Many programming guides recommend to begin scripts with the #! /usr/bin/env shebang in order to to automatically locate the necessary interpreter. For example, for a Python script you would use #! /usr/bin/env python, and then the saying goes, the script would “just work” on any machine with Python installed. The reason for this recommendation is that /usr/bin/env python will search the PATH for a program called python and execute the first one found… and that usually works fine on one’s own machine.
If you're having some old desktop or laptop, there are many lightweight Linux distros that you can install and enjoy a lag-free computing experience. These operating systems for 2018 have been optimized by their developers to reduce overall RAM and resource usage. The top-rated distros on our list are Bodhi Linux, Puppy Linux, Linux Lite, Ubuntu MATE, etc.
Learn my 10-step process of how to start a business while keeping a full-time day job, from someone who's successfully done it. What's your side business?
There's an adage which goes, "The tool does not make the artist." While this statement maybe true, it matters whether the artist has access to any free
This is a short collection of lessons learned using Colab as my main coding learning environment for the past few months. Some tricks are Colab specific, others as general Jupyter tips, and still more are filesystem related, but all have proven useful for me.
To see live versions of the charts included in this article, and the code used to create them, see my GitHub project repository here. When working with text datasets, getting a handle on the “who…
In a broader mathematical or computational perspective, an optimization problem is defined as a problem of finding the best solution from all feasible solutions. In terms of Machine Learning and…
ReSanskrit explores every aspect of Aditya Hrudayam Stotram - right from the story, rules of recitation, benefits and scientific significant. Click to read now
Humans are tribal animals, and a recurring failure to grasp this truth has contributed to some of the worst debacles of U.S. foreign policy in the past 50 years.
One of the hardest concepts to grasp when learning about Convolutional Neural Networks for object detection is the idea of anchor boxes. It is also one of the most important parameters you can tune…
In this blog post we will cover some of the basics of the Barnes Hut algorithm. This is completely new to me, it is not an algorithm I’ve used/studied before (and I am by no means an astrophysicist). Nonetheless it has piqued my interest so I have decided to write about it. In this blog I will be talking about 2 dimensions unless otherwise stated, this just makes the resulting code run a little quicker and output easier to visualise. Modifying the 2d code to be 3d (or even higher dimension) requires only minor revisions.
How did East Asians come to be referred to as yellow-skinned? It was the result of a series of racial mappings of the world and had nothing to do with the actual color of people’s skin. ...
This post discusses the benefits of full-stack data science generalists over narrow functional specialists. The later will help you execute and bring process...
Unlike task-specific algorithms, Deep Learning is a part of Machine Learning family based on learning data representations. With massive amounts of computational power, machines can now recognize…
Hi Geeks, welcome to Part-3 of our Reinforcement Learning Series. In the last two blogs, we covered some basic concepts in RL and also studied the multi-armed bandit problem and its solution methods…
While simple approximations to the bbox are trivial (such as computing the bounding box of their control points), in this article we deduce the exact bounding box analytically.
Today we’ll look at the implementation of a data structure wl_list, it belongs to the wayland library and demonstrates a very clever use of the C preprocessor.
In reality, you are actually coinciding given two points with the points of your ruler. Then you will say, these points are separated by x unit in length.
Ever since graduation, people have been asking me: “What’s now?” My answer has been an unequivocal: “I don’t know.” I used to think that by the time I finish...
Note: You can find the source code for the optimized version of poly2tri on Github.I needed a fast and robust mesh triangulation solution for Metric Panda Engine and after some ...
I sat in a coffee shop reflecting on my journey in Haskell today. It was spurred on by briefly seeing the whole “monads are pipes” thing and some responses to it. I don’t involve myself in these…
Turning procedural and structural knowledge into programs has established methodologies, but what about turning knowledge into probabilistic models? I explore a few examples of what such a process could look like.
In the Beginning... ...there was no inheritance and no composition, only code. And the code was unwieldy, repetitive, blocky, unhappy, verbose, and tired. Copy and Paste were the primary mechanisms of code reuse. Procedures and functions were rare, newfangled gadgets viewed with suspicion. Calling a procedure was expensive! Separating pieces of code from the main logic caused confusion! It was a Dark Time.
For instance, you might learn in an online course how to run a YOLO network, but a real-world use case might asks for 7 YOLO networks in distributed GPUs and a HydraNet architecture. What the heck is…
Overview Threads and locks are a software-defined formalization of the hardware underneath, and as such comprise the simplest possible concurrency model. It forms the basis of other concurrency abstractions built on top of it, so it’s important to understand in this regards. However, it’s difficult or impossible to build reliable, scalable systems directly on these primitives. While most every language has support for threads and locks, CPython remains special in its use of a global interpreter lock that prevents threads from concurrently accessing shared memory, because CPython’s memory management is not thread-safe.