C# Corner

Resources  
  • Binary Search Using ArrayList Jan 10, 2000. The ArrayList class provide binary search algorithm and more...
  • Symmetric Encryptor Beta1Jan 11, 2000. Free to use Encrypt/Decrypt using 2 Symmetric Algorithms 'DES' and 'RC2' coded in C#.
  • Tic Tac ToeJul 16, 2001. TicTacToe is a demonstration of the AI game playing minimax algorithm. The game plays out every possible combination of moves from each position and consequently is unbeatable. This example uses .NET Beta 2 and was written using a text editor.
  • Sorting, Searching and some other useful programsSep 07, 2001. Here are the some useful programs including many search algorithms, sort, palindrome, fibonacci...
  • Extended Euclidean AlgorithmOct 31, 2001. Author explains how to implement Extended Euclidean Algorithm in C#.
  • Mandelbrodt Plotting Program Using C#Jan 31, 2002. This program illustrates the use of the algorithm to create the Mandelbrodt set. The formula is an iterative one and is plotted in the complex plane (x, yi).
  • Low Cost Credit Card VerificationMar 15, 2002. The last digit of a credit card is a check digit that is used to detect keystroke errors when a check card is entered into a computer.
  • Gene Expression Programming (GEP) in C# and .NETApr 11, 2002. Gene Expression programming (GEP) is a subset of Genetic Algorithms, except it uses genomes whose strings of numbers represent symbols. The string of symbols can further represent equations, grammars, or logical mappings.
  • Implementing a Genetic Algorithms in C# and .NETApr 14, 2002. One of the more interesting developments that has come out of the Artificial Intelligence world is the invention of Genetic Algorithms.
  • File EncryptionMay 05, 2002. The classes in the .Net Framework cryptography namespace manage many details of cryptography for you.
  • Mastermind Computer Player using Genetic Algorithms in C#Jul 22, 2002. After writing the Genetic Algorithm Article for implementing a Genetic Algorithm in C#, I tried to think of a good example of how to illustrate a real-world use of Genetic Algorithms to illustrate artificial intelligence.
  • Generating Maze using C# and .NETSep 25, 2002. This article focuses on how to generate a maze using the depth first search algorithm. This is a very simple but clever algorithm that creates a maze by randomly stripping one available wall between two cells for every cell in the grid.
  • Generating Maze using C# and .NETSep 25, 2002. Did you ever get the feeling that cubicles were laid out with the idea that there could be no escape? (Must be I am a bit overworked these days). Today's article focuses on how to generate a maze using the depth first search algorithm. This is a very simple but clever algorithm that creates a maze by randomly stripping one available wall between two cells for every cell in the grid.
  • Maze Solver Oct 28, 2002. Solving mazes is one of those problems, at least with the algorithm I've chosen here.
  • More AI...(GEP) Gene Expression Programming in C# and .NETNov 04, 2002. Gene Expression programming (GEP) is a subset of Genetic Algorithms, except it uses genomes whose strings of numbers represent symbols.
  • Using Multiple Expressions to derive the Pythagorean TheoremNov 06, 2002. In this article, we will talk about a simpler GA technique for manipulating symbolic expressions and also use it to derive the Pythagorean equation.
  • Implementing Prim's Algorithm using GDI+Dec 31, 2002. Prim's algorithm is an algorithm used in the graphics development to calculate the shortest route in a network when an object is moving from a source node to the destination node.
  • Cryptography in Microsoft.NET Part III: Digital CertificatesJan 08, 2003. Part-I and II of this article discussed the basics of cryptography and its applications in real world enterprise solutions. Part-I discussed the nitty-gritty of encryption and its implementation in Microsoft .NET Framework Class Library (FCL). Part-II discussed the hashing and signature algorithms and their implementation in FCL. It also discussed the two common cryptography applications namely digital envelope & digital signature.
  • Using Genetic Algorithms to Design Logic Circuits in C#Feb 05, 2003. The article goes to explain that GA (Genetic Algorithms) have been used by various programmers to come up with 15 previous patented inventions + (and here is the startling part) some new ones! I can see the running joke in the patent office now.
  • Hash Password GeneratorFeb 10, 2003. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
  • Regular Expression ValidatorMar 14, 2003. This tool is useful when you are creating Regular Expression. This tool will help you in checking syntax of the regular expression typed in.
  • Histogram Code in C#Apr 01, 2003. C# histogram class maintains a histogram of input data. Input data is sorted into bins and a count is kept of how many data points fall into each bin.
  • Mersenne Twister Random Number GeneratorApr 01, 2003. The attached source code is the C# implementation of the Mersenne Twister algorithm, developed by Makoto Matsumoto and Takuji Nishimura in 1996-1997.
  • Math Equation Editor in C#Apr 07, 2003. The Equation Editor I created in C# allows you to create a few simple equations using the keyboard. With the editor you can open and save files of your equations.
  • Using Generic Algorithms to Layout Circuit BoardsApr 07, 2003. This article tells you how to use a Genetic Algorithm to optimally layout parts on a circuit board so they have the shortest connections between them.
  • Simulating a Swarm Algorithm in C# Apr 07, 2003. Rather than reinvent the wheel, I took this code and translated it into C# to demonstrate the swarm behavior in a Windows Form using GDI+. The algorithm is exactly the same and also a fairly simple one.
  • Developing Secure Web Site with ASP.NET and IIS: PartIIMay 07, 2003. Authentication is a very important element of developing secure sites. It is the starting point of a secure environment for the protected resources. I have discussed several authentication mechanisms available in ASP.NET and how they join with IIS to provide a secure platform to develop sites in Part I of this article. I will be looking at Form Authentication and how to implement it in several sample web applications.
  • Trapezoidal Rule Implementation in C#Jul 23, 2003. The attached source code implements trapezoidal rule for numerical integration in C#.
  • Using Genetic Algorithms to Generate Evolutionary Art in C# and .NETOct 10, 2003. In this article we will experiment a bit with genetic algorithms and creating fitness functions that produce art on a Windows Form.
  • Code Generator for Basic Stamp II MicrocontrollerOct 15, 2003. The Basic II Stamp is programmed by the language its named after, Basic. The language is a combination of Basic syntax and built in key words that control the Basic Stamp II chip.
  • Virtual Oscilloscope using PIC Microcontroller Oct 23, 2003. An oscilloscope is probably the most important instrument for observing and measuring electronic circuits.
  • Training and Simulating a Neutral DotNetwork in C# Jan 16, 2004. In this article we will explore a well-known AI algorithm for modeling the training of neural networks called back propagation.
  • Normal Distribution Implementation in C#Apr 13, 2004. The attached source code is a C# normal distribution class. The probability density function (PDF) and cumulative distribution function (CDF) can be computed for a given x-value.
  • Evolving Register Network using Genetic Algorithms in C# Jun 23, 2004. Genetic Algorithms are powerful AI tools because they can evolve through trial and error and converge into a solution. In this article we will use genetic algorithms to come up with an analog solution.
  • Evolving Numeric Series using Genetic Algorithms in C#Jul 27, 2004. If you ever browsed around the book store, you'll notice these puzzle books or IQ test books and some of the books contain questions asking you to complete a series of numbers.
  • Cryptography in .NETJul 31, 2004. This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
  • Formula Generator - A Regular Expression Generator Class in C# and .NETAug 17, 2004. The attached source code is a class - FormulaGenerator, which is a component that interprets and evaluate a string expression
  • How Count Sort worksJan 15, 2005. Count Sort is Linear Sorting algorithm which sorts elements in O(n) time , the other linear sorts include Bucket and Radix sorts.
  • Public Key Token Generation AlgorithmJan 31, 2005. The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.
  • Biology Inspired Computing Work in C#Mar 29, 2005. Biology teaches us a set of rules defined by nature that have evolved over millions of years. So, if you want to put intelligence into something simplifying the world around you into basic rules can give you a big head start.
  • Floating-Point in .NET Part I: Concepts and FormatsApr 18, 2005. The first in a three part series, this article introduces the basic concepts of floating-point arithmetic: number formats, accuracy and precision, and round-off error.
  • AI: Population based Incremental Learning in C# and .NETMay 22, 2005. In this article I would like to discuss another offshoot of the genetic algorithm called Population Based Incremental Learning (PBIL).
  • Design Patterns (Strategy Pattern) Part - IIAug 31, 2005. Define a family of algorithms, encapsulate each one, and make them interchangeable. Strategy lets the algorithm vary independently from clients that use it.
  • Using Genetic Algorithms to come up with Sudoku PuzzlesSep 23, 2005. Sudoku is a new type of puzzle from Japan that will keep you entertained for a time and may even get you hooked. This article demonstrates how to generate a fully populated Sudoku grid using genetic algorithms.
  • AI: Using the Compact Genetic Algorithm to Compute Square Roots in C#Oct 09, 2005. This article describes the Compact Genetic Algorithm (cGA) and how it can be used to calculate the square root of a floating point number.
  • Sudoku generating and solving using C# in PocketPC SDKNov 20, 2005. The article is about a program writen in C# to create a simple game application - sudoku. The game can generate several diffculty level sudokus with one solution, solve previously entered puzzles etc.
  • Algorithm to Normalize and Sort FilesDec 20, 2005. A program which do all the sorting work for you. This program is just for Windows, I am working on a Mono Version for Linux.
  • Garbage Collector AlgorithmDec 22, 2005. This article explains how garbage collector algorithm works in order to clean managed heap.
  • AI: Using Genetic Algorithms and NetSpell to Solve AnagramsMar 27, 2006. Remember the puzzles where you are given a jumble of letters and you have to unscramble a word? This article shows you how to use a genetic algorithm and NetSpell, an open source spell checker, to solve these anagram puzzles.
  • Solving Polynomial Equations with Complex Roots using Genetic Algorithms in C#Apr 09, 2006. This article features a program in which the user can enter a polynomial equation and it will use GAs to determine the complex roots.
  • Random isn't Really Random -- C# Random Number GenerationJul 18, 2006. This article covers overriding the System.Random object in order to produce better random numbers. The project file contains a library of eight commonly used random number generating algorithms, the best of which is the Mersenne Twister algorithm.
  • Subtitles AlgorithmSep 06, 2006. This article explains a simple and useful algorithm that helps you to implement subtitles into your simple video player.
  • Using Genetic Algorithms to Determine Calculus Derivative Functions in C# and.NETNov 28, 2006. This article describes how you can use genetic algorithms in .NET to determine derivatives of mathematical functions. The program uses an algorithm called Multiple Expression Programming (MEP) inside the genomes to exercise a function tree.
  • How to use Genetic Algorithm for Traveling Salesman ProblemDec 20, 2006. TSP is a famous math problem: Given a number of cities and the costs of traveling from any city to any other city, what is the cheapest round-trip route that visits each city exactly once and then returns to the starting city? We use the Genetic Algorithm to solve the TSP problem as a C# programing example .
  • Implementation of MD-5 Jan 22, 2007. Describing, how can we implement MD5 and how it works and what is purpose of Hash algorithm.
  • Using a Genetic Algorithm to Do Consultant Scheduling in C#Apr 09, 2007. This article describes a way to use a type of genetic algorithm called PBIL (Population Based Incremenetal Learning) to optimize the scheduling of consultants on a group of 5 project.
  • Functional Programming with C#: Lazy CalculationJan 20, 2008. I ran across Mike Gold’s nice algorithm for finding primes using LINQ syntax and thought I’d use his idea as a base from which to demonstrate one of the more subtle features in functional programming: lazy calculation.
  • Functional Programming with C#: Dynamic List GenerationJan 27, 2008. This article covers how to use functions as the basis for generating lists given some initial seed values. This technique is useful for constructing different types of numeric series, calculating growth and decay, and also useful for searching algorithms.
  • Using Symmetric Algorithms to Encrypt DataMay 20, 2008. In this article, I will propose a method of how to encrypt data and store it using symmetric algorithms whose are, in fact, four integrated classes within the .Net framework, namely DES,RC2,Rijndael and TripleDES but I will perform the task using the two last ones as they are the mostly used in real time cases.
  • Working of Garbage Collector: Part ISep 01, 2008. This article gives you a brief introduction about the c# garbage collector algorithm.
  • Introduction to Microsoft Synchronization Framework: Part IIMay 04, 2009. This article explains about Microsoft synchronization algorithm and its internals.
  • .NET Best Practice No: 2:- Improve garbage collector performance using finalize/dispose patternAug 23, 2009. In this article we will first understand the concept of generations and then we will see the finalize dispose pattern. I am sure this article will change your thought process regarding destructor, dispose and finalize.
  • Chess Knight Tour with C# and GDI+Aug 31, 2009. In this article you will learn how to wrap the Graphics object to create a Board class to render and maintain the state.
  • Simple genetic algorithm on C#Oct 07, 2009. First steps on the exploration of genetic algorithms using C#
  • Using PLINQ to Improve Learning AlgorithmsNov 30, 2009. PLINQ is a welcome addition to the .NET 4.0 framework, allowing us to operate on collection elements in parallel. This article examines the performance improvements of PLINQ over LINQ when doing heavy calculations on a large collection of genomes in a particular learning algorithm.
  • An Algorithm for Grouping Data On One Or More Fields Using A DataReader in .NetJan 18, 2010. In this article you will learn how to use Algorithm for Grouping Data On One Or More Fields Using A DataReader in .Net
  • Genetic CloudJan 24, 2010. Complex optimization tasks, like travelling salesman problem, can be solved by simple algorithms with random searching component. Genetic algorithm is one of such approaches. It gives better solution on the big population sizes, but the execution time grows non-linear with population size growth. Another way to increase accuracy is to have several parallel runs. The additional resources for parallel runs could be taken in a Cloud.
  • Compare two files with Hash AlgorithmApr 16, 2010. This article shows you how to compare two files using Hash Algorithm.
  • ASP.Net 4.0 ClientIdMay 12, 2010. ASP.Net 4.0 provides four algorithms to generate the ClientId for controls. In this article we will see each of them in detail.
  • Encrypt a File using DES (Data Encryption standard) Algorithm in ASP.NETAug 16, 2010. In this article we will learn how we can encrypt a file using DES (Data Encryption standard) algorithm in ASP.NET.
  • How we Decrypt the Text File using DES Method in ASP.Net: Part 2Aug 16, 2010. In this article we will learn how to decrypt a Encrypted text file.
  • Introduction about Strategy PatternSep 21, 2010. The Strategy pattern enables a client to choose which algorithm to use from a family of algorithms and gives it a simple way to access it.
  • Strategy Design PatternOct 25, 2010. The Strategy pattern involves separating an algorithm from its host class and putting it in a separate class. When there are multiple strategies available for an algorithm, for a given problem it is always better to separate them in to different objects.
  • Genetic Algorithms in .NETDec 15, 2010. Genetic Algorithms (GAs) are adaptive methods that can be used to solve search and optimization problems.
  • Connection Strings for SQL Server 2008Dec 20, 2010. SQL Server 2008 includes better compression features, which also helps in improving scalability. It enhanced the indexing algorithms and introduced the notion of filtered indexes. It includes capabilities for transparent encryption of data (TDE) as well as compression of backups.
  • Extended prime number finder AlgorithmDec 20, 2010. I wrote this article to explain how to calculate large prime numbers using this struct.
  • Strategy PatternJan 30, 2011. The Strategy Pattern is a GOF (Gang of Four) behavioral pattern where the intent is to "define a family of algorithms, encapsulate each one, and make them interchangeable".
  • Strategy Pattern in .NETFeb 24, 2011. The Strategy design pattern defines a family of algorithms, encapsulates each one, and makes them interchangeable. Strategy lets the algorithm vary independently from clients that use it.
  • SQL Server 2008 Recovery ModelsMar 01, 2011. SQL Server is a database management system that includes several data management and analysis technologies. It includes better compression features, which also helps in improving scalability and enhancing the indexing algorithms and introduce the notion of filtered indexes.
  • Implementing the DBSCAN Algorithm using C#Mar 17, 2011. I was recently asked if I could implement DBSCAN algorithm in C# as there appears to be no other implementation which is freely available. Here I am showing to implement this algorithm.
  • Implementing the QT Algorithm using C#Mar 17, 2011. The basic idea of cluster analysis is to partition a set of points into clusters which have some relationship to each other.
  • Simulating Binary Literals in C#Mar 19, 2011. How to use integers instead of strings so that we can easily do bit and normal arithmetic with binary numbers.
  • Efficient String Matching Algorithm with Use of Wildcard CharactersAug 15, 2011. In this article we shall cover one common problem in textual data processing and that is how to match strings against patterns that may contain wildcard characters.
  • Configurable String Matching SolutionAug 16, 2011. In this article we are presenting classes which can be used to formalize the string comparison. Applications can offer several comparison methods and then let the caller decide which one to use in every call to a function. Classes shown in this article can help build such functionality almost without effort.
  • AES Encryption using 256 bit Encryption key and IV spec parameterNov 17, 2011. AES is a strong algorithm to encrypt or decrypt the data. Java, .NET and C++ provide different implementation to achieve this kind of encryption.
  • Microcontroller Based Robotic Garbage CollectorDec 06, 2011. In this article a light has been thrown on how can we make a garbage collector by using C# algorithm and to apply it in different hardware components.
  • Binary Search in JavaMar 24, 2012. In this article we are going to describe implementation of a Binary Search in the Java language. So first you should understand what a Binary Search is. A Binary Search is applicable only to a sorted array and any data structure.
  • Linear Search in JavaMar 25, 2012. In this article we are going to discuss or describe Java linear searches. This is the simplest method of searching. In this method, the element to be searched is sequentially searched in the list. This method can be applied to a sorted or an unsorted list.
  • IMEI Validator Using Java SwingJul 04, 2012. This article covers how to create a simple IMEI validator application using Java Swing.
  • Tic Tac Toe Game in VB.NET Nov 08, 2012. TicTacToe is a demonstration of the AI game playing minimax algorithm. The game plays out every possible combination of moves from each position and consequently is unbeatable.
  • Hash Password Generator in VB.NETNov 10, 2012. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
  • Cryptography in VB.NET Part 1Nov 10, 2012. For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
  • Tic Tac Toe Game in VB.NETNov 10, 2012. TicTacToe is a demonstration of the AI game playing minimax algorithm. The game plays out every possible combination of moves from each position and consequently is unbeatable.
  • Bubble Sort In C#Jan 03, 2013. In this article I am going to show sorting an array using the Bubble Sort Algorithm.
  • Demystify Garbage Collection in C#: Part 5Aug 24, 2013. In this article we will see how the Garbage Collection algorithm works. We will next see how to implement a weak reference to optimize performance.
  • An Introduction to Phonetic Search in JavaOct 07, 2013. This article introduces phonetic search algorithms and their usage in Java based applications without reinventing the wheel.
  • RSA Algorithm With C#Dec 07, 2013. This article describes the RSA Algorithm and shows how to use it in C#.
  • Insertion & Deletion in a Binary Search Tree Using C#Jan 25, 2014. This articles describes the algorithm to insert and delete elements in a Binary Search Tree (BST) and it's implementation in C#.
  • Simple and Effective Way to Find the Boundary Items of a Binary TreeApr 07, 2014. This article describes an algorithm that performs boundary item detection of a binary tree. Special logic in this algorithm makes this more effective than others.
  • How MediaTypeFormatter and MediaTypeMapping Are Associated With Each Other in Web ApiMay 10, 2014. In this article I’ll explain “How MediaTypeFormatter and MediaTypeMapping are associated with each other as well as the precedence order to handling the request”.

About Luhn-Algorithm

NA

SPONSORED BY

Custom Software Development
MCN is your source for developing solutions involving websites, mobile apps, cloud-computing, databases, BI, back-end services and processes and client-server applications.
European SharePoint Conference