Our Feeds
Categories
Home
About
XploitZ
Vulnerability
Hacking
Shellcode
Buffer Overflow
Programming
CSS
C
CPP
Python
PHP
Java
HTML
Android
Video Tutorials
PlayStore*
Home
Java
Programming Language
Programming Languages Theory
Program to print Binary Numbers where adjacent bits are not 1 [Java]
Thursday, 30 January 2014
Ajith KP
Program to print Binary Numbers where adjacent bits are not 1 [Java]
Ajith KP
January 30, 2014
No comments :
This was the interview question asked to my teacher when she attend an interview.
I have created a Java program to demonstrate it.
Eg.
1010
- Valid.
11
01
- Not Valid because two 1's are in adjacent positions.
/* # ##### ### ######## ### ### TM # # # # # # # # # # # # # # # # # # # # # ####### ####### # # # # # # # # # # # # # ### ### #### ### ### ### ### (C) AJITH KP (C) */ import java.util.*; public class BinaryX { public static void main(String[] args) { String bin; int n, i, j, k, flag; char[] bn; Scanner sc = new Scanner(System.in); StringBuilder bld; System.out.print("Enter Digit: "); n = sc.nextInt(); if(n==1) { for(i=0;i<2;i++) { flag = 0; bin = binary(i); bld = new StringBuilder(bin); bn = bin.toCharArray(); for(j=0;j
Next
« Prev Post
Previous
Next Post »
Popular Posts
Easiest way to convert RGB Color Image to Gray scale Image in Java
Hello GuyZ, I would like to share Java code to convert RGB images to Gray scale images. I have seen many Java codes which converts im...
Fist GUI Program - FASM
I hope you have read the previous posts about FASM. Else please read it here: http://terminalcoders.blogspot.in/search/label...
Digital Camera Day or Night - Python Solution
"You need to construct a feature in a Digital Camera, which will auto-detect and suggest to the photographer whether the pi...
OpenGL: Line Drawing - DDA Algorithm
Hello GuYz, DDA algorithm is another popular line drawing algorithm. Source Code #include <gl/glut.h> #include <Wind...
Web Application Vulnerabilities: Dawn, Detection, Exploitation and Defence Slide Show
ABSTRACT Web applications are popular software application types in which the client runs the application stored in server in his/her we...
Beautiful Black-Green Theme for Hackers [GNOME/GTK/KALI LINUX]
If you like this theme download it from here: http://downloads.ziddu.com/download/24041123/HackerTheme.tar.gz.html ...
Histogram Equalization Algorithm and Implementation in Java
Histogram equalization is a technique used to enhance the contrast of image using the histogram of image. The histogram of image represents...
Skin Detection Algorithm - Implementation in Java
Hi GuyZ,,, This is one of the partial solution of my Mini Project. This is an implementation of skin detection algorithm in Jav...
P2P Networks
A P2P [ Peer 2 Peer ]computer network is one in which each computer in the network can act as a server or client for the other computers ...
Google Dork Generator
( keyword: ) ( site: ) ( intitle: ) ( inurl: )
..:: SUPPORT US ::..
Labels
Programming Language
Programming Languages Theory
Adv. Hacking
Hacking
Vulnerability
C++
CPP
ALOGORITHM
Java
C
Python
Linux
PHP
Shellcode
Buffer Overflow
JavaFX
x64
Android
Digital Image Processing
Graphics
Image Processing
Metasploit
OpenGL
AI
FASM