Articles for author: Aman Kumar

Greedy Algorithm in Data Structure

The Greedy algorithm solves optimization problems by making locally optimal choices, potentially leading to a globally optimal solution. This article covers the approach, related terms, and discusses its applications, including finding optimal solutions and approximating solutions for NP-Hard problems like the Traveling Salesman Problem. Takeaways Applications of Greedy Algorithm What is Greedy Algorithm? To maximize ...

Level Order Traversal of Binary Tree

Level Order Traversal is a technique used to traverse a Tree where all nodes at the same level are visited entirely before moving to the next level. The level order traversal of this tree will be as follows: Working of Level Order Traversal Level order traversal involves visiting all nodes at a lower level before ...

Euler’s Totient Function

Totient function (denoted by $\phi:\mathbb{N} \rightarrow \mathbb{N}$ ), also known as phi-function or Euler’s Totient function, is a mathematical function which counts the number of integers in the range $[1, n]$ (both inclusive) that are co-prime to $n$ or we can say whose GCD with n is 1. Note: $$\gcd(a, b) = 1$$ Example of ...

Print Right View of a Binary Tree

The right view of binary tree is the set of nodes seen by an observer as standing to the right of a given binary tree. The nodes visible to the observer will be the rightmost nodes at each level. All the other nodes (which will lie to the left of the rightmost nodes) will be ...

Combinatorics

Combinatorics is a branch of mathematics concentrating on counting, arrangement, and combination of elements within sets to satisfy specific criteria. It delves into the principles and methods used to solve problems related to permutations, combinations, graph theory, etc. Essential to fields such as computer science, cryptography, and statistics, combinatorics plays a pivotal role in understanding ...

Aman Kumar

Dynamic Trunking Protocol

Dynamic Trunking Protocol is a set of rules and properties that is used for carrying the traffic over the network when there is more than one VLAN (virtual local area network) in the network. This protocol was developed by the company named CISCO Systems. In the Dynamic Trunking Protocol, any interface can be set to ...