All Stories

Applications and Examples of GANs (2/3)

In the previous article of this series, we dived into the field of what GANs are and gained a basic understanding of how GANs work. A quick recap. Generative Adversarial...

Decision Trees

        Decision Tree is a tree-like decision tool to map out decisions and possible consequences. It has influenced a large option of machine learning, covering classification and...

Algorithms in Chess Engines

In the previous article we explored some basic evaluation functions and gave an algorithm which makes n-move deep analysis for any position. Now we look at more advanced algorithms to...

Introduction to NEAT

Neat or Neuro-Evolution of Augmenting Topologies

Public Key Cryptography

Public key cryptography is the most significant development in modern cryptography since it allows for secure communication even over insecure lines.

Secret Key Cryptography

Secret (or Symmetric) Key Cryptography methods employ a single key for both encryption and decryption and was the only method used before 1976!