Friday, 8 November 2013

Water Jug Problem Java Code

Use the DOWNLOAD BOX to download the file 'wj2.java'.

  View the Java Code for Water Jug Problem.

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS -  Robotics and Artificial Intelligence

Wumpus World Problem Java Code

Use the DOWNLOAD BOX provided in the blog to download the file 'wumpus.java'.

  View the Java Code for Wumpus World Problem.

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS -  Robotics and Artificial Intelligence

Friday, 18 October 2013

Semester 7 : Digital Signal and Image Processing (DSIP) MATLAB codes

The MATLAB codes are available in the 'dsip.zip'  file.
Download this file from the download box given in the blog.

It contains MATLAB codes for :-
1.IGS
2.Ideal High pass filter
3.Gaussian High pass filter
4.Butterworth High pass filter
5.Ideal Low pass filter
6.Gaussian Low pass filter
7.Butterworth Low pass filter

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS -  Robotics and Artificial Intelligence

Friday, 20 September 2013

Mobile Computing Project : WML (Wireless Markup Language) mini project on 'E-Commerce website' free download

This is a mini project in wml on an online shop. You can Donload the project from the DOWNLOAD BOX.Download the file 'wmlproject.zip' from the download box.

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Monday, 16 September 2013

Robotics and AI : Wumpus world problem Java Code/Program.

Given below is the java program for "Wumpus world problem".
The program gives a perfect implementation of this problem.It accepts the environment from the user dynamically, and then the agent tries to explore the best possible path to reach the gold, preventing the pits and the wumpus.
This is a perfect code with sample outputs for two scenarios/environments.

VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS -  Robotics and Artificial Intelligence



VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Thursday, 5 September 2013

Sem 4 & Sem 7 (AOAD & RAI) : N queen Algorithm Java Code



VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Tuesday, 27 August 2013

Water Jug Problem Java program

The java code for Water Jug Problem is given below.There are many solutions for it run the code to find all.

VIEW OUR SPECIAL PAGE ON, " ROBOTICS AND ARTIFICIAL INTELLIGENCE " FOR SEM 7 STUDENTS -  Robotics and Artificial Intelligence

Thursday, 1 August 2013

System Security : C code for Playfair Cipher (Should be executed in Linux with gcc.)

The Playfair cipher or Playfair square is a manual symmetric encryption technique and was the first literal digraph substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair who promoted the use of the cipher.
The technique encrypts pairs of letters (digraphs), instead of single letters as in the simple substitution cipher and rather more complex Vigenère ciphersystems then in use. The Playfair is thus significantly harder to break since the frequency analysis used for simple substitution ciphers does not work with it. Frequency analysis can still be undertaken, but on the 600 possible digraphs rather than the 26 possible monographs. The frequency analysis of digraphs is possible, but considerably more difficult – and it generally requires a much larger ciphertext in order to be useful.


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

System Security : C code for Transposition Cipher (should be executed in linux with gcc)

In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed. Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Thursday, 25 July 2013

System Security : C code for Vigenere Cipher (should be executed in linux with gcc).




VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Wednesday, 24 July 2013

System Security : C code for Hill Cipher (should be executed in linux with gcc).




VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Tuesday, 23 July 2013

Robotics & AI: Java code for Homogeneous Composite Transformation Matrix (HCTM) finding fixed , mobile co-ordinates.



VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Thursday, 18 July 2013

System Security : C code for Additive cipher / Shift cipher / Caeser cipher ( can be executed in Linux )

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipherCaesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plain text is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by Awould become B, and so on. The method is named after Julius Caeser, who used it in his private correspondence.
VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Given below is the C code for the same.


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Tuesday, 4 June 2013

SEM 7 [Revised] Syllabus for Computer engineering (MU) Free Download

 Use the download box to download the Syllabus copy for SEM 7.

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 7 java codes

Everything about SEM 6 (Computer Engineering)

This is an extremely important and useful post for sem 6 computer enginering students.
Download the "Everything for SEM 6.zip" file from the download box in the blog.

It contains all the assignments, experiments, important notes,  for the following,
1.OOSE
2.AMP
3.SPCC
4.ACN
5.DWM
6.SEMINAR( topic:web personalization)

Download this file and you can complete all your term work with great ease and feel free to comment if you find it useful.So just download the file "Everything for SEM 6.zip" file from the download box.
Best of luck for your SEM 6 !!
The blog also provides Java codes for all experiments of sem 6.

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes


Tuesday, 14 May 2013

Brute Force Algorithm for mining Association Rules

923NNTB75NZ5

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

Saturday, 27 April 2013

Web Personalization Report and Power Point Presentation


View Paper on Web Personalization

Use Download Box in my blog to download  the "Power Point Presentation.


Abstract:
                 Web personalization is the process of customizing the content and the structure of a Web site to the specific and individual needs of each user, without requiring from them to ask for it explicitly.This can be achieved by taking advantage of the user’s navigational behaviour, as it can be revealed through the processing of the Web usage logs, as well as the user’s characteristics and interests. Suchinformation can be further analysed in association with the content of a Web site, resulting to improvement of the system performance, users’ retention and/or site modification.The overall process of Web personalization consists of five modules, namely: user profiling, log analysis and Web usage mining, information acquisition, content management and Web sitepublishing. 
                 
                 Web personalization is a domain that has been recently gaining great momentum not only in the research area, where many research teams have addressed this problem from different perspectives, but also in the industrial area, where there exists a variety of tools and applications addressing one or more modules of the personalization process. Enterprises expect that by exploiting the information hidden in their Web server logs they could discover the interactions between their Web site visitors and the products offered through their Web site. Using such information, they can optimise their site in order to increase sales and ensure customer retention. Apart from Web usage mining, user profiling techniques are also employed in order to form a complete customer profile. Lately, there is an effort to incorporate web content in the recommendation process, in order to enhance the effectiveness of personalization. Thus web personalization has made web activities user-centric and has made the users an integrated part of the web environment.  

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

Branch prediction logic (JAVA CODE)




VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

RAID 0 and RAID 1 JAVA Implementation


RAID has seven levels.It stands for Redundand Array Of Independent Disk.The code in JAVA gives the implementation of RAID 0 followed by a seperate code for RAID 1


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

4 stage floating point addition pipeline (JAVA CODE)

The 4 stages in floating point addition pipeline are:
1.Exponent comparer
2.Mantissa shifter
3.Mantissa adder
4.Normalize result


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

Data Dependency Hazard (RAW, WAR, WAW) JAVA CODE

The Data dependency hazards are of 4 types.

1.RAR :Read After Read (This is not harmful as only read operations are performed.)

2.RAW :Read After Write(This may create problems and needs to be handled.)

3.WAR :Write After Read(A naming conflict. Not hazardous if sequential execution takes place)

4.WAW : Write After Write(A naming conflict. Not hazardous if sequential execution takes place)



VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

Tuesday, 23 April 2013

Easy Solution for Sem 6 DWDM pracs(Java Code)

Use Download box to download programs for decision tree and bayesian algo

VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

Wednesday, 20 March 2013

Thursday, 28 February 2013

K-means Clustering Algorithm: Java Code


The Java Code for K-means clustering is given below:


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

Friday, 22 February 2013

Internal Forwarding Techniques(Java Code):Store Fetch,Fetch Fetch,Store Store Forwarding

To download the program use the download box 


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

Wednesday, 13 February 2013

Decision Tree Algorithm:(Classification Problem Java Code)

Java Program for Decision Tree Algorithm.


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes

Monday, 4 February 2013

Classification problem:Bayesian Classification(Java Code)

Java code for Bayesian Classification is as follows


VIEW OUR SPECIAL PAGE FOR SEM 7 STUDENTS -  sem 6 java codes