Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please register yourself to join the community.
I believe that my previous blog has provided you a little hint about how the AI works. In this blog, I will be discussing another heuristic algorithm which has slightly better performance than Simple Hill Climbing. This algorithm is known ...Continue reading
Hello everyone. In this blog, I will be discussing about first Symmetric Key Cryptography – Data Encryption Standard (DES) – in details. DES was developed by IBM in 1970s and later standardized in public by NSA in 1977. It is a ...Continue reading
Hello everyone. With my previous blogs, we have come to know a little about Technique Based Cryptographic Algorithms and their working mechanisms. In this blog, I will be discussing about Key Based Cryptographic Algorithms. Key based algorithms are fairly harder ...Continue reading
Hello everyone. This blog introduces you to another Transposition techniques – Simple Columnar Method With Multiple Rounds. It is a very efficient and useful transposition algorithm. There are two forms of this algorithm. One is the “Simple Columnar Method With One ...Continue reading
Hello everyone. My new blog introduces you to the first heuristic algorithm Simple Hill Climbing. It is a very simple algorithm. Because of its simplicity, it becomes the first choice for AI implementation. But it has one major disadvantage which ...Continue reading
In this blog, I have shifted the focus from Substitution techniques to Transposition techniques. A small description about what is Transposition Technique. Then went straight to one of the first algorithms in this category i.e. Rail Fence algorithm. The description ...Continue reading
In my last blog about Cryptography, I demonstrated Caesar Cipher. In this blog, I have described about Mono Alphabetic Cipher (a substitution based cryptographic algorithm). It is an algorithm where each character in the plain text is substituted with another ...Continue reading
In this blog, I discussed about improvising search techniques. Then a little description about two different categories of search. This blog mainly focuses on Heuristic which is the basis of improvising search process in an intelligent manner. I demonstrated a ...Continue reading
This series is all about Cryptography. Those who are interested in learning may find it useful. It includes the introduction to Cryptography and the two main processes that any cryptographic algorithm contains. I have also explained about different types of approaches – ...Continue reading