Breaking Down the Timetable Puzzle: IST’s Algorithmic Framework

:::info Authors: (1) Jo˜ao Almeida, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (2) Jos´e Rui Figueira, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (3) Alexandre P. Francisco, INESC-ID, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (4) Daniel Santos, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal. ::: 4 Algorithmic framework In this section, … Read more

IST’s Timetabling Dilemma: Constraints, Variables, and Real-World Instances

:::info Authors: (1) Jo˜ao Almeida, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (2) Jos´e Rui Figueira, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (3) Alexandre P. Francisco, INESC-ID, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (4) Daniel Santos, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal. ::: 3 The course timetabling problem for … Read more

Meta-heuristics and Feasible Solutions in Course Timetabling

:::info Authors: (1) Jo˜ao Almeida, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (2) Jos´e Rui Figueira, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (3) Alexandre P. Francisco, INESC-ID, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (4) Daniel Santos, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal. ::: 2 Literature Review In this section, … Read more

A Hybrid Meta-Heuristic for Feasible Large-Scale Course Timetables With Instance Decomposition

:::info Authors: (1) Jo˜ao Almeida, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (2) Jos´e Rui Figueira, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (3) Alexandre P. Francisco, INESC-ID, Instituto Superior T´ecnico, Universidade de Lisboa Portugal; (4) Daniel Santos, CEGIST, Instituto Superior T´ecnico, Universidade de Lisboa Portugal. ::: Abstract This work presents a hybrid … Read more

BlackCard Redefines Crypto Payments With Token Launch And Key Listings

By introducing a plethora of useful features for crypto users, including the launch of the $BcCoin token (which will be featured on prominent crypto exchanges soon), BlackCard aims to be at the forefront of revolutionizing global cryptocurrency payment operations. By utilizing AI technology, the BlackCard Crypto Credit Card empowers users to easily integrate their digital … Read more

Managing Large Data Volumes With MinIO, Langchain and OpenAI

In the rapidly evolving world of data storage and processing, combining efficient cloud storage solutions with advanced AI capabilities presents a transformative approach to handling vast volumes of data. This article demonstrates a practical implementation using MinIO, Langchain and OpenAI’s GPT-3.5 model, focusing on summarizing documents stored in MinIO buckets. The Power of MinIO MinIO … Read more

Exploring Dart Fundamentals – Part 5: Inheritance and Method Overriding

1. Inheritance Definition and Importance: Inheritance is a core principle of object-oriented programming where a new class, called a subclass or derived class, can inherit properties and methods from an existing class, known as a superclass or base class. Example Clarification: In your example, the Car the class serves as the superclass, representing a generic … Read more

Leetcode: Two-sum an Intuitive Approach

Imagine yourself as the proud owner of a souvenir shop inside the Spot-On Change Hotel. When closing the cash register, you notice an excess of 8 euros. It seems that a guest didn’t receive the exact change. This could tarnish the hotel’s reputation. To avoid this, you decide to solve the mystery of the incorrect … Read more

Getting Started With Apache Iceberg and Resources if You Would Like To Go Further

For a long time, siloed data systems such as databases and data warehouses were sufficient. These systems provided convenient abstractions for various data management tasks, including: Storage locations and methods for data. Identification and recognition of unique datasets or tables. Cataloging and tracking available tables. Parsing, planning, and executing queries. However, as needs evolved, it … Read more

Enhancing Password Security and Recovery with Next.js 14 and NextAuth.js

In the first two parts of our series, we dove into the essentials of user authentication and email verification in Next.js 14 using NextAuth.js, React Hook Form, and Zod, followed by advanced techniques for handling email resend functionalities. Now, in the third installment, we continue to enhance our authentication system by focusing on crucial security … Read more

How Software Testing Fits Into The Debugging Process

Debugging is not just about identifying errors—it’s about instituting a reliable process for ensuring software health and longevity. In this post, we discuss the role of software testing in debugging, including foundational concepts and how they converge to improve software quality. https://www.youtube.com/watch?v=yap509UZz6M&embedable=true As a side note, if you like the content of this and the … Read more

Furrever Token Anticipates Rally Amidst Solana (SOL) and Dogecoin (DOGE) Price Fluctuations

Significant movements and promising forecasts in the world of crypto have recently highlighted three digital assets: Solana (SOL), Dogecoin (DOGE), and Furrever Token (FURR). Each of these tokens has displayed distinct dynamics and potential growth trajectories that attract both seasoned investors and new market entrants. Solana’s 5.5% Surge: Technical Analysis and Future Price Trajectory Solana … Read more

6 Critical Challenges of Productionizing Vector Search

You’ve decided to use vector search in your application, product, or business. You’ve researched how and why embeddings and vector search make a problem solvable or can enable new features. You’ve dipped your toes into the hot, emerging area of approximate nearest-neighbor algorithms and vector databases. Almost immediately upon productionizing vector search applications, you will start to … Read more

The 30-Day .NET Challenge – Day 30: XML vs JSON Serialization

Learn to enhance your code with JSON Serialization in C#. Discover a better approach on Day 30 of our 30-Day .NET Challenge. Introduction Serialization involves a process of converting an object into an easily stored format. The article demonstrates the problem with old XML Serialization and how JSON serialization improves both efficiency and effectiveness. Learning … Read more

Deep Dive into Functional Programming in Javascript

Functional programming (FP) has gained significant traction in the world of software development, and JavaScript developers are increasingly turning to this paradigm to solve problems more efficiently and with fewer bugs. At its core, functional programming emphasizes the use of pure functions, immutability, and advanced techniques like currying, memoization, and monads to create cleaner, more … Read more

Game of Threats: Winning Strategies for Proactive Cyber Defense

The world of cybersecurity is akin to the fierce battles and political intrigues of George R. R. Martin’s epic fantasy series, “A Game of Thrones.” In the realm of cyber, organizations must navigate through treacherous landscapes, guarded by their vigilant watchdogs—the cybersecurity professionals. Threat hunting, a critical practice in this ongoing war, is akin to … Read more

Cut the Crap! 100 Complex Cryptocurrency Terminologies Explained in a Single Sentence

Altcoin: Alternative digital currency to Bitcoin. Blockchain: Decentralized ledger for secure transactions. Mining: Solving complex math problems to validate transactions. Wallet: Digital storage for cryptocurrencies and private keys. Token: Digital asset representing value or utility on a blockchain. Exchange: Platform for buying, selling, and trading cryptocurrencies. Fiat currency: Government-issued currency used as a standard unit. … Read more

Cypherpunks Write Code: Phil Zimmerman and PGP

Cryptography can be used to have not only decentralized and private money but also private communications. The activists known as cypherpunks knew this too well, and that’s why not only Bitcoin came out from that mailing list started in the ’90s. A bunch of free and useful cryptographic tools are the legacy of cypherpunks, including … Read more

Cryptography and the Golden Security Line

Having spent the last 18 months focusing solely on self-research aimed toward the roots of mathematics, I can tell you that I miss a lot of technical knowledge when it comes to crypto, APIs, blockchains, and everything. So my focus is not to explain how these services work, but rather, what I believe they intend … Read more

The TechBeat: 2024 Marketing Insights: Content, Partnerships, AI Implementation and More (4/23/2024)

How are you, hacker? 🪐Want to know what’s trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ## 2024 Marketing Insights: Content, Partnerships, AI Implementation and More By @julkordinova [ 6 Min read ] The article highlights trends in … Read more

Outlier Detection: What You Need to Know

Analysts often encounter outliers in data during their work, such as during AB-test analysis, creating predictive models, or tracking trends. Decisions are usually based on the sample mean, which is very sensitive to outliers and can dramatically change the value. So, it is crucial to manage outliers to make the correct decision. Let’s consider several … Read more

Making Cents (Sense!) of Post-Halving Pricing…

The transaction that first gave Bitcoin any sort of monetary value happened in October 2009 when a Finnish computer science student Martti Malmi (‘Sirius’) sold 5,050 coins for $5.02, meaning each Bitcoin was worth $0.0009. In today’s terms, if he had held on to his coins, he’d be (circa) NZ$555,500,000 richer. Today, we all know … Read more

Building the Cloud Future: Sreedevi Velagala’s Trek in AWS Architecture

Sreedevi Velagala’s path in the ever-changing world of technology is a story of dedication, adaptation, and a drive to push boundaries. With over two decades of experience, she has become a respected figure in AWS cloud architecture, helping organizations navigate the complexities of this powerful technology. Sreedevi’s journey began as a developer at Wipro Technologies … Read more