Posts

Web

 <!DOCTYPE html> <html> <head>     <title>Reg Form</title>     <style type="text/css">                  body{             font-family: Calibri;         }         input[type="text"], [type="textarea"], [type="number"]{             width: 300px;             padding: 12px 20px;             border-radius: 4px;         }         input[type="submit"], input[type="reset"] {             width: 100px;             height: 35px;             position: relative;left: 180px;             text-align: center;             background-color: Green ;   ...

Database Connectivity

 using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Linq; using System.Text; using System.Windows.Forms; using System.Data.SqlClient; namespace WindowsFormsApplication3 { public partial class Form1 : Form { SqlConnection con = new SqlConnection(@"Data  Source=.\SQLEXPRESS;AttachDbFilename=C:\Users\kisho\OneDrive\Documents\Empl oyee.mdf;Integrated Security=True;Connect Timeout=30;User Instance=True"); public Form1() { InitializeComponent(); } private void Form1_Load(object sender, EventArgs e) { } private void button2_Click(object sender, EventArgs e) { con.Open(); SqlCommand cmd = new SqlCommand ("Insert into Employee_Table  values('"+textBox1.Text+"','"+textBox2.Text+"','"+textBox3.Text +"','"+textBox4  .Text+"','"+comboBox1 .Text +"')",con); cmd.ExecuteNonQuery(); MessageBox .Show("Insert dat...

R tools Code

Apirori Code:  install.packages("arules") > library(arules) > data(Groceries) > transactions <- Groceries > summary(transactions) > itemFrequencyPlot(transactions, support=0.1, cex.names=0.8) > itemFrequencyPlot(transactions, support=0.05, cex.names=0.8) > itemFrequencyPlot(transactions,topN=20) > rules <- apriori(Groceries, parameter = list(support = 0.009, confidence = 0.25, minlen = 2)) > inspect(head(sort(rules, by="lift"),5)) > install.packages("arulesViz") > library("arulesViz") > plot(rules, measure=c("support", "confidence"), shading="lift", interactive=FALSE) > milk.rules <- sort(subset(rules, subset = rhs %in% "whole milk"), by = "confidence") > summary(milk.rules) > inspect(milk.rules) ===================================== NaivesBayes Code : install.packages("e1071")  library(e1071)  data("iris") head(iris)  tail(...

XMLProg

 <?xml version="1.0" encoding="UTF-8"?> <?xml-stylesheet type="text/xsl" href="students.xsl"?> <students>  <student>  <name>Aswath S</name>  <age>21</age>  <dob>09/08/2000</dob>  <mobile>9812989444</mobile>  <address>CBE</address>  </student>  <student>  <name>Surya M</name>  <age>21</age>  <dob>04/08/2000</dob>  <mobile>9585593999</mobile>  <address>CBE</address>  </student> </students> <?xml version="1.0" encoding="UTF-8"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:template match="/">  <html>  <body>  <h2>Students Personal Details</h2>  <table border="1">  <tr bgcolor="#9acd32">  <th>...

Mobile Computing Seminar

Image
Need for  Ad-hoc Networks :   Ad Hoc Network :           ■ An ad hoc network is a type of peer to peer wireless network mode where wireless devices communicate with each other directly, without the aid of a Wireless Access Point (WAP) device.           ■ Wireless networks typically depend on a base station or WAP device to manage and direct the stream of data between wireless devices.          ■  In an ad hoc setup, the network is built spontaneously as and when devices communicate with each other.            ■ These devices should ideally be within close range of each other; however quality of connection and speed of the network will suffer as more devices are added to the network.           ■ The security of an ad hoc network is non-existent, as wireless security norms such as WAP2, WAP, and WEP are not permitted in such dire...

OS Seminar

Protection in Directory Structure:                  ■In computer systems, alot of user’s information is stored, the objective of the operating system is to keep safe the data of the user from the improper access to the system.             ■Protection can be provided in number of ways.              ■For a single laptop system, we might provide protection by locking the computer in a desk drawer or file cabinet.               ■For multi-user systems, different mechanisms are used for the protection.  Types of Access :                ■The files which have direct access of the any user have the need of protection.                ■The files which are not accessible to other users doesn’t require any kind of protection.             ...

Java Seminar

Image
   JAVA BEANS :           ■A JavaBean is a specially constructed Java class written in the Java and coded according to the JavaBeans API specifications.   Following are the unique characteristics that distinguish a JavaBean from other Java classes −                   ■It provides a default, no-argument constructor.                   ■It should be serializable and that which can implement the Serializable interface.                   ■ It may have a number of properties which can be read or written.                   ■It may have a number of "getter" and "setter" methods for the properties. JavaBeans Properties :                  ■A JavaBean property is a named attribute that can be accessed by the user of the object....