Saturday, 11 April 2020

Best time to invest in Chinese stock

The corona virus pandemic that began earlier this year has left the global economy at a standstill. With no new business opportunities, even groomed investors are finding it difficult to thrive in this utterly bearish market after it was last observed in the crisis of 2008.


Though, China was the first to be hit and for a time the worst affected, it has progressed gradually and rather rapidly once the virus had been contained. Before the outbreak, the Chinese market was going through a tough time as the Shanghai Composite and the Hong Kong's Hang Seng Index were looming in lows since the past year.

With the American stocks falling miserably and the global market choking for money, China has got a clear path without obstructions from other nations as its indigenous stocks now gripping the global economy firmly. These stocks have seen an unprecedented growth backed by the strong administration policies of the Chinese government that is trying to make the best of this opportunity, though others might call them opportunists.

Chinese investors reportedly bought western stocks at thrift rates when the world market was brought to its knees by COVID-19. What this means is that the Chinese economy is now at a very strong stand point where it shall only gain or stabilize but not squander. Obviously, if the world doesn't unite and corners China which seems a far cry as so many huge corporations, such as Apple, depend hugely on the Chinese work force and production.



This is thus the best time for an investor to invest in big Chinese stock such as Alibaba(BABA), Tencent(TCEHY) and other Chinese brands like Xiaomi, Baidu that are deemed to rise unprecedentedly. For an average consumer like you and me, this indicates a time where we might want to focus our attention towards this tabooed market that we had been neglecting due to our differences from our neighbor. If China can benefit from this bearish market, why not be smart and play along the winning side rather than sully in the on going misery.

Wish you and your loved ones lasting good health.

Monday, 27 January 2020

The fear of never finding the right one


What if you never find the one? It’s a question we are all afraid to ask ourselves. Scares the living hell out of us.
So why is companionship so important. The answer is rooted deep in our brains from the time we were a tiny sea swimming Pisces millions of years ago. The need for moral support and someone to rely on at the end of the day, someone watching our back is the primary driving force for survival once mammals have garnered resources like warmth, food and shelter. It's what keeps us thriving as a species. We all need someone.
We have evolved a lot since our good old swimming days and then our running in the day and sleeping in a cave at night times. We now classify as what we call "a society". We have the choice to choose our partners. We don't need to make do with an unfavorable partner just to carry on the genes. Since our biggest competition is not the dark silhouette of a big cat at night or the overhead thunder clouds, it is us. Our fellow homo sapiens pose the greatest threat to us today. Who'll get that next promotion, who will get that big investment, who'll buy that luxurious house or car, who gets into that big shot college, watches that big game on good seats, gets married to that beautiful partner. So it is really important today than in no other point of time ever before, to choose the right one. The one who'll push us forward, walk along on that dreaded path and not the one who pushes us down.
The question, therefore, that I raise today is how are we supposed to find the right one in the 7 billion of us. Everyone is different in their own unique way. Everyone has their own story.
Even if you meet the one, can he/she really leave that impression? We all have a lot going on at every moment. What if you have already met the one true partner, but It was a mere glance? Fate made you cross paths, but never made you interact. You must be thinking, maybe it was this guy/girl I saw on the subway today that I'll probably never see again. What if he/she was the one?
Assuming you go on a spree to meet every potential partner on the planet? You cannot possibly judge a person in a second, right? Well guess what, even if hypothetically you had just a second with every potential partner on the planet, you'd miss out on more simply because 3.5 billion is a huge number.
What do we do?
Wait and let fate decide?
Go on a desperate search spree?
Leave it as it is?
My answer? Be there, be you, let life come your way. No one for you is perfect, or I think so. Have you ever tried searching for new parents? Have you ever unloved someone? No one remains the same. Your reaction to the same situation possibly will have changed or will change depending on your state of mind. Nothing is perfect, we can only make it suit ourselves and maybe walk a little longer in the short span of time that we have on this ball floating in nothingness around another hotter ball floating in the same unknown nothingness.
So hang tight, don't lose hope, make the best of the situation and just enjoy your time as long as you can. You'll find the one, or maybe they'll find you. Just look for the good in others, I believe there is plenty. All you need to do is to open yourself up.

Friday, 30 August 2019

My experience with Artificial Intelligence


In 2016, when I entered freshman year of engineering at my college, Artificial Intelligence or "A.I." as the slang went was the thing. Anyone who wasn't doing it was bound to be unsuccessful, such was the buzz. Naturally, eager to learn and excel and follow every engineer's dream of making Tony Stark a.k.a. Iron Man's A.I. system like J.A.R.V.I.S., I too picked up my laptop and books and dived right in.

While learning about the various components of A.I., the initial phase of data collection and analysis really intrigued me as it reflected with my hobby of comparing various movies, based on their all-time monetary collections, and cricket player stats. This encouraged me to take a six-week course at C-DAC, Mohali during the summer of my sophomore year in Big Data Technologies. I was so into the course at that time that I convinced the course instructor to allow me to submit the final project, which was a necessity to complete the course, without any support or team mate. So while everyone was making their projects on Big Data in teams of 4-5, I submitted a detailed report on the U.K. Traffic Accident Analysis for the year 2012-2014 which the course instructor really liked.
The detailed report is available on this blog which you can also access by clicking on the link above. Do visit the blog as it has some very interesting conclusions derived from the data, taken from the U.K. Traffic Police accident records, regarding the leading reasons of traffic accidents in the United Kingdom with great visualisations in the form of maps and graphs.

During the same time, I was also a part of a private project where we collected publicly posted data from social media sites to analyse the intent of the user. Thus, our team of four, built up a site using APIs of the social media sites and already available Natural Language Processing or NLP modules and Python's built-in libraries for data processing. Due to the Non-Disclosure Agreement, this is the extent of the information that can be provided about this project.

To understand more about the extent and developments of A.I. in the recent years, I attended a two day workshop by professional speakers on AI, ML, DL, Computer Vision and NLP. Though, the quantum of the workshop far-exceeded the time in which it was to be conducted, it surprisingly cleared many concepts and myths and opened my mind to newer techniques being used on the industry like Neural Networks and Computer Vision.

Some of this knowledge also came in handy while participating in the Smart India Hackathon, 2019 - Software Edition or SIH, when we had to make a desktop and mobile application that ranked colleges based on the students JEE/NEET/AIIMS marks and on his/her personal preference like location, hostel availability among others.

Although having had some good theoretical and hands-on experience with A.I. and M.L. in the past, my skills were put to the ultimate test while my internship at Hughes Systique, Corporation, Gurugram, where I acted as an engineering intern. My duties there involved Research and Development of a Speaker Recognition Project under the senior engineers at the corporation. I had some good time learning acoustic data collection and manipulation, Tensor Flow and the Python libraries being used to develop such tools as Microsoft Azure, Google Assistant and Amazon's Alexa.
It was there where I was introduced to CNNs or Convolutional Neural Networks. Due to the brief stay there, I was only able to get a hint of how this field of Artificial Intelligence actually works.

Currently, I am planning a support software for value investors to help ease the stresses of investing. In the software, I do plan to incorporate a system using Machine Learning that would recommend potential stocks to the investor conforming to his/her pocket and interest to maximise their gains.
I definitely do not intend to stop here and would love to work more on good projects and learn more so I could make useful products that are simple enough to be used by everybody.

Tuesday, 14 August 2018

U.K. Traffic Accident Analysis (2012-14)

 During my 6-week summer training at C-DAC, Mohali this June, I learned the Hadoop Infrastructure, basics of Big Data and Machine Learning. As part of the final assignment, I was given the data set of 'Traffic Accident Analysis in the United Kingdom'.
Here is the detailed version of the entire project made by me individually.

Data Set Acquisition 
The data set was procured from Kaggle.com. The data available on Kaggle was from the recorded year of 2006 to 2014 extending up to 1.6 million rows. Limited by the processing power and memory of my system(Intel i5 6th gen, 8GB DDR3 RAM), I had to settle for just the data of 2012 to 2014(3 years).
Reference Link : https://www.kaggle.com/daveianhickey/2000-16-traffic-flow-england-scotland-wales/version/10#_=_

Procedure
After the data was gathered from Kaggle, due to it's sheer volume and the system's incapability to process and return a usable result in reasonable time, the data was cleansed randomly using the R programming language to nearly 16000 rows.
The data was then ingested into the Hadoop Infrastructure installed locally on my system so that the data could be processed using the Pig and Hive querying languages.
For representing the less inferable .csv format of the query result, Tableau and WEKA(Waikato Environment for Knowledge Analysis) tools were used.

Tools Used
  1. The R Programming Language
  2. WEKA
  3. Hadoop Infrastructure
    • Pig
    • Hive
  4. Tableau
Columns available in the Data Set
The image above represents the distribution of all the columns in the data set in the representational view of WEKA.
  1. Longitude
  2. Latitude
  3. The Severity of the accident
  4. Number of Vehicles involved in the accident
  5. Number of Casualties
  6. Date of Accident
  7. Day of the week
  8. Time
  9. Road 1 (where accident took place)
  10. Type of road
  11. Speed Limit in the area
  12. Junction Control near accident site
  13. Road 2 (in case accident took place on a junction)
  14. Lighting during the time of the accident
  15. Weather condition in the area during the time of the accident
  16. Road surface on which the accident happened
  17. The year the accident took place
The Road Map of the United Kingdom (as present in the data set)

RESULTS OBTAINED : 
Casualty vs Weather
The picture above represents circular graph charts for the number of casualties that took place in the different weather conditions.
It was observed that most accidents took place when the weather was bright and without snow or rainfall. Rain(green) claimed most lives in the U.K.

Road Surface vs Casualties
Here, we see that most accidents took place on dry surfaces due to over speeding(explained in the following graphs). Wet or damp and Frosty road surface claimed most number of lives over the recorded 3 years from 2012 to 2014.

Road Type vs Casualties
Most of the accidents took place on single carriageway roads, followed by double carriageway roads.
Slip roads proved to be most secure considering lower speed limits and single way traffic.

Speed Limit vs Hour of the Day
As was expected, roads with no junction control proved to be the platform of most road accidents in the U.K. Roads which were controlled by Automatic Traffic Systems or Traffic Lights proved to be most secure. Though the most severe accident claimed 11 lives occured in the early hours of the day, most accidents are observably in the darker hours of the day.

Day of the week vs number of accidents
To present to the audience how important it is to wear seat belts and caution proper measures on the road, I came up with this Jitter-Plot in WEKA that shows no matter what day of the week or which year, road accidents are just round the corner if one does not take the necessary precautions.

Weather with Road Surface - MAP
The distribution of weather with road surface on the map of U.K. shows that the upper areas in the country like Scotland and Wales due to their proximity to the polar ice caps experience higher percentage of accidents due to snow and fog on frosty roads. The lower areas like London experience more accidents due to fog or mist on dry roads.

Light variation with Hour of the day - MAP
The map above shows how light variations are observed at the different hours of the day. This might sound cliche, but looking closely we observe how Scotland and Wales area experiences darkness even in day light hours due to its proximity to the poles and the tilt of the Earth.
Most accidents, expectedly, occur in after sunset hours in the darkness in areas surrounding London.

How was this useful?
Data analysis of this kind can help the government in recognizing the faults in its current road traffic management and help save millions of lives in the future.
Further, we can infer points like -
  1. Scotland and Wales require better lighting and cold weather prevention tactics
  2. England and surrounding area's people need ot drive slower.
  3. No day of the week is safer on the road, always protect yourseslf.
For viewing the entire presentation, go to prezi.com and search for "UK Traffic Accident Analysis - CDAC".

Tuesday, 13 February 2018

List of all Windows Command Prompt commands


append
Allows programs to open data files in specified directories as if they were located in the current directory.
assoc
Displays or changes the file type associated with a particular file extension.
at
Schedules commands and other programs to run at a specific date and time.
atmadm
Displays connection information of the ATM adapter.
attrib
Changes the attributes of a single file or a directory.
Auditpol
Displays information about or performs functions to manipulate audit policies.
bcdboot
Configures the boot files on a PC or device to run the Windows operating system and to create a new system BCD store.
bcdedit
Used to view or make changes to Boot Configuration Data.
bdehdcfg
Used to prepare a hard drive for BitLocker Drive Encryption.
bitsadmin
Used to create, download or upload jobs and monitor their progress.
bootcfg
Used to build, modify, or view the contents of the boot.ini file.
bootsect
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR.
break
Sets or clears extended CTRL+C checking on DOS systems.
cacls
Displays or changes access of the security descriptors on folders and files.
call
Used to run a script or batch program from within another script or batch program.
cd
Also known as chdir, is used to change the current working drive and/or directory in operating systems.
certreq
Used to perform various certification authority (CA) certificate requests, such as submit a request, retrieve a response, create a new request, accept, sign, policy, sign and enrol.
certutil
Used to dump and display certification authority (CA) configuration information, configure Certificate Services, backup and restore CA components, and verify certificates, key pairs, and certificate chains.
change
Changes various terminal server settings like install modes, COM port mappings, and logons.
chcp
Displays or configures the active code page number.
chdir
Used to display the drive letter and folder that you are currently in.
checknetisolation
Used to test apps that require network capabilities.
chglogon
Enables or disables logons from client sessions on an RD Session Host (Remote Desktop Session Host) server, or displays current logon status.
chgport
Can be used to display or change COM port mappings to be compatible with MS-DOS applications.
chgusr
Used to change the install mode for the RD Session Host server.
chkdsk
Verifies the file system integrity of a volume and fixes logical file system errors.
chkntfs
Used to display or modify the checking of the disk drive using NTFS at boot time.
choice
Allows batch files to prompt the user to select one item from a set of single-character choices and return the value of that choice to the program.
cipher
Used to encrypt or decrypt files and folders on NTFS drives.
clip
Copies the result of any command (stdin) to the clipboard in Windows.
cls
Used to clear the screen or console window of all previously entered commands and any output generated by them.
cmd
Starts a new instance of the cmd.exe command interpreter.
cmdkey
Used to create, list and delete stored user names or credentials.
cmstp
Used to install or uninstall a Connection Manager service profile.
color
Changes the colors of the text and background within the Command Prompt window.
command
Starts a new instance of the command.com command interpreter.
comp
Performs a binary comparison of two set of files or multiple files and shows the differences between them.
compact
Displays and changes the compression state of files or directories on NTFS partitions.
convert
Used to convert volumes using the FAT or FAT32 formatted file systems to NTFS.
copy
Copies one or more files from one directory to another.
cscript
Provides command-line options for setting and executing script properties via Microsoft Script Host.
ctty
Used to change the default input and output devices for the system.
date
Used to show or change the current date.
driveSpace
Initially known as DoubleSpace can be used to create or configure DoubleSpace compressed drives.
debug
Starts Debug, a command line application used to test and edit programs.
defrag
Used to defragment a drive you specify.
del
Used to delete one or more files.
deltree
Used to delete a directory and all the files and subdirectories within it.
dir
Displays a list of files and folders contained inside the folder that you are currently working in.
diskcomp
Used to compare contents of two floppy disks.
diskcopy
Copies the entire contents of one floppy disk to another.
diskpart
Prevents creating multi-partition layout for removable media such as flash drives and also used for partitioning internal hard drives..
diskperf
Used to remotely enable or disable physical or logical disk performance counters on computers running Windows 2000.
diskraid
Starts the DiskRAID command-line tool that allows to configure and manage redundant array of independent (or inexpensive) disks (RAID) storage subsystems.
dism
Starts the Deployment Image Servicing and Management (DISM) tool.
dispdiag
Used to output a log of information about the display system.
djoin
Used to create a new computer account in a domain.
doskey
Used to edit command lines, create macros, and recall previously entered commands.
dosshell
Starts DOS Shell, a graphical file management tool for MS-DOS.
dosx
Used to start DOS Protected Mode Interface (DPMI), a special mode designed to give MS-DOS applications access to more than the normally allowed 640 KB.
driverquery
Displays a list of all installed device drivers and their properties.
drvspace
Used to create or configure DriveSpace compressed drives.
echo
Used in shell scripts and batch files to output status text to the screen or a file and also to turn the echoing feature on or off.
edit
Starts the MS-DOS Editor tool that is used to create and modify text files.
edlin
Starts the Edlin tool that is used to create and modify text files from the command line.
emm386
Used to give MS-DOS access to more than 640 KB of memory.
endlocal
Ends localization of environment changes inside a batch or script file, restoring environment variables to their values before the matching setlocal command.
erase
Used to delete one or more files.
esentutl
Provides database utilities for the Extensible Storage Engine (ESE) for Windows Vista.
eventcreate
Creates a custom event in an event log.
eventtriggers
Displays and configures event triggers on local or remote machines.
exe2bin
Converts a file of the EXE file type (executable file) to a binary file.
exit
Used to end the cmd.exe (Windows) or command.com (MS-DOS) session that you’re currently working in.
expand
Used to extract the files and folders contained in Microsoft Cabinet (CAB) files.
extrac32
This command is actually a CAB extraction program for use by Internet Explorer but can be used to extract any Microsoft Cabinet file.
extract
Used to extract the files and folders contained in Microsoft Cabinet (CAB) files.
fasthelp
This command provides more detailed information on any of the other MS-DOS commands.
fastopen
Used to add a program’s hard drive location to a special list stored in memory.
fc
Used to compare two individual or sets of files and then show the differences between them.
fdisk
Used to create, manage, and delete hard drive partitions.
find
Used to search for a specified text string in one or more files.
findstr
Used to find specific text string patterns in one or more files.
finger
Used to find information about computer users.
fltmc
Used to load, unload, list, and otherwise manage Filter drivers.
fondue
The fondue (Features on Demand User Experience) tool is used to install any of the several optional Windows features from the command line.
for
Used to run a specified command for each file in a set of files.
forcedos
Used to start the specified program in the MS-DOS subsystem.
forfiles
Selects one or more files and runs a command on them.
format
Used to format a drive in the file system that you specify.
fsutil
Performs tasks that are related to file allocation table (FAT) and NTFS file system, such as managing reparse points and sparse files, dismounting a volume, and extending a volume.
ftp
Transfers files to and from another computer.
ftype
Defines a default program to open a specified file type.
getmac
Used to display the Media Access Control (MAC) address of all the network adapters in the computer.
goto
Used in a batch or script file to direct the command process to a labelled line in the script.
gpresult
Used to display group policy settings and resultant set of policy for a user.
gpupdate
Refreshes local and Active Directory-based Group Policy settings, including security settings.
graftabl
Used to enable the ability of Windows to display an extended character set in graphics mode.
graphics
Used to load a program that can print graphics.
help
Provides help information for Windows commands.
hostname
Displays the host name portion of the full computer name of the computer.
hwrcomp
Used to compile custom dictionaries for handwriting recognition.
hwrreg
Used to install a previously compiled custom dictionary for handwriting recognition.
icacls
Display, modify, backup, or restore ACLs for files and directories.
if
Performs conditional functions in batch programs.
interlnk
Connects two computers via a serial or parallel connection to share files and printers.
intersvr
Starts interlnk server and to copy interlnk files from one computer to another.
ipconfig
Displays all current TCP/IP network configuration values and can modify Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
ipxroute
Used to display and change information about IPX routing tables.
irftp
Used to transmit files over an infrared link.
iscsicli
Starts the Microsoft iSCSI Initiator, used to manage iSCSI.
kb16
Used to support MS-DOS files that need to configure a keyboard for a specific language.
keyb
Used to configure a keyboard for a specific language.
klist
Used to list service tickets of Kerberos.
ksetup
Used to configure connections to a Kerberos server.
ktmutil
Starts the Kernel Transaction Manager utility.
label
Used to manage the volume label of a disk.
lh
Shorthand version of the loadhigh command.
licensingdiag
Used to generate a text-based log and other data files that contain product activation and other Windows licensing information.
loadfix
Used to load the specified program in the first 64K of memory and then runs the program.
loadhigh
Used to load a program into high memory and is usually used from within the autoexec.bat file.
lock
Used to lock a drive, enabling direct disk access for a program.
lodctr
This is used to update registry values related to performance counters.
logman
Used to create and manage Event Trace Session and Performance logs.
logoff
Used to terminate a session.
lpq
Displays the status of a print queue on a computer running Line Printer Daemon (LPD).
lpr
Used to send a file to a computer running Line Printer Daemon (LPD).
makecab
Used to create .cab files.
Manage-bde
Used to configure BitLocker Drive Encryption from the command line.
Md
Shorthand version of the mkdir command.
Mem
Shows information about used and free memory areas and programs that are currently loaded into memory in the MS-DOS subsystem.
Memmaker
Used to start MemMaker, a memory optimization tool.
Mkdir
Used to create a new folder.
Mklink
Creates a symbolic link.
Mode
Used to configure system devices, most often COM and LPT ports.
Mofcomp
This command properly displays the data within a Managed Object Format (MOF) file.
More
Used to display the information contained in a text file.
Mount
Used to mount Network File System (NFS) network shares.
Mountvol
Used to display, create, or remove volume mount points.
Move
Used to move one or files from one folder to another.
Mrinfo
Used to provide information about a router’s interfaces and neighbors.
Msav
This command starts Microsoft Antivirus.
Msbackup
This command starts Microsoft Backup, a tool used to back up and restore one or more files.
Mscdex
Used to provide CD-ROM access to MS-DOS.
Msd
Starts Microsoft Diagnostics.
Msg
Used to send a message to a user.
Msiexec
Used to start Windows Installer, a tool used to install and configure software.
Muiunattend
This command starts the Multilanguage User Interface unattended setup process.
Nbtstat
This command is used to show TCP/IP information and other statistical information about a remote computer.
Net
Used to display, configure, and correct a wide variety of network settings.
Net1
Used to display, configure, and correct a wide variety of network settings.
Netcfg
Used to install the Windows Preinstallation Environment (WinPE),
Netsh
Used to start Network Shell, a command-line utility used to manage the network configuration of the local, or a remote, computer.
Netstat
This command is most commonly used to display all open network connections and listening ports.
Nfsadmin
This command is used to manage Server for NFS or Client for NFS from the command line.
Nlsfunc
Used to load information specific to a particular country or region.
Nltest
Used to test secure channels between Windows computers in a domain and between domain controllers that are trusting other domains.
Nslookup
The command is most commonly used to display the hostname of an entered IP address.
Ntbackup
Used to perform various backup functions from the Command.
Ntsd
Used to perform certain command line debugging tasks.
Ocsetup
This command starts the Windows Optional Component Setup tool, used to install additional Windows features.
Openfiles
Used to display and disconnect open files and folders on a system.
Path
Used to display or set a specific path available to executable files.
Pathping
Functions much like the tracert command, will also report information about network latency and loss at each hop.
Pause
Used within a batch or script file to pause the processing of the file.
Pentnt
Used to detect floating point division errors in the Intel Pentium chip.
Ping
The command sends an Internet Control Message Protocol (ICMP) Echo Request message to a specified remote computer to verify IP-level connectivity.
Pkgmgr
Used to start the Windows Package Manager from the Command Prompt.
Pnpunattend
Used to automate the installation of hardware device drivers.
Pnputil
Used to start the Microsoft PnP Utility, a tool used to install a Plug and Play device from the command line.
Popd
This command is used to change the current directory to the one most recently stored by the pushd command.
Power
Used to reduce the power consumed by a computer by monitoring software and hardware devices.
Powercfg
Used to manage the Windows power management settings from the command line.
Print
Used to print a specified text file to a specified printing device.
Prompt
Used to customize the appearance of the prompt text in Command Prompt or MS-DOS.
Pushd
Used to store a directory for use, most commonly from within a batch or script program.
Pwlauncher
Used to enable, disable, or show the status of your Windows To Go start-up options.
Qappsrv
Used to display all Remote Desktop Session Host servers available on the network.
Qbasic
This command starts QBasic, the MS-DOS based programming environment for the BASIC programming language.
Qprocess
Used to display information about running processes.
Query
Used to display the status of a specified service.
Quser
Used to display information about users currently logged on to the system.
Qwinsta
Used to display information about open Remote Desktop Sessions.
Rasautou
Used to manage Remote Access Dialer AutoDial addresses.
Rasdial
Used to start or end a network connection for a Microsoft client.
Rcp
Used to copy files between a Windows computer and a system running the rshd daemon.
Rd
Shorthand version of the rmdir command.
Rdpsign
Used to sign a Remote Desktop Protocol (RDP) file.
Reagentc
Used to configure the Windows Recovery Environment (RE).
Recimg
Used to create a custom refresh image.
Recover
Used to recover readable data from a bad or defective disk.
Reg
Used to manage the Windows Registryfrom the command line.
Regini
Used to set or change registry permissions and registry values from the command line.
Register-cimprovider
Used to register a Common Information Model (CIM) Provider in Windows.
Regsvr32
Used to register a DLL file as a command component in the Windows Registry.
Relog
Used to create new performance logs from data in existing performance logs.
Rem
Used to record comments or remarks in a batch or script file.
Ren
The shorthand version of the rename command.
Rename
Used to change the name of the individual file that you specify.
Repair-bde
Used to repair or decrypt a damaged drive that’s been encrypted using BitLocker.
Replace
Used to replace one or more files with one or more other files.
Reset
This command, executed as reset session, is used to reset the session subsystem software and hardware to known initial values.
Restore
Used to restore files that were backed up using the backup command.
Rexec
Used to run commands on remote computers running the rexec daemon.
Rmdir
Used to delete an existing or completely empty folder.
Robocopy
Used to copy files and directories from one location to another.
Route
Used to manipulate network routing tables.
Rpcinfo
This command makes a remote procedure call (RPC) to an RPC server and reports what it finds.
Rpcping
Used to ping a server using RPC.
Rsh
Used to run commands on remote computers running the rsh daemon.
Rsm
Used to manage media resources using Removable Storage.
Runas
Used to execute a program using another user’s credentials.
Rwinsta
Shorthand version of the reset session command.
Sc
Used to configure information about services.
Scandisk
Used to start Microsoft ScanDisk, a disk repair program.
Scanreg
This command starts Windows Registry Checker, a basic registry repair program and backup utility.
Schtasks
Used to schedule specified programs or commands to run a certain times.
Sdbinst
Used to deploy customized SDB database files.
Secedit
Used to configure and analyze system security by comparing the current security configuration to a template.
Set
Used to display, enable, or disable environment variables in MS-DOS or from the Command Prompt.
Setlocal
Used to start the localization of environment changes inside a batch or script file.
Setspn
Used to manage the Service Principal Names (SPN) for an Active Directory (AD) service account.
Setver
Used to set the MS-DOS version number that MS-DOS reports to a program.
Setx
Used to create or change environment variables in the user environment or the system environment.
Sfc
Used to verify and replace important Windows system files.
Shadow
Used to monitor another Remote Desktop Services session.
Share
Used to install file locking and file sharing functions in MS-DOS.
Shift
Used to change the position of replaceable parameters in a batch or script file.
Showmount
Used to display information about NFS mounted file systems.
Shutdown
Used to shut down, restart, or log off the current system or a remote computer.
Smartdrv
This command installs and configures SMARTDrive, a disk caching utility for MS-DOS.
Sort
Used to read data from a specified input, sort that data, and return the results of that sort to the Command Prompt screen, a file, or another output device.
Start
Used to open a new command line window to run a specified program or command.
Subst
Used to associate a local path with a drive letter.
Sxstrace
Used to start the WinSxs Tracing Utility, a programming diagnostic tool.
Sys
Used to copy the MS-DOS system files and command interpreter to a disk.
Systeminfo
Used to display basic Windows configuration information for the local or a remote computer.
Takeown
Used to regain access to a file that that an administrator was denied access to when reassigning ownership of the file.
Taskkill
Used to terminate a running task.
Tasklist
Displays a list of applications, services, and the Process ID (PID) currently running on either a local or a remote computer.
Tcmsetup
Used to setup or disable the Telephony Application Programming Interface (TAPI) client.
Telnet
Used to communicate with remote computers that use the Telnet protocol.
Tftp
Used to transfer files to and from a remote computer that’s running the Trivial File Transfer Protocol (TFTP) service or daemon.
Time
Used to show or change the current time.
Timeout
Used in a batch or script file to provide a specified timeout value during a procedure.
Title
Used to set the Command Prompt window title.
Tlntadmn
Used to administer a local or remote computer running Telnet Server.
Tpmvscmgr
Used to create and destroy TPM virtual smart cards.
Tracerpt
Used to process event trace logs or real-time data from instrumented event trace providers.
Tracert
This command sends Internet Control Message Protocol (ICMP) Echo Request messages to a specified remote computer with increasing Time to Live (TTL) field values and displays the IP address and hostname, of the router interfaces between the source and destination.
Tree
Used to graphically display the folder structure of a specified drive or path.
Tscon
Used to attach a user session to a Remote Desktop session.
Tsdiscon
Used to disconnect a Remote Desktop session.
Tskill
Used to end the specified process.
Tsshutdn
Used to remotely shut down or restart a terminal server.
Type
Used to display the information contained in a text file.
Typeperf
This command displays performance data in the Command Prompt window or writes the data to specified log file.
Tzutil
Used to display or configure the current system’s time zone.
Umount
Used to remove Network File System (NFS) mounted network shares.
Undelete
Used to undo a deletion performed with the MS-DOS delete command.
Unformat
Used to undo the formatting on a drive performed by the MS-DOS format command.
Unlock
Used to unlock a drive, disabling direct disk access for a program.
Unlodctr
Removes Explain text and Performance counter names for a service or device driver from the Windows Registry.
Vaultcmd
Used to create, remove, and show stored credentials.
Ver
Used to display the current Windows or MS-DOS version number.
Verify
Used to enable or disable the ability of Command Prompt, or MS-DOS, to verify that files are written correctly to a disk.
Vol
Shows the volume label and serial number of a specified disk, assuming this information exists.
Vsafe
Used to start VSafe, a basic virus protection system for MS-DOS.
Vssadmin
This command starts the Volume Shadow Copy Service administrative command line tool which displays current volume shadow copy backups and all installed shadow copy writers and providers.
W32tm
Used to diagnose issues with Windows Time.
Waitfor
Used to send or wait for a signal on a system.
Wbadmin
Used start and stop backup jobs, display details about a previous backup, list the items within a backup, and report on the status of a currently running backup.
Wecutil
Used to manage subscriptions to events that are forwarded from WS-Management supported computers.
Wevtutil
This command starts the Windows Events Command Line Utility which is used to manage event logs and publishers.
Where
Used to search for files that match a specified pattern.
Whoami
Used to retrieve user name and group information on a network.
Winmgmt
Starts the command line version of WMI, a scripting tool in Windows.
Winrm
Used to start the command line version of Windows Remote Management, used to manage secure communications with local and remote computers using web services.
Winrs
Used to open a secure command window with a remote host.
Winsat
Starts the Windows System Assessment Tool, a program that assesses various features, attributes, and capabilities of a computer running Windows.
Wmic
Starts the Windows Management Instrumentation Command line (WMIC), a scripting interface that simplifies the use of Windows Management Instrumentation (WMI) and systems managed via WMI.
Wsmanhttpconfig
Used to manage aspects of the Windows Remote Management (WinRM) service.
Xcopy
Used to copy one or more files or directory trees from one location to another. The xcopy command is generally considered a more “powerful” version of the copy command though the robocopy command trumps even xcopy.
Xwizard
This command, short for Extensible Wizard, is used to register data in Windows, often from a preconfigured XML file.

Analysis of the time complexity of LINEAR SEARCH

AIM - To analyze the time complexity and behavior of linear search
algorithm and plot the acquired data.


Introduction - The following data has been obtained by running the linear search
algorithm to search an element in a randomly generated array of ‘n’ elements. The size of the array was increased continuously from 100 to 5000 with the number
inputed also being in the same range. The program was made using the ‘Python’ programming language using the ‘random’,
‘time’
and ‘matplotlib’ libraries on a computer with an Intel Core i5-6200U quad-core processor,
having 7.5GB of RAM running on Ubuntu 17.10(GNOME). The code was run using
Ubuntu’s Terminal.
The above detail is necessary as it is assumed the program was run with a machine having
different specifications.
Input - No input was given. (i) The arrays are instantiated by pre-defined loops and the values are fed into the arrays
using ‘Random’ library of Python. (ii) The element for searching in the array is also generated randomly using python
libraries. (iii) The number of times the algorithm runs is also pre-defined, equated to a thousand.


Assumptions Since any algorithm requires some prerequisites which are not often met, we assume the
following to be true: (i) The numbers generated by the random command are truly random and do not
follow any pattern. (ii) The CPU has only 1 core with single(no multithreading) threading. (iii) There is no other process being run on the CPU while this program executes till
termination.
Methodology - The program is executed using the following methodology:
  1. Firstly, necessary libraries like the ‘random’ library for random number generation,
    the ‘time’ library for finding the time taken by the algorithm and the ‘matplotlib’
    library for plotting bar and line graphs are imported.
  2. Next, arrays of size ranging from 100 to 5000 are programmed to be initialised
    when searching on the array of size ‘n-1’ has been performed.
  3. These arrays are filled with numbers ranging from 1 to their maximum size.
  4. Then, a number between the same range is randomly generated to be searched for in
    the array.
  5. Algorithm for linear search is applied and the process is repeated for 100 times.
  6. Lastly, time for 100 repetitions is stored in an array of 50 elements.
  7. The derived result is then plotted against average time taken by the algorithm to
    execute in seconds. Also the record for the total number of successful cases is plotted
    against the size of the array.

Experiment (with observation, analysis and supporting data)-
CASE -1 : THE AVERAGE CASE For this step the search number is randomly generated and is within the range of the array elements. For Ex. for an array of size 2300, the array is filled with numbers ranging from 1 to 2300 and the search element is also present in between this range.
[ X-axis : size of the array ; Y-axis : time taken in milliseconds ] Fig: 1.1 : Line graph of linear search of arrays from 100 to 5000



Graph Analysis: As is clearly visible, the graph is a straight line with slope less than 45 degrees. The abrupt breaks or local maximas and minimas in the graph can be explained by
stating the fact that:
  1. There were assumptions.
  2. The randomly generated number to be searched could be anything and could be
    present anywhere in the array.

The following graph shows the number of successful searches returned in the given runs
of the array. Clearly, the number of successful searches does not vary much over the entire run of the
program. This observation clarifies the stability of the time complexity of linear search, which does
not vary with increasing array size.
[ X-axis : size of the array ; Y-axis : percentage of successful and unsuccessful
searches ]
Fig: 1.2 : Bar graph showing percentage of successful and unsuccessful searched
vs array size


CASE -2 : THE BEST CASE In the best case scenario, the element to be searched is present in the beginning of the
array and hence the search time is very short and success ratio is 100%.

[ X-axis : size of the array ; Y-axis : time taken in (10^-2)milliseconds ]
Fig: 1.3 : Line graph for best case of linear search
As is clear by the graph, the search time is very short and time complexity for best case is
‘1 or constant’.
[X-axis : size of array ; Y-axis : time taken]
Fig: 1.4 : Line graph of best case of linear search nearly parallel to the x-axis




CASE -3 : THE WORST CASE For this step the search number is ‘out-of-range’ of the array elements. This will
ensure that every run is completed from first to the last element. For Ex. for an array of size 900, containing elements from 1 to 900, a search element
equal to 1000 was passed so that nothing could be returned. This case shows the maximum time an algorithm will take for a given amount of
elements and produces the best graph.

[ X-axis : size of the array ; Y-axis : time taken in milliseconds ]
Fig:1.5 : Line graph showing worst case of linear search
Clearly, the graph is a linear line which provides us with a clear result that the
time complexity of a linear search algorithm is ‘n’.



Conclusion - It can thus be concluded that the time complexity of a linear search algorithm: In its best case : constant or O(1) In its average case : nearly O(n) In its worst case : linear or O(n) Also, it can be inferred that it is the worst case of any algorithm that decides the
final time complexity, as it describes the maximum time that can be taken by that
algorithm.
References -
  1. Ask Ubuntu : http://askubuntu.com/questions/666530/ddg#666549
  2. DuckDuckGO : https://duckduckgo.com/?t=canonical


--------------*--------------




WARNING : for reference purpose only, any form of copying is a violation of digital rights and policies