infix to postfix c pgm. CLICK HERE
18EEEP201 for 3rd Semester 18EEEP301 for 5th Semester Department of Electrical & Electronics Engineering KLE Technological University, Vidyanagar, Hubballi.
Wednesday, 28 November 2018
Tuesday, 27 November 2018
LAB EXPERIMENTS FOR FINALS 3rd and 5th SEM
CONDUCTION OF FOLLOWING EXPERIMENTS.
VIVA WILL BE ASKED ON ANY TOPIC INCLUDING DEFINITIONS, OPERATIONS, ASYMPTOTIC ANALYSIS.
1. STACKS - C PROGRAM ON BASIC OPERATIONS OF STACK, C PROGRAM ON INFIX TO POSTFIX CONVERSION.
2. QUEUES - C PROGRAM ON LINEAR QUEUE, C PROGRAM ON CIRCULAR QUEUE.
3. LINKED LIST - C PROGRAM ON SINGLY LINKED LIST, C PROGRAM ON DOUBLY LINKED LIST.
4. TREES - C PROGRAM ON CREATION OF BINARY SEARCH TREE (BST) AND BST TRAVERSALS,
C PROGRAM ON CREATION OF BST AND FINDING MIN, MAX VALUES IN BST, HEIGHT OF BST.
5. SORTING - C PROGRAM ON MERGE SORT, C PROGRAM ON QUICK SORT, C PROGRAM ON HEAP SORT.
VIVA WILL BE ASKED ON ANY TOPIC INCLUDING DEFINITIONS, OPERATIONS, ASYMPTOTIC ANALYSIS.
1. STACKS - C PROGRAM ON BASIC OPERATIONS OF STACK, C PROGRAM ON INFIX TO POSTFIX CONVERSION.
2. QUEUES - C PROGRAM ON LINEAR QUEUE, C PROGRAM ON CIRCULAR QUEUE.
3. LINKED LIST - C PROGRAM ON SINGLY LINKED LIST, C PROGRAM ON DOUBLY LINKED LIST.
4. TREES - C PROGRAM ON CREATION OF BINARY SEARCH TREE (BST) AND BST TRAVERSALS,
C PROGRAM ON CREATION OF BST AND FINDING MIN, MAX VALUES IN BST, HEIGHT OF BST.
5. SORTING - C PROGRAM ON MERGE SORT, C PROGRAM ON QUICK SORT, C PROGRAM ON HEAP SORT.
Tuesday, 6 November 2018
STRUCTURED ENQUIRY FOR 3RD AND 5TH SEM
STRUCTURED ENQUIRY
MARKS BASED ON FOLLOWING:
1. DEMONSTRATION / EXECUTION OF PROGRAM(S) TO RESPECTIVE STAFF.
2. REPORT OF 10-20 PAGES PER TEAM, WITH FOLLOWING CONTENTS:
- FRONT PAGE
- CERTIFICATE
- CHAPTERS - 1. INTRODUCTION, 2. PROBLEM STATEMENT, 3. ANALYSIS, 4. DESIGN, 5. IMPLEMENTATION, 6. RESULT AND OUTCOMES.
FONT - TIMES NEW ROMAN.
FONT SIZE: CHAPTER NAME - 18, HEADING - 16, SUB HEADING - 14, CONTENT - 12.
LINE SPACING - 1.5
1. Design a Program to store the details of a function call as a frame of data. Data in a frame should include function name, return type, arguments passed to a function. Maintain the starting address of every frame. Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap).
2. Consider a mouse trapped in a maze, trying to find the exit:
This mouse can only move right, left, down, or up—one step at a time. It applies the following procedure:
-> Try moving right, left, down, and up If a route beginning with any one of these fails,
-> Try a new route that starts in an untried direction.
The maze is implemented as a 2D array of char’s. 1 = wall, 0 = open, m = mouse’s initial position, e = exit (could be anywhere), .(dot) = visited location. We assume the boundaries of the array are walls.
Find out appropriate data structure to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap).
3. Design an input restricted double ended queue for which only the operations removeleft, removeright, and insertleft are valid. And an output restricted double ended queue for which only removeleft, insertleft and insertright are valid.
Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap).
4. Design a C program to simulate a simple multiuser computer system as follows: Each user has unique ID and wishes to perform a number of transactions on the computer. Only one transaction may be processed by the computer at any given moment. Each input line represents a single user and contains user's ID followed by a starting time and a series of integers representing the duration of each of his or her transactions. The input is sorted by increasing starting time, and all the times and durations are in seconds. Assume a user does not request time for a transaction until the previous transaction is complete and computer accepts transactions based on First Come First Served basis. The program should simulate system and print a message containing user ID and time whenever a transaction begins and ends. At the end of simulation it should print the average waiting time for a transaction. ( Waiting time is amount of time between time that the transaction was requested and time it was started).
Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap, sorting algorithms). Justify your solution.
5. Design a program to implement a polynomial equation having 3 variables (x, y and z). Each node should represent a term and should contain the powers of x, y and z as well as coefficient of that term. Program should have following functions:
a. Add two such polynomials.
b. Multiply two such polynomials.
c. Take partial derivative of such polynomial with respect to any of its variables.
d. Evaluate such polynomial for given values of x, y and z.
e. Divide one such polynomial by another, creating a quotient polynomial.
f. Print the representation of such a polynomial.
Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap, sorting algorithms). Justify your solution.
6. Design a C program to perform following operations on a binary tree.
a. Accept a pointer to a node and return TRUE if that node is root of valid tree and FALSE otherwise.
b. Accept a pointer to a node of a tree, and return level of that node in the tree.
c. Accept pointer to a tree and return a pointer to a new tree that is mirror image of the first tree ( i.e. all left sub trees are now right subtrees and vice versa).
Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap, sorting algorithms). Justify your solution.
TEAMS
3A 3B
MARKS BASED ON FOLLOWING:
1. DEMONSTRATION / EXECUTION OF PROGRAM(S) TO RESPECTIVE STAFF.
2. REPORT OF 10-20 PAGES PER TEAM, WITH FOLLOWING CONTENTS:
- FRONT PAGE
- CERTIFICATE
- CHAPTERS - 1. INTRODUCTION, 2. PROBLEM STATEMENT, 3. ANALYSIS, 4. DESIGN, 5. IMPLEMENTATION, 6. RESULT AND OUTCOMES.
FONT - TIMES NEW ROMAN.
FONT SIZE: CHAPTER NAME - 18, HEADING - 16, SUB HEADING - 14, CONTENT - 12.
LINE SPACING - 1.5
1. Design a Program to store the details of a function call as a frame of data. Data in a frame should include function name, return type, arguments passed to a function. Maintain the starting address of every frame. Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap).
2. Consider a mouse trapped in a maze, trying to find the exit:
This mouse can only move right, left, down, or up—one step at a time. It applies the following procedure:
-> Try moving right, left, down, and up If a route beginning with any one of these fails,
-> Try a new route that starts in an untried direction.
The maze is implemented as a 2D array of char’s. 1 = wall, 0 = open, m = mouse’s initial position, e = exit (could be anywhere), .(dot) = visited location. We assume the boundaries of the array are walls.
Find out appropriate data structure to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap).
3. Design an input restricted double ended queue for which only the operations removeleft, removeright, and insertleft are valid. And an output restricted double ended queue for which only removeleft, insertleft and insertright are valid.
Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap).
4. Design a C program to simulate a simple multiuser computer system as follows: Each user has unique ID and wishes to perform a number of transactions on the computer. Only one transaction may be processed by the computer at any given moment. Each input line represents a single user and contains user's ID followed by a starting time and a series of integers representing the duration of each of his or her transactions. The input is sorted by increasing starting time, and all the times and durations are in seconds. Assume a user does not request time for a transaction until the previous transaction is complete and computer accepts transactions based on First Come First Served basis. The program should simulate system and print a message containing user ID and time whenever a transaction begins and ends. At the end of simulation it should print the average waiting time for a transaction. ( Waiting time is amount of time between time that the transaction was requested and time it was started).
Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap, sorting algorithms). Justify your solution.
5. Design a program to implement a polynomial equation having 3 variables (x, y and z). Each node should represent a term and should contain the powers of x, y and z as well as coefficient of that term. Program should have following functions:
a. Add two such polynomials.
b. Multiply two such polynomials.
c. Take partial derivative of such polynomial with respect to any of its variables.
d. Evaluate such polynomial for given values of x, y and z.
e. Divide one such polynomial by another, creating a quotient polynomial.
f. Print the representation of such a polynomial.
Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap, sorting algorithms). Justify your solution.
6. Design a C program to perform following operations on a binary tree.
a. Accept a pointer to a node and return TRUE if that node is root of valid tree and FALSE otherwise.
b. Accept a pointer to a node of a tree, and return level of that node in the tree.
c. Accept pointer to a tree and return a pointer to a new tree that is mirror image of the first tree ( i.e. all left sub trees are now right subtrees and vice versa).
Find out appropriate data structures to be used to solve the problem. If appropriate data structure found, implement the program, if not, justify your answer why the following data structure cannot be used to implement. (Analyze using Stack, Queue, Linked List (singly/doubly), Tree, Heap, sorting algorithms). Justify your solution.
TEAMS
3A 3B
NO | ROLL NOS. | ROLL NOS. |
1 | 1 to 7 | 73 to 79 |
2 | 8 to 13 | 80 to 86 |
3 | 14 to 19 | 87 to 94 |
4 | 20 to 26 | 95 to 102 |
5 | 27 to 33 | 103 to 110 |
6 | 34 to 39 | 111 to 119 |
1 | 40 to 47 | 121 TO 127 |
2 | 48 to 56 | 128 TO 134 |
3 | 57 to 62 | 135 TO 141 |
4 | 63 to 68 | 142 TO 154 |
5 | 25, 43, 51, 69 to 72 | 155 TO 160 |
|
Subscribe to:
Posts (Atom)
INFIX TO POSTFIX C PGM
infix to postfix c pgm. CLICK HERE
-
TO ACCESS PPT - CLICK HERE TO VIEW PPT TO ACCESS PDF BOOK - LET US C BY YK - CLICK HERE DATA STRUCTURES NOTES FIRST SESSION. INTRODUC...
-
DS LAB - SEMINAR TOPICS - for 3rd and 5th Sem. Every topic should have 1. Theory / Concept 2. Algor...
-
DS LAB MINOR - 2 WILL BE SCHEDULED ALONG WITH REGULAR MINOR - 2 EXAMS FOR BOTH 3RD AND 5TH SEM (EXCEPT DIPLOMA STUDENTS ). DURATION - 1H...