Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Programming Articles
Page 1795 of 2547
Applications, Advantages and Disadvantages of Directed Graph
Diverse domains, including CS, social networks, and logistics, use directed graphs, also known as digraphs. Arrows indicating the direction of links serve to depict the interconnections between the various components. They have the ability to represent intricate connections, handle data quickly, and facilitate pathfinding algorithms. Their drawbacks, however, include the potential for analysis complexity, the challenge of visualising vast graphs, and the requirement for cautious treatment of cyclic structures. Despite these drawbacks, directed graphs continue to be fundamental tools for comprehending, evaluating, and enhancing interconnected systems in a variety of real−world contexts. Methods Used Topological Sorting Strongly Connected Components ...
Read MoreApplications, Advantages and Disadvantages of Graph
Graphs are used in different disciplines. They are utilised in biology to represent gene interactions, in transportation for route optimisation, and in social networks for user connection analysis. The visual representation of intricate relationships and the capacity to see patterns and trends are two benefits of graphs. However, dealing with large datasets can make graphs bulky and difficult to understand. Additionally, creating graphs can take time and necessitate knowledge. Despite these drawbacks, graphs continue to be an effective tool for data analysis and decision−making across a range of disciplines. Methods Used Set Representation Linked Representation Sequential Representaion Set ...
Read MoreCount of Nodes Accessible from all Other Nodes of Graph
The number of nodes that may be reached from any particular node in a graph is called as the count of nodes accessible from all other nodes in the graph. It shows the degree of reachability and connectivity inside the graph. We start at each node and investigate all accessible routes to other nodes in order to get this count.The nodes we can access are recorded as we move across the graph. The count of reachable nodes in the graph includes all nodes that can be reached. This is vital for understanding network relationships and information flow efficiency. Methods Used ...
Read MoreHow to validate IFSC Code using Regular Expression?
Indian Financial System Code is the abbreviation. Indian bank branches that take part in the electronic fund transfer system are identified by a special 11-character code. The Reserve Bank of India uses this code to transfer money between banks during internet transactions. There are two sections to the IFSC code. The bank is identified by the first four characters, whereas the branch is identified by the final six characters. NEFT (National Electronic Funds Transfer), RTGS (Real Time Gross Settlement), and IMPS (Immediate Payment Service) are just a few of the electronic transactions that require IFSC codes. Method Some general methods ...
Read MorePrint all the non-repeating words from the two given sentences
In this tutorial, we will identify and print all non-repeating words from two given sentences. Non-repeating words refer to words that appear only once in both sentences, means they do not repeat in other sentence. The task involves analysis of the input sentences, identification of the individual words, and comparing them across both sentences to find which ones appear only once. The output should be a list of all such words. This task can be accomplished through various programming approaches, such as using loops, arrays, or dictionaries. Methods Here are the two methods to print all the non-repeating words from ...
Read MorePermutation of a string with maximum number of characters greater than its adjacent characters
It is crucial to manipulate strings in various problem-solving scenarios. Discovering a permutation of the given string that optimizes the count of characters larger than their contiguous counterparts presents an enjoyable puzzle, requiring rearranging the string's characters to generate as many pairs as possible of adjacent characters where the left character is lesser than the right. Methods There are several methods to solve permutations of a string where maximum number of characters is more than characters immediately adjacent to them. Method 1 − Backtracking with Pruning − Method 2 − Dynamic Programming− Method 3 − Heap's Algorithm− Method 4 ...
Read MoreWhy does an online Judge crash during an online Programming Contest?
We all are well aware are that now-a-days various coding platforms include competitive codings, for example GeeksforGeeks, CodeChef, Codeforces, atCoder, SPOJ, HackerRank, HackerEarth, and many more where they supposed to code out by themselves by either attaching local editor file such as a sublime editor or by directly writing on their respective editors. So how are these test cases getting accessed or in an easy way we can say that our code is getting compiled and run? On these programming platforms for competitive programming online judges act as the backbone for code compilation and run. Online Judge To judge ...
Read MoreLeft Shift Operator in Java
The execution of instructions in programming languages involves the operation of various symbols referred to as "operators." Operators tell computers what action/value evaluation should be performed throughout set codes. Arithmetic-based operates consist of performing essential calculations like addition/subtraction/multiplication/division. Played out with relational-oriented operates that indicate interactions between any two values and analyzes when one is greater/equal/less with regards to another value - showing its relevance under certain conditions. Logical-operates' primary role often includes merging diverse quality statements into significant arguments either as True/False statement criteria based on developers' intentions efficiently using all three indispensable operator types. Left Shift Operator in ...
Read MoreWhich Data Type cannot be stored in Java ArrayList?
An ArrayList is a dynamic list of objects and you can't store primitive values like int, double, char or long in an ArrayList. The creation of wrapped class in java allows for holding of primitive data types and each object belonging to these types holds a single value for its respective primitive data type (int, double short or byte).To work with primitive data types in Java structures like JLists or ArrayLists which require objects, we need to use wrappers, and this article explains how to use ArrayList to store simple data types such as int and char. Primitive Data types ...
Read MoreAsynchronous and synchronous callbacks in Java
Sun Microsystems initially introduced Java, a programming language and computing platform, in 1995. It has grown from its modest origins to power a significant portion of the digital world of today by offering the solid foundation upon which numerous services and applications are developed. Java is still used in cutting-edge goods and digital services that are being developed for the future. What is Asynchronous and Synchronous in Java? Java's asynchronous programming paradigm enables teams to distribute workload and develop application features apart from the main application thread. The code is then synchronised with the main thread when the team is ...
Read More