Build 2017 : Party at Kolkata
Have you attended the Build ? Or if you have missed, have you made it to the one that we did in your city ? Well, if the first case was with you, then you missed a lot, while ...
Continue readingLost your password? Please enter your email address. You will receive a link and will create a new password via email.
Have you attended the Build ? Or if you have missed, have you made it to the one that we did in your city ? Well, if the first case was with you, then you missed a lot, while ...
Continue readingI believe that my previous blog has provided you a little hint about how the AI works. In this blog, I will be discussing another heuristic algorithm which has slightly better performance than Simple Hill Climbing. This algorithm is known ...
Continue readingHello everyone. In this blog, I will be discussing about first Symmetric Key Cryptography – Data Encryption Standard (DES) – in details. DES was developed by IBM in 1970s and later standardized in public by NSA in 1977. It is a ...
Continue readingHello everyone. With my previous blogs, we have come to know a little about Technique Based Cryptographic Algorithms and their working mechanisms. In this blog, I will be discussing about Key Based Cryptographic Algorithms. Key based algorithms are fairly harder ...
Continue readingHello everyone. This blog introduces you to another Transposition techniques – Simple Columnar Method With Multiple Rounds. It is a very efficient and useful transposition algorithm. There are two forms of this algorithm. One is the “Simple Columnar Method With One ...
Continue readingHello everyone. My new blog introduces you to the first heuristic algorithm Simple Hill Climbing. It is a very simple algorithm. Because of its simplicity, it becomes the first choice for AI implementation. But it has one major disadvantage which ...
Continue readingIn this blog, I have shifted the focus from Substitution techniques to Transposition techniques. A small description about what is Transposition Technique. Then went straight to one of the first algorithms in this category i.e. Rail Fence algorithm. The description ...
Continue readingIn my last blog about Cryptography, I demonstrated Caesar Cipher. In this blog, I have described about Mono Alphabetic Cipher (a substitution based cryptographic algorithm). It is an algorithm where each character in the plain text is substituted with another ...
Continue readingIn this blog, I discussed about improvising search techniques. Then a little description about two different categories of search. This blog mainly focuses on Heuristic which is the basis of improvising search process in an intelligent manner. I demonstrated a ...
Continue readingThis series is all about Cryptography. Those who are interested in learning may find it useful. It includes the introduction to Cryptography and the two main processes that any cryptographic algorithm contains. I have also explained about different types of approaches – ...
Continue reading