PHP SQL Server Stored Procedure #Root

/* prepare the statement resource */
$stmt=mssql_init("your_stored_procedure", $conn);

/* now bind the parameters to it */
mssql_bind($stmt, "@id", $id, SQLINT4, FALSE);
mssql_bind($stmt, "@name", $name, SQLVARCHAR, FALSE);
mssql_bind($stmt, "@email", $email, SQLVARCHAR, FALSE);

/* now execute the procedure */
$result = mssql_execute($stmt);

Another Example

$conn = mssql_connect($db_host,$db_user,$db_password);if ($conn===false){
echo 'Cannot connect.';
exit;
}

if (mssql_select_db("YourDatabase",$conn) === false) {
echo 'no database';
exit;
}

$proc = mssql_init('YourStoredProcedure',$conn);
mssql_bind($proc,'@ParameterOne',$ParameterOne,SQLVARCHAR);
mssql_bind($proc,'@ParameterTwo',$ParameterTwo,SQLVARCHAR);
mssql_bind($proc,'@ParameterThree',$ParameterThree,SQLVARCHAR);
if ($result = mssql_execute($proc)) {
if ($row = mssql_fetch_row($result)){
// process results
}
}

From: http://sitestree.com/php-sql-server-stored-procedure-prepare-the-statement-resource-stmtmssql_inityour_stored_procedure-conn-now-bind-the-parameters-to-it-mssql_bindstmt-id-id-sqlint4-fa/
Categories:Root
Tags:
Post Data:2019-09-21 08:44:53

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Important Basic Concepts: Statistics for Big Data #Root

Important Basic Concepts: Statistics for Big Data

Graphical : Exploratory Data Analysis (EDA) methods?
First of all, EDA is about exploring the data and understanding if the data will be good for the experiment and study. Graphs and plots can easily show the data patterns. The raw data can be difficult to understand for patterns and fitness, Graphs can easily show some information about the data.

Graphical Methods can be as follows:
1. Scatter Plots
2. Histograms
3. Box Plots
4. Normal Probability plots

Quantitative Exploratory Data Analysis Techniques:

1. Interval Estimation (Ranges)
2. Hypothesis testing (Null Hypothesis, Alternate Hypothesis)

1. Interval Estimation (Ranges): Create a range of values within which a variable is likely to fall. Confidence Interval (mean will be here) is an interval estimation.

2. Hypothesis testing: Test various propositions about a data

Example: Test that the mean age of Canadian Population is 53.

It’s a multi-step process. Steps can be as follows:

1. Test Null Hypothesis: Assume the Hypothesis is true
2. Alternate Hypothesis: Hypothesis that will be accepted if the null hypothesis is rejected
3. Significance Level: what level of significance the null hypothesis will be conducted (i.e. 95% of the time the average return of index investing is 6% for 10 years period)
4. Test Statistic: Numerical measure showing sample data is consistent with Null Hypothesis
6. Critical Value: If test statistic (numerical measure) is more extreme than critical value – null hypothesis is rejected
7. Decision: decision is made by considering Test Statistic and Critical value

Some Basic Probability Distributions:

Binomial Distribution: When the variable can have only one of two values

Poisson Distribution: Describe the likelihood of given number of events occurring during a time interval (customers to your shop in an hour)

Normal Distribution: Symmetrical data. probability that a variable will have a given distance from the mean on both lower and higher side is equal.

t distribution: Similar to Normal Distribution. Extreme large or extreme low values are highly likely. Shows too much variance. Useful when the sample size is small (it is also told when there is not variance, standard deviation)

Chi Square Test: Test to see if a population follows a particular distribution such as normal distribution.

The F distribution: To test if two datasets are from the same population (by using variances).

Related Concepts:

What is Z Score?
Probability of a particular score to be occurring in our normal distribution.
Helps to compare two values that are from two different normal distributions

Another definition: it is a measure on how a value is related to the mean.

Chi Square test for Normal Distribution:
Null Hypothesis: No relation exists between categorical variables. They are independent. If the Hypothesis is true, it is a normal distribution

What is p value in Chi Square test:
p value is just a significance. Helps to understand the significance of the result. A small p value means a strong evidence against the Null Hypothesis.

Reference: Anderson A., Semmelroth D., Statistics for Big Data

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://sitestree.com, http://bangla.salearningschool.com From: http://sitestree.com/important-basic-concepts-statistics-for-big-data/
Categories:Root
Tags:
Post Data:2019-09-15 20:28:37

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Questions Answered by Exploratory Data Analysis (EDA) #Root

Questions Answered by Exploratory Data Analysis (EDA)

What are the key properties of a Dataset (Center, Spread, Skew, probability distribution, correlation, outliers)

1. What is the center of the data (mean, median, mode)
2. How much spread is there in the data? (Variance, Standard deviation, Quartiles, Interquartile Range (IQR), Example: IQR = Q3 – Q1)
3. Is the data skewed? : Mean > Median = Positive, Mean = Median = Symmetrical, Mean < median = Negatively skewed
4. What distribution does the data follows? Is the data Normally distributed?
5. Are the elements in the Dataset uncorrelated? i.e. two variable move positively or negatively together or not; linearly or non-linearly or not
6. Does the center of the data change over time? Example: for time series data, does the mean change over time?
7. Does the spread of the dataset Change over time? Example: for time series data, does the variance change over time?
8. Are there outliers in the data?
9. Does the data conform to your assumptions? Normally Distributed, constant parameter, no outliers, close to normally distributed, members are independent or nearly independent, variance increases over time, or several outliers are there in the data

Reference: Anderson A., Semmelroth D., Statistics for Big Data


Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://sitestree.com, http://bangla.salearningschool.com From: http://sitestree.com/questions-answered-by-exploratory-data-analysis-eda/
Categories:Root
Tags:
Post Data:2019-09-15 15:57:59

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Best Practices in Data Preparation #Root

Best Practices in Data Preparation

1. Check data formats (Image, CSV, PC, Mac, mainframe, text, structured, unstructured)
2. Verify data types (numbers, text, floats, currencies, nominal, ordinal, interval, range)
3. Graph your Data (Scatter, Histogram, bar, line)
4. Verify the data (data accuracy, data makes sense)
5. Identify outliers ( Examples: very large or very small (than the rest))
6. Deal with missing values
7. Check your assumptions on data distribution (normal, poisson )
8. Backup and document – everything that you do

Reference: Anderson A., Semmelroth D.
Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://sitestree.com, http://bangla.salearningschool.com From: https://sitestree.com/best-practices-in-data-preparation/
Categories:Root
Tags:
Post Data:2019-09-15 15:32:17

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Machine Learning and Security Basics #Root

Machine Learning and Security Basics

Objective: Define/describe key concepts on what Machine Learning can do for Security and how

First of all, what are security threats?
Malware, Worm, Trojan, Spyware, Adware, Ransomware, Rootkit, Backdoor, Bot, Botnet, Exploit, Scanning (port scanning), Sniffing (silently observe and record), Keylogger, Spam, Login Attack, Account Take Over, Phising (masquerading), Spear phising, Social Engineering, Incendiary Speech, Denial of Service, Distributed Denial of Service, Advanced persistent threats (APTs), Zero day vulnerability.

Then Cyber Threat Taxonomy:
Information gathering (Scan, Sniff, Social engineering)
Intrusion Attempts
Intrusions (Account Takeover, Privilege escalation, bot, application compromise)
Fraud (Unauthorized use of Resources)
Abusive Content (Spam, …)
Malware (Virus, Trojan)
Availability Attacks (DoS)

What is the motivation behind cyber attacks?
There can be many reasons including monetary gain, power and political gain/control.

What is Machine Learning?
Simply, Programs that learn from data, adapt with data changes, then form models and algorithms to utilize that learning for a goal (such as prevent security attacks)

How and where machine Learning can help in Security:
Some examples can be: Pattern Recognition and Anomaly detection, Malware and botnet detection and analysis, Spam Fighting

How does Machine Learning help in Security?
Examples can be: Using classification and clustering events/incidents/contents into security categories/classes/levels and taking proper actions to mitigate the effect or to prevent future incidents.

Where and how can Machine Learning help with Security?
Machine Learning can help in Anomaly Detection, Malware Analysis, Network Traffic Analysis, Protecting the Consumer web, also protecting and adapting itself from security attacks.

What are the Machine Learning Approaches and Concepts that can help with Security?
These will be primarily classification, clustering, and prediction approaches and algorithms. The way Machine Learning will work, it will analyze past logs, emails, login attempts, inbound and outbound requests, then find patterns, then create algorithms (i.e. find/customize and apply proper ML algorithms ) based on those patterns. With training data and test data, fine tune the model. The following algorithms can be applied for Security as well: Logistic Regression, Decision Trees, Decision Forests, Support Vector Machines, Naive Bayes, KNN, Neural Networks.

However, feature selection and feature engineering with selection of the proper model and algorithms will be critical.

Will continue…
Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://sitestree.com, http://bangla.salearningschool.com From: https://sitestree.com/machine-learning-and-security-basics/
Categories:Root
Tags:
Post Data:2019-09-15 13:19:14

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Hacking Basics: Short Overview: A Short Breadth #Root

Hacking Basics: Short Overview: A Short Breadth

Audience: Ethical Hackers, Wanna be security researchers, interested to know the basics of Security

Objective: Identify the key hacking concepts. Just the names primarily.

key Topics: Password Cracking, Keyloggers, Trojans, Viruses, Worms, Rootkits, Social Engineering, Privilege Escalation, Denial of service attack, Botnet, Alternate data streams, Steganography, Covering tracks.

Password Cracking Techniques that hackers use or can be used as part of ethical hacking:

Dictionary Attack, Brute Force Attack (uses combination of letters, digits, esp. characters – not dictionary words), Hybrid Attack (on top of dictionary attack such as world123), Syllable Attack (brute force attack on top of dictionary attack, combine dictionary and brute force), Rule based attack (when some hints are known then use rules to create passwords to use to crack), Rainbow Table Attack (uses pre-generated hashes of combinations/permutations of a character set), distributed password attack (uses multiple systems to crack the password), non-technical attack (social engineering, shoulder surfing to see typing)

Keyloggers: Used to steal passwords such as BIOS Embedded (sits in the BIOS), keylogger keyboard (replace keyboard with keyboards with internal memory), External Keyloggers (fits the PS/2, serial keyboard port to intercept), Software keyloggers (most common, installed in the target system)

Trojans: Hides inside trust-able applications can give the attacker full access to the system, can steal passwords and any other data. Two types: Overt channel (uses a genuine channel to communicate), Covert Channel (uses back/secret door)

Types of Trojans: Command shelf Trojans (gives command line access to the attacker), Document Trojans (hides inside word or pdf files), email trojans (attacker sends commands through email messages ), Botnet Trojans (uses bots to attack, for DOS attacks bots are usually used)

Viruses: A malicious program itself. The life-cycle of a virus: design/development, infection and replication (replicates itself on the target system to attack), detection (can be detected by anti-virus software), anti-virus signature development, Eradication

Types of Viruses: System/boot virus, File virus, Macro Virus (can be word and excel macro), Polymorphic virus (change code and behaviors of itself).

Computer Worms: Similar to virus however they self-replicate themselves aggressively and try to attack aggressively to infect as many systems as possible (and as quickly as possible)

Rootkits:

Affect the operating system, changes the kernels. hard to remove. Changes system level code to remain undetected by anti-virus software.

About Antivirus software: Not all anti-virus software can detect all viruses. VirusTotal a service scans submitted files using multiple anti-virus software to detect viruses.

Social Engineering: Deceptive art to engage in communication with others to collect sensitive/valuable information Such as the CRA scam, Lottery winner scam. Steps of Social Engineering: information gathering, choose the victim, establish trust, exploit the relationship.

Types of Social Engineering: Human based, computer based, mobile based

Privilege Escalation: First gets access to the system that can be a basic access. then tries to increase privileges that can be by using programming, or utilizing misconfiguration in the system.

DOS Attack: Overwhelms the system resources so that even legitimate users cannot get access or use the system and services.

Botnet: Can be used for DOS attacks. A Botnet is a group of systems that work together to shut the target system down. the botnet is controlled by the attackers.

Alternate Data Streams: Data attached to a file. The attachment is invisible to the user. Such as hidden.txt file (will be hidden and will gwt data) can be attached to file.txt (will be visible). StreamArmor application can detect such hidden files.

Steganography: techniques where data is hidden inside messages/data. Only the related parties will have keys to see the hidden data. Example purpose: Copy prevention, Hiding meta-data, Covert communication, Authenticity testing.

Covering Tricks:

Covering Tricks: Attacker after attacking the target systems and after collecting information, can try to clear all traces. Clearing might involve: clear browser cache, remove all files it created, clear audit and event logs, close open ports, stop the service processes, restore the registry, delete user accounts it created, create temp files.

Cleaner Programs: CCCleaner, File Shredder

References: Sagar Ajay, CEH, Apress

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://sitestree.com, http://bangla.salearningschool.com From: http://sitestree.com/hacking-basics-short-overview-a-short-breadth/
Categories:Root
Tags:
Post Data:2019-09-14 14:33:39

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Where to get Malware Samples and Labels? #Root

Where to get Malware Samples and Labels?

This information is intended for Security and Malware researchers.

Virus Total: https://www.virustotal.com/gui/

Malware-traffic-analysis-net: http://malware-traffic-analysis.net/

Virus Share : https://virusshare.com/

VX Haven: https://vxer.org

Kaggle, Microsoft Virus/Malware database: https://www.kaggle.com/c/microsoft-malware-prediction/data

Reference: Clarence C, and David F. From: http://sitestree.com/where-to-get-malware-samples-and-labels/
Categories:Root
Tags:
Post Data:2019-09-13 20:08:22

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Text Visualization: Concepts, Examples, Code (Python, R, Matlab), Example Projects #Root

Text Visualization

Data Visualization Of President Obama’s Inauguration Speech
https://blog.capitalogix.com/public/2009/01/data-visualization-of-president-obamas-inauguration-speech.html

Text Visualization Course at Washington University
https://courses.cs.washington.edu/courses/cse512/16sp/lectures/CSE512-Text.pdf

Why Visualize Text?
https://www.teachervision.com/reading-comprehension/visualizing

You can visualize text to find key concepts in a speech.
Obama’s Speech: https://www.nytimes.com/2009/09/10/us/politics/10obama.text.html

Example: Speech/Article Visualizations
https://economix.blogs.nytimes.com/2009/09/09/obama-in-09-vs-clinton-in-93/?mtrref=undefined&gwh=EA5A091DC9E658A2DCC9513805FEAC3F&gwt=pay&assetType=REGIWALL

1993 Speech: Bill Clinton
https://economix.blogs.nytimes.com/2009/09/09/bill-clinton-on-health-care-1993/
1993 vs 2009. https://economix.blogs.nytimes.com/2009/09/09/obama-in-09-vs-clinton-in-93/

Wordtree
https://www.jasondavies.com/wordtree/?source=8bd3e76f64f2d614410435434e2fb1fd&amp;prefix

Text Visualization Overview
https://courses.cs.washington.edu/courses/cse512/16sp/lectures/CSE512-Text.pdf

Introduction to Text Analysis: Cleaning/Parsing
http://guides.library.duke.edu/c.php?g=289707&p=1930855

Tokenization
https://graphics.cs.wisc.edu/WP/vep/tokenization/

Wordcount
http://www.wordcount.org/main.php

Wordcloud
https://www.jasondavies.com/wordcloud/

See through your text
https://voyant-tools.org/

Bubble Cloud
http://vallandingham.me/bubble_cloud/?sherlock

Comparison Cloud: Comparative Word Cloud
https://sites.google.com/site/miningtwitter/questions/talking-about/wordclouds/comparison-cloud

N-Grams
http://text-analytics101.rxnlp.com/2014/11/what-are-n-grams.html

Wordtree
https://developers.google.com/chart/interactive/docs/gallery/wordtree

Pattern Searching using Suffix Tree
https://www.geeksforgeeks.org/pattern-searching-using-suffix-tree/

Wordtree
https://www.jasondavies.com/wordtree/

Clustered Word Cloud
http://neoformix.com/2011/WordClusterDiagram.html

Document Contrast Diagrams
http://neoformix.com/2008/DocumentContrastDiagrams.html

Phrase Net
https://www.betterevaluation.org/en/evaluation-options/phrase_net

Analyze Obama’s Speech from 2004: Code Example
https://hackernoon.com/analysing-obama-speeches-since-2004-7f08797f7078

A Complete Exploratory Data Analysis and Visualization for Text Data
https://towardsdatascience.com/a-complete-exploratory-data-analysis-and-visualization-for-text-data-29fb1b96fb6a

Basics of Text Analysis & Visualization
https://itnext.io/basics-of-text-analysis-visualization-1978de48af47

The Data Visualization Design Process: A Step-by-Step Guide for Beginners
https://depictdatastudio.com/data-visualization-design-process-step-by-step-guide-for-beginners/

Wordnet Visualization
http://vialab.science.uoit.ca/portfolio/wordnet-visualization

Visual Wordnet with D3JS
https://www.visual-thesaurus.com/wordnet.php

Visualizing Word Vectors with t-SNE
https://www.kaggle.com/jeffd23/visualizing-word-vectors-with-t-sne

Embedding Projector
https://projector.tensorflow.org/

Visualizing Tweets with Word2Vec and t-SNE, in Python
https://leightley.com/visualizing-tweets-with-word2vec-and-t-sne-in-python/

Text Analysis for Visualizations
http://vallandingham.me/textvis-talk/#1

visualization-and-sentiment-analysis
https://www.kaggle.com/shaliniyaramada/visualization-and-sentiment-analysis

Word Cloud. Bag of Words
https://www.mathworks.com/help/textanalytics/ref/ldamodel.wordcloud.html

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://sitestree.com, http://bangla.salearningschool.com From: https://sitestree.com/text-visualization-concepts-examples-code-python-r-matlab-example-projects/
Categories:Root
Tags:
Post Data:2019-09-10 09:46:34

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Hierarchical Visualization: Examples, Implementations, Theory, and Projects #Root

Hierarchical Visualization

Hierarchical Visualization in R
http://www.r-chart.com/2010/07/hierarchical-visualizations-in-r-and.html

Hierarchical cluster analysis on famous data sets – enhanced with the dendextend package
https://cran.r-project.org/web/packages/dendextend/vignettes/Cluster_Analysis.html

Tree Plots
https://plot.ly/python/tree-plots/

A Python framework for the analysis and visualization of trees.
http://etetoolkit.org/

Hierarchy
https://en.wikipedia.org/wiki/Hierarchy

Organizational Chart
https://upload.wikimedia.org/wikipedia/commons/8/86/Departments_in_advertising_agencies.jpg

Brackets
https://en.wikipedia.org/wiki/Bracket_(tournament)#/media/File:SixteenPlayerSingle

Introduction to Graphs
http://btechsmartclass.com/data_structures/introduction-to-graphs.html
https://www.csee.umbc.edu/courses/undergraduate/341/fall98/frey/ClassNotes/Class14/RootedTree.jpg

Tree Data Structure
https://en.wikipedia.org/wiki/Tree_(data_structure)

Unrooted Tree
https://image.slidesharecdn.com/phylogeneticanalysis-111117220939-phpapp01/95/phylogenetic-analysis-16-728.jpg?cb=1321568578

cyclicVSacyclic
http://www2.imm.dtu.dk/projects/graph/images/fig_graph_structures/cyclicVSacyclic.png

Querying Social Media with NodeXL
http://scalar.usc.edu/works/querying-social-media-with-nodexl/what-is-a-network-graph-what-is-a-node-link-diagram

Evaluation of Traditional, Orthogonal, and Radial Tree Diagrams by an Eye Tracking Study
http://www.joules.de/files/burch_evaluation_2011.pdf

Exponential SVG
https://upload.wikimedia.org/wikipedia/commons/thumb/6/64/Exponential.svg/718px-Exponential.svg.png

revisioning-trees
https://shapeofthought.typepad.com/shape_of_thought/revisioning-trees/

File System as Cone Trees
https://infovis-wiki.net/wiki/Cone_Trees

orthogonal_layouter
http://docs.yworks.com/yfiles/doc/developers-guide/orthogonal_layouter.html

Indented Tree or Graph
http://chisel.cs.uvic.ca/pubs/fu-ISWC2013.pdf
http://mbostock.github.io/protovis/ex/indent.html

Collapsible Indented Tree
https://bl.ocks.org/mbostock/1093025

Dendogram
https://en.wikipedia.org/wiki/Dendrogram

Visualizing Dendrograms in R
https://rpubs.com/gaston/dendrograms

Dendrograms in Python
https://plot.ly/python/dendrogram/

Hierarchical Clustering / Dendrograms
https://ncss-wpengine.netdna-ssl.com/wp-content/themes/ncss/pdf/Procedures/NCSS/Hierarchical_Clustering-Dendrograms.pdf

icicle
https://homes.cs.washington.edu/~jheer/files/zoo/ex/hierarchies/icicle.png

icicle in d3js
https://bl.ocks.org/mbostock/4347473

Radial Layout
https://yed.yworks.com/support/manual/layout/layout_radial.html

Thread Arcs
http://visualoop.com/media/2015/01/image_72.png

Trees and Graphs
https://courses.cs.washington.edu/courses/cse512/14wi/lectures/Trees&Graphs.pdf

Treemap Template
http://bl.ocks.org/ganeshv/6a8e9ada3ab7f2d88022

Nested Treemap
https://observablehq.com/@d3/nested-treemap

Ordered and Unordered Treemap Algorithms and Their Applications on Handheld Devices
https://www.nada.kth.se/utbildning/grukth/exjobb/rapportlistor/2005/rapporter05/engdahl_bjorn_05033.pdf

Circular Treemap
https://www.treemap.com/documentation/treemapping/circular-profit-sales.png

Voronoi treemaps
https://en.wikipedia.org/wiki/Voronoi_diagram
https://www.jasondavies.com/voronoi-treemap/

Visualizations
http://www.shengdongzhao.com/wp-content/uploads/2012/06/EH_InfoVis_Final1.ppt

Hyperbolic Trees
https://philogb.github.io/jit/static/v20/Jit/Examples/Hypertree/example1.html

Hyperbolic Space
http://karynvogel.blogspot.com/2012/01/hyperbolic-space.html
https://bakingandmath.com/2014/10/02/what-is-hyperbolic-space/

Hyperbolic Tree
https://en.wikipedia.org/wiki/Hyperbolic_tree

Sayed Ahmed

Linkedin: https://ca.linkedin.com/in/sayedjustetc

Blog: http://sitestree.com, http://bangla.salearningschool.com From: https://sitestree.com/hierarchical-visualization-examples-implementations-theory-and-projects/
Categories:Root
Tags:
Post Data:2019-09-09 10:07:04

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Firewall, Security, and Misc #Root

Nmap and Port Scanning

https://nmap.org/book/man-port-scanning-techniques.html

MacOs Commands:

nmap localhost

lsof -i :5955

MacOS Network Utility
https://wilsonmar.github.io/ports-open/

Port 49152
https://www.speedguide.net/port.php?port=49152

MacOs: Close the Ports and Firewall
https://www.macworld.com/article/1132558/connect2504.html

— From: https://sitestree.com/firewall-security-and-misc/
Categories:Root
Tags:
Post Data:2019-09-07 14:11:40

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada