DII

## The DevHeads IoT Integration Server accelerates technology engineering by helping pro devs learn, share and collaborate.

Join

seeking-collabs

firmware-and-baremetal

middleware-and-os

edge-networking

pcb-and-analog

jobs

iot-cloud

code-review

general-dev-chat

data buffering when connectivity is lost

This topic is to share with how you manage your application and how you deal with it in case the connectivity is lost, and what you do when the connection is established ?

Solves a Sudoku puzzle < C++>

What will be the output of this code? ```C++ #include <iostream> #include <vector>...
Solution:

Coding Challenges < Python >

What will be the output of this code? ```python def count_subsets(nums, target): memo = {}...
Solution:
No , it’s 3 😌

Coding Challenges < Python >

What will be the output of this code? ```python def find_combinations(nums, target):...
Solution:
[7] [2, 2, 3]...

Coding Challenges < C >

What will be the output of this program when n is 50? ```C #include <stdio.h> ...
Solution:
Fibonacci Sequence up to 50: 0 1 1 2 3 5 8 13 21 34...

Coding Challenges < C >

What will be the output of this program when num is 5? ```C #include <stdio.h> int computeSum(int n) {...
Solution:

Caesar's Cipher

Julius Caesar protected his confidential information by encrypting it using a cipher. Caesar's cipher shifts each letter by a number of letters. If the shift takes you past the end of the alphabet, just rotate back to the front of the alphabet. In the case of a rotation by 3, w, x, y and z would map to z, a, b and c. Create a function that takes a string s (text to be encrypted) and an integer k (the rotation factor). It should return an encrypted string. Resources...

Coding Challenges <C++>

What will this program output? ```c++ #include <iostream> ...
Solution:
|| I'm sorry, my post will be long. I just want to follow the code process Inside factorial(10) fac(10) -> ret 10 * fac(9) -> 10 * 362,880 = 3,628,800...

Fibonacci Word C# Coding Challenge

A Fibonacci Word is a specific sequence of binary digits (or symbols from any two-letter alphabet). The Fibonacci Word is formed by repeated concatenation in the same way that the Fibonacci numbers are formed by repeated addition. Create a function that takes a number n as an argument and returns the first n elements of the Fibonacci Word sequence. If n < 2, the function must return "invalid". Examples...

Does anybody have a solution for the Raspberry Pi 4 and Pi Camera v1.3 , its not detecting

I have tried to connect Pi camera Rev 1.3 to Pi 4 and software doesn't have the legacy camera option which used to be there, does any on have solution for it :salute:

Tic Tac Toe C++ Coding Challenge

Create a function that takes an array of char inputs from a Tic Tac Toe game. Inputs will be taken from player1 as "X", player2 as "O", and empty spaces as "#". The program will return the winner or tie results. Examples ```...
Solution:
```c++ #include <iostream> #include <vector> ...

Coding Challenge < Python >

Write a program to solve a classic ancient Chinese puzzle: We count 35 heads and 94 legs among the chickens and rabbits in a farm. How many rabbits and how many chickens do we have?...
Solution:

The Arduino Puzzle Box Challenge

Objective: Design and construct an interactive puzzle box that incorporates various sensors and output devices, controlled by an Arduino. The puzzle box should require the user to complete a series of tasks involving light, sound, and distance sensors to unlock it. Creativity in the design and complexity of the tasks is encouraged to test the user's problem-solving skills and understanding of embedded systems. Project Requirements: 1. Design Overview:...

Coding Challenge " Password Cracker "

This challenge is to build your own version of John the Ripper or CrackStation. These are password cracking tools that can be used to recover passwords, by penetration testers and of course bad guys. We’re going to take a look at them because they provide an interesting way of learning several different things - you can pick and choose where you focus from the list: 🇦 How to implement cryptographic hash functions - you can build these by hand if learning how to code them interests you, otherwise you can use the ones available for your programming language....

Coding Challenge < C++ >

What will this program output? ```C++ #include <iostream> ...

Coding challenge ( rust)

Give it a try and see if you can predict the output of this Rust program. ```rust use std::collections::HashMap;...

Write an Arduino sketch that blinks an LED connected to pin 13 with a 500ms ON and 500ms OFF time.

Swap Odd and Even Bits

Write a C function to swap all odd and even bits in an unsigned integer. Bit positions 0, 2, 4, ... are considered even bits, and positions 1, 3, 5, ... are odd bits. Ex input: 10101010 (in binary), Expected O/P: 01010101. ...

Challenge of the day " C++"

What will this program output ? ```C++ #include <iostream> ...

Problem : Time-Sensitive Data Logging with Edge Processing

Context: Your IoT device collects time-sensitive data that needs to be logged with high precision and analyzed locally at the edge. Challenge: Ensure accurate time stamping of data points, even with potential network delays or disruptions. Objective: Utilize the RTC for precise time stamping, implement local data storage and processing capabilities, and handle potential time synchronization issues upon reconnection....