Problem Statement

📌 Create image by yourself Using Python Code
📌 Take 2 images, crop some part of both the images and swap them.
📌 Take 2 images and combine it to form a single image. For example, collage

So in this article, we will see how to create image , take 2 images crop it ,swap them and combine two images to form a single image using OpenCV module in python.

Image-Processing

Image processing is a method to perform some operations on an image, in order to get an enhanced image and or to extract some useful information from it. …


MongoDB is a NOSQL based database which uses collections and documents for storing the data. Flask is a python framework for web development. So in this article, we will see how to connect and use MongoDB with flask.

Installations

  1. Download the community version of MongoDB from here
  2. Download the individual edition of Anaconda from here
  3. Install flaskand flask_pymongo modules in python.
pip install flask
pip install flask_pymongo

Aggregation Framework

Aggregation operations process data records and return computed results. Aggregation operations group values from multiple documents together, and can perform a variety of operations on the grouped data to return a single result.

MongoDB provides three ways to perform Aggregation:

1. Aggregation pipeline

MongoDB’s aggregation framework is modeled on the concept of data processing pipelines. Documents enter a multi-stage pipeline that transforms the documents into an aggregated result.

db.orders.aggregate([
{ $match: { status: “A” } },
{ $group: { _id: “$cust_id”, total: { $sum: “$amount” } } }
])

First Stage: The $match stage filters the documents by the status field and passes…


What is Cybercrime?

Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money.

Cybercrime is carried out by individuals or organizations. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers. Rarely, cybercrime aims to damage computers for reasons other than profit. These could be political or personal.

Cybercrime that targets computers often involves viruses and other types of malware. Cybercriminals may infect computers with viruses and malware to damage devices or stop…


MongoDB is a general purpose, document-based, distributed database built for modern application developers and for the cloud era. It is used by millions of developers to power the world’s most innovative products and services. MongoDB is a cross-platform, document oriented database that provides, high performance, high availability, and easy scalability. MongoDB works on concept of collection and document.

Database

Database is a physical container for collections. Each database gets its own set of files on the file system. A single MongoDB server typically has multiple databases.

Collection

Collection is a group of MongoDB documents. It is the equivalent of an RDBMS table…


PROBLEM STATEMENT:

  1. Launch a container on docker in GUI mode.
  2. Run any GUI software on the container.

WHAT IS DOCKER ?

Docker is a tool designed to make it easier to create, deploy, and run applications by using containers. Containers allow a developer to package up an application with all of the parts it needs, such as libraries and other dependencies, and deploy it as one package.

OVERVIEW OF DOCKER :

Docker is an open platform for developing, shipping, and running applications. Docker enables us to separate our applications from our infrastructure so we can deliver software quickly.

With Docker…


Problem Statement

· Create a key pair

· Create a security group

· Launch an instance using the above created key pair and security group.

· Create an EBS volume of 1 GB.

· The final step is to attach the above created EBS volume to the instance you created in the previous steps.

First we have to Create IAM User

Go to root account →my security credentials →Users →add user →set user details →add user policies →add tags(optional ) →Review →success (Get Access key & Secure key) →login with IAM user with Account No.


In this Article, We are going to see an concept of NEURAL NETWORKS its industrial USECASES.

A neural network is a series of algorithms that endeavors to recognize underlying relationships in a set of data through a process that mimics the way the human brain operates. In this sense, neural networks refer to systems of neurons, either organic or artificial in nature. Neural networks can adapt to changing input; so the network generates the best possible result without needing to redesign the output criteria.


In this Article, We are going to see an open source development platform concept of REDHAT OPENSHIFT CONTAINER PLATFORM its industrial USECASES.

what is Openshift?

OpenShift is a cloud development Platform as a Service (PaaS) developed by Red Hat. It is an open source development platform (cloud-based user-friendly), which enables the developers to develop ,test and deploy their applications on cloud infrastructure. It is very helpful in developing cloud-enabled services.

OpenShift is capable of managing applications written in different languages, such as Node.js, Ruby, Python, Perl, and Java. One of the key features of OpenShift is it is extensible, which helps the users…

Sakshijadhav

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store