Our Feeds
Categories
Home
About
XploitZ
Vulnerability
Hacking
Shellcode
Buffer Overflow
Programming
CSS
C
CPP
Python
PHP
Java
HTML
Android
Video Tutorials
PlayStore*
Home
C++
Programming Language
Programming Languages Theory
Skillen( :p )_Questions(+2)
Tower Of Hanoi Solving [CPP]
Sunday, 5 January 2014
Ajith KP
Tower Of Hanoi Solving [CPP]
Ajith KP
January 05, 2014
No comments :
Tower of Hanoi is a disk transferring problem.
I hope the seeker knows the rules of transferring disks from source to destination.
Source Code
#include
using namespace std; class tower { int n; public: void read() { cout<<"Enter Number of Disks: "; cin>>n; transfer(n, 'S', 'I', 'D'); } void transfer(int n, char s, char i, char d) { if(n==0) { //cout<<"Move Disk "<
Next
« Prev Post
Previous
Next Post »
Popular Posts
Easiest way to convert RGB Color Image to Gray scale Image in Java
Hello GuyZ, I would like to share Java code to convert RGB images to Gray scale images. I have seen many Java codes which converts im...
Fist GUI Program - FASM
I hope you have read the previous posts about FASM. Else please read it here: http://terminalcoders.blogspot.in/search/label...
Digital Camera Day or Night - Python Solution
"You need to construct a feature in a Digital Camera, which will auto-detect and suggest to the photographer whether the pi...
OpenGL: Line Drawing - DDA Algorithm
Hello GuYz, DDA algorithm is another popular line drawing algorithm. Source Code #include <gl/glut.h> #include <Wind...
Web Application Vulnerabilities: Dawn, Detection, Exploitation and Defence Slide Show
ABSTRACT Web applications are popular software application types in which the client runs the application stored in server in his/her we...
Beautiful Black-Green Theme for Hackers [GNOME/GTK/KALI LINUX]
If you like this theme download it from here: http://downloads.ziddu.com/download/24041123/HackerTheme.tar.gz.html ...
Histogram Equalization Algorithm and Implementation in Java
Histogram equalization is a technique used to enhance the contrast of image using the histogram of image. The histogram of image represents...
Skin Detection Algorithm - Implementation in Java
Hi GuyZ,,, This is one of the partial solution of my Mini Project. This is an implementation of skin detection algorithm in Jav...
P2P Networks
A P2P [ Peer 2 Peer ]computer network is one in which each computer in the network can act as a server or client for the other computers ...
Google Dork Generator
( keyword: ) ( site: ) ( intitle: ) ( inurl: )
..:: SUPPORT US ::..
Labels
Programming Language
Programming Languages Theory
Adv. Hacking
Hacking
Vulnerability
C++
CPP
ALOGORITHM
Java
C
Python
Linux
PHP
Shellcode
Buffer Overflow
JavaFX
x64
Android
Digital Image Processing
Graphics
Image Processing
Metasploit
OpenGL
AI
FASM