<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: bhat sumair</title>
    <description>The latest articles on DEV Community by bhat sumair (@bhatsumair).</description>
    <link>https://dev.to/bhatsumair</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F638258%2F1d113e72-5aa9-4427-bd55-7ab118cce48b.jpeg</url>
      <title>DEV Community: bhat sumair</title>
      <link>https://dev.to/bhatsumair</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bhatsumair"/>
    <language>en</language>
    <item>
      <title>K-mean clustering and its real use-case in the security domain</title>
      <dc:creator>bhat sumair</dc:creator>
      <pubDate>Mon, 19 Jul 2021 16:14:06 +0000</pubDate>
      <link>https://dev.to/bhatsumair/k-mean-clustering-and-its-real-use-case-in-the-security-domain-nhe</link>
      <guid>https://dev.to/bhatsumair/k-mean-clustering-and-its-real-use-case-in-the-security-domain-nhe</guid>
      <description>&lt;p&gt;&lt;em&gt;What is K- Means Clustering ?&lt;/em&gt;&lt;br&gt;
We are given a data set of items, with certain features, and values for these features (like a vector). The task is to categorize those items into groups. To achieve this, we will use the k-Means algorithm; an unsupervised learning algorithm.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;em&gt;Document classification&lt;/em&gt;
cluster documents in multiple categories based on tags, topics, and the content of the document. this is a very standard classification problem and k-means is a highly suitable algorithm for this purpose. the initial processing of the documents is needed to represent each document as a vector and uses term frequency to identify commonly used terms that help classify the document. the document vectors are then clustered to help identify similarity in document groups.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Identifying crime localities&lt;/em&gt;
With data related to crimes available in specific localities in a city, the category of crime, the area of the crime, and the association between the two can give quality insight into crime-prone areas within a city or a locality.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Insurance fraud detection&lt;/em&gt;
Machine Learning has a critical role to play in fraud detection and has numerous applications in automobile, healthcare, and insurance fraud detection. utilizing past historical data on fraudulent claims, it is possible to isolate new claims based on its proximity to clusters that indicate fraudulent patterns. Since insurance fraud can potentially have a multi-million dollar impact on a company, the ability to detect frauds is crucial.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Cyber-profiling criminals&lt;/em&gt;
Cyber-profiling is the process of collecting data from individuals and groups to identify significant co-relations. The idea of cyber profiling is derived from criminal profiles, which provide information on the investigation division to classify the types of criminals who were at the crime scene.
Thank You...&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>Use Case of JavaScript in today's industry.</title>
      <dc:creator>bhat sumair</dc:creator>
      <pubDate>Fri, 25 Jun 2021 12:54:40 +0000</pubDate>
      <link>https://dev.to/bhatsumair/use-case-of-javascript-in-today-s-industry-53f1</link>
      <guid>https://dev.to/bhatsumair/use-case-of-javascript-in-today-s-industry-53f1</guid>
      <description>&lt;p&gt;&lt;strong&gt;Uber and javascript&lt;/strong&gt;&lt;br&gt;
Uber needs to handle loads of data in real time. They have millions of requests coming in continuously, and that’s not just hits on a page. Uber needs to track driver locations, rider locations, and incoming ride requests. It has to seamlessly sort that data and match riders as fast as possible.&lt;/p&gt;

&lt;p&gt;All of that plays to NodeJS’s and JavaScript’s strengths. Node is designed to handle requests and hand off data quickly. It’s asynchronous capabilities are a huge part of that. Node is central to Uber’s user facing stack for just that reason.&lt;/p&gt;

&lt;p&gt;Uber’s core trip execution engine was originally written in Node.js because of its asynchronous primitives and simple, single-threaded processing. (In fact, we were one of the first two companies to deploy Node.js in production.) Node.js gives us the ability to manage large quantities of concurrent connections. We’ve now written many services in Go, and this number continues to increase. We like Go for its concurrency, efficiency, and type-safe operations.&lt;br&gt;
The frontline API for our mobile apps consists of over 600 stateless endpoints that join together multiple services. It routes incoming requests from our mobile clients to other APIs or services. It’s all written in Node.js&lt;br&gt;
&lt;strong&gt;Highly Available, Self-Healing, Persistent&lt;/strong&gt;&lt;br&gt;
Having to support the highest availability demands, the Marketplace stack must receive and execute in real time. Even brief interruptions in this area have major consequences for our users and our business. Much of Marketplace’s stack was built by and for Marketplace engineers first.&lt;br&gt;
Ringpop, a library for building cooperative distributed systems, solved some of Marketplace’s problems before its adoption in other teams at Uber and beyond. It gives the high-availability, partition-tolerant properties of distributed databases like DynamoDB or Riak to developers at the application level.&lt;br&gt;
The systems that handle pings from riders and drivers in real-time and then match them are written in Node.js and Go. These teams use Ringpop and Sevnup for cooperation and shifting of object ownership when a node in a hashring goes down, or when another node takes ownership of the keyspace. Riak is their distributed database. Redis provides caching.&lt;br&gt;
&lt;strong&gt;Seeing and Using Data&lt;/strong&gt;&lt;br&gt;
A group within Marketplace turns Marketplace data into useful visualizations to help the team understand and observe the state of the world. We use JavaScript for web front-end applications. React+Flux, D3, and Mapbox are the libraries and frameworks behind this group. For the back end, it’s the same Node.js server used by Uber’s web engineers.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Confusion Matrix and cyber crime</title>
      <dc:creator>bhat sumair</dc:creator>
      <pubDate>Sat, 05 Jun 2021 18:10:46 +0000</pubDate>
      <link>https://dev.to/bhatsumair/confusion-matrix-and-cyber-crime-3951</link>
      <guid>https://dev.to/bhatsumair/confusion-matrix-and-cyber-crime-3951</guid>
      <description>&lt;p&gt;A confusion matrix is a table that is often used to describe the performance of a classification model (or "classifier") on a set of test data for which the true values are known. The confusion matrix itself is relatively simple to understand, but the related terminology can be confusing.&lt;/p&gt;

&lt;p&gt;I wanted to create a "quick reference guide" for confusion matrix terminology because I couldn't find an existing resource that suited my requirements: compact in presentation, using numbers instead of arbitrary variables, and explained both in terms of formulas and sentences.&lt;/p&gt;

&lt;p&gt;Let's start with an example confusion matrix for a binary classifier (though it can easily be extended to the case of more than two classes):&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--i6m5r1Iu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pzuxiwgf79xhqh7y5kd4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--i6m5r1Iu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pzuxiwgf79xhqh7y5kd4.png" alt="diagram"&gt;&lt;/a&gt;&lt;br&gt;
What can we learn from this matrix?&lt;/p&gt;

&lt;p&gt;There are two possible predicted classes: "yes" and "no". If we were predicting the presence of a disease, for example, "yes" would mean they have the disease, and "no" would mean they don't have the disease.&lt;br&gt;
The classifier made a total of 165 predictions (e.g., 165 patients were being tested for the presence of that disease).&lt;br&gt;
Out of those 165 cases, the classifier predicted "yes" 110 times, and "no" 55 times.&lt;br&gt;
In reality, 105 patients in the sample have the disease, and 60 &lt;br&gt;
patients do not.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1WOq9h5O--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sd6ssij7k2zhtyv8eyjy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1WOq9h5O--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/sd6ssij7k2zhtyv8eyjy.jpg" alt="cybercrime"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;cybercrime&lt;/strong&gt;:&lt;br&gt;
Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them, while others use computers or networks to spread malware, illegal information, images or other materials. Some cybercrimes do both -- i.e., target computers to infect them with a computer virus, which is then spread to other machines and, sometimes, entire networks.&lt;/p&gt;

&lt;p&gt;A primary effect of cybercrime is financial; cybercrime can include many different types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal financial account, credit card or other payment card information. Cybercriminals may also target an individual's private information, as well as corporate data for theft and resale. As many workers settle into remote work routines due to the pandemic, cybercrimes are expected to grow in frequency in 2021, making it especially important to protect backup data.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--O7lCGegv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wxholnrdxr13f8wnyrtm.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--O7lCGegv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/wxholnrdxr13f8wnyrtm.jpg" alt="cyber security"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CYBER-SECURITY WITH CONFUSION MATRIX&lt;/strong&gt;&lt;br&gt;
Support Vector Machines (SVM) are the classifiers that were originally designed for binary c1assification. The c1assificatioin applications can solve multi-class problems. The result shows that pSVM gives more detection accuracy for classes and comparable to the false alarm rate.&lt;/p&gt;

&lt;p&gt;Cyberattack detection is a classification problem, in which we classify the normal pattern from the abnormal pattern (attack) of the system.&lt;/p&gt;

&lt;p&gt;The SDF is a very powerful and popular data mining algorithm for decision-making and classification problems. It has been using in many real-life applications like medical diagnosis, radar signal classification, weather prediction, credit approval, and fraud detection, etc.&lt;/p&gt;

&lt;p&gt;A parallel Support Vector Machine (pSVM) algorithm was proposed for the detection and classification of cyber attack datasets.&lt;/p&gt;

&lt;p&gt;The performance of the support vector machine is greatly dependent on the kernel function used by SVM. Therefore, we modified the Gaussian kernel function in a data-dependent way in order to improve the efficiency of the classifiers. The relative results of both the classifiers are also obtained to ascertain the theoretical aspects. The analysis is also taken up to show that PSVM performs better than SDF.&lt;br&gt;
The classification accuracy of PSVM remarkably improve (accuracy for Normal class as well as DOS class is almost 100%) and comparable to false alarm rate and training, testing times.&lt;br&gt;
Thanks for reading👍&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Run GUI apps in docker container.</title>
      <dc:creator>bhat sumair</dc:creator>
      <pubDate>Sun, 30 May 2021 09:31:52 +0000</pubDate>
      <link>https://dev.to/bhatsumair/run-gui-apps-in-docker-container-56m6</link>
      <guid>https://dev.to/bhatsumair/run-gui-apps-in-docker-container-56m6</guid>
      <description>&lt;p&gt;Hello learners,&lt;br&gt;
Today i got a new task &lt;strong&gt;how to run GUI applications in container&lt;/strong&gt;.&lt;br&gt;
we known that by default we can't run GUI applications in docker container because of non-availability of xserver which is required to meet this challenge.&lt;br&gt;
let me show you how to overcome with this challenge:-&lt;br&gt;
Follows these instructions carefully&lt;br&gt;
Install docker in your os&lt;br&gt;
  -yum install docker-ce&lt;br&gt;
start docker services&lt;br&gt;
  -systemctl start docker &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PdnvEr0m--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1r7wykkfptr5b0w22o1g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PdnvEr0m--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1r7wykkfptr5b0w22o1g.png" alt="Alt Text"&gt;&lt;/a&gt; &lt;br&gt;
Now pull any image you want in my case i pulled centos latest one&lt;br&gt;
  -docker pull centos:latest&lt;br&gt;
It is already in my system you can download it from above command.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--s09gCjvz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hmuigqby6lzz9kg91n7s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--s09gCjvz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hmuigqby6lzz9kg91n7s.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
launch the docker container with following options.&lt;br&gt;
  -docker run -it --net=host --env="DISPLAY" centos:latest&lt;br&gt;
here i pass --net=host means i want to use host connectivity and provide an --env to share docker's host display.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PCpJ1rCI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/v43soj6gwodscge06sfm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PCpJ1rCI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/v43soj6gwodscge06sfm.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
After successffully launch of docker container install firefox&lt;br&gt;
   -yum install firefox -y&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_187XHEN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/boq4zusiegsrtzbm19bw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_187XHEN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/boq4zusiegsrtzbm19bw.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
Now run firefox command&lt;br&gt;
  -firefox&lt;br&gt;
so you see it runs successfully👍&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9bIxirqi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a1s7anyy3rltxg647hs8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9bIxirqi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a1s7anyy3rltxg647hs8.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Now we can run jupyter notebook&lt;/strong&gt;&lt;br&gt;
install python&lt;br&gt;
  -yum install python3&lt;br&gt;
install jupyter notebook&lt;br&gt;
  -pip3 install jupyter&lt;br&gt;
After successfully installed launch jupyter notebook&lt;br&gt;
  -jupyter notebook&lt;br&gt;
it shows some error so we have to bypass it with root permission&lt;br&gt;
  jupyter notebook --allow-root&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DfSOh6V4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0pau6rx5u34ivh2hkivl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DfSOh6V4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0pau6rx5u34ivh2hkivl.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
Finally it is launched successfully👍&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dgEuD9L7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g08b1f6iov3eo4ui3aua.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dgEuD9L7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g08b1f6iov3eo4ui3aua.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
Thanks for reading.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Deploy Machine learning(ML) model in Docker container.</title>
      <dc:creator>bhat sumair</dc:creator>
      <pubDate>Thu, 27 May 2021 05:50:27 +0000</pubDate>
      <link>https://dev.to/bhatsumair/deploy-machine-learning-ml-model-in-docker-container-3d8m</link>
      <guid>https://dev.to/bhatsumair/deploy-machine-learning-ml-model-in-docker-container-3d8m</guid>
      <description>&lt;p&gt;First we will understand what is machine learning(ML) and Docker.&lt;br&gt;
&lt;strong&gt;Machine learning&lt;/strong&gt;:- Machine learning is an application/program or subset of AI that allows machines to learn from data without being programmed explicitly.&lt;br&gt;
&lt;strong&gt;Docker&lt;/strong&gt;:-It is a tool that provides platform to create, run and deploy the applications by using containers. Docker is a bit like a virtual machine rather than creating a whole virtual operating system, Docker allows applications to use the same Linux kernel as the system that they're running on and only requires applications be shipped with things not already running on the host computer. This gives a significant performance boost and reduces the size of the application.&lt;br&gt;
&lt;strong&gt;Here are the complete steps:-&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Step 1&lt;/strong&gt;:&lt;br&gt;
Install docker&lt;br&gt;
   #yum install docker-ce --nobest&lt;br&gt;
if you have already installed check for query&lt;br&gt;
   #rpm -q docker-ce&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--tXxexy9Y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dc7awzppnc5e7nk3lat7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--tXxexy9Y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dc7awzppnc5e7nk3lat7.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;step 2&lt;/strong&gt;:&lt;br&gt;
check status of docker &lt;br&gt;
   #systemctl status docker&lt;br&gt;
if services are not enabled run&lt;br&gt;
   #systemctl start docker&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---xkn0Mxq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/esosdk8kame2dl1mz9r2.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---xkn0Mxq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/esosdk8kame2dl1mz9r2.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;step 3&lt;/strong&gt;:&lt;br&gt;
download the latest centos image from docker hub&lt;br&gt;
   #docker pull centos:latest&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KJnVBMm_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zqn24q43u0eume7gc0fu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KJnVBMm_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zqn24q43u0eume7gc0fu.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;step 4&lt;/strong&gt;:&lt;br&gt;
deploy a latest centos new container&lt;br&gt;
   #docker run -it --name MyOs centos:latest&lt;br&gt;
by passing -it arguments provides terminal and we can interact with it.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dAmrt11E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xsc8qxfwrzgwnpkl9dlq.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dAmrt11E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xsc8qxfwrzgwnpkl9dlq.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;STEP 5&lt;/strong&gt;:&lt;br&gt;
Installing python3 on centos container&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--k6-zX1Et--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qe2vwvdbrf7fzfen94i4.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--k6-zX1Et--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qe2vwvdbrf7fzfen94i4.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Step 6&lt;/strong&gt;:&lt;br&gt;
Now installing all required packages&lt;br&gt;
   #pip3 install numpy&lt;br&gt;
   #pip3 install pandas&lt;br&gt;
   #pip3 install sklearn &lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_0WDoljY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qrskresyc3zbg2rz755m.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_0WDoljY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qrskresyc3zbg2rz755m.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;step 7&lt;/strong&gt;:&lt;br&gt;
copying dataset from base os to centos container&lt;br&gt;
   #docker cp /root/salary.csv MyOs:/ML&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MVbZdr5R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a1yg7ebjn4nao0v36yee.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MVbZdr5R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/a1yg7ebjn4nao0v36yee.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Step 8&lt;/strong&gt;:&lt;br&gt;
Code to run for ML model&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mt6Jhn_q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/496jv1ek3p22q206nu0m.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mt6Jhn_q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/496jv1ek3p22q206nu0m.jpeg" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Final Step&lt;/strong&gt;:&lt;br&gt;
   #python3 model.py&lt;br&gt;
Here is the complete output of our ML model&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dt_AtK8T--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/new30v2332pmy19cxxcc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dt_AtK8T--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/new30v2332pmy19cxxcc.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;THANK YOU&lt;/strong&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
