A perfect blog for engineering codes, projects, reports, presentations making Computer Engineering easy !!
Wednesday, 18 December 2013
Friday, 8 November 2013
Water Jug Problem Java Code
Use the DOWNLOAD BOX to download the file 'wj2.java'.
View the Java Code for Water Jug Problem.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
View the Java Code for Water Jug Problem.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
Wumpus World Problem Java Code
Use the DOWNLOAD BOX provided in the blog to download the file 'wumpus.java'.
View the Java Code for Wumpus World Problem.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
View the Java Code for Wumpus World Problem.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
Friday, 18 October 2013
Semester 7 : Digital Signal and Image Processing (DSIP) MATLAB codes
The MATLAB codes are available in the 'dsip.zip' file.
Download this file from the download box given in the blog.
It contains MATLAB codes for :-
1.IGS
2.Ideal High pass filter
3.Gaussian High pass filter
4.Butterworth High pass filter
5.Ideal Low pass filter
6.Gaussian Low pass filter
7.Butterworth Low pass filter
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
Download this file from the download box given in the blog.
It contains MATLAB codes for :-
1.IGS
2.Ideal High pass filter
3.Gaussian High pass filter
4.Butterworth High pass filter
5.Ideal Low pass filter
6.Gaussian Low pass filter
7.Butterworth Low pass filter
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
Friday, 20 September 2013
Mobile Computing Project : WML (Wireless Markup Language) mini project on 'E-Commerce website' free download
This is a mini project in wml on an online shop. You can Donload the project from the DOWNLOAD BOX.Download the file 'wmlproject.zip' from the download box.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
Monday, 16 September 2013
Robotics and AI : Wumpus world problem Java Code/Program.
Given below is the java program for "Wumpus world problem".
The program gives a perfect implementation of this problem.It accepts the environment from the user dynamically, and then the agent tries to explore the best possible path to reach the gold, preventing the pits and the wumpus.
This is a perfect code with sample outputs for two scenarios/environments.
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
The program gives a perfect implementation of this problem.It accepts the environment from the user dynamically, and then the agent tries to explore the best possible path to reach the gold, preventing the pits and the wumpus.
This is a perfect code with sample outputs for two scenarios/environments.
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
Thursday, 5 September 2013
Tuesday, 27 August 2013
Water Jug Problem Java program
The java code for Water Jug Problem is given below.There are many solutions for it run the code to find all.
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS - Robotics and Artificial Intelligence
Thursday, 1 August 2013
System Security : C code for Playfair Cipher (Should be executed in Linux with gcc.)
The Playfair cipher or Playfair square is a manual symmetric encryption technique and was the first literal digraph substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair who promoted the use of the cipher.
The technique encrypts pairs of letters (digraphs), instead of single letters as in the simple substitution cipher and rather more complex Vigenère ciphersystems then in use. The Playfair is thus significantly harder to break since the frequency analysis used for simple substitution ciphers does not work with it. Frequency analysis can still be undertaken, but on the 600 possible digraphs rather than the 26 possible monographs. The frequency analysis of digraphs is possible, but considerably more difficult – and it generally requires a much larger ciphertext in order to be useful.
System Security : C code for Transposition Cipher (should be executed in linux with gcc)
In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.
Thursday, 25 July 2013
Wednesday, 24 July 2013
Tuesday, 23 July 2013
Thursday, 18 July 2013
System Security : C code for Additive cipher / Shift cipher / Caeser cipher ( can be executed in Linux )
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plain text is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caeser, who used it in his private correspondence.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
Given below is the C code for the same.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
Given below is the C code for the same.
Tuesday, 4 June 2013
SEM 7 [Revised] Syllabus for Computer engineering (MU) Free Download
Use the download box to download the Syllabus copy for SEM 7.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 7 java codes
Everything about SEM 6 (Computer Engineering)
This is an extremely important and useful post for sem 6 computer enginering students.
Download the "Everything for SEM 6.zip" file from the download box in the blog.
It contains all the assignments, experiments, important notes, for the following,
1.OOSE
2.AMP
3.SPCC
4.ACN
5.DWM
6.SEMINAR( topic:web personalization)
Download this file and you can complete all your term work with great ease and feel free to comment if you find it useful.So just download the file "Everything for SEM 6.zip" file from the download box.
Best of luck for your SEM 6 !!
The blog also provides Java codes for all experiments of sem 6.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Download the "Everything for SEM 6.zip" file from the download box in the blog.
It contains all the assignments, experiments, important notes, for the following,
1.OOSE
2.AMP
3.SPCC
4.ACN
5.DWM
6.SEMINAR( topic:web personalization)
Download this file and you can complete all your term work with great ease and feel free to comment if you find it useful.So just download the file "Everything for SEM 6.zip" file from the download box.
Best of luck for your SEM 6 !!
The blog also provides Java codes for all experiments of sem 6.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Tuesday, 14 May 2013
Saturday, 27 April 2013
Web Personalization Report and Power Point Presentation
View Paper on Web Personalization
Use Download Box in my blog to download the "Power Point Presentation.
Abstract:
Web personalization is the process of customizing the content and the structure of a Web site to the specific and individual needs of each user, without requiring from them to ask for it explicitly.This can be achieved by taking advantage of the user’s navigational behaviour, as it can be revealed through the processing of the Web usage logs, as well as the user’s characteristics and interests. Suchinformation can be further analysed in association with the content of a Web site, resulting to improvement of the system performance, users’ retention and/or site modification.The overall process of Web personalization consists of five modules, namely: user profiling, log analysis and Web usage mining, information acquisition, content management and Web sitepublishing.
Web personalization is a domain that has been recently gaining great momentum not only in the research area, where many research teams have addressed this problem from different perspectives, but also in the industrial area, where there exists a variety of tools and applications addressing one or more modules of the personalization process. Enterprises expect that by exploiting the information hidden in their Web server logs they could discover the interactions between their Web site visitors and the products offered through their Web site. Using such information, they can optimise their site in order to increase sales and ensure customer retention. Apart from Web usage mining, user profiling techniques are also employed in order to form a complete customer profile. Lately, there is an effort to incorporate web content in the recommendation process, in order to enhance the effectiveness of personalization. Thus web personalization has made web activities user-centric and has made the users an integrated part of the web environment.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Use Download Box in my blog to download the "Power Point Presentation.
Web personalization is the process of customizing the content and the structure of a Web site to the specific and individual needs of each user, without requiring from them to ask for it explicitly.This can be achieved by taking advantage of the user’s navigational behaviour, as it can be revealed through the processing of the Web usage logs, as well as the user’s characteristics and interests. Suchinformation can be further analysed in association with the content of a Web site, resulting to improvement of the system performance, users’ retention and/or site modification.The overall process of Web personalization consists of five modules, namely: user profiling, log analysis and Web usage mining, information acquisition, content management and Web sitepublishing.
Web personalization is a domain that has been recently gaining great momentum not only in the research area, where many research teams have addressed this problem from different perspectives, but also in the industrial area, where there exists a variety of tools and applications addressing one or more modules of the personalization process. Enterprises expect that by exploiting the information hidden in their Web server logs they could discover the interactions between their Web site visitors and the products offered through their Web site. Using such information, they can optimise their site in order to increase sales and ensure customer retention. Apart from Web usage mining, user profiling techniques are also employed in order to form a complete customer profile. Lately, there is an effort to incorporate web content in the recommendation process, in order to enhance the effectiveness of personalization. Thus web personalization has made web activities user-centric and has made the users an integrated part of the web environment.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
RAID 0 and RAID 1 JAVA Implementation
RAID has seven levels.It stands for Redundand Array Of Independent Disk.The code in JAVA gives the implementation of RAID 0 followed by a seperate code for RAID 1
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
4 stage floating point addition pipeline (JAVA CODE)
The 4 stages in floating point addition pipeline are:
1.Exponent comparer
2.Mantissa shifter
3.Mantissa adder
4.Normalize result
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
1.Exponent comparer
2.Mantissa shifter
3.Mantissa adder
4.Normalize result
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Data Dependency Hazard (RAW, WAR, WAW) JAVA CODE
The Data dependency hazards are of 4 types.
1.RAR :Read After Read (This is not harmful as only read operations are performed.)
2.RAW :Read After Write(This may create problems and needs to be handled.)
3.WAR :Write After Read(A naming conflict. Not hazardous if sequential execution takes place)
4.WAW : Write After Write(A naming conflict. Not hazardous if sequential execution takes place)
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
1.RAR :Read After Read (This is not harmful as only read operations are performed.)
2.RAW :Read After Write(This may create problems and needs to be handled.)
3.WAR :Write After Read(A naming conflict. Not hazardous if sequential execution takes place)
4.WAW : Write After Write(A naming conflict. Not hazardous if sequential execution takes place)
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Tuesday, 23 April 2013
Easy Solution for Sem 6 DWDM pracs(Java Code)
Use Download box to download programs for decision tree and bayesian algo
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Wednesday, 20 March 2013
Thursday, 28 February 2013
K-means Clustering Algorithm: Java Code
The Java Code for K-means clustering is given below:
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Friday, 22 February 2013
Internal Forwarding Techniques(Java Code):Store Fetch,Fetch Fetch,Store Store Forwarding
To download the program use the download box
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Wednesday, 13 February 2013
Decision Tree Algorithm:(Classification Problem Java Code)
Java Program for Decision Tree Algorithm.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Monday, 4 February 2013
Classification problem:Bayesian Classification(Java Code)
Java code for Bayesian Classification is as follows
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS - sem 6 java codes
Subscribe to:
Posts (Atom)