41 skills found · Page 1 of 2
walkframe / Covertablemakes combinations for testing.
Ashleshk / IBM Data Science Specialization CourseraData Science has been ranked as one of the hottest professions and the demand for data practitioners is booming. This Professional Certificate from IBM is intended for anyone interested in developing skills and experience to pursue a career in Data Science or Machine Learning. This program consists of 9 courses providing you with latest job-ready skills and techniques covering a wide array of data science topics including: open source tools and libraries, methodologies, Python, databases, SQL, data visualization, data analysis, and machine learning. You will practice hands-on in the IBM Cloud using real data science tools and real-world data sets. It is a myth that to become a data scientist you need a Ph.D. This Professional Certificate is suitable for anyone who has some computer skills and a passion for self-learning. No prior computer science or programming knowledge is necessary. We start small, re-enforce applied learning, and build up to more complex topics. Upon successfully completing these courses you will have done several hands-on assignments and built a portfolio of data science projects to provide you with the confidence to plunge into an exciting profession in Data Science. In addition to earning a Professional Certificate from Coursera, you will also receive a digital Badge from IBM recognizing your proficiency in Data Science.
worldcuisines / WorldcuisinesWorldCuisines is an extensive multilingual and multicultural benchmark that spans 30 languages, covering a wide array of global cuisines. Best Theme Paper 🏆 NAACL 2025
guru-shreyansh / INTERNSHALA Java App Developement ProjectsThe Core Java Training by Internshala is an online training program covering the basic concepts of Java and Object-Oriented Programming such as arrays, methods, and inheritance, polymorphism, classes etc. As a part of the project, I learned about Java FX and developed two awesome app & game using the same concepts in IntelliJ IDEA.
Gagniuc / Python Coding Examples From Simple To ComplexThis book takes the reader from Python basics to advanced applications through 227 worked examples, covering variables, arrays, control flow, functions, recursion, objects, JSON, sorting, statistics, signal analysis, logic gates, randomness, Markov chains, and Python-specific tools such as file I/O and GUIs.
SepidehHosseinian / 100 Days Of Leetcode Challenges100-Days-of-Leetcode-Challenges is a repository that contains my solutions and explanations for various coding problems from Leetcode, one of the most popular online platforms for practicing and improving your programming skills. Leetcode offers hundreds of problems covering different topics, such as arrays, strings, trees, graphs, dynamic programm
Akarshjha03 / JavaccinoWelcome to the Javaccino repository! This project aims to help beginners learn the fundamentals of Java programming, covering essential topics such as basic syntax, variables, data types, type casting, operators,, control flow statements, methods, loops, strings, arrays, functions, and basic I/O operations with OOPS concept & exception handling
kevilkhadka / IBM Data ScienceThis repo consists of all courses of IBM - Data Science Professional Certificate, providing with techniques covering a wide array of data science topics including open source tools and libraries, methodologies, Python, databases, SQL, data visualization, data analysis, and machine learning. You will practice hands-on in the IBM Cloud using real data science tools and real-world data sets.
ADiTyaRaj8969 / ArraysThis repository helps beginners understand arrays through simple examples and exercises, covering how to create, use, and optimize them.
wasitkrish / C ProgrammingA curated collection of C programming programs covering core concepts such as variables, conditionals, loops, arrays, functions, recursion, strings, pointers, structures, and basic problem-solving techniques.
adolgert / UnitTestDesign.jlAutomated unit test coverage with fewer test cases using all-pairs and other covering arrays.
Shubh2-0 / Basic JavaThe Basic Java repository is a beginner's guide to Java programming. It includes examples and programs covering object-oriented programming, arrays, methods, and more. Whether you're new to Java or looking to strengthen your skills, this repository is the perfect resource to learn and practice Java programming concepts. 🚀📚
huayaow / DPSOA discrete particle swarm optimization for covering array generation
AdityaBhatt3010 / C Lab ArchiveArchive of 77 foundational C lab programs covering arithmetic, logic, patterns, functions, recursion, arrays, structures, and file handling.
Gagniuc / JavaScript Coding Examples From Simple To ComplexThis book guides the reader from JavaScript fundamentals to advanced applications through 226 worked examples, covering variables, arrays, control flow, multidimensional structures, functions, recursion, objects, JSON, sorting, statistics, signal analysis, logic gates, string alignment, randomness, Markov chains, and browser features.
dcstechnoweb / The Reason Why Everyone Love Mining ToolsAs a rule, mining alludes to the birth of minerals and land accoutrements from the earth, from a gravestone or seal. moment different factors are mended by mining as similar accoutrements aren't developed, horticulturally handled, or misleadingly made. Superb models are precious essence, coal, precious monuments, and gold. Non-inexhaustible sources like ignitable gas, petrol, and indeed water are also booby-trapped. With the application of applicable mining tackle, the vigorous and worrisome undertaking of mining is achieved. Mining is the system involved in disengaging significant minerals and geographical accoutrements. typically, the minerals got from the mining system incorporate earth, coal, aspect gravestone, rock, gemstone, limestone, essence, potash, gemstone swab, and oil painting shale, and that is just the morning. As is generally said, whatever could not be developed through agricultural ways or made in a factory must be booby-trapped. Ever, indeed the birth of ignitable gas, oil painting, and other on-inexhaustible means are also acquired through mining. Mining is a sedulity that has been around for glories. it's been used on an outsized scale since neolithic times and contains long history. Mining makes use of technology so on urge the duty finished effectiveness and through a timely manner. There are numerous several mining tools that should be got used for the duty to be done duly. From the tricks of the trade to plenty of introductory, DCS Techno can give you a regard at completely different mining tools. for several years, the strategy for earning enough to pay the bills was by finding a replacement line of labour and dealing during a mine. Mining tools are a significant tool employed in creating a good kind of minerals from the planet. From the method of rooting minerals, they're also employed in a spread of consumer products. Mining Tools are utilized in the timber of buses, electronics, and jewellery. they're utilized in nearly every hand of society. Presently assuming that you just want to induce minerals from the planet, you need to have the correct apparatuses. Exercising proper and probative gear can make mining tasks more straightforward and more helpful. These are the foundation of any mining association so you should be careful while copping the needed effects. You can browse different tackle, with changing purposes and purposes, to do the errands hastily. Be open and feel free to this gear in the event that you realize it can help with expanding your tasks' effectiveness. The mining business has five significant sections coal mining, gas, and oil painting separating, essence mining, non-metal mining, and supporting exercises. Besides farther developing the exertion sluice, this tackle ought to likewise expand the degree of the well- being of the sloggers hard. As the owner, it's your obligation to take care of their musts. Pre-Historic Mining Early mortal progress has used the world's means through digging for a multifariousness of purposes. an outsized portion of the minerals and components mined in early times were utilized for the assembly of weapons and different devices. During these times, top-notch stone, which happens in masses of sedimentary rocks, was at that time pursued in pieces of Europe. They were utilized as weapons within that period of time. irrespective of the restricted mining gear, Neanderthal men had the choice to quarry and make ad-libbed instruments. Glancing back at history, specialists would affirm that metal and stone mining has been essential for everyday living since antiquated times. In our times, present-day techniques and hardware are being employed to formwork essentially simpler and increment usefulness. these days, the foremost common way of mining includes fundamental advances, recognizing regions where metal bodies are often gotten, dissecting its conceivable benefit, extricating the materials, and afterward recovering the land after the activity is finished up. Obviously, security could be a limitless need, particularly during the mining system itself. Working in such a setting is extremely hazardous thus security estimates should be painstakingly noticed. In view of their riches and influence, the antiquated Egypt civilization was one of the primaries to effectively mine minerals. They were accustomed mine is malachite and gold. The green stones were used for the foremost a part of stoneware and as trimmings. Later on, involving iron devices as mining hardware, they sought minerals, generally gold from Nubia. The stone containing the mineral is ready against a stone face to warm it and afterward drenched with water. Fire-setting was maybe the foremost well-known strategy for mining it slows ago. Mining predisposition is the stuff utilized in eliminating a wide bunch of minerals from the earth. Booby-trapped minerals are employed in enough important every paperback item from vehicles to attack, to gems and also some.These means are acquired using different feathers of mining instruments. Mining Tools are the outfit used in lodging a wide array of minerals from the earth. They range from the most introductory outfit, analogous as shovels and picks, to complex ministry, like drills and crushers. Booby- trapped minerals are used in nearly every consumer product — from motorcars, to electronics, to jewellery and further. They are employed to make everything from plastics to iPads and mobile phones. The mining business is formed out of assorted players, everyone with a basic job to create the work fruitful and compelling. most significantly, the general public authority handles the assignments of overseeing mineral cases moreover as giving investigation grants. Miners, then again, accomplish crafted by using topographical guides and other significant apparatuses to tell apart minerals. Junior investigation organizations are those accountable for testing stores for any attractive metals. Generally speaking, these organizations additionally own working mines. Then, significant mining organizations employ gifted people to accomplish the real work of mining. also flashed back for the rundown are the specialists. These experts handle sophisticated lab work and similar. Administration’s suppliers are likewise significant and they can come in colorful administrations, for illustration, geologists, copter aviators, instructors, and multitudinous others. Gear providers, development associations, assiduity confederations, and fiscal exchange fiscal backers also play their own corridor to satisfy to finish the advanced perspective. It was the Romans who made extraordinary advancements throughout the entire actuality of mining. They were the original bones to use enormous compass quarrying strategies, for illustration, the application of volumes of water to work introductory outfit, exclude trash, etc. This has come to be known as water-fueled mining or hydraulicking. This is a type of mining that utilizes high-constrained shocks of water to move jewels and other residue and detritus. During the 1300s, the interest in essence brands, coverings, and different munitions expanded drastically. further minerals, for illustration, iron, and tableware were extensively excavated. The interest to deliver coins also expanded with the eventual result of causing a lack of tableware. During this period, iron turned into an abecedarian part of structure developments; outfits and other mining gear came pervasive. from open-hole mining, water shops and dark greasepaint have developed into tractors, snares, exchanges, etc. Other mechanical advancements, for illustration, green light rays employed in mining as aphorism attendants and machine arrangements helped diggers with quarrying lands. Feathers of Mining Tools The mining sedulity has a wide compass of endlessly booby-trapping outfits. The mining business is a mind- boggling frame that requires an outfit that not just meets the particular musts of the mining business, yet likewise resolves the issues of the guests. thus, mining associations need gear like cherries on top, safeguards, sizers, the cherry on top pails, gyratory cherries on top, sway cherries on top, and jaw cherries on top. From-noteworthy bias, a huge outfit is presently used to successfully and incontinently uncover lands. These are also used to separate and exclude jewels, indeed mountains. Exceptionally designed gear presently helps in the birth of different precious minerals and other had relations with accoutrements like gypsum and swab. moment, there are as of now five classes of mining coal, essence, on-metallic mineral mining, oil painting, and gas birth. oil painting and gas birth stay to be maybe the topmost business in this present reality. Any intrigued fiscal backer or business person who needs to probe the mining business should communicate to the concerned neighbourhood government workplaces to get some information about the musts. By reaching out to these means, important data will be gotten and every one of the abecedarian advances will be illustrated. Poring the authority spots of mining associations can likewise be useful in realizing mining. Mining is a sedulity that has been around for prodigies. It has been employed on an outsized scale since neolithic times and contains long history. Mining utilizes invention to encourage the obligation to finish with acceptability and as soon as possible. There are colorful mining accoutrements that must be landed employed for the position to be done meetly. From the subtle strategies to a ton of early on, DCS Techno can offer you admire to completely unique mining instruments. From now onward, indefinitely quite a while, the system for making with the end result of dealing with the bills was by finding one more calling and working in a mine Mining instrument are a necessary outfit employed in making a wide multifariousness of minerals from the earth. From the system involved with establishing minerals, they're also employed in a multifariousness of client particulars. Mining Tools are employed in the timber of transports, tackle, and gems. They're employed in basically every hand of society. By and by awaiting that you need to get minerals from the earth, you should have the right bias. Mining inclination is the stuff employed in barring a wide bunch of minerals from the earth. Booby- caught minerals are employed inadequate important every softcover thing from vehicles to handle, to jewels and likewise some. also, minerals like uranium and coal are critical energy sources that record for half of the US's energy force. These coffers are gained exercising colorful awards of mining instruments. Mining Tools are the outfit employed in establishing a wide cluster of minerals from the earth. They range from the most starting outfit, relative as digging tools and picks, to complex tackle, analogous to drills and cherries on top. Booby- caught minerals are employed in nearly every buyer item from transports to widgets, to doodads and further. Mining Industry Overview Mining falls into two classes Surface mining and underground mining. The kind of minerals and mining ways that a mining trouble is trying to suppose will directly enlighten which instruments tractors use in their work. 1.Surface Mining This involves the mining of minerals located at or near the face of the earth. This are the six step processes and these are • Strip Mining- this involves the stripping of the earth's face by the heavy ministry. This system is generally targeted at rooting coal or sedimentary jewels that lay near the earth's face. • Placer Mining- this involves the birth of sediments in beach or clay. It's a simple, old- fashioned way of mining. This system is generally applicable to gold and precious gems that are carried by the inflow of water. • Mountain Top Mining- this is a new system that involves blasting a mountain top to expose coal deposits that lie underneath the mountain crest. • Hydraulic Mining- this is an obsolete system that involves jetting the side of a mountain or hill with high-pressure water to expose gold and another precious essence. • Dredging- it involves the junking of jewels, beaches, and ground underneath a body of water to expose the minerals. • Open hole- this is the most common mining system. It involves the junking of the top layers of soil in the hunt for gold or buried treasure. The miner digs deeper and deeper until a large, open hole is created. 2. Underground Mining This is the process in which a lair is made into the earth to find the mineral ore. The mining operation is generally performed with the use of underground mining outfits. Underground mining is done through the following styles • pitch Mining- it involves the creation of pitches into the ground in order to reach the ore or mineral deposit. This cycle is for the most part applied in coal mining. • Hard gemstone- this system uses dynamite or giant drills to produce large, deep coverts. The miners support the coverts with pillars to help them from collapsing. This is a large- scale mining process and is generally applied in the birth of large bobby, drum, lead, gold, or tableware deposits. • Drift mining- this system is applicable only when the target mineral is accessible from the side of a mountain. It involves the creation of a lair that is slightly lower than the target mineral. The graveness makes the deposit fall to the lair where miners can collect them. • Shaft system- this involves the creation of a perpendicular hallway that goes deep down underground where the deposit is located. Because of the depth, miners are brought in and out of the hole with elevators. • Borehole system- this involves the use of a large drill and high-pressure water to eject the target mineral. These are the introductory styles used in the birth of common minerals. There are more complex systems, but still, they're grounded on these abecedarian processes. To Know more information about Mining Tools Visit: dcstechno Contact us: Plot No 169, Road No.11, Prashasan Nagar, Jubilee Hills, Hyderabad, Telangana – 500096 +91-9849009875
gitKeshav11 / ArrayLogic JavaThis repository contains Java programs covering array fundamentals, logic building, and common problem-solving patterns for beginners.
AbdullahAli2005 / Data Structures And Algorithms In DartA collection of Data Structures and Algorithms (DSA) implemented in Dart, covering essential concepts like arrays, linked lists, trees, graphs, sorting, searching, and more.
fazeelkhalid / Graph Real Time ProblemsPoints: 100 Topics: Graphs, topological sort, freedom to decide how to represent data and organize code (while still reading in a graph and performing topological sort) PLAGIARISM/COLLUSION: You should not read any code (solution) that directly solves this problem (e.g. implements DFS, topological sorting or other component needed for the homework). The graph representation provided on the Code page (which you are allowed to use in your solution) and the pseudocode and algorithm discussed in class provide all the information needed. If anything is unclear in the provided materials check with us. You can read materials on how to read from a file, or read a Unix file or how to tokenize a line of code, BUT not in a sample code that deals with graphs or this specific problem. E.g. you can read tutorials about these topics, but not a solution to this problem (or a problem very similar to it). You should not share your code with any classmate or read another classmate's code. Part 1: Main program requirements (100 pts) Given a list of courses and their prerequisites, compute the order in which courses must be taken so that when taking a courses, all its prerequisites have already been taken. All the files that the program would read from are in Unix format (they have the Unix EOL). Provided files: ● Grading Criteria ● cycle0.txt ● data0.txt ● data0_rev.txt ● data1.txt - like data0.txt but the order of the prerequisite courses is modified on line 2. ● slides.txt (graph image) - courses given in such a way that they produce the same graph as in the image. (The last digit in the course number is the same as the vertex corresponding to it in the drawn graph. You can also see this in the vertex-to-course name correspondence in the sample run for this file.) ● run.html● data0_easy.txt - If you cannot handle the above file format, this is an easier file format that you can use, but there will be 15 points lost in this case. More details about this situation are given in Part 3. ● Unix.zip - zipped folder with all data files. ● For your reference: EOL_Mac_Unix_Windows.png - EOL symbols for Unix/Mac/Windows Specifications: 1. You can use structs, macros, typedef. 2. All the code must be in C (not C++, or any other language) 3. Global or static variables are NOT allowed. The exception is using macros to define constants for the size limits (e.g. instead of using 30 for the max course name size). E.g. #define MAX_ARRAY_LENGTH 20 4. You can use static memory (on the frame stack) or dynamic memory. (Do not confuse static memory with static variables.) 5. The program must read from the user a filename. The filename (as given by the user) will include the extension, but NOT the path. E.g.: data0.txt 6. You can open and close the file however many times you want. 7. File format: 1. Unix file. It will have the Unix EOL (end-of-line). 2. Size limits: 1. The file name will be at most 30 characters. 2. A course name will be at most 30 characters 3. A line in the file will be at most 1000 characters. 3. The file ends with an empty new line. 4. Each line (except for the last empty line) has one or more course names. 5. Each course name is a single word (without any spaces). E.g. CSE1310 (with no space between CSE and 1310). 6. There is no empty space at the end of the line. 7. There is exactly one empty space between any two consecutive courses on the same line. (You do not need to worry about having tabs or more than one empty space between 2 courses.) The first course name on each line is the course being described and the following courses are the prerequisites for it. E.g. CSE2315 CSE1310 MATH1426 ENGL13018. The first line describes course CSE2315 and it indicates that CSE2315 has 2 prerequisite courses, namely: CSE1310 and MATH1426. The second line describes course ENG1301 and it indicates that ENG1301 has no prerequisites. 9. You can assume that there is exactly one line for every course, even for those that do not have prerequisites (see ENGL1301 above). Therefore you can count the number of lines in the file to get the total number of courses. 10.The courses are not given in any specific order in the file. 8. You must create a directed graph corresponding to the data in the file. 1. The graph will have as many vertices as different courses listed in the file. 2. You can represent the vertices and edges however you want. 3. You do NOT have to use a graph struct. If you can do all the work with just the 2D table (the adjacency matrix) that is fine. You HAVE TO implement the topological sorting covered in class (as this assignment is on Graphs), but you can organize, represent and store the data however you want. 4. For the edges, you can use either the adjacency matrix representation or the adjacency list. If you use the adjacency list, keep the nodes in the list sorted in increasing order. 5. For each course that has prerequisites, there is an edge, from each prerequisite to that course. Thus the direction of the edge indicates the dependency. The actual edge will be between the vertices in the graph corresponding to these courses. E.g. file data0.txt has: c100 c300 c200 c100 c200 c100 Meaning: c100-----> c200 \ | \ | \ | \ | \ | \ | V V c300(The above drawing is provided here to give a picture of how the data in the file should be interpreted and the graph that represents this data. Your program should *NOT* print this drawing. See the sample run for expected program output.) From this data you should create the correspondence: vertex 0 - c100 vertex 1 - c300 vertex 2 - c200 and you can represent the graph using adjacency matrix (the row and column indexes are provided for convenience): | 0 1 2 ----------------- 0| 0 1 1 1| 0 0 0 2| 0 1 0 e.g. E[0][1] is 1 because vertex 0 corresponds to c100 and vertex 1 corresponds to c300 and c300 has c100 as a prerequisite. Notice that E[1][0] is not 1. If you use the adjacency list representation, then you can print the adjacency list. The list must be sorted in increasing order (e.g. see the list for 0). It should show the corresponding node numbers. E.g. for the above example the adjacency list will be: 0: 1, 2, 1: 2: 1, 6. 7. In order for the output to look the same for everyone, use the correspondence given here: vertex 0 for the course on the first line, vertex 1 for the course on the second line, etc. 1. Print the courses in topological sorted order. This should be done using the DFS (Depth First Search) algorithm that we covered in class and the topological sorting based on DFS discussed in class. There is no topological order if there is a cycle in the graph; in this case print an error message. If in DFV-visit when looking at the (u,v) edge, if the color of v is GRAY then there is a cycle in the graph (and therefore topological sorting is not possible). See the Lecture on topological sorting (You can find the date based on the table on the Scans page and then watch the video from that day. I have also updated the pseudocodein the slides to show that. Refresh the slides and check the date on the first page. If it is 11/26/2020, then you have the most recent version.) 8. (6 points) create and submit 1 test file. It must cover a special case. Indicate what special case you are covering (e.g. no course has any prerequisite). At the top of the file indicate what makes it a special case. Save this file as special.txt. It should be in Unix EOL format. Part 2: Suggestions for improvements (not for grade) 1. CSE Advisors also are mindful and point out to students the "longest path through the degree". That is longest chain of course prerequisites (e.g. CSE1310 ---> CSE1320 --> CSE3318 -->...) as this gives a lower bound on the number of semesters needed until graduation. Can you calculate for each course the LONGEST chain ending with it? E.g. in the above example, there are 2 chains ending with c300 (size 2: just c100-->c300, size 3: c100-->c200-->c300) and you want to show longest path 3 for c300. Can you calculate this number for each course? 2. Allow the user the enter a list of courses taken so far (from the user or from file) and print a list of the courses they can take (they have all the prerequisites for). 3. Ask the user to enter a desired number of courses per semester and suggest a schedule (by semester). Part 3: Implementation suggestions 1. Reading from file: (15 points) For each line in the file, the code can extract the first course and the prerequisites for it. If you cannot process each line in the file correctly, you can use a modified input file that shows on each line, the number of courses, but you would lose the 15 points dedicated to line processing. If your program works with the "easy files", in order to make it easy for the TAs to know which file to provide, please name your C program courses_graph_easy.c. Here is the modification shown for a new example. Instead of c100 c300 c200 c100 c200 the file would have: 1 c1003 c300 c200 c100 1 c200 1. that way the first data on each line is a number that tells how many courses (strings) follow after it on that line. Everything is separated by exactly one space. All the other specifications are the same as for the original file (empty line at the end, no space at the end of any line, length of words, etc). Here is data0_easy.txt Make a direct correspondence between vertex numbers and course names. E.g. the **first** course name on the first line corresponds to vertex 0, the **first** course name on the second line corresponds to vertex 1, etc... 2. 3. The vertex numbers are used to refer to vertices. 4. In order to add an edge in the graph you will need to find the vertex number corresponding to a given course name. E.g. find that c300 corresponds to vertex 1 and c200 corresponds to vertex 2. Now you can set E[2][1] to be 1. (With the adjacency list, add node 1 in the adjacency list for 2 keeping the list sorted.) To help with this, write a function that takes as arguments the list/array of [unique] course names and one course name and returns the index of that course in the list. You can use that index as the vertex number. (This is similar to the indexOf method in Java.) 5. To see all the non-printable characters that may be in a file, find an editor that shows them. E.g. in Notepad++ : open the file, go to View -> Show symbol -> Show all characters. YOU SHOULD TRY THIS! In general, not necessarily for this homework, if you make the text editor show the white spaces, you will know if what you see as 4 empty spaces comes from 4 spaces or from one tab or show other hidden characters. This can help when you tokenize. E.g. here I am using Notepad++ to see the EOL for files saved with Unix/Mac/Windows EOL (see the CR/LF/CRLF at the end of each line): EOL_Mac_Unix_Windows.png How to submit Submit courses_graph.c (or courses_graph_easy.c) and special.txt (the special test case you created) in Canvas . (For courses_graph_easy.c you can submit the "easy" files that you created.)Your program should be named courses_graph.c if it reads from the normal/original files. If instead it reads from the 'easy' files, name it courses_graph_easy.c As stated on the course syllabus, programs must be in C, and must run on omega.uta.edu or the VM. IMPORTANT: Pay close attention to all specifications on this page, including file names and submission format. Even in cases where your answers are correct, points will be taken off liberally for non-compliance with the instructions given on this page (such as wrong file names, wrong compression format for the submitted code, and so on). The reason is that non-compliance with the instructions makes the grading process significantly (and unnecessarily) more time consuming. Contact the instructor or TA if you have any questions
RashadTanjim / Data Structure And AlgorithmsA collection of DSA problems with detailed solutions, covering arrays, linked lists, recursion, sorting, searching, dynamic programming, trees, graphs, and more. Perfect for lab assignments and interview prep!