Anshul Thakur
anshulthakurjourneyendless@gmail.com
Joined
Role .

Your recent contibutions to pirate society.

Understanding the relationship between delay spread and coherence bandwidth

In this post, we explore the relationship between Delay Spread in a multipath channel and Coherence Bandwidth of that...
Jan. 18, 2019, 11:03 a.m.
check
Read More

Friendly Introductions: Signal generation in frequency domain.

In this post, we will see how we can manipulate and even create signals in the frequency domain rather than in the time...
Feb. 5, 2017, 4:26 p.m.
check
Read More

Friendly Introductions: Playing with signals.

In this post we are going to explore signal generation through GNU-Radio and how we can visualize it in the time and...
Feb. 5, 2017, 11:44 a.m.
check
Read More

Friendly Introductions: Working under the hood directly.

In this post, we will see how we can accomplish the function done by Drag and Drop from the GUI by working directly on...
Feb. 5, 2017, 11:44 a.m.
check
Read More

MAP Detector for AWGN channels

In this post, we will discuss the logic and mathematics behind the Maximum Aposteriori Probability detection principles...
Sept. 18, 2016, 8:55 p.m.
check
Read More

Probability 101: Framing an Event

In this post, we are going to see how variations in framing an Event can change the way we solve the problem. This post...
June 5, 2016, 3:08 p.m.
check
Read More

Online mean and variance computation

In this article, we are going to derive and implement an iterative algorithm to compute the variance and mean of an...
April 2, 2016, 6:11 p.m.
check
Read More

Maximum Likelihood Demystified

In this post, we are going to examine how Maximum Likelihood Estimators work, how to make one of our own and how to use...
Feb. 6, 2016, 10:37 a.m.
check
Read More

Divide and Conquer Algorithms

In the TRIVIAL SORTING ALGORITHM series, we have seen some sorting algorithms that solve the problem of...
Oct. 25, 2015, 8:29 p.m.
check
Read More

Trivial Sorting Algorithms

In this series of Trivial Sorting Algorithms tutorials, we will go through some simple sorting algorithms like Bubble...
Oct. 14, 2015, 8:19 p.m.
check
Read More

Trivial Sorting Algorithms - Selection Sort

This is the second tutorial of our 'TRIVIAL SORTING ALGORITHMS' series and before going further to another solution...
Oct. 14, 2015, 12:02 a.m.
check
Read More

Monty Hall Problem stumping intuition

In 1963, there used to be an extremely popular game show in the US Television named "Let's Make a Deal". It's host was...
Aug. 5, 2015, 9:11 a.m.
check
Read More

Your recent bookmarks for safekeeping.

Difference between declared string and allocated string

The code above will cause problems. The first instance is known as static string allocation and definition. For normal variables like int, etc, and non-string data types, such a declaration …
March 26, 2016, 11:22 p.m.
check people
Read More

sizeof class with int , function, virtual function in C++?

Why siszeof(A) is 1 and sizeof(C) is 1 too ? The function in C is not virtual, so the class doesn't need a vtable pointer, so it needs no more …
March 27, 2016, 9:19 a.m.
check people
Read More

Stars and bars (combinatorics)

In the context of combinatorial mathematics, stars and bars is a graphical aid for deriving certain combinatorial theorems. It was popularized by William Feller in his classic book on probability. …
May 16, 2016, 9:10 a.m.
check people
Read More

Why Variances add?

The Pythagorean Theorem of Statistics Quick. What’s the most important theorem in statistics? That’s easy. It’s the central limit theorem (CLT), hands down. Okay, how about the second most important …
Sept. 30, 2016, 10:31 p.m.
check people
Read More

Tun/Tap interface tutorial

Foreword: please note that the code available here is only for demonstration purposes. If you want to be serious, you'll have to make it more robust and integrate it with …
Feb. 7, 2017, 4:07 p.m.
check people
Read More

Reset the MySQL 5.7 root password in Ubuntu 16.04 LTS (Example)

This is a bit gnarly. If you have a better method of updating the password without triggering a warning about PASSWORD being deprecated, I'm all ears. # Stop MySQL sudo …
May 22, 2017, 8:26 a.m.
check people
Read More

HOW TO CHECK WHETHER 16X2 LCD WORKING OR NOT

Are you worried whether your 16x2 Lcd is working or not? Are you worried whether it is burned or working well? Here is the solution, just follow the below steps …
June 16, 2017, 10:55 p.m.
check people
Read More

FFT Spectral Leakage and Windowing | Saad Ahmad

Spectral leakage happens whenever we introduce components into the frequency spectrum of a signal. First, let's look at this in the case of continuous time with a continuous signal. Let's …
Oct. 20, 2017, 10:49 p.m.
check people
Read More

How parsers and compilers work

Download this zip file to obtain the source code of files discussed in this article. A few months ago I began a personal project to learn a bit more about …
Nov. 1, 2017, 11:58 a.m.
check people
Read More

Best VPN Providers of November/2017

The Ultimate Guide to Finding the Best VPN Thanks to Mr Edward Snowden, public awareness about the extent to which our governments spy on everything we do, everything we say, …
Nov. 13, 2017, 4:32 p.m.
check people
Read More

A guide to Python's function decorators

Python is rich with powerful features and expressive syntax. One of my favorites is decorators. In the context of design patterns, decorators dynamically alter the functionality of a function, method …
Dec. 13, 2017, 4:52 p.m.
check people
Read More

__attribute__((constructor)) and __attribute__((destructor)) syntaxes in C - GeeksforGeeks

Write two functions in C using GCC compiler, one of which executes before main function and other executes after the main function. Recommended: Please try your approach on {IDE} first, …
Feb. 2, 2019, 2:07 p.m.
check people
Read More

Interacting with a long-running child process in Python - Eli Bendersky's website

July 11, 2017 at 05:43 Tags Python The Python subprocess module is a powerful swiss-army knife for launching and interacting with child processes. It comes with several high-level APIs like …
July 31, 2019, 6:02 p.m.
check people
Read More

AutoRecon - An Open Source Enumeration Tool - Latest Hacking News

AutoRecon is an enumeration tool that performs automated enumeration with multi-threaded capabilities. It is purposely built to be used for CTFs, exams (like OSCP) and other penetration testing environments for …
Aug. 9, 2019, 9:08 a.m.
check people
Read More

How to Scrape Amazon.com: 19 Lessons I Learned While Crawling 1MM+ Product Listings

In its simplest form, web scraping is about making requests and extracting data from the response. For a small web scraping project, your code can be simple. You just need …
Aug. 24, 2019, 10:09 a.m.
check people
Read More

How to convert an KVM image into a LXC container // Andreas Happe

KVM was an improvement over Xen for me. Still for many use-cases a LXC are a more performance, light-weight alternative – which also seems to be en vougue nowadays. Through …
Sept. 19, 2019, 9:08 a.m.
check people
Read More

Tuya IoT and EZ Mode Pairing

Synopsis With smart lighting and other IoT devices becoming cheaper and more accessible, for example, the Mirabella Genio range now being sold in large supermarket chains, I decided to take …
Dec. 24, 2023, 11:36 a.m.
check people
Read More

How to build a React application in a Django project

How to build a React application in a Django project Learning about hybrid applications by creating a single-page React app. Exploring the common issues that come up and how to …
Feb. 23, 2024, 11:40 a.m.
check people
Read More