<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Manpreet Kaur on Medium]]></title>
        <description><![CDATA[Stories by Manpreet Kaur on Medium]]></description>
        <link>https://medium.com/@mk7450247?source=rss-36df95427120------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*k8xyINP6Sz6jEa4TtxV3EA.jpeg</url>
            <title>Stories by Manpreet Kaur on Medium</title>
            <link>https://medium.com/@mk7450247?source=rss-36df95427120------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 23 May 2026 15:33:12 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@mk7450247/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[How difficult is it to hack bitcoin blockchain?]]></title>
            <link>https://medium.com/@mk7450247/how-difficult-is-it-to-hack-bitcoin-blockchain-28b80f0822c9?source=rss-36df95427120------2</link>
            <guid isPermaLink="false">https://medium.com/p/28b80f0822c9</guid>
            <dc:creator><![CDATA[Manpreet Kaur]]></dc:creator>
            <pubDate>Thu, 14 Mar 2024 12:20:09 GMT</pubDate>
            <atom:updated>2024-03-14T12:20:09.848Z</atom:updated>
            <content:encoded><![CDATA[<p>Hacking the Bitcoin blockchain is an extremely arduous task due to its complex and decentralized nature. The blockchain is essentially a decentralized ledger that records all transactions across a network of computers known as nodes. Each transaction is verified by these nodes through a process called mining, where complex mathematical problems are solved to ensure the integrity of the network. This process creates a high level of security that makes it incredibly difficult for hackers to manipulate the blockchain.</p><p>One of the key reasons <strong>why hacking the Bitcoin blockchain is so difficult is</strong> <strong><em>due to its immutability</em></strong>. Once a block of transactions is added to the blockchain, it is nearly impossible to alter it without the majority consensus of the network. This means that even if a hacker were able to gain control of a significant portion of the network’s computing power, they would still need to convince the rest of the network to accept their fraudulent transactions, which is highly unlikely.</p><p>Another factor that contributes to the difficulty of hacking the Bitcoin blockchain is the <strong><em>cryptographic algorithms</em></strong> that are used to secure it. Bitcoin uses industry-standard encryption techniques such as SHA-256 and Elliptic Curve Digital Signature Algorithm (ECDSA) to ensure the integrity and privacy of transactions. These algorithms are widely regarded as highly secure and have withstood numerous attempts to crack them.</p><p>Furthermore, the decentralized nature of the Bitcoin network makes it even more challenging for hackers to target. Unlike traditional centralized systems where a single point of failure can lead to catastrophic breaches, the Bitcoin blockchain is distributed across thousands of nodes worldwide. This means that even if a hacker were to target a specific node or group of nodes, the rest of the network would continue to operate undisturbed.</p><p>In addition to these technical challenges, hacking the Bitcoin blockchain also presents significant legal and ethical hurdles. The cryptocurrency industry is subject to strict regulations in many jurisdictions, and attempting to hack the blockchain is considered a serious crime. Furthermore, the decentralized and transparent nature of the blockchain makes it easy to trace and track malicious activity, making it highly risky for hackers to attempt an attack.</p><p>Overall, the difficulty of hacking the Bitcoin blockchain stems from a combination of technical, legal, and ethical barriers. The decentralized and secure nature of the network, combined with the robust cryptographic algorithms that protect it, make it an incredibly daunting task for even the most skilled hackers. As a result, the Bitcoin blockchain remains one of the most secure and resilient financial networks in existence today.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=28b80f0822c9" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Dimensionality Reduction]]></title>
            <link>https://medium.com/@mk7450247/dimensionality-reduction-a977f1ef932b?source=rss-36df95427120------2</link>
            <guid isPermaLink="false">https://medium.com/p/a977f1ef932b</guid>
            <category><![CDATA[dimensionality-reduction]]></category>
            <dc:creator><![CDATA[Manpreet Kaur]]></dc:creator>
            <pubDate>Thu, 07 Sep 2023 09:29:30 GMT</pubDate>
            <atom:updated>2023-09-07T09:29:30.312Z</atom:updated>
            <content:encoded><![CDATA[<p>Dimensionality reduction is a technique<strong> used to reduce the number of features in a dataset </strong>while retaining as much of the important information as possible. In other words, it is a <strong>process of transforming high-dimensional data into a lower-dimensional space</strong> that still preserves the essence of the original data.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/482/0*A5F_cb9R-chc0jwd.jpeg" /></figure><p>In machine learning, high-dimensional data refers to data with a large number of features or variables. The curse of dimensionality is a common problem in machine learning, where the performance of the model deteriorates as the number of features increases. This is because the complexity of the model increases with the number of features, and it becomes more difficult to find a good solution. In addition, high-dimensional data can also lead to overfitting, where the model fits the training data too closely and does not generalize well to new data.</p><p>There are two main approaches to dimensionality reduction: <strong>feature selection</strong> and <strong>feature extraction.</strong></p><p><strong>Feature Selection:</strong><br>Feature selection involves selecting a subset of the original features that are most relevant to the problem at hand. The goal is to reduce the dimensionality of the dataset while retaining the most important features. There are several methods for feature selection, including <strong>filter methods, wrapper methods, </strong>and<strong> embedded methods.</strong></p><p><strong>Feature Extraction:</strong><br>Feature extraction involves creating new features by combining or transforming the original features. The goal is to create a set of features that captures the essence of the original data in a lower-dimensional space. There are several methods for feature extraction, including <strong>principal component analysis (PCA), linear discriminant analysis (LDA), </strong>and <strong>t-distributed stochastic neighbor embedding (t-SNE).</strong> PCA is a popular technique that projects the original features onto a lower-dimensional space while preserving as much of the variance as possible.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/530/1*5yCGuCav1tfwRCWgwDU2Ew.jpeg" /></figure><p>One<strong> commonly used </strong>dimensionality reduction <strong>technique </strong>is <strong>Principal Component Analysis (PCA)</strong>. PCA identifies the orthogonal axes in the data that capture the most variation. It projects the high-dimensional data onto a lower-dimensional space, where the new axes, called principal components, are ordered by the amount of variation they explain. By selecting the top principal components, which represent the most important information, we can reduce the dimensionality of the data.</p><p><strong>Dimensionality reduction is essential for several reasons:</strong></p><p><strong>1. Visualization:</strong> High-dimensional data is challenging to visualize, but by reducing the dimensionality, we can easily create scatter plots or other visualizations to gain insights from the data.</p><p><strong>2. Computation efficiency: </strong>Many machine learning algorithms suffer from the curse of dimensionality, where the performance decreases as the number of features increases. Dimensionality reduction enables us to reduce the computational complexity and speed up the training process.</p><p><strong>3. Noise reduction:</strong> High-dimensional data often contains noise or irrelevant features. By reducing dimensionality, we can filter out these noisy variables and focus on the most meaningful ones.</p><p><strong>4. Interpretability:</strong> With reduced dimensionality, it becomes easier to interpret and understand the relationships between variables.</p><p>In <strong>terms of recent advancements</strong> in <strong>dimensionality reduction,</strong> one notable development is the use of deep learning techniques for unsupervised dimensionality reduction. Autoencoders, a type of neural network, can be trained to reconstruct the input data after compressing it into a lower-dimensional space. This allows for more powerful representations to be learned and applied to various tasks.</p><p><strong>Overall, </strong>dimensionality reduction techniques like <strong>PCA play a crucial role</strong> in simplifying and understanding complex data, enabling efficient computation, and improving the performance of machine learning algorithms. With advancements in deep learning, we can expect further developments in this field to address more complex data structures and enhance our ability to make sense of high-dimensional data.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a977f1ef932b" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>