Laboratory Experiments
Comprehensive collection of hands-on experiments across multiple computer science disciplines
16
Lab Courses
180+
Experiments
12
Programming Languages
π¬
Analysis & Design of Algorithms
- Iterative and Recursive Binary Search
- Merge Sort Implementation
- Quick Sort Algorithm
- Strassen's Matrix Multiplication
- Optimal Merge Patterns
- Huffman Coding
- Minimum Spanning Trees - Kruskal's Algorithm
- Minimum Spanning Trees - Prim's Algorithm
- Single Source Shortest Path Algorithm
- Floyd-Warshall Algorithm
- Traveling Salesman Problem
- Hamiltonian Cycle Problem
π»
Computer Organization & Architecture
- Study of Multiplexer and Demultiplexer
- Study of Half Adder and Subtractor
- Study of Full Adder and Subtractor
- Add Two 8-bit Numbers (Assembly)
- Multiply Two 8-bit Numbers (Assembly)
- Add Two 16-bit Numbers (Assembly)
- Test for Zero Bit in Data Byte
- Load Registers from Consecutive Memory
- Increment 16 Bytes by 01
- Add 10 Bytes from Memory Location 3000
β‘
Digital Circuits & Systems
- Logic Gates Operation & Verification
- Design Gates using NOR Universal Gate
- Design Gates using NAND Universal Gate
- Verification of De Morgan's Theorem
- Half Adder and Full Adder Circuits
- Half Subtractor and Full Subtractor Circuits
- Binary to Gray & Gray to Binary Converters
- BCD to Excess-3 Code Converter
- Multiplexer Circuit Design
- De-multiplexer Circuit Design
π
Python Programming
- Find GCD of Two Numbers
- Square Root using Newton's Method
- Exponentiation of a Number
- Find Maximum from List
- Linear Search Algorithm
- Binary Search Algorithm
- Selection Sort Algorithm
- Insertion Sort Algorithm
- Merge Sort Algorithm
- First n Prime Numbers
- Matrix Multiplication
- Command Line Arguments
- Most Frequent Words in Text File
- Elliptical Orbits in Pygame
- Bouncing Ball in Pygame
π₯οΈ
Operating Systems
- FCFS CPU Scheduling Algorithm
- SJF CPU Scheduling Algorithm
- Priority CPU Scheduling Algorithm
- Round Robin CPU Scheduling
- Compare CPU Scheduling Algorithms
- Producer-Consumer Problem
- Reader-Writers Problem
- Dining Philosophers Problem
- Page Replacement Algorithms
- Disk & Drum Scheduling Algorithms
- Banker's Algorithm
- Remote Procedure Call (RPC)
- Device Driver Development
β
Java Programming
- Installation of J2SDK
- Scope of Variables
- Concept of CLASS in Java
- Type Casting in Java
- Exception Handling
- Inheritance Implementation
- Polymorphism Demonstration
- Access Specifiers (Public, Private, Protected)
- Constructor Usage & Advantages
- Interfacing Between Classes
- Adding Class to Package
- Thread Life Cycle
π
Theory of Computation
- Machine Accepting Three Consecutive Ones
- String Ending with 101
- Mode 3 Machine
- Decimal Divisible by 2
- Equal Number of 1's and 0's
- Count 1's and 0's in String
- 2's Complement of Binary Number
- Increment Binary Number by 1
- NDFA to DFA Conversion
- PDA for Well-Formed Parentheses
- PDA to Accept WCW^R
- Turing Machine for a^n b^n c^n
ποΈ
Database Management Systems
- Delete Duplicate Rows
- Display Alternate Rows
- Delete Alternate Rows
- Update Multiple Rows
- Third Highest and Lowest Salary
- Display 3rd, 4th, and 9th Rows
- Ename Starting with J, K, L, or M
- Employees Hired in First Half of Month
- Three-Row Display Pattern
- Rollback, Commit, and Savepoints
- PL/SQL for CRUD Operations
- Delete Record with Return Status
- Display Name & Hire Date with Cursors
- Top 5 Highly Paid Employees with Cursors
- Time-Based Database Trigger
- Primary Key Trigger
π
Computer Networks
- Study of LAN & Network Equipment
- Network Topologies (Star, Bus, Ring)
- LAN Installation & Configuration
- Error-Correcting Techniques
- Framing Methods Implementation
- Tool Command Language (TCL)
- Network Simulators (NS-2, NS-3, OpNet)
- ONE Simulator for High Mobility Networks
- Configure 802.11 WLAN
- Routing Algorithms Simulation
- MAC Protocols (Aloha, CSMA, CSMA/CD, CSMA/CA)
- Application Layer Protocols (DNS, HTTP, FTP, TelNet)
π
Information Security & Management
- RSA Algorithm Implementation
- Caesar Cipher
- Diffie-Hellman Key Exchange
- SHA-1 Algorithm
- Simple DES or AES
- Digital Signature Algorithm
- Playfair Cipher
- Encryption-Decryption with CrypTool
- MD5 Algorithm
- HILL Cipher Encryption-Decryption
π―
Object Oriented Programming
- Rectangle Area Using Class & Object
- Types of Constructors
- Inheritance Implementation
- Association Demonstration
- Abstract Class
- Compile-Time Polymorphism (Overloading)
- Run-Time Polymorphism (Overriding & Virtual)
- Friend Function & Friend Class
- Data Members & Member Functions
- Exception Handling
π§
Deep Learning
- McCulloch-Pitts Neuron Network
- Diffie-Hellman Key Exchange
- Feedforward Neural Network
- Weight Updation Algorithm
- Backpropagation Algorithm
- Momentum-Based Gradient Descent
- Nesterov Accelerated Gradient (NAG)
- CNN in TensorFlow
- Gradient Descent with RMSProp
- Principal Component Analysis (PCA)
π
Knowledge Representation & Reasoning
- Study of Prolog Environment
- Hello World in Prolog
- Basic Knowledge of Prolog
- Knowledge Base in Logic Programming
- Relations in Knowledge Representation
- Anonymous Variables in KRR
- Operators in Knowledge Reasoning
- Conjunctions & Disjunctions
- Built-In Predicates
- Query Evaluation with Quantifiers
π€
Machine Learning
- Python Libraries (Pandas & Matplotlib)
- Dataset Creation & Loading
- PCA on Iris Dataset
- Decision Tree ID3 Algorithm
- Simple Linear Regression
- Linear Regression with Sklearn & Confusion Matrix
- NaΓ―ve Bayes for Text Classification
- SVM with Kernel Functions (Linear, Polynomial, RBF)
π¬
Natural Language Processing
- Tokenization by Word and Sentence
- Eliminate Stopwords
- Stemming with NLTK
- Parts of Speech Tagging
- Lemmatization with NLTK
- Chunking with NLTK
- Named Entity Recognition
- Unigrams, Bigrams, and Trigrams
- Probability of Statement from Corpus
π€
Introduction to Artificial Intelligence
- Study of Prolog
- Validate Facts Using Prolog
- Conjunction and Disjunction
- Convert Query into Rule
- Arithmetic Operations (Add, Subtract, Multiply)
- Temperature Conversion (Celsius β Fahrenheit)
- Anonymous Variable Usage
- List and List Membership Problem
- Factorial and Square of Number
- Facts Validation with Predicate Logic