C language developed at Bell lab by Dennis Ritchie on UNIX environment. UNIX was...

# Technology Home

Below is an example Recursive C program to perform Binary – int binsearch(int low,...

Below is an example recursive C program to return Fibonacci series for a given...

Here is a C program to find a factorial by recursive method – int...

Below is an example to represent a Tree structure in C using struct

Gregory Newton Backward Interpolation Method can be used to derive difference formula when the...

Below is an amazing solution to prove that when n=2,Â Lagranges interpolation formula reduces to...

One of the fastest growth rates in the telecommunications industry anywhere in the world...

Olden form of phone systems involved manual exchanges which involved a great task in...

It’s helpful for data communication and IT students to understand the evolution of Data...

Data Communications is the function of transferring a digital signal from one digital device...

Below is sample C program to convert a postfix string to prefix form. Also...

Below is sample C program to convert a prefix string to infix form. Also...

Below is an example that I prepared for preorder and postorder traversal of a...

Below is the algorithm and C routine for traversing a Binary Tree in postorder....

A binary tree can be traversed in two basic ways – preorder and postorder....

Binary Tree is a basic data structure that is used behind the scenes of...

Below is the solution to test convergence of a sampleÂ Logarithmic series –

Below is a sample problem and its solution to find maximum power transmitted in...

Below is the solution to find power transmitted by a belt given maximum permissible...

Here is a problem involving V-belt where we calculate the maximum power transmitted from...

Here is an interesting solution to find velocity and maximum power transmitted –

Here is an interesting problem and solution to calculate torque and power transmitted of...

Its interesting to use the mechanical formulas to find maximum power transmitted and initial...

Here is a real life mechanical problem to solve – Two parallel shafts whose...

Question: A leather belt transmits 30 KW from a pulley 750 mm diameter which...

Question:Â An electric motor provides 6.6 KW to a belt driven pulley 125 mm in...

Jacobi’s Iteration method is an interesting method to solve equations by simple iteration method....

Here is an excellent example of Gauss Seidal elimination method to solve a set...

Here is an intelligent and simple way to find the inverse of a matrix...

Here is a well explained solution to solve a set of equations using Gauss...

Below is a well explained solution for a set of equations using Gauss Elimination...

We will be using Newton Raphson method to find the root of this equation....

Below is the lab work for Parallel Lamp Connection –

Here is the detailed lab work for a Dim and Bright lamp connection –Â

We will see how to operate 3 lamps using a master switch and also...

Below is a simple step by step description of a Fluorescent Tube connection. We...

Here we define what Poisson Distribution is how to measure itsÂ skewness and kurtosis.

Here we venture to prove that Inversion MappingÂ maps the totality of circles lines in...

Here is an interesting solution to find nth root of a complex number Z....

Here we discuss transformation of W = eZ

Here is a mathematical solution for forming aÂ Bi-Linear Transformation which maps the points (1,...

Here is the solution on how to determine if a mathematical function is analytic...

Here is an attempt to check if a function satisfies Laplace Equation and determining...

Here is a fun solution for Mathematics students to find the locus of a...

Suppose machine A wants to send its message packets to B which has the...

ARP or Address Resolution Protocol is used to map Internet addresses to physical addresses....

Below are couple major weaknesses of IP addresses – A machine cannot be assigned...

An IP address with all 0’s in the host id, refers to this particular...

Network and Broadcast address are derived from the general IP addresses and are used...

Internet address refers to the unique identification or address assigned to each machine in...

As shown above, the Internet consists of various physical networks (Net1 â€¦ Netn) connected...

ProNET variation as star topology is as shown below – The 3 hosts are...

ProNET 10 token recovery is essential to handle situations of loss of token when...

ProNET Token ring technology is an alternative to ethernet technology and it also works...