## Recursive C program for Binary search

Below is an example Recursive C program to perform Binary – int binsearch(int low, int high, in a, X){ int mid; if(low > high){ return(-1);...

Skip tto content
##
Technology Articles Blog

#
Category: Technology Home

##
Recursive C program for Binary search

##
Recursive C program to print Fibonacci series

##
C program for finding factorial by recursion

##
Tree representation in C

##
Gregory Newton Backward Interpolation Method

##
Reducing Lagranges interpolation formula to Linear interpolation

##
Mobile Communication Services

##
Digitized Phone Services (E-10B)

##
Early Evolution of Data Commmunication Systems

##
Data Communication and its basic setup

##
C program to convert a postfix string to prefix form

##
C program to convert a prefix string to infix form

##
Example for Preorder and Postorder traversal of a Binary tree

##
Traversing a Binary Tree in Postorder

##
Traversing a Binary Tree in Preorder

##
Binary Tree

##
Testing convergence of a sample Logarithmic series using Leibnitz’s rule

##
Finding maximum power transmitted neglecting centrifugal tension

##
Finding power transmitted by a belt given max tension

##
Finding maximum power transmitted from maximum belt stress

##
Finding Velocity and maximum power transmitted

##
Finding Torque and power transmitted

##
Finding maximum power transmitted and initial tension

##
Finding power transmitted by a pulley

##
Finding maximum cross sectional area of a Mechanical belt

##
Finding Tight side and Slack side tension of a mechanical belt

##
Discussing Convergence of Iteration and Newton Raphson Methods

##
Solving Equations by Jacobi’s Iteration Method

##
Solving a set of equations using Gauss Seidal Elimination Method

##
Finding Inverse of a Matrix using Gauss Elimination Method

##
Gauss Jordan Elimination Method

##
Gauss Elimination Method

##
Finding Roots of equation x3-3×2+x+1=0

##
Parallel Lamp Connection

##
Dim and Bright Connection

##
Master Electric Connection

##
Fluorescent Tube connection

##
Finding measure of skewness and kurtosis for Poisson distribution

##
Proving Inversion Mapping

##
Find 4th Root of 1 and Square root of -8i

##
Finding Linear Fractional Transformation

##
Transformation of W=eZ

##
Forming a Bi-Linear Transformation which maps a set of points

##
How to determine which mathematical functions are analytic

##
Mathematical solution for checking a certain function satisfy Laplace Equation

##
Locus of a point Z satisfying condition |Z-1| + |Z+1| = 4

##
ARP (Address Resolution Protocol) in action

##
ARP – Address Resolution Protocol

##
Weaknesses of IP address

##
‘This’ network and ‘this’ host address

##
Network & Broadcast address

##
Internet Addresses

##
Internet Architecture

##
Internetworking Concept and Architectural Model

##
ARPANET Technology

##
ProNET variation – Start topology

##
ProNET 10 Token recovery

##
ProNET Token Ring Technology

##
Ethernet Variations

Technology Articles Blog

Below is an example Recursive C program to perform Binary – int binsearch(int low, int high, in a, X){ int mid; if(low > high){ return(-1);...

Below is an example recursive C program to return Fibonacci series for a given number – int fibonacci (int x){ if(n < 0){ printf("Invalid input");...

Here is a C program to find a factorial by recursive method – int factorial (int x ) { return ( n==0? 1: n*(fact(n-1))); }...

Below is an example to represent a Tree structure in C using struct...

Gregory Newton Backward Interpolation Method can be used to derive difference formula when the x values are at equidistant intervals and the value to be...

Below is an amazing solution to prove that when n=2, Lagranges interpolation formula reduces to Linear interpolation –...

One of the fastest growth rates in the telecommunications industry anywhere in the world is that of mobile radio communication devices. The basic architecture of...

Olden form of phone systems involved manual exchanges which involved a great task in switching and routing of calls to various subscribers that increased network...

It’s helpful for data communication and IT students to understand the evolution of Data communication systems. The first phase in the evolution of data communication...

Data Communications is the function of transferring a digital signal from one digital device to another. Data transmission and data communications mean two different things....

Below is sample C program to convert a postfix string to prefix form. Also included is detailed flow chart of the program and dry run...

Below is sample C program to convert a prefix string to infix form. Also included is detailed flow chart of the program and dry run...

Below is an example that I prepared for preorder and postorder traversal of a Binary Tree – enjoy!...

Below is the algorithm and C routine for traversing a Binary Tree in postorder. ...

A binary tree can be traversed in two basic ways – preorder and postorder. Explained below is the process or preorder traverse of a binary...

Binary Tree is a basic data structure that is used behind the scenes of all major technologies whether it’s a Database system or operating system,...

Below is the solution to test convergence of a sample Logarithmic series –...

Below is a sample problem and its solution to find maximum power transmitted in a scenario where we need to neglect centrifugal tension....

Below is the solution to find power transmitted by a belt given maximum permissible tension and rpm of a larger pulley –...

Here is a problem involving V-belt where we calculate the maximum power transmitted from the maximum belt stress and other attributes in the system –...

Here is an interesting solution to find velocity and maximum power transmitted –...

Here is an interesting problem and solution to calculate torque and power transmitted of a shaft and pulley system. You can easily extend this to...

Its interesting to use the mechanical formulas to find maximum power transmitted and initial tension given the characteristic features of a flat belt pulley system....

Here is a real life mechanical problem to solve – Two parallel shafts whose center lines are 4.8m apart are connected on an open belt...

Question: A leather belt transmits 30 KW from a pulley 750 mm diameter which runs at 500 rpm. The belt is in contact with the...

Question: An electric motor provides 6.6 KW to a belt driven pulley 125 mm in diameter. The speed of the pulley is 1050 rpm. Calculate the...

We use various Numerical methods to solve algebraic and transcendental equations. All these methods converge the result to a single root after various approximations specific...

Jacobi’s Iteration method is an interesting method to solve equations by simple iteration method. Here is an example – ...

Here is an excellent example of Gauss Seidal elimination method to solve a set of equations –...

Here is an intelligent and simple way to find the inverse of a matrix using Gauss Elimination method –...

Here is a well explained solution to solve a set of equations using Gauss Jordan Elimination method –...

Below is a well explained solution for a set of equations using Gauss Elimination method. Enjoy! ...

We will be using Newton Raphson method to find the root of this equation. Enjoy!...

Below is the lab work for Parallel Lamp Connection –...

Here is the detailed lab work for a Dim and Bright lamp connection – ...

We will see how to operate 3 lamps using a master switch and also simultaneously operating them....

Below is a simple step by step description of a Fluorescent Tube connection. We will see the list of materials needed, the procedure to build...

Here we define what Poisson Distribution is how to measure its skewness and kurtosis....

Here we venture to prove that Inversion Mapping maps the totality of circles lines in the Z plane on to the same that of W plane...

Here is an interesting solution to find nth root of a complex number Z. Here we use a general equation to find the 4th root...

Ok, here is a beautiful mathematical solution to find the Linear Fractional Transformation which maps |Z| <= 1 on to |W| <=1 such that Z =...

Here we discuss transformation of W = eZ...

Here is a mathematical solution for forming a Bi-Linear Transformation which maps the points (1, i,-1) onto the points (i,0,-i) and hence finding the image of...

Here is the solution on how to determine if a mathematical function is analytic –...

Here is an attempt to check if a function satisfies Laplace Equation and determining corresponding analytical function –...

Here is a fun solution for Mathematics students to find the locus of a point Z satisfying condition |Z-1| + |Z+1| = 4 – ...

Suppose machine A wants to send its message packets to B which has the IP address 1B. A only knows B’s IP address and thus...

ARP or Address Resolution Protocol is used to map Internet addresses to physical addresses. Address resolution is the process of mapping Internet IP addresses into...

Below are couple major weaknesses of IP addresses – A machine cannot be assigned a permanent IP address i.e. it should change when the machine...

An IP address with all 0’s in the host id, refers to this particular and the IP addresses with all 0’s in the network id...

Network and Broadcast address are derived from the general IP addresses and are used for specific or reserved applications. Network address refers to the IP...

Internet address refers to the unique identification or address assigned to each machine in the physical network. The basic need for assigning Internet address is...

As shown above, the Internet consists of various physical networks (Net1 … Netn) connected together as a single large network. Each network may have host...

Internetworking is the technology that makes it possible to interconnect many disparate physical networks with diverse underlying hardware technologies and make them function as a coordinated...

ARPANET (Advanced research project agency network) is the oldest wide area packet switched network build by the DARPA (Defense advanced research project agency). Physically ARPANET...

ProNET variation as star topology is as shown below – The 3 hosts are connected logically by a ring connection and physically by a start...

ProNET 10 token recovery is essential to handle situations of loss of token when the host want to transmit. Such token loses occur due to...

ProNET Token ring technology is an alternative to ethernet technology and it also works fairly good speeds. It uses token ring technology- Token ring network...

Ethernet technology started with using the costly coaxial cables. Now it is possible to carry ethernet frames over cost-effective and cheaper twisted pair cables supporting...