Remote Controlled (RC) Airplane
An in-depth coverage of resources for building a rc plane.
An in-depth coverage of resources for building a rc plane.
Given a set of locations on Openstreetmap, we solve the traveling salesman problem to find shortest routing between those locations.
A tutorial on creatin a typewriter effect in the atom editor. This is a very useful effect to create educational presentations and videos.
Learn how how attackers spoof emails using a simple PHP script and how to detect them.
What to expect once this policy goes into effect? Suggestions on opensource ecosystem.
Advanced high school level introduction to binomial theorem for competitive exams.
Advanced high school level introduction to sequence and series for competitive exams.
When we say an event is improbable, it does not mean that the event is impossible. Improbable events are those that have zero measure.
Have you wondered how big platforms like Google, Amazon, or YouTube deliver massive amount of data to their users? Read this article to understand various strategies.
What’s the maximum number of knights you can place on a chessboard so that none of them attack each other?
A matrix puzzle based on pigeonhole principle is described and analyzed.
Lecture notes for network theory course at Indian Institute of Technology, Bombay
Lecture notes for control system course at Indian Institute of Technology, Bombay
Lecture notes for the microprocessors course conducted at Indian Institute of Technology, Bombay
Lecture notes for the electromagnetic waves course conducted at Indian Institute of Technology, Bombay
Lecture notes for the digital signal processing course conducted at Indian Institute of Technology, Bombay
Lecture notes for the digital electronics course conducted at Indian Institute of Technology, Bombay
Lecture notes for the digital communications course conducted at Indian Institute of Technology, Bombay
Lecture notes for the computer vision course conducted at Indian Institute of Technology, Bombay
Lecture notes for the communication systems course conducted at Indian Institute of Technology, Bombay
Lecture notes for the optimization course conducted at Indian Institute of Technology, Bombay
Lecture notes for the optimal control systems course conducted at Indian Institute of Technology, Bombay
Lecture notes for the multivariable control systems course conducted at Indian Institute of Technology, Bombay
Lecture notes for the signals and systems course conducted at Indian Institute of Technology, Bombay
Lecture notes for the stochastic and networked control course conducted at Indian Institute of Technology, Bombay
Lecture notes for the switched and hybrid systems course conducted at Indian Institute of Science, Bangalore
Lecture notes for the systems theory course conducted at Indian Institute of Technology, Bombay
यह एक साधारण पहेली है जो हमारे दिमाग के ज़रूरत से ज़्यादा सोचने की प्रवृत्ति को दिखाती है। यह पहेली आमतौर पर इंटरव्यू के दौरान पूछी जाती है, ताकि यह देखा जा सके कि उम्मीदवार किसी समस्या को नए दृष्टिकोण से हल करने के लिए कितना तैयार है।
Tutorial on setting up an API management system using Kong (an open-source API gateway) with FastAPI (a modern Python web framework) to create, manage, and secure your API endpoints.
Bitchat is a decentralized, peer to peer Bluetooth-based messaging application developed by Jack Dorsey. The article discusses essential building blocks of the Bitchat messaging app.
Scinet is a successor of Scihub, a platform for free access to research papers. The article elaborates how Scihub works and the need to launch Scinet.
The article studies the problem of fitting shapes on a metal using efficiently to minimize wastage.
Discrete optimization deals with optimization of a discrete-domain function. The objective is to maximize or minimize the function over its domain. The domain may be subjected to additional constraints. Due to discrete domain, functions cannot be optimized by taking its derivative. This makes the problem challenging compared to the optimization of functions with continuous domain.
Importance of mathematics for aspiring computer scientists and software developers
A simple puzzle to demonstrate overthinking of our brain. The puzzle is typically asked during interviews to check their preparedness to approach a problem from a fresh perspective.
We study an interesting, counter-intuitive result in random walk using theory of Markov chain and recurrence.
We use a puzzle to understand the concept of Eulerian path. This is followed by conditions for existence of Eulerian path for any shape.
This tutorial covers implementation of server-side pagination using JavaScript and PHP to deal with large databases as loading all data at once can slow down a webpage.
We illustrate the problem of selecting a random chord on a unit circle to motivate the need for a modern axiomatic approach to probability theory.
We explore popular board games that can be used to engage groups and get them to reduce their screen time.
First mover advantage refers to strategic advantage gained in a game by making the first move. In this article, we study a simple board game to understand moving first may or may not be always advantageous.
This article outlines the steps to scale a website for handling increased traffic.
Web hosting refers to the service that allows individuals and organizations to store their websites and make them accessible on the internet. Whereas a server is a physical or virtual machine that stores website data and serves it to users on the internet when they request it. This guide will help us understand the terminologies associated with a web hosting package.
LAMP stands for Linux, Apache, MySQL (or MariaDB), and PHP, a widely used stack for hosting dynamic websites and web applications.
भारत में ऑनलाइन स्कैम्स तेजी से बढ़ रहे हैं, और इंटरनेट का इस्तेमाल बढ़ने के साथ इन धोखाधड़ी के तरीके भी जटिल होते जा रहे हैं। इन स्कैम्स से बचने के लिए जागरूकता, सतर्कता, और सुरक्षा उपायों का पालन करना बेहद ज़रूरी है।
ओपन-सोर्स प्लेटफ़ॉर्म वे सिस्टम या सॉफ़्टवेयर होते हैं जिनका स्रोत कोड सार्वजनिक रूप से उपलब्ध होता है, जिससे कोई भी इसे निरीक्षण, संशोधित और वितरित कर सकता है। हमारा मानना है कि ओपन सोर्स प्लेटफ़ॉर्म, प्रोपाइटरी और केंद्रीकृत प्लेटफ़ॉर्म की तुलना में, दुष्ट तत्वों द्वारा सेंसरशिप के प्रति कम संवेदनशील होते हैं। आइए समझते हैं क्यों।
Are open source platforms less vulnerable to censorship by malicious entities compared to proprietary, centralized platforms? We also review some examples of malicious regulation by centralized platforms.
An SSL (Secure Sockets Layer) certificate encrypts data to ensure privacy and security while browsing a website.
ओपन-सोर्स, विकेंद्रीकृत और सेल्फ-होस्टेड विकल्प डेटा सुरक्षा को बढ़ाने के लिए एक मजबूत समाधान प्रदान करते हैं। ये विकल्प अधिक पारदर्शिता, नियंत्रण और गोपनीयता प्रदान करते हैं, जिससे वे उन व्यक्तियों और संगठनों के लिए उपयुक्त हैं जो अपने डेटा को सुरक्षित रखना चाहते हैं।
यूट्यूब पर विज्ञापनों को हटाने के कई तरीके उपलब्ध हैं। इनमें यूट्यूब प्रीमियम सब्सक्रिप्शन लेना, एडब्लॉकर एक्सटेंशन इंस्टॉल करना, और एडब्लॉकिंग सॉफ़्टवेयर का उपयोग करना शामिल है। आप वीपीएन के साथ डीएनएस फिल्टरिंग का उपयोग कर सकते हैं या मॉडेड यूट्यूब ऐप्स का विकल्प चुन सकते हैं। इसके अलावा, प्राइवेसी-केंद्रित टूल्स का भी उपयोग किया जा सकता है।
ऐक्टिविटीपब (ActivityPub) एक ओपन-सोर्स प्रोटोकॉल है, जिसे सोशल नेटवर्किंग प्लेटफ़ॉर्म और वेब एप्लिकेशन के बीच डेटा साझा करने और आपस में कनेक्ट होने के लिए डिज़ाइन किया गया है। यह एक विकेंद्रीकृत प्रणाली है, जिसका मतलब है कि इसमें कोई केंद्रीय सर्वर नहीं होता, बल्कि हर प्लेटफ़ॉर्म (जैसे Mastodon, PeerTube, आदि) अपने सर्वर पर चलता है।
ओपन सोर्स (Open Source) एक ऐसा सॉफ़्टवेयर है जिसका स्रोत कोड (Source Code) सार्वजनिक रूप से उपलब्ध होता है। इसका मतलब यह है कि कोई भी व्यक्ति उस सॉफ़्टवेयर के कोड को देख सकता है, उपयोग कर सकता है, सुधार सकता है और इसे साझा कर सकता है। ओपन सोर्स सॉफ़्टवेयर को मुफ्त में डाउनलोड और उपयोग किया जा सकता है।
वर्डप्रेस (WordPress) एक लोकप्रिय और शक्तिशाली प्लेटफ़ॉर्म (platform) है, जिसका उपयोग करके आप आसानी से अपनी वेबसाइट (website) बना सकते हैं। इसका उपयोग करना आसान है और यह आपको बिना कोडिंग (coding) के अपनी वेबसाइट डिज़ाइन और प्रबंधित करने की सुविधा देता है।
Open-source, decentralized, and self-hosted technology solutions are ideal for enhancing data security, as they offer greater control, transparency, and protection against central points of failure.
Free tools and resources for creating and editing content, including graphic design, digital painting, video editing, royalty-free media, screen recording, and live streaming.
A comparison of client-side and server-side scripts for generating website content with focus on user-friendliness and search engine discoverability.
Best practices for search engine optimization and free site auditing tools.
A tutorial on hosting a free website on Github and cutomizing domain name.
A novel non-parametric change detection algorithm to identify eclipse attacks on a blockchain network; the non-parametric algorithm relies only on the empirical mean and variance of the dataset, making it highly adaptable.
We design a truth-telling principal-agent problem to assign PoW difficulty levels to agents as a function of their computing power. The rate control mechanism is achieved by compensating a higher PoW difficulty level with a larger weight/reputation for the transaction.
Algorithm for Kilobots to collaboratively form a given shape. A finite state machine based framework is utilized to breakdown the problem into two essential components. The first component comprises of an orbiting algorithm to allow Kilobots to reach their desired location, and the second, a localization mechanism to identify its relative position.
A literature survey of several game theoretic models to study the benefit of coalition for electricity consumers under different pricing models.
SVM generates an optimal separating hyperplane (by maximizing the margin) to sequester two class of data using a constrained quadratic convex optimization formulation. Log-barrier method is an interior point method used to convert an inequality constrained optimization problem to an approximate constrained problem using a logarithmic penalty function.
Design and control of a multi-output flyback converter.
Extension of the Hough transform algorithm to detect an arbitrary, non-parameteric shapes with scaling. The algorithm uses gradient information around the centroid of the non-parameteric shape to accumulate bin array. Thresholding the bin array gives the centroid of detected shape.
Algorithm to stitch multiple images obtained from arbitrary motion of a camera.
A comprehensive approach for modelling of dynamic hysteresis loops in rolling and transverse direction. This work uses the magnetic viscosity-based approach, which is able to describe irregular widening of dynamic loops. The loss separation scheme is also considered for both principal directions. Variations of loss components with frequency for both directions are discussed.
Design of an interface between Keithley Source Measure Unit (SMU) and Labview for two probe and four probe measurements of nano wire networks using probe station. Also, an interface to perform voltage and frequency sweep for small voltage signal using LCR meter is designed.
Design of a data acquisition system using ADC and FPGA for Epstein testers to record hysteresis loop of magnetic materials.
Design of a 6 stage, pipelined, 16-bit processor on FPGA.
Algorithm to extract depth information from more than two image sets, thereby, improving accuracy of depth map. Depth map set, obtained from all valid pair of images, is averaged out to reduce number of unresolved pixels in final depth map.
A python based software on Beaglebone black to debug and validate mock-up circuit design on breadboard.
Comparison of efficiency of K-mean and C-mean clustering algorithms on satellite images.