Turing
People are a pink collection of sensory data
Category Divide and Conquer
Ever wanted to know what QuickSort is? Or even just wondered how the person who made could be so confident in is algorithm that he called it “quick”? Well let’s...
Invented by John von Neumann in 1945, MergeSort was one of the most innovative and efficient sorting algorithms of it’s time and is a classic example of divide and conquer...
What is “Divide and Conquer”?
Category Chess
Perfect game In principle, it is possible to construct a machine to play a perfect game i.e. a machine which would never lose or draw a won position and never...
The story of chess engines begins in the year 1770, when the inventor Wolfgang von Kempelen revealed “The Turk”, a chess playing machine, to Empress Maria Theresa of Austria ,attempting...
In the previous article we explored some basic evaluation functions and gave an algorithm which makes n-move deep analysis for any position. Now we look at more advanced algorithms to...
Category Cryptography
RSA is one of the most famous and most used cryptographic algorithms. Let us take a peek behind the curtains of this beautiful mystery.
Public key cryptography is the most significant development in modern cryptography since it allows for secure communication even over insecure lines.
Secret (or Symmetric) Key Cryptography methods employ a single key for both encryption and decryption and was the only method used before 1976!
We talked about cryptography and what it means in our first article, Introduction to cryptography. Now we talk about it in more depth, with a focus on its implementation. Some...
Cryptography is the science of data security and privacy in the context of communication. It may seem like a loaded definition, so let us understand what it means. Often, we...
Category Security
RSA is one of the most famous and most used cryptographic algorithms. Let us take a peek behind the curtains of this beautiful mystery.
Public key cryptography is the most significant development in modern cryptography since it allows for secure communication even over insecure lines.
Secret (or Symmetric) Key Cryptography methods employ a single key for both encryption and decryption and was the only method used before 1976!
We talked about cryptography and what it means in our first article, Introduction to cryptography. Now we talk about it in more depth, with a focus on its implementation. Some...
Cryptography is the science of data security and privacy in the context of communication. It may seem like a loaded definition, so let us understand what it means. Often, we...
Category Artificial Intelligence
How machine learning and artificial intelligence are being used to revolutionize the field of gaming and what's in store for the future of gaming.
Category Machine Learning
A basic insight into some classification algorithms
An insight into how major Search Engines work, along with an understanding of some basic Ranking algorithms.
A basic insight into Machine Learning
The problems that Machine Learning algorithms can be used to solve
The working and algorithms behind how dating apps work
Random forest is a method for classification, regression and other tasks. It works by constructing a multitude of decision trees at the training stage. In classification,...
We will be discussing some of the easiest machine learning tools and Pipelines used in high energy physics.
Gradient Descent is a simple yet efficient approach to fitting linear classifiers and regressors. Even though it has been around for a long time, it has...
Decision Tree is a tree-like decision tool to map out decisions and possible consequences. It has influenced a large option of machine learning, covering classification and...
How machine learning and artificial intelligence are being used to revolutionize the field of gaming and what's in store for the future of gaming.
Category Gaming
How machine learning and artificial intelligence are being used to revolutionize the field of gaming and what's in store for the future of gaming.
Category Algorithms
The working and algorithms behind how dating apps work
What algorithmic trading is and how it is replacing human traders. Explains the basics of trading and the financial market as well.
Random forest is a method for classification, regression and other tasks. It works by constructing a multitude of decision trees at the training stage. In classification,...
Gradient Descent is a simple yet efficient approach to fitting linear classifiers and regressors. Even though it has been around for a long time, it has...
Decision Tree is a tree-like decision tool to map out decisions and possible consequences. It has influenced a large option of machine learning, covering classification and...
We talked about cryptography and what it means in our first article, Introduction to cryptography. Now we talk about it in more depth, with a focus on its implementation. Some...
Category Quantum Computing
Exploring quantum computing, how it could possibly break our current standards of encryption and what that means for the security of our online data.
Category Encryption
Exploring quantum computing, how it could possibly break our current standards of encryption and what that means for the security of our online data.
Category pathfinding algorithms
Terminology used:
• Vertex: A ‘node’ of a graph
This article is loosely based on the previous one.
Category MergeSort
Invented by John von Neumann in 1945, MergeSort was one of the most innovative and efficient sorting algorithms of it’s time and is a classic example of divide and conquer...
Category Secret Key Cryptography
Secret (or Symmetric) Key Cryptography methods employ a single key for both encryption and decryption and was the only method used before 1976!
Category Stream cipher
Secret (or Symmetric) Key Cryptography methods employ a single key for both encryption and decryption and was the only method used before 1976!
Category Block cipher
Secret (or Symmetric) Key Cryptography methods employ a single key for both encryption and decryption and was the only method used before 1976!
Category Public Key Cryptography
RSA is one of the most famous and most used cryptographic algorithms. Let us take a peek behind the curtains of this beautiful mystery.
Public key cryptography is the most significant development in modern cryptography since it allows for secure communication even over insecure lines.
Category AI
Neat or Neuro-Evolution of Augmenting Topologies
Category ML
Neat or Neuro-Evolution of Augmenting Topologies
Category NEAT
Neat or Neuro-Evolution of Augmenting Topologies
Category GANs
In this series of articles, we will be exploring the world of GANs, starting with an introduction to and the basic working of GANs. After this we will see various...
In the previous article of this series, we dived into the field of what GANs are and gained a basic understanding of how GANs work. A quick recap. Generative Adversarial...
Category GAN
As you must have seen in the previous two articles of the series: Introduction and Applications, GANs can produce “realistic” data, but mind you, it is still “realistic” and not...
Category Physics
We will be discussing some of the easiest machine learning tools and Pipelines used in high energy physics.
Category Python
We will be discussing some of the easiest machine learning tools and Pipelines used in high energy physics.
Category Quantum Cryptography
To understand the need for quantum cryptographic protocols ,we first need to look at the current state of classical ones. Current classical encryption schemes like RSA work on the basic...
Category Internet security
RSA is one of the most famous and most used cryptographic algorithms. Let us take a peek behind the curtains of this beautiful mystery.
Category RSA
RSA is one of the most famous and most used cryptographic algorithms. Let us take a peek behind the curtains of this beautiful mystery.
Category Finance
What algorithmic trading is and how it is replacing human traders. Explains the basics of trading and the financial market as well.
Category Digital Forensics
So you’re Felicity Smoak and Oliver hands you his bullet-ridden laptop. You now start salvaging everything you can from it… except you don’t know how. This article is all that...
Category QuickSortSort
Ever wanted to know what QuickSort is? Or even just wondered how the person who made could be so confident in is algorithm that he called it “quick”? Well let’s...
Category Hash Functions
A look into the workings of hash functions, particularly SHA-1
Category Ranking
An insight into how major Search Engines work, along with an understanding of some basic Ranking algorithms.