DevHeads IoT Integration Server

DII

DevHeads IoT Integration Server

The DevHeads IoT Integration Server accelerates technology engineering by helping pro devs learn, share and collaborate.

Join
nour_oud
nour_oud5/5/2024

Solves a Sudoku puzzle < C++>

What will be the output of this code? ```C++ #include <iostream> #include <vector>...
Solution:
nour_oud
nour_oud4/28/2024

Coding Challenges < Python >

What will be the output of this code? ```python def count_subsets(nums, target): memo = {}...
Solution:
No , it’s 3 😌
nour_oud
nour_oud4/21/2024

Coding Challenges < Python >

What will be the output of this code? ```python def find_combinations(nums, target):...
Solution:
[7] [2, 2, 3]...
nour_oud
nour_oud4/14/2024

Coding Challenges < C >

What will be the output of this program when n is 50? ```C #include <stdio.h> ...
Solution:
Fibonacci Sequence up to 50: 0 1 1 2 3 5 8 13 21 34...
nour_oud
nour_oud4/7/2024

Coding Challenges < C >

What will be the output of this program when num is 5? ```C #include <stdio.h> int computeSum(int n) {...
Solution:
the answer is 15
nour_oud
nour_oud3/31/2024

Caesar's Cipher

Julius Caesar protected his confidential information by encrypting it using a cipher. Caesar's cipher shifts each letter by a number of letters. If the shift takes you past the end of the alphabet, just rotate back to the front of the alphabet. In the case of a rotation by 3, w, x, y and z would map to z, a, b and c. Create a function that takes a string s (text to be encrypted) and an integer k (the rotation factor). It should return an encrypted string. Resources...
nour_oud
nour_oud3/24/2024

Coding Challenges <C++>

What will this program output? ```c++ #include <iostream> ...
Solution:
|| I'm sorry, my post will be long. I just want to follow the code process Inside factorial(10) fac(10) -> ret 10 * fac(9) -> 10 * 362,880 = 3,628,800...
nour_oud
nour_oud3/17/2024

Fibonacci Word C# Coding Challenge

A Fibonacci Word is a specific sequence of binary digits (or symbols from any two-letter alphabet). The Fibonacci Word is formed by repeated concatenation in the same way that the Fibonacci numbers are formed by repeated addition. Create a function that takes a number n as an argument and returns the first n elements of the Fibonacci Word sequence. If n < 2, the function must return "invalid". Examples...
scitechindian
scitechindian3/13/2024

Does anybody have a solution for the Raspberry Pi 4 and Pi Camera v1.3 , its not detecting

I have tried to connect Pi camera Rev 1.3 to Pi 4 and software doesn't have the legacy camera option which used to be there, does any on have solution for it :salute:
nour_oud
nour_oud3/10/2024

Tic Tac Toe C++ Coding Challenge

Create a function that takes an array of char inputs from a Tic Tac Toe game. Inputs will be taken from player1 as "X", player2 as "O", and empty spaces as "#". The program will return the winner or tie results. Examples ```...
Solution:
```c++ #include <iostream> #include <vector> ...
nour_oud
nour_oud3/3/2024

Coding Challenge < Python >

Write a program to solve a classic ancient Chinese puzzle: We count 35 heads and 94 legs among the chickens and rabbits in a farm. How many rabbits and how many chickens do we have?...
Solution:
def solve(numheads,numlegs): ns='No solutions!' for i in range(numheads+1): j=numheads-i if 2i+4j==numlegs:...
nour_oud
nour_oud2/25/2024

The Arduino Puzzle Box Challenge

Objective: Design and construct an interactive puzzle box that incorporates various sensors and output devices, controlled by an Arduino. The puzzle box should require the user to complete a series of tasks involving light, sound, and distance sensors to unlock it. Creativity in the design and complexity of the tasks is encouraged to test the user's problem-solving skills and understanding of embedded systems. Project Requirements: 1. Design Overview:...
nour_oud
nour_oud2/18/2024

Coding Challenge " Password Cracker "

This challenge is to build your own version of John the Ripper or CrackStation. These are password cracking tools that can be used to recover passwords, by penetration testers and of course bad guys. We’re going to take a look at them because they provide an interesting way of learning several different things - you can pick and choose where you focus from the list: 🇦 How to implement cryptographic hash functions - you can build these by hand if learning how to code them interests you, otherwise you can use the ones available for your programming language....
nour_oud
nour_oud2/11/2024

Coding Challenge < C++ >

What will this program output? ```C++ #include <iostream> ...
nour_oud
nour_oud2/4/2024

Coding challenge ( rust)

Give it a try and see if you can predict the output of this Rust program. ```rust use std::collections::HashMap;...
nour_oud
nour_oud1/28/2024

" Arduino Blink " Challenge

Write an Arduino sketch that blinks an LED connected to pin 13 with a 500ms ON and 500ms OFF time.
Yash Naidu
Yash Naidu1/25/2024

Swap Odd and Even Bits

Write a C function to swap all odd and even bits in an unsigned integer. Bit positions 0, 2, 4, ... are considered even bits, and positions 1, 3, 5, ... are odd bits. Ex input: 10101010 (in binary), Expected O/P: 01010101. ...
nour_oud
nour_oud1/21/2024

Challenge of the day " C++"

What will this program output ? ```C++ #include <iostream> ...
nour_oud
nour_oud12/21/2023

Problem : Time-Sensitive Data Logging with Edge Processing

Context: Your IoT device collects time-sensitive data that needs to be logged with high precision and analyzed locally at the edge. Challenge: Ensure accurate time stamping of data points, even with potential network delays or disruptions. Objective: Utilize the RTC for precise time stamping, implement local data storage and processing capabilities, and handle potential time synchronization issues upon reconnection....
nour_oud
nour_oud12/11/2023

Coding Challenge (C amd64 Linux)

What does this output and how does it work? ```C #include <stdio.h> ...
Next