people you want to reach, considering factors like age, gender, income, interests, and values.
  • Buyer Persona (BP): A semi-fictional representation of your ideal customer, based on market research and real data about your existing customers. It includes details like name, age, job, goals, motivations, and pain points.

The Buyer's Journey Stages

  1. Problem Recognition: The buyer identifies a problem or need.
  2. Information Search: The buyer looks for solutions or information.
  3. Evaluation of Alternatives: The buyer compares different options.
  4. Purchase Decision: The buyer chooses a product or service.
  5. Post-Purchase Behavior: The
... Continue reading "Comprehensive SEO Strategies for Website Success" »