There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Free-Responsive-Web-UI-Kit---Dashboard-Template-bootstrap
It's a folder of fully featured dashboard and admin template comes with tones of well designed UI elements, components, widgets and pages. It uses bootstrap, JS, CSS, HTML for the frontend.Cpp-Programming-practice-problems-and-solutions
All important Programs that are best for starting C++ or ant programming are present init(solved)artificial-intelligence-real-life-problem-and-solutions
All solved lab of FAST NUCES Lahore campus _ 2022 SpringOnline_Grocery_Store-Project
This website is going to be a platform where people can facilitate from online retail being hassle free, especially in this pandemic. Users can have a convenient experience of buying their daily base groceries and by groceries we mean every other thing that a household needs whether on daily, weekly or monthly basis. The items selected can be easily added to cart and shipped to home within a certain time depending upon the location, availability of product and other factors. Users can thus facilitate by ordering the grocery before time.AutoPlayer-Chess-With-Alpha-Beta-Pruning
Game of chess has been a classic AI problem and these days there are several excellent open source implementations of automatic chess players are available on line. In this assignment we are going to make yet another FAST-chess player that will play chess using some well-established strategies along with MINIMAX to compute moves for a chess player. To complete this assignment you have been provided with an abstract base class called chessPlayer and two demo player classes named humanPlayer and autoPlayer. Along with these two class, another class, called gameState, is also provided that holds state of the game at any given time. The state of the chess at any given time consists of information about player turn (i.e. an enumeration called Color with a value of 1 means WHITE player will move and 0 means BLACK player will move) and an 8 x 8 chess board with chess pieces encoded as shown below.Operating-System-real-life-problems-and-solution
All operating system tasks that help you to prepare yourself for the interviews.Shell-in-c-with-all-advance-feature
Design and implement a simple, interactive shell program that prompts the user for a command, parses the command, and then executes it with a child process. In your solution you are required to use execv(), which means that you will have to read the PATH environment, then search each directory in the PATH for the command file name that appears on the command line. Goals After this exercise you should: Understand how a command line shell works. Understand the commands fork, execv and wait. Feel comfortable compiling simple C-programs using a Makefile. Makefile https://www.includehelp.com/c-programming-questions/what-is-makefile.aspx Background The shell command line interpreter is an application program that uses the system call interface to implement an operator's console. It exports a character-oriented human-computer interface, and uses the system call interface to invoke OS functions. Every shell has its own language syntax and semantics. In conventional UNIX shells a command line has the form command argument_1 argument_2 ... where the command to be executed is the first word in the command line and the remaining words are arguments expected by that command. The number of arguments depends on the command which is being executed. The shell relies on an important convention to accomplish its task: the command is usually the name of a file that contains an executable program. For example ls and cc are the names of files (stored in /bin on most UNIX-style machines). In a few cases, the command is not a file name, but is actually a command that is implemented within the shell; for example cd is usually implemented within the shell rather than in a file. Since the vast majority of the commands are implemented in files, think of the command as actually being a file name in some directory on the machine. This means that the shell's job is to find the file, prepare the list of parameters for the command, and the cause the command to be executed using the parameters. A shell could use many different strategies to execute the user's computation. However the basic approach used in modern shells is to create a new process to execute any new computation. This idea of creating a new process to execute a computation may seem like overkill, but it has a very important characteristic. When the original process decides to execute a new computation, it protect itself from fatal errors that might arise during that execution. If it did not use a child process to execute the command, a chain of fatal errors could cause the initial process to fail, thus crashing the entire machine. Steps These are the detailed steps any shell should take to accomplish its job (note that the code snippets are just examples; they might not suffice for this assignment, but they should give enough clues): Printing a prompt. There is a default prompt string, sometimes hardcoded into the shell, e.g. > or other. When the shell is started it can look up the name of the machine on which it is running, and prepend it to the standard prompt character, for example, giving a prompt string such as zaagblad>. The shell can also be designed to print the current directory as part of the prompt, meaning that each time the user employs cd the prompt string is redefined. Once the prompt string is determined, the shell prints it to stdout whenever it is ready to accept a command line. For example this function prints a prompt: void printPrompt() { /* Build the prompt string to have the machine name, * current directory, or other desired information. */ promptString = ...; printf("%s ", promptString); } Getting the command line. To get a command line, the shell performs a blocking read operation so that the process that executes the shell will be blocked until the user types a command line in response to the prompt. When the command has been provided by the user (and terminated with a newline character, the command line string is returned to the shell. void readCommand(char *buffer) { /* This code uses any set of I/O functions, such as those in the * stdio library to read the entire command line into the buffer. This * implementation is greatly simplified but it does the job. */ gets(buffer); } Note: do not use gets in your final code. Use man gets to see why. Parsing the command. For this assignment your shell doesn't need to be able to handle pipes or redirections. Finding the file. Before you search for the file you have to figure out whether the command needs to be implemented as an internal command or not. If it is not an internal command, you will have to read the environment variable PATH. These environment variables are typically set when the shell is started, but can be modified on the commandline. The command you have to use for this depends on the shell you are using. The PATH environment variable is an ordered list of absolute pathnames that specifies where the shell should search for command files. If the .login file has a line like: set path=(.:/bin:/usr/bin) the shell will first look in the current directory (since the first pathname is "." for the current directory), then in /bin and finally in /usr/bin. If there is no file with the same name as the command from the command line in any of the specified directories, the shell responds to the user that it is unable to find the command. Your solution needs to parse the PATH variable before it begins reading command lines. This can be done with code like this:Clinic-management-system-in-c--
Clinic management system with classesUniversity-of-Okara-Oop-final-2020
Binary-tree-complete-implementation
complete implimentation of binary tree with inorder,preorder postorder, levelorder and spiral order triversal plus implimentation of mirror tree of BSTCOAL-labs-FastNu-fall-2020--processor-8080-or-8086-
Its the main folder so all solved labs are Inside itDesign-a-dataType-Mystring
It can add subtract multiply and divide string types objects you can add object element by element or concatinate two mystring type objectsQueue-implementation-in-c-in-data-structure
all implementation of queue it can add remove element from queueTic-Tac-with-class-in-c--
In which two person can play game and User can visuallize game on counsel where he or she can visualize data through table.oop-final-paper-spring-2020-FAST
Paraphrassing-tool-in-c-by-using-inheritance
two-stacks-with-one-array
Design-a-data-type-hugeInt
Design a data type hugeInt in c++Linked_list-to-store-Just-intiger
Find-Input-number-is-a-fectorial-number
UI-graphis-of-c---on-console
Chess-Without-classes-or-any-data-structure-in-c--
Its my nuiversity roject in which two people can play chess according to all rulescoalesced-Hashing-complete-code-in-c--
insert delete and search in o(1) time complexityAVL-Tree-comlete-implementation-in-fastNU-lab-9
add child in AVL tree, search a perticular number or data in avl tree delete any child event parentDraw-diffferent-shapes-by-using-inheritance-such-as-circle
data-structure-Assignment-3-of-Fast-NUCES-lahore-2020-
1)compress arrayAdd-subtract-string-by-using-templets
Conversion-postfix-to-infix-and-all-other-kind-of-conversion
In which I'm convertin postfix into infix, infix into postfix, with pointer and by using without pointersImplimentaion-of-Queue-in-C
1) Implementation of Queue with Array. 2) Queue implimentation with linked listinheritance-in-cpp
I'm going to upload maximium type of inheritance in this repositoryFind-the-sub-matrix-in-2D-where-the-sum-of-all-the-matrix-is-maximium
It basically a midterm exam paper of Fast NUCES Lahore(Fall 2019)University-Okara-pf-Mid-2020
In this mids there are consisit of 5 questionTetris-with-classes--polymorphism-and-inheritance
This project consists of 3 header files and one main file but if we talk about classes that are eight classes piece class is a base class, and all other classes are derived from piece class. Actual working is present in the Tetris class that runs the game and all other information or you can say that Tetris class is the main class.Implement-a-class-to-represent-a-Roman-Number
you can add subtract multiply and divide two roman number of my class as well as any logical operation for example less then, greater them, equal to, nut equal to operatorMonopoly-Game-with-classes
I'm using the SFML library for the graphical user interface. I'm obeying all laws of Monopoly as a standard. All files are attached to it. you just need to download it and use it by making a project. If you face any issues then mail me or comment issue in comment boxCreating-basic-Page-on-ASP.Net-frame-work-with-CSS
A complete discription is present inside the lab manual 1.1 and lab manual 1.2swap--concatinate-and-add-two-infinity-number-of-linked-list
a). Write a program to concatenate two un-ordered doubly linked lists into one. The input and output of the program is shown as follows b). Modify the program in (a) to combine two ordered doubly linked lists resulting in single ordered doubly linked lists. The output of the program is shown as follows c). using doubly linked list. Write a function that returns the sum of these two lists. The sum list is linked list representation of the addition of two input numbers. There are two restrictions to solve this problem i.e. you cannot modify the lists and you are not allowed to use explicit extra space (Resultant list is not explicit) Is it easy to implement? or more difficult?Assignment-1-fo-amazon-web-services-from-book-Churcher-book-and-e-W-nschier-book
Database-management-system
Advance-Clinic-Management-System
Windows-all-necessary-softwares
Shopewise-web-project-.net-frame-workwith-c--and-mysql-data-base-
this project consist of whole implementation on online shopping implementation rights are reserved by Fazeel khalid if you wanna use this you should need to get permit before using thisDisk-management-system-in-c-linux-
practical-case-study-e-operating-systems-programming--300698-1-introduction-in-this-workshop-you-will-be-implementing-a-file-system-simulator-loosely-based-on-historic-file-systems-the-file-system-will-be-have-the-following-properties--it-is-a-single-level-directory-system--the-directory-entry-has-the-following-format-struct-entry--char-user-char-name9-char-extension4-short-blockcount-short-block8--with-the-name-and-extension-fields-being-c-strings-this-structure-is-32-bytes-in-size--the-disk-size-is-160-kbyte-this-is-roughly-one-side-of-a-5-1-4-00-inch-disk--the-smallest-unit-of-allocation-is-1-kbyte--the-main-directory-occupies-the-first-block-of-the-disk-block-0-and-its-size-is-fixed-at-1-block-so-there-can-only-be-32-files-in-this-file-system--as-the-directory-always-occupies-only-the-first-block-therefore-no-control-information-about-it-needs-to-be-stored-in-the-directory-ie-no--entry--the-only-user-is-user-1--user-1-is-not-a-valid-user-and-could-be-used-to-mark-free-directory-entries--alongside-the-directory-you-also-need-a-bitmap-that-is-capable-of-representing-all-of-the-blocks-available-on-the-disk-this-can-be-a-free-space-bitmap-or-an-allocation-bitmap-this-is-your-choice-this-structure-is-not-stored-on-the-disk-but-would-be-computed-by-the-operating-system-when-the-disk-was-inserted-you-are-not-supposed-to-implement-the-actual-storage-only-the-control-structures-of-the-file-system-when-implementing-the-free-bitmap-you-must-use-a-bitmap-ie-it-should-be-an-array-but-each-element-of-the-array-should-represent-several-blocks-1-2-programming-tasks-when-your-program-starts-it-will-assume-that-the-disk-is-unformatted-you-should-provide-a-menu-that-implements-the-following-options-initialise-disk-initialise-disk-control-structures-setting-the-first-block-of-the-disk-to-used-in-the-bitmap-and-marking-all-directory-entries-as-being-available-list-files-in-the-directory-list-the-names-extensions-and-block-counts-of-all-the-valid-files-in-the-directory-display-the-free-bitmap-print-the-value-of-each-of-the-bits-in-the-bitmap-this-need-not-be-pretty-just-a-long-list-of-1s-and-0s-is-sufficient-opencreate-file-scans-the-directory-and-if-the-name-provided-doesnt-exist-then-adds-that-file-to-the-directory-this-file-will-be-used-in-all-subsequent-operations-until-a-new-file-is-opened-or-it-is-deleted-read-file-list-the-blocks-occupied-by-the-currently-open-file-not-the-content-of-these-blocks-as-you-dont-store-this-information-write-file-allocate-another-block-to-the-currently-open-file-you-should-not-preallocate-blocks-for-the-file-you-should-allocate-the-first-available-block-by-scanning-the-bitmap-for-the-first-block-that-is-available-each-write-shall-add-another-block-to-the-file-until-there-are-no-more-slots-to-allocate-blocks-to-or-the-disk-runs-out-of-blocks-there-are-only-8-slots-available-for-each-file-delete-file-deallocate-all-blocks-for-the-current-file-in-the-bitmap-and-marks-as-free-the-directory-entry-for-that-file-you-need-to-pay-close-attention-to-multiple-boundary-conditions-which-exist-in-this-file-system-including-the-total-size-of-the-disk-maximum-size-of-a-file-maximum-number-of-files-etc-2-3-file-fsh-ifndef-fsh-define-fsh--prevent-multiple-inclusion--includestdinth--fsh--various-definitions-for-osp-practical-case-study-e---the-bitmap--extern-uint8t-bitmap20--160kb-disk-with-1kb-blocks--160-bits-for-bitmap---20-bytes---the-directory-entry--struct-entry--char-user-char-name9-char-extension4-short-blockcount-short-block8---the-directory--extern-struct-entry-directory32--extern-means-its-defined-in-another-file-prevents-multiple-definition-errors--int-togglebitint-block--toggles-the-value-of-the-bit-block-in-the-external-array-bitmap-returns-the-current-value-of-the-bit-does-not-validate-block--int-blockstatusint-block--returns-the-status-of-block-in-the-external-array-bitmap-returns-0-if-bitmap-bit-is-0-not-0-if-bitmap-bit-is-1-does-not-validate-block--endif-3-4-file-fsc--fsc-some-useful-functions-for-osp-practical-case-study-e--includefsh-uint8t-bitmap20-struct-entry-directory32-int-togglebitint-block--int-elemblock8-int-posblock8-int-mask1pos-bitmapelemmask-return-bitmapelemmask--int-blockstatusint-block--int-elemblock8-int-posblock8-int-mask1pos-return-bitmapelemmask--5-file-mainc-includestdioh--stdioh-will-be-found-in-the-system-path--includefsh--fsh-will-be-found-in-the-local-path--int-mainint-ac-charav--printfplease-make-me-usefuln-return-0--4-6-file-makefile-all-casee-casee-maino-fso-cc--o-5Lab-2--Time-complexity-of-non-recursive-functions-
Alpha_Beta_Prunning
MIPS32-Assembly-Language
Assembler that supports a subset of the MIPS32 assembly language. The assembler is implemented in C and executed on Linux.fazeelkhalid
Config files for my GitHub profile.fazeelkhalid.github.io
Advance-shell-in-c-language
it will handel all external, some internal command like cd, exit, jobs and help, also handel pipe and background and fore ground jobsData-structure-Labs
Lab1-read-and-write-in-file-through-system-Call-
Create a function removeNonAlphabets(char * inputFileName, char * outputFileName) in C or C++ that is passed as parameters: an input file name and an output file name. The function then reads the input file using read system call and removes all non-alphabets. It then writes the data to output file using write system call. You will need to see open, read, write, and close system calls.Lab1-Create-a-template-class--Matrix--
1. An overloaded constructor which takes the values of rows and columns, and declares the required memory for the matrix. Matrix(int rows, int columns) 2. Copy Constructor to deep copy another matrix Matrix(Matrix const &obj) . 3. Insert function to insert an element in the given row number and column number void insertElement(T const& element, int rowNo, int colNo) 4. An overloaded + operator to add corresponding elements of two matrices. If there is a mismatch of number of rows or columns for the matrices, the operator will print an error. Matrix<T> operator+(Matrix const& obj) 5. A function named “print” to print the matrix in a neat and readable way. void print(); 6. Transpose function to take transpose of the matrix. (Convert rows into columns and vice versa). void transpose() 7. A destructor to delete the memory. ~Matrix()Design-and-Analysis-of-Algorithms--Spring-2021-Assignment-4
Problem 1 The spread of third wave of COVID-19 in Pakistan has resulted in closure of academic Institutes. The management of FAST Lahore decided to save your academic year by conducting online sessions (video lectures). There are total n videos that need to be streamed one after the other. Each video vi consists of bi bits that needs to be sent at a constant rate over a period of ti seconds. There is only one connection allowed so two videos can’t be sent at a time. This means scheduling of videos is required (an order in which to send these videos). Whichever order is chosen, there cannot be any delays between the end of one video and the start of the next. The connection does not want its user taking up too much bandwidth, so it imposes the following constraint, using a fixed parameter r: For each natural number t > 0, the total number of bits you send over the time interval from 0 to t cannot exceed r*t. A schedule is considered valid if it satisfies the constraint imposed by the connection. You are a computer science expert and management of FAST need your services. Given a set of n video streams specified by its number of bits bi and its time duration ti, they need to determine whether there exists a valid schedule that satisfies connection parameter r. For example you have 3 videos with (b1,t1)=(2000,1), (b2,t2)=(6000,2) and (b3,t3)=(2000,1) also r=5000. The schedule that runs videos in order 1, 2, 3, is valid because at time t=1 the first stream is sent and 2000 < 5000*1 at time t=2 2000+3000(half of second video)<5000*2 similar calculation can be done to check the constraint for t=3 and t=4. a. Design an efficient algorithm that takes a set of n streams each specified by bi and ti along with r and determines whether a valid schedule exists or not. b. Analyze the running time of your algorithm as a function of n. c. Prove that your algorithm works (Give informal argument). Problem 2 Suppose that instead of always selecting the first activity to finish, we instead select the last activity to start that is compatible with all previously selected activities. Describe how this approach is a greedy algorithm, and prove that it yields an optimal solution. Problem 3 Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in any lecture hall. We wish to schedule all the activities using as few lecture halls as possible. Give an efficient greedy algorithm to determine which activity should use which lecture hall. Problem 4 Alice wants to throw a party and is deciding whom to call. She has n people to choose from, and she has made up a list of which pairs of these people know each other. She wants to pick as many people as possible, subject to two constraints: at the party, each person should have at least five other people whom they know and five other people whom they don't know. Give an efficient algorithm that takes as input the list of n people and the list of pairs who know each other and outputs the best choice of party invitees. Give the running time in terms of n.TREX-GAME-coal-project--intel-8080
For this assignment you will work in group of two team member, in case you are unable to find partner you can work alone (but you will need my permission). You cannot working in group of more than 2. You will submit assignment in one. asm file on google classroom (link will be provided soon) Due data of assignment is: 23rd Dec 2020 (no extension possible as that is last week of classes) Plagiarism will result in negative marking that will seriously affect your grade and can also result in F TREX GAME. In this assignment you will be creating a T-Rex game. In this game a dinosaur is running and has to jump over the hurdles. The more hurdles it crosses the more it will score. You can play this game online at https://elgoog.im/t-rex/ and get familiar with itDesign-Finite-Automata
Problem 1: For languages L1 to L10 over alphabets {a,b} do the following a) Enumerate some elements b) Draw a Deterministic Finite Automata L1: The language of all strings containing even number of a’s and each a is followed by at least one b. L2:The language that has even length and odd number of a’s. L3:The language of all strings in which every pair of adjacent b’s appear before any pair of adjacent a’s. L4:The language of all strings containing no more than one occurrence of the string aa. (the string aaa should be viewed as containing 2 occurrences of aa) L6: The language of all strings that begins and end with a triple letter( aaa or bbb) L7: The language of all strings containing at least two a’s and at most one b. Problem 2a: For languages L1 to L10 over alphabets {0,1} do the following a) Enumerate some elements b) Draw a Deterministic Finite Automata L1: strings over {0,1} such that their decimal equivalent is multiple of 5 Eg: {0, 101,1010…..} L2: all strings over {0,1} that start with 0 and end with 010 and do not have 000 as part of a string. L3: all the string x in which n 0 (x)%3=0 and n 1 (x)%3!=0 L4: all the string x in which n 0 (x)%3=0 and n 1 (x)%3=0 L5: L4 U L3 L6= L1’ School of Computer SciencePage2 Problem 2a: Run DFA of L1 of problem 2 for following strings, and answer which ones are accepted and which are rejected {000111, 101000, 10110100,0000100000}Operating-System_Assignment-1
1) Write a C program that accepts a file name and a substring as command line argument and prints the number of occurrences of substring in the given file on the console. If the file does not exist, print some error on the screen. 2) Write a program to manage record of student registration on file. Enter your details and the details of two of your classmates. Roll no, Name and Email should be saved as student details. Example Record: Name: Waleed Akram Khan Roll No. L17-4268 Email: [email protected] Take input via command line argument or user input. Your program should do the following: a. Allow Adding students b. Read student record from file. (Program must take input from user to read a record. E.g. “0” to read your record, “1” and “2” to read record of fellow student.) c. Delete student record in file. (Program must take input from user to delete a record. E.g. “0” to delete your record, “1” and “2” to delete record of fellow student.) 3) Write a program that reverses all the characters of words that are not vowels in a given file.concatinate-and-delete-data
concatinate two doubly linked list such that copy datra of list2 in to list2. secondly design a function that delete all data except given keyDesign-and-Analysis-of-Algorithms--Spring-2021-Assignment-3
Problem 1 Suppose you want to place bill boards to advertise about your new business on the roads of your city. The idea is to place billboards only on the junctions to get maximum visibility as lots of people pass through those junctions. Placing a bill board cost you X Rs. You want to place these bill boards such that each road of the city is covered (i.e. one board must be placed at least to one of the junctions connecting that road). Your objective is to place the boards such that all roads are covered with minimum cost. Being a computer science expert, you model the road network as a graph where roads are edges and junctions are vertices. One of your friends asks you to apply greedy approach to minimize your cost. He asks you to place a board on the junction/vertex that has maximum degree (this way maximum number of roads will be covered) and then place the next board on the junction/vertex that has maximum uncovered roads. Keep doing this until all roads are covered. Is this greedy strategy optimal? If yes then give an informal correctness proof. Otherwise give a counter example. Problem 2 You are recently appointed as an intern of company ABC for n weeks. You team lead has assigned you n tasks t1, t2, t3, ... , tn. You have to submit one task every week but you can do these tasks in any order. Each task i requires hi hours to complete (h1 hours for task t1, h2 hours for task t2 and so on). If you submit task ti on week j then you will be paid hi*(n-j)$. You want to maximize your earning. Give a greedy algorithm that can determine the order in which you should perform the tasks to maximize your income. Give n informal proof of correctness for you algorithm. Problem 3 We use Huffman's algorithm to obtain an encoding of alphabet {a, b, c} with frequencies fa, fb, fc. In each of the following cases, either give an example of frequencies (fa; fb; fc) that would yield the specified code, or explain why the code cannot possibly be obtained (no matter what the frequencies are). (a) Code: {0, 10, 11} (b) Code: {0, 1, 00} (c) Code: {10, 01, 00} Problem 4 Ternary Huffman. Trimedia Disks Inc. has developed ternary hard disks. Each cell on a disk can now store values 0, 1, or 2 (instead of just 0 or 1). To take advantage of this new technology, we need a modified Huffman algorithm for compressing sequences of characters from an alphabet of size n, where the characters occur with known frequencies f1, f2, ..., fn. Your algorithm should encode each character with a variable-length code word over the values 0, 1, 2 such that no code word is a prefix of another code word and so as to obtain the maximum possible compression. a. Design an algorithm for finding optimal code. b. Analyze the running time of your algorithm as a function of n, the number of unique characters. c. Prove that your algorithm works (Give informal argument).chatgpt
Love Open Source and this site? Check out how you can help us