Trending questions in Edureka Community

0 votes
0 answers

Is the NIST 800-53 PM-1 security plan the same as the security policy?

NIST 800-53 defines security controls for federal ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
96 views
0 votes
0 answers

Getting Top-K Input vectors through Attention Mechanism in TensorFlow

Can you explain Getting Top-K Input vectors ...READ MORE

Mar 19 in Generative AI by Nidhi
• 16,140 points
100 views
0 votes
0 answers

Customize the attention mechanism but report an error, tensorflow: Gradients do not exist for variables

With the help of python programming can ...READ MORE

Mar 19 in Generative AI by Nidhi
• 16,140 points
102 views
0 votes
1 answer

Need help understanding nntopo macro in Julia's Attention mechanism Transformers.jl package

The @nntopo macro in Julia's Transformers.jl package ...READ MORE

Mar 17 in Generative AI by Ashutosh
• 32,730 points
143 views
0 votes
0 answers

What are the disadvantages of Modbus TCP?

Modbus TCP is a widely used industrial ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
93 views
0 votes
0 answers

How can SCADA attacks disrupt industrial processes?

Supervisory Control and Data Acquisition (SCADA) systems ...READ MORE

Mar 19 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
93 views
0 votes
0 answers

output of custom attention mechanism implementation does not match torch.nn.MultiheadAttention

With the help of a proper code ...READ MORE

Mar 19 in Generative AI by Nidhi
• 16,140 points
98 views
0 votes
0 answers

How can I speed up this Keras Attention computation?

With the help of proper Python programming, ...READ MORE

Mar 19 in Generative AI by Nidhi
• 16,140 points
96 views
0 votes
1 answer

How do I fine tune BERT's self attention mechanism?

You can fine-tune BERT's self-attention mechanism by ...READ MORE

Mar 17 in Generative AI by Ashutosh
• 32,730 points
140 views
0 votes
0 answers

using Attention mechanisms in Tensorflow Seq2Seq native API (v1.3)

Can you help me by using Attention ...READ MORE

Mar 19 in Generative AI by Nidhi
• 16,140 points
92 views
0 votes
0 answers

Unable to save model architecture (bilstm + attention)

Can i know if  Unable to save ...READ MORE

Mar 19 in Generative AI by Nidhi
• 16,140 points
86 views
0 votes
0 answers

How do you manage stakeholder expectations when facing project delays?

How do you set and manage stakeholder ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
158 views
0 votes
0 answers

What’s the best way to handle dependencies between project tasks?

What’s the best way to manage task ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
121 views
0 votes
0 answers

What’s your approach to resource allocation for time-sensitive projects?

What’s your approach to allocating resources effectively ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
121 views
0 votes
1 answer

adding attention mechanism to yolo algorithm

To add an attention mechanism to the ...READ MORE

Mar 17 in Generative AI by megha
229 views
0 votes
0 answers

What strategies do you use to optimize project costs?

What strategies do you use to cut ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
123 views
0 votes
0 answers

How does AI-powered enumeration automate recon?

AI can enhance reconnaissance by automating the ...READ MORE

Mar 18 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
113 views
0 votes
0 answers

How do you adjust timelines when project scope changes?

When the project scope changes, how do ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
114 views
0 votes
0 answers

How do you manage cultural differences in an international project team?

How do you navigate cultural differences when ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
119 views
0 votes
0 answers

How do you implement Agile methodology in a non-Agile organization?

How do you introduce Agile practices in ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
112 views
0 votes
0 answers

How do you deal with unexpected external risks (e.g., regulatory changes, economic shifts)?

How do you deal with unexpected risks, ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
155 views
0 votes
0 answers

How do you balance speed with quality in project execution?

How do you strike the right balance ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
113 views
0 votes
0 answers

How can RPC Dumping be used in Windows attacks?

Remote Procedure Call (RPC) services in Windows ...READ MORE

Mar 18 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
105 views
0 votes
0 answers

How do you handle a situation where risk mitigation efforts fail?

What would you do if your risk ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
153 views
0 votes
0 answers

How do you manage competing project priorities?

How do you handle situations where multiple ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
111 views
0 votes
0 answers

How do you handle project delays that are beyond your control?

How do you deal with project delays ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
111 views
0 votes
0 answers

What methods prevent Unix/Linux user enumeration?

User enumeration can expose valid accounts to ...READ MORE

Mar 18 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
102 views
0 votes
0 answers

What are the best tools for project scheduling?

What are your go-to tools for project ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
109 views
0 votes
0 answers

How do you estimate project costs for an unclear scope?

How do you estimate project costs when ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
109 views
0 votes
0 answers

What are some common risk management mistakes project managers make?

What are some common risk management mistakes ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
150 views
0 votes
0 answers

What SMB enumeration techniques expose file shares?

Server Message Block (SMB) allows file sharing ...READ MORE

Mar 18 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
100 views
0 votes
0 answers

What are AI-based countermeasures for enumeration?

AI can help detect and mitigate reconnaissance ...READ MORE

Mar 18 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
99 views
0 votes
0 answers

What tools do you use for project cost tracking?

What tools or methods do you use ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
105 views
0 votes
1 answer

what's the difference between "self-attention mechanism" and "full-connection" layer?

A self-attention mechanism computes contextual relationships between ...READ MORE

Mar 17 in Generative AI by batauski
210 views
0 votes
0 answers

How do you ensure transparency in financial reporting for projects?

How do you ensure transparency in financial ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
104 views
0 votes
0 answers

How can I validate that a PRNG's output is insecure and predictable?

Pseudo-Random Number Generators (PRNGs) should produce unpredictable ...READ MORE

Mar 18 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
96 views
0 votes
0 answers

Check if table exists in SQL Server

I want this to be the last ...READ MORE

Aug 21, 2022 in Database by Kithuzzz
• 38,000 points
40,666 views
0 votes
0 answers

What’s the best way to manage vendor costs in a project?

What’s the best way to keep vendor ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
102 views
0 votes
0 answers

What tools do you use for risk assessment and tracking?

What tools or methods do you use ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
142 views
0 votes
0 answers

What can hackers do with the ability to read /etc/passwd?

The /etc/passwd file stores user account information ...READ MORE

Mar 18 in Cyber Security & Ethical Hacking by Anupam
• 18,120 points
92 views
0 votes
0 answers

How do you handle a situation where the project exceeds the budget?

What’s your approach if a project starts ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
95 views
0 votes
0 answers

How do you handle tight project deadlines?

What’s your strategy for handling tight deadlines ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
92 views
0 votes
0 answers

What are some common budgeting mistakes in project management?

What are some common budgeting mistakes in ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
92 views
0 votes
0 answers

Can we mask two words at the same time in attention mechanism?

Can we mask two words at the ...READ MORE

Mar 17 in Generative AI by Ashutosh
• 32,730 points
136 views
0 votes
1 answer

How Vertex AI rate limits are calculated on GCP?

Vertex AI rate limits on GCP are ...READ MORE

Mar 12 in Generative AI by nini
325 views
0 votes
0 answers

How do you justify additional budget requirements to senior management?

How do you justify asking for additional ...READ MORE

Mar 18 in PMP by Parshvi
• 7,940 points
91 views
0 votes
1 answer

How to visualize an attention mechanism in a classification task?

To visualize an attention mechanism in a ...READ MORE

Mar 17 in Generative AI by preeti
196 views
0 votes
1 answer

How Can I Create a Curved Menu Like Stacks in OS X Using jQuery UI or CSS and JavaScript?

You can create a curved menu like ...READ MORE

Mar 11 in Java-Script by Sanvi
348 views
0 votes
0 answers

What steps do you take if a project risk materializes?

What’s your first move when a project ...READ MORE

Mar 17 in PMP by Parshvi
• 7,940 points
131 views