## Tags

No tag found

Content Filter Articles

Videos

Blogs

Resources

News

Forums

Interviews

Complexity Level

Refine by Author [Clear] -
Beginner -
Intermediate -
Advanced

- Mike Gold(7)
- Suketu Nayak(4)
- Jesus Morales(4)
- Vulpes (3)
- Matthew Cochran(3)
- Gul Md Ershad(2)
- Nilesh Jadav(2)
- Emiliano Musso(2)
- Saineshwar Bageri(2)
- Paul Lockwood(2)
- Abhishek Dubey(2)
- Zoran Horvat(2)
- Nipun Tomar(2)
- Srihari Chinna(2)
- Brijesh Jalan(2)
- Veena Sarda(1)
- Padmalatha Dronamraju(1)
- Ahmad Mozaffar(1)
- Viral Jain(1)
- Mohammad Shahid Solanki(1)
- Gourav Jain(1)
- Yusuf Karatoprak(1)
- Hussain Patel(1)
- Disha Raval(1)
- Vinodhini M(1)
- Arvind Singh Baghel(1)
- Sourav Bhattacharya(1)
- Jean-Claude Colette(1)
- Željko Perić(1)
- Rajib Rezwan(1)
- Sridhar Sharma(1)
- Mohammed Ibrahim (1)
- Gopi Chand(1)
- Bruno Leonardo Michels(1)
- Udaya kumar(1)
- Kamal Rawat(1)
- Michal Habalcik(1)
- Jignesh Trivedi(1)
- Raj Bandi(1)
- Sahil Sharma(1)
- Rahul Bansal(1)
- Sachin Kalia(1)
- Selva Ganapathy(1)
- Prakash Tripathi(1)
- Sourabh Somani(1)
- Debadatta Mishra(1)
- Sourav Kayal(1)
- Sandeep Singh Shekhawat(1)
- Gowry S Paramasivam(1)
- Mohammed Asief(1)
- Santhosh Kumar Jayaraman(1)
- Sonakshi Singh(1)
- Aarti (1)
- Shinuraj (1)
- Abhishek Bhat(1)
- Josip Juric(1)
- Uziel gc(1)
- Pradeep Chandraker(1)
- Kirtan Patel(1)
- Pavel Klimov(1)
- jeff fernandez(1)
- Alfredo Alvarez(1)
- Felipe Ramos(1)
- Shivprasad (1)
- Sateesh Arveti(1)
- Eranda Horanagama(1)
- Bechir Bejaoui(1)
- Muhammad Shakir(1)
- Yuan Wang(1)
- Peter (1)
- Anand Thakur(1)
- Melkor (1)
- Alex Groysman(1)
- Saif Ikram(1)

Resources No resource found

- Overview Of Generative Adversarial NetworksFeb 23, 2018. Once trained, Neural Networks are fairly good at recognizing voices, images, and objects in every frame of a video – even when you are playing the video. Let’s say you are not able to buy an expensive painting from a famous painter; can you create/generate an artificial painter who can paint like any famous artist by learning from his/her past collections? The answer is Yes – using Generative adversarial networks (GAN) you can. Generative Adversarial Networks (GANs) are a class of algorithms used in unsupervised learning -- you don’t need labels for your dataset in order to train a GAN.
- Learn About Machine Learning BasicsFeb 02, 2018. Machine Learning is the booming research area across the Globe. Advances in Machine Learning will make a big difference in many fields in future. This is a vast area in which there are many types of algorithms embedded in it. This article will help you get started with Basics of Machine Learning.
- Classify Twitter's Tweets Based On Naive Bayes AlgorithmDec 20, 2017. This article explains the way to classify twitters' tweeted data based on Machine Learning's Naive Bayes Algorithm
- Implement Symmetric And Asymmetric Cryptography Algorithms With C#Dec 09, 2017. How to encrypt and decrypt data using Symmetric and Asymmetric algorithms using C# Programming language
- Classify Data Based On K-Nearest Neighbor Algorithm Machine LearningNov 25, 2017. This article will explain the concept of data classification based on K-Nearest Neighbor Algorithm of Machine Learning
- Introduction To Face API In AzureNov 18, 2017. Face API helps you to add facial recognition capabilities to your application with the Face API. State-of-right algorithms detect your human faces in images, including face landmarks like nose, gender, hair color etc.
- Three Digit Sum Using Tuple in C#Nov 02, 2017. In this article, we will be discussing an algorithm which returns possible (no. of pairs) digit pairs that are equal to a given number (6) using Tuple class.
- Understanding Face API In AzureOct 11, 2017. Add facial recognition capabilities to your app with the Face API. State-of-the-art algorithms detect human faces in images, opening a range of facial capabilities to your apps. Face detection can also identify attributes, including face landmarks (nose, eyes, etc.), gender, age, and other machine-predicted facial features.
- The Basic Concepts Of Data ScienceSep 04, 2017. The basics concepts of data science can be separated two important parts. Maybe some people can argue with me because I have to tell you supervised learning and unsupervised learning and decision trees algorithms. But my intend is not explaining the concepts of Data science. This article is related to some knowledge about who wants to be started as data scientist.
- Data Structures and Algorithm (DSA) – Performance, Complexity And Big-O NotationAug 28, 2017. In this article we will be talking about what performance of an algorithm is and how Complexity is used to measure performance and what Big-O notation is.
- Algorithms Of Microsoft Azure Machine LearningJul 05, 2017. Every Data Science and Machine Learning beginner has only one question in mind: how to start with Machine Learning or how to choose algorithms in Machine Learning, So let's understand Algorithms of Microsoft Azure Machine learning in this article
- Two-Class Boosted Decision TreeJul 03, 2017. Two-Class Boosted Decision Tree module creates a machine learning model that is based on the boosted decision trees algorithm. A boosted decision tree is an ensemble learning method in which the second tree corrects for the errors of the first tree, the third tree corrects for the errors of the first and second trees, and so forth. Predictions are based on the entire ensemble of trees together that make the prediction.
- Data Structures And Algorithms - Part Three - An Array Of FunJun 15, 2017. Data Structures And Algorithms An Array Of Fun.
- Data Structures And Algorithms - Part One - IntroductionMay 22, 2017. Introduction to data structures and algorithms.
- Data Structures And Algorithms - Part Two - A Word About Big-O NotationMay 22, 2017. This article is an introduction to Big-O Notation, which is used to measure the running time of a function/ method.
- Introduction Of Big DataApr 30, 2017. In this article, I will discuss about Big data and where it is used and how it will perform in various applications in the world.
- What Is Bully Algorithm In Mutual ExclusionApr 22, 2017. This article presents insights on what Bully algorithm In Mutual Exclusion is.
- Introduction To AES And DES Encryption Algorithms In .NETFeb 17, 2017. In this article, I am going to explore encryption and decryption. We will see some of the encryption algorithms with C# example code.
- Getting Started With Floyd’s Warshall AlgorithmNov 14, 2016. In this article, you will learn about Floyd’s Warshall algorithm.
- Key Based Cryptographic AlgorithmsSep 23, 2016. In this article, you will learn about Key based cryptographic algorithms.
- Solving a Maze Without Recursion In C#Jun 20, 2016. In this article, we present a non-recursive algorithm that finds all solutions of a maze.
- Packing Two Dimensional Rectangular Elements At Orthogonal TableMay 20, 2016. Here is a program made for two dimensional rectangular elements at orthogonal table in sequence along the X axis of the table, with horizontal orientation exclusively.
- Regression Algorithms Parameters In Azure MLMay 07, 2016. In this article you will learn about Regression Algorithms parameters in Azure ML.
- Fun with Backtracking - The N Queen ProblemApr 26, 2016. This article is for Implementation of backtracking algorithm using c#.
- Understanding Classification Algorithms In Azure MLApr 25, 2016. In this article you will understand about Classification Algorithms in Azure ML.
- Classification Algorithms Parameters In Azure MLApr 25, 2016. In this article you will learn about Classification Algorithms parameters in Azure ML.
- A Simple Way to Learn GenericsNov 20, 2015. In this article we will look at the basics of generics. Generics is a mechanism offered by the Common Language Runtime (CLR) and programming languages that provide one form of code re-use and algorithm re-use.
- Simple Login Form Using MD5 Hash AlgorithmSep 14, 2015. In this article, I will show how to create a login form using MD5 hash algorithm.
- How to Encrypt and Decrypt the String in Java Without Using Any AlgorithmJun 03, 2015. This article teaches you how a string can be simply encrypted & decrypted in Java.
- Using Reflection to Get Enum Description and ValueMay 31, 2015. In this article you will see how to handle enum values with descriptions.
- Genetic Algorithm to Solve 2D MazesApr 19, 2015. This article shows how to use genetic algorithms to solve problems. The approach uses Genetic Algorithms (GA) in the solutions optimization context.
- Genetic Algorithm For Icon Generation in Visual BasicApr 16, 2015. This article provides some of the basics of genetic algorithms, including what they are, what they're good for, why we call them genetic, and so on. This provides both theory and sample implementations in Visual Basic .NET.
- Validating Mobile IMEI NumberMar 28, 2015. In this article you will learn how to validate the Mobile IMEI number.
- C# Corner Delhi Chapter "How to Crack the Coding Interview": Discussion of TestFeb 18, 2015. Here we will discuss the written test of C# Corner Delhi Chapter How to Crack the Coding Interview event.
- Encrypt in JavaScript and Decrypt in C# With AES Algorithm in ASP.Net in MVC 4Jan 26, 2015. This article shows how to encrypt on the client side values in JavaScript and decrypt in C# with AES algorithm in ASP.NET MVC 4.
- Encrypt in JavaScript and Decrypt in C# With AES AlgorithmJan 18, 2015. In this article I am going to show you how to encrypt Client side values in JavaScript and decrypt in C# with AES algorithm in ASP.NET web forms.
- A Day Without Visual Studio; Game Programming Algorithms and Techniques ReviewJan 09, 2015. This article provides a brief Game Programming Algorithms and Techniques book review.
- Garbage Collection In DepthJan 05, 2015. This article looks at Garbage Collection in depth.
- Using Cryptography in Portable Xamarin Forms (Windows Phone, Android and IOS)Dec 23, 2014. In this article, I will explain how to use cryptographic algorithms as common code in C# targeting multiple mobile platforms (Windows phone, Android and IOS) using Xamarin forms without depending on native functionality.
- Introduction to Regular ExpressionsDec 22, 2014. This article is the beginning of a series on regular expressions and the importance of learning such technologies. The article attempts to explain why this should matter to us.
- The Fibonacci NumbersOct 03, 2014. This article helps you to understand Fibonacci Numbers and also provides various ways to generate a Fibonacci series in C#.
- Generate the Client Side Hash Password Via MD5 Algorithm and Saving it to DatabaseAug 26, 2014. This article shows how to convert a plain password to a hashed password using the MD5 algorithm on the client side and save it to the database.
- How MediaTypeFormatter and MediaTypeMapping Are Associated With Each Other in Web ApiMay 10, 2014. In this article I’ll explain “How MediaTypeFormatter and MediaTypeMapping are associated with each other as well as the precedence order to handling the request”.
- Simple and Effective Way to Find the Boundary Items of a Binary TreeApr 07, 2014. This article describes an algorithm that performs boundary item detection of a binary tree. Special logic in this algorithm makes this more effective than others.
- Insertion & Deletion in a Binary Search Tree Using C#Jan 25, 2014. This articles describes the algorithm to insert and delete elements in a Binary Search Tree (BST) and it's implementation in C#.
- RSA Algorithm With C#Dec 07, 2013. This article describes the RSA Algorithm and shows how to use it in C#.
- An Introduction to Phonetic Search in JavaOct 07, 2013. This article introduces phonetic search algorithms and their usage in Java based applications without reinventing the wheel.
- Demystify Garbage Collection in C#: Part 5Aug 24, 2013. In this article we will see how the Garbage Collection algorithm works. We will next see how to implement a weak reference to optimize performance.
- Bubble Sort In C#Jan 03, 2013. In this article I am going to show sorting an array using the Bubble Sort Algorithm.
- Tic Tac Toe Game in VB.NETNov 10, 2012. TicTacToe is a demonstration of the AI game playing minimax algorithm. The game plays out every possible combination of moves from each position and consequently is unbeatable.
- Cryptography in VB.NET Part 1Nov 10, 2012. For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
- Hash Password Generator in VB.NETNov 10, 2012. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
- Tic Tac Toe Game in VB.NET Nov 08, 2012. TicTacToe is a demonstration of the AI game playing minimax algorithm. The game plays out every possible combination of moves from each position and consequently is unbeatable.
- IMEI Validator Using Java SwingJul 04, 2012. This article covers how to create a simple IMEI validator application using Java Swing.
- Linear Search in JavaMar 25, 2012. In this article we are going to discuss or describe Java linear searches. This is the simplest method of searching. In this method, the element to be searched is sequentially searched in the list. This method can be applied to a sorted or an unsorted list.
- Binary Search in JavaMar 24, 2012. In this article we are going to describe implementation of a Binary Search in the Java language. So first you should understand what a Binary Search is. A Binary Search is applicable only to a sorted array and any data structure.
- Microcontroller Based Robotic Garbage CollectorDec 06, 2011. In this article a light has been thrown on how can we make a garbage collector by using C# algorithm and to apply it in different hardware components.
- AES Encryption using 256 bit Encryption key and IV spec parameterNov 17, 2011. AES is a strong algorithm to encrypt or decrypt the data. Java, .NET and C++ provide different implementation to achieve this kind of encryption.
- Configurable String Matching SolutionAug 16, 2011. In this article we are presenting classes which can be used to formalize the string comparison. Applications can offer several comparison methods and then let the caller decide which one to use in every call to a function. Classes shown in this article can help build such functionality almost without effort.
- Efficient String Matching Algorithm with Use of Wildcard CharactersAug 15, 2011. In this article we shall cover one common problem in textual data processing and that is how to match strings against patterns that may contain wildcard characters.
- Simulating Binary Literals in C#Mar 19, 2011. How to use integers instead of strings so that we can easily do bit and normal arithmetic with binary numbers.
- Implementing the QT Algorithm using C#Mar 17, 2011. The basic idea of cluster analysis is to partition a set of points into clusters which have some relationship to each other.
- Implementing the DBSCAN Algorithm using C#Mar 17, 2011. I was recently asked if I could implement DBSCAN algorithm in C# as there appears to be no other implementation which is freely available. Here I am showing to implement this algorithm.
- SQL Server 2008 Recovery ModelsMar 01, 2011. SQL Server is a database management system that includes several data management and analysis technologies. It includes better compression features, which also helps in improving scalability and enhancing the indexing algorithms and introduce the notion of filtered indexes.
- Strategy Pattern in .NETFeb 24, 2011. The Strategy design pattern defines a family of algorithms, encapsulates each one, and makes them interchangeable. Strategy lets the algorithm vary independently from clients that use it.
- Strategy PatternJan 30, 2011. The Strategy Pattern is a GOF (Gang of Four) behavioral pattern where the intent is to define a family of algorithms, encapsulate each one, and make them interchangeable.
- Extended prime number finder AlgorithmDec 20, 2010. I wrote this article to explain how to calculate large prime numbers using this struct.
- Connection Strings for SQL Server 2008Dec 20, 2010. SQL Server 2008 includes better compression features, which also helps in improving scalability. It enhanced the indexing algorithms and introduced the notion of filtered indexes. It includes capabilities for transparent encryption of data (TDE) as well as compression of backups.
- Genetic Algorithms in .NETDec 15, 2010. Genetic Algorithms (GAs) are adaptive methods that can be used to solve search and optimization problems.
- Strategy Design PatternOct 25, 2010. The Strategy pattern involves separating an algorithm from its host class and putting it in a separate class. When there are multiple strategies available for an algorithm, for a given problem it is always better to separate them in to different objects.
- Introduction about Strategy PatternSep 21, 2010. The Strategy pattern enables a client to choose which algorithm to use from a family of algorithms and gives it a simple way to access it.
- How we Decrypt the Text File using DES Method in ASP.Net: Part 2Aug 16, 2010. In this article we will learn how to decrypt a Encrypted text file.
- Encrypt a File using DES (Data Encryption standard) Algorithm in ASP.NETAug 16, 2010. In this article we will learn how we can encrypt a file using DES (Data Encryption standard) algorithm in ASP.NET.
- ASP.Net 4.0 ClientIdMay 12, 2010. ASP.Net 4.0 provides four algorithms to generate the ClientId for controls. In this article we will see each of them in detail.
- Compare two files with Hash AlgorithmApr 16, 2010. This article shows you how to compare two files using Hash Algorithm.
- Genetic CloudJan 24, 2010. Complex optimization tasks, like travelling salesman problem, can be solved by simple algorithms with random searching component. Genetic algorithm is one of such approaches. It gives better solution on the big population sizes, but the execution time grows non-linear with population size growth. Another way to increase accuracy is to have several parallel runs. The additional resources for parallel runs could be taken in a Cloud.
- An Algorithm for Grouping Data On One Or More Fields Using A DataReader in .NetJan 18, 2010. In this article you will learn how to use Algorithm for Grouping Data On One Or More Fields Using A DataReader in .Net
- Using PLINQ to Improve Learning AlgorithmsNov 30, 2009. PLINQ is a welcome addition to the .NET 4.0 framework, allowing us to operate on collection elements in parallel. This article examines the performance improvements of PLINQ over LINQ when doing heavy calculations on a large collection of genomes in a particular learning algorithm.
- Simple genetic algorithm on C#Oct 07, 2009. First steps on the exploration of genetic algorithms using C#
- Chess Knight Tour with C# and GDI+Aug 31, 2009. In this article you will learn how to wrap the Graphics object to create a Board class to render and maintain the state.
- .NET Best Practice No: 2:- Improve garbage collector performance using finalize/dispose patternAug 23, 2009. In this article we will first understand the concept of generations and then we will see the finalize dispose pattern. I am sure this article will change your thought process regarding destructor, dispose and finalize.
- Introduction to Microsoft Synchronization Framework: Part IIMay 04, 2009. This article explains about Microsoft synchronization algorithm and its internals.
- Working of Garbage Collector: Part ISep 01, 2008. This article gives you a brief introduction about the c# garbage collector algorithm.
- Using Symmetric Algorithms to Encrypt DataMay 20, 2008. In this article, I will propose a method of how to encrypt data and store it using symmetric algorithms whose are, in fact, four integrated classes within the .Net framework, namely DES,RC2,Rijndael and TripleDES but I will perform the task using the two last ones as they are the mostly used in real time cases.
- Functional Programming with C#: Dynamic List GenerationJan 27, 2008. This article covers how to use functions as the basis for generating lists given some initial seed values. This technique is useful for constructing different types of numeric series, calculating growth and decay, and also useful for searching algorithms.
- Functional Programming with C#: Lazy CalculationJan 20, 2008. I ran across Mike Gold’s nice algorithm for finding primes using LINQ syntax and thought I’d use his idea as a base from which to demonstrate one of the more subtle features in functional programming: lazy calculation.
- Using a Genetic Algorithm to Do Consultant Scheduling in C#Apr 09, 2007. This article describes a way to use a type of genetic algorithm called PBIL (Population Based Incremenetal Learning) to optimize the scheduling of consultants on a group of 5 project.
- Implementation of MD-5 Jan 22, 2007. Describing, how can we implement MD5 and how it works and what is purpose of Hash algorithm.
- How to use Genetic Algorithm for Traveling Salesman ProblemDec 20, 2006. TSP is a famous math problem: Given a number of cities and the costs of traveling from any city to any other city, what is the cheapest round-trip route that visits each city exactly once and then returns to the starting city? We use the Genetic Algorithm to solve the TSP problem as a C# programing example .
- Using Genetic Algorithms to Determine Calculus Derivative Functions in C# and.NETNov 28, 2006. This article describes how you can use genetic algorithms in .NET to determine derivatives of mathematical functions. The program uses an algorithm called Multiple Expression Programming (MEP) inside the genomes to exercise a function tree.
- Subtitles AlgorithmSep 06, 2006. This article explains a simple and useful algorithm that helps you to implement subtitles into your simple video player.
- Random isn't Really Random -- C# Random Number GenerationJul 18, 2006. This article covers overriding the System.Random object in order to produce better random numbers. The project file contains a library of eight commonly used random number generating algorithms, the best of which is the Mersenne Twister algorithm.
- Solving Polynomial Equations with Complex Roots using Genetic Algorithms in C#Apr 09, 2006. This article features a program in which the user can enter a polynomial equation and it will use GAs to determine the complex roots.
- AI: Using Genetic Algorithms and NetSpell to Solve AnagramsMar 27, 2006. Remember the puzzles where you are given a jumble of letters and you have to unscramble a word? This article shows you how to use a genetic algorithm and NetSpell, an open source spell checker, to solve these anagram puzzles.
- Garbage Collector AlgorithmDec 22, 2005. This article explains how garbage collector algorithm works in order to clean managed heap.
- Algorithm to Normalize and Sort FilesDec 20, 2005. A program which do all the sorting work for you. This program is just for Windows, I am working on a Mono Version for Linux.
- Sudoku generating and solving using C# in PocketPC SDKNov 20, 2005. The article is about a program writen in C# to create a simple game application - sudoku. The game can generate several diffculty level sudokus with one solution, solve previously entered puzzles etc.
- AI: Using the Compact Genetic Algorithm to Compute Square Roots in C#Oct 09, 2005. This article describes the Compact Genetic Algorithm (cGA) and how it can be used to calculate the square root of a floating point number.
- Using Genetic Algorithms to come up with Sudoku PuzzlesSep 23, 2005. Sudoku is a new type of puzzle from Japan that will keep you entertained for a time and may even get you hooked. This article demonstrates how to generate a fully populated Sudoku grid using genetic algorithms.
- Design Patterns (Strategy Pattern) Part - IIAug 31, 2005. Define a family of algorithms, encapsulate each one, and make them interchangeable. Strategy lets the algorithm vary independently from clients that use it.

## About Luhn-Algorithm

NA

Web Development Outsourcing

Looking to add more bandwidth to your software team? Web Developers, designers, testers are now available on demand. Flexible hours, very competitive rates, expert team and High Quality work.