Friday, March 29, 2019

Machine learning Curve fitting using MATLAB

here is the code for the data set we have taken.



>> clear;
close all;
Tx = [80: -20: -340];
alphay=[6.47  6.36 6.24 6.12 6.00 5.86 5.72 5.58 5.43 5.28 5.09 4.91 4.72 4.52 4.30 4.08 3.83 3.58 3.33 3.07 2.76 2.45];
alphay=1.e-6*alphay;
plot(Tx,alphay,'bo');


title('Thermal expansion cofficient of steel');
ylabel('cofficient\alpha');
xlabel('temperature(in F)');
>> coef1=polyfit(Tx,alphay,1)

Computer Networks all chapter Notebook From the book> Behrouz A. Forouzan,"Computer Networks",4th edition, McGraw-Hill PPT slides,

Behrouz A. Forouzan,"Computer Networks",4th edition, McGraw-Hill PPT slides,

 Click and Download PPTs

Sr. No.Chapter Name

Overview

1

Introduction

2

Network Models

Physical Layer and Media

3

Data and Signals

4

Digital Transmission

5

Analog Transmission

6

Bandwidth Utilization: Multiplexing and Spreading

7

Transmission Media

8

Switching

9

Using Telephone and Cable Networks for Data Transmission

Data Link Layer

10

Error Detection and Correction

11

Data Link Control

12

Multiple Access

13

Wired LANs: Ethernet

14

Wireless LANs

15

Connecting LANs, Backbone Networks, and Virtual LANs

16

Wireless WANs: Cellular Telephone and Satellite Networks

17

SONETISDH

18

Virtual-Circuit Nenvorks: Frame Relay and ATM

Network Layer

19

Network Layer: Logical Addressing

20

Network Layer: Internet Protocol

21

Network Layer: Address Mapping, Error Reporting, and Multicasting

22

Network Layer: Delivery, Forwarding, and Routing

Transport Layer

23

Process-to-Process Delivery: UDP, TCP, and SCTP

24

Congestion Control and Quality of Service

Application Layer

25

Domain Name System

26

Remote Logging, Electronic Mail, and File Transfer

27

WWW and HTTP

28

Network Management: SNMP

29

Multimedia

Security

30

Cryptography

31

Network Security

32

Security in the Internet: IPSec, SSLlTLS, PCp, VPN, and Firewalls