## Tags

No tag found

Content Filter Articles

Videos

Blogs

Resources

News

Forums

Interviews

Complexity Level

Refine by Author [Clear] -
Beginner -
Intermediate -
Advanced

- Mike Gold(14)
- Suketu Nayak(3)
- Vulpes (3)
- Matthew Cochran(3)
- Nilesh Jadav(2)
- Emiliano Musso(2)
- Saineshwar Bageri(2)
- Paul Lockwood(2)
- Abhishek Dubey(2)
- Zoran Horvat(2)
- Nipun Tomar(2)
- Srihari Chinna(2)
- Brijesh Jalan(2)
- Trevor Misfeldt(2)
- Arvind Singh Baghel(1)
- Sourav Bhattacharya(1)
- Jean-Claude Colette(1)
- Željko Perić(1)
- Rajib Rezwan(1)
- Sridhar Sharma(1)
- Mohammed Ibrahim (1)
- Gopi Chand(1)
- Bruno Leonardo Michels(1)
- Udaya kumar(1)
- Kamal Rawat(1)
- Michal Habalcik(1)
- Jignesh Trivedi(1)
- Raj Bandi(1)
- Jesus Morales(1)
- Sahil Sharma(1)
- Rahul Bansal(1)
- Sachin Kalia(1)
- Selva Ganapathy(1)
- Prakash Tripathi(1)
- Sourabh Somani(1)
- Debadatta Mishra(1)
- Sourav Kayal(1)
- Sandeep Singh Shekhawat(1)
- Gowry S Paramasivam(1)
- Mohammed Asief(1)
- Santhosh Kumar Jayaraman(1)
- Sonakshi Singh(1)
- Aarti (1)
- Shinuraj (1)
- Abhishek Bhat(1)
- Josip Juric(1)
- Uziel gc(1)
- Pradeep Chandraker(1)
- Kirtan Patel(1)
- Pavel Klimov(1)
- jeff fernandez(1)
- Alfredo Alvarez(1)
- Felipe Ramos(1)
- Shivprasad (1)
- Sateesh Arveti(1)
- Eranda Horanagama(1)
- Bechir Bejaoui(1)
- Muhammad Shakir(1)
- Yuan Wang(1)
- Peter (1)
- Anand Thakur(1)
- Melkor (1)
- Alex Groysman(1)
- Saif Ikram(1)
- jeffrey 0(1)
- Nick Hardman(1)
- Shashi Jeevan M P(1)
- Razi Rais(1)
- Tiberiu Ionescu(1)
- Suprotim Agarwal(1)
- Gayan Peiris(1)

Resources No resource found

- What Is Bully Algorithm In Mutual ExclusionApr 22, 2017. This article presents insights on what Bully algorithm In Mutual Exclusion is.
- Introduction To AES And DES Encryption Algorithms In .NETFeb 17, 2017. In this article, I am going to explore encryption and decryption. We will see some of the encryption algorithms with C# example code.
- Getting Started With Floyd’s Warshall AlgorithmNov 14, 2016. In this article, you will learn about Floyd’s Warshall algorithm.
- Key Based Cryptographic AlgorithmsSep 23, 2016. In this article, you will learn about Key based cryptographic algorithms.
- Solving a Maze Without Recursion In C#Jun 20, 2016. In this article, we present a non-recursive algorithm that finds all solutions of a maze.
- Packing Two Dimensional Rectangular Elements At Orthogonal TableMay 20, 2016. Here is a program made for two dimensional rectangular elements at orthogonal table in sequence along the X axis of the table, with horizontal orientation exclusively.
- Regression Algorithms Parameters In Azure MLMay 07, 2016. In this article you will learn about Regression Algorithms parameters in Azure ML.
- Fun with Backtracking - The N Queen ProblemApr 26, 2016. This article is for Implementation of backtracking algorithm using c#.
- Understanding Classification Algorithms In Azure MLApr 25, 2016. In this article you will understand about Classification Algorithms in Azure ML.
- Classification Algorithms Parameters In Azure MLApr 25, 2016. In this article you will learn about Classification Algorithms parameters in Azure ML.
- A Simple Way to Learn GenericsNov 20, 2015. In this article we will look at the basics of generics. Generics is a mechanism offered by the Common Language Runtime (CLR) and programming languages that provide one form of code re-use and algorithm re-use.
- Simple Login Form Using MD5 Hash AlgorithmSep 14, 2015. In this article, I will show how to create a login form using MD5 hash algorithm.
- How to Encrypt and Decrypt the String in Java Without Using Any AlgorithmJun 03, 2015. This article teaches you how a string can be simply encrypted & decrypted in Java.
- Using Reflection to Get Enum Description and ValueMay 31, 2015. In this article you will see how to handle enum values with descriptions.
- Genetic Algorithm to Solve 2D MazesApr 19, 2015. This article shows how to use genetic algorithms to solve problems. The approach uses Genetic Algorithms (GA) in the solutions optimization context.
- Genetic Algorithm For Icon Generation in Visual BasicApr 16, 2015. This article provides some of the basics of genetic algorithms, including what they are, what they're good for, why we call them "genetic", and so on. This provides both theory and sample implementations in Visual Basic .NET.
- Validating Mobile IMEI NumberMar 28, 2015. In this article you will learn how to validate the Mobile IMEI number.
- C# Corner Delhi Chapter "How to Crack the Coding Interview": Discussion of TestFeb 18, 2015. Here we will discuss the written test of C# Corner Delhi Chapter "How to Crack the Coding Interview" event.
- Encrypt in JavaScript and Decrypt in C# With AES Algorithm in ASP.Net in MVC 4Jan 26, 2015. This article shows how to encrypt on the client side values in JavaScript and decrypt in C# with AES algorithm in ASP.NET MVC 4.
- Encrypt in JavaScript and Decrypt in C# With AES AlgorithmJan 18, 2015. In this article I am going to show you how to encrypt Client side values in JavaScript and decrypt in C# with AES algorithm in ASP.NET web forms.
- A Day Without Visual Studio; Game Programming Algorithms and Techniques ReviewJan 09, 2015. This article provides a brief Game Programming Algorithms and Techniques book review.
- Garbage Collection In DepthJan 05, 2015. This article looks at Garbage Collection in depth.
- Using Cryptography in Portable Xamarin Forms (Windows Phone, Android and IOS)Dec 23, 2014. In this article, I will explain how to use cryptographic algorithms as common code in C# targeting multiple mobile platforms (Windows phone, Android and IOS) using Xamarin forms without depending on native functionality.
- Introduction to Regular ExpressionsDec 22, 2014. This article is the beginning of a series on regular expressions and the importance of learning such technologies. The article attempts to explain why this should matter to us.
- The Fibonacci NumbersOct 03, 2014. This article helps you to understand Fibonacci Numbers and also provides various ways to generate a Fibonacci series in C#.
- Generate the Client Side Hash Password Via MD5 Algorithm and Saving it to DatabaseAug 26, 2014. This article shows how to convert a plain password to a hashed password using the MD5 algorithm on the client side and save it to the database.
- How MediaTypeFormatter and MediaTypeMapping Are Associated With Each Other in Web ApiMay 10, 2014. In this article I’ll explain “How MediaTypeFormatter and MediaTypeMapping are associated with each other as well as the precedence order to handling the request”.
- Simple and Effective Way to Find the Boundary Items of a Binary TreeApr 07, 2014. This article describes an algorithm that performs boundary item detection of a binary tree. Special logic in this algorithm makes this more effective than others.
- Insertion & Deletion in a Binary Search Tree Using C#Jan 25, 2014. This articles describes the algorithm to insert and delete elements in a Binary Search Tree (BST) and it's implementation in C#.
- RSA Algorithm With C#Dec 07, 2013. This article describes the RSA Algorithm and shows how to use it in C#.
- An Introduction to Phonetic Search in JavaOct 07, 2013. This article introduces phonetic search algorithms and their usage in Java based applications without reinventing the wheel.
- Demystify Garbage Collection in C#: Part 5Aug 24, 2013. In this article we will see how the Garbage Collection algorithm works. We will next see how to implement a weak reference to optimize performance.
- Bubble Sort In C#Jan 03, 2013. In this article I am going to show sorting an array using the Bubble Sort Algorithm.
- Tic Tac Toe Game in VB.NETNov 10, 2012. TicTacToe is a demonstration of the AI game playing minimax algorithm. The game plays out every possible combination of moves from each position and consequently is unbeatable.
- Cryptography in VB.NET Part 1Nov 10, 2012. For any Distributed Framework or Infrastructure to be successful today it has to have an extensive support for developing secured solutions. Microsoft .NET is developed from bottom up with security in mind. It has an eclectic security infrastructure.
- Hash Password Generator in VB.NETNov 10, 2012. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
- Tic Tac Toe Game in VB.NET Nov 08, 2012. TicTacToe is a demonstration of the AI game playing minimax algorithm. The game plays out every possible combination of moves from each position and consequently is unbeatable.
- IMEI Validator Using Java SwingJul 04, 2012. This article covers how to create a simple IMEI validator application using Java Swing.
- Linear Search in JavaMar 25, 2012. In this article we are going to discuss or describe Java linear searches. This is the simplest method of searching. In this method, the element to be searched is sequentially searched in the list. This method can be applied to a sorted or an unsorted list.
- Binary Search in JavaMar 24, 2012. In this article we are going to describe implementation of a Binary Search in the Java language. So first you should understand what a Binary Search is. A Binary Search is applicable only to a sorted array and any data structure.
- Microcontroller Based Robotic Garbage CollectorDec 06, 2011. In this article a light has been thrown on how can we make a garbage collector by using C# algorithm and to apply it in different hardware components.
- AES Encryption using 256 bit Encryption key and IV spec parameterNov 17, 2011. AES is a strong algorithm to encrypt or decrypt the data. Java, .NET and C++ provide different implementation to achieve this kind of encryption.
- Configurable String Matching SolutionAug 16, 2011. In this article we are presenting classes which can be used to formalize the string comparison. Applications can offer several comparison methods and then let the caller decide which one to use in every call to a function. Classes shown in this article can help build such functionality almost without effort.
- Efficient String Matching Algorithm with Use of Wildcard CharactersAug 15, 2011. In this article we shall cover one common problem in textual data processing and that is how to match strings against patterns that may contain wildcard characters.
- Simulating Binary Literals in C#Mar 19, 2011. How to use integers instead of strings so that we can easily do bit and normal arithmetic with binary numbers.
- Implementing the QT Algorithm using C#Mar 17, 2011. The basic idea of cluster analysis is to partition a set of points into clusters which have some relationship to each other.
- Implementing the DBSCAN Algorithm using C#Mar 17, 2011. I was recently asked if I could implement DBSCAN algorithm in C# as there appears to be no other implementation which is freely available. Here I am showing to implement this algorithm.
- SQL Server 2008 Recovery ModelsMar 01, 2011. SQL Server is a database management system that includes several data management and analysis technologies. It includes better compression features, which also helps in improving scalability and enhancing the indexing algorithms and introduce the notion of filtered indexes.
- Strategy Pattern in .NETFeb 24, 2011. The Strategy design pattern defines a family of algorithms, encapsulates each one, and makes them interchangeable. Strategy lets the algorithm vary independently from clients that use it.
- Strategy PatternJan 30, 2011. The Strategy Pattern is a GOF (Gang of Four) behavioral pattern where the intent is to "define a family of algorithms, encapsulate each one, and make them interchangeable".
- Extended prime number finder AlgorithmDec 20, 2010. I wrote this article to explain how to calculate large prime numbers using this struct.
- Connection Strings for SQL Server 2008Dec 20, 2010. SQL Server 2008 includes better compression features, which also helps in improving scalability. It enhanced the indexing algorithms and introduced the notion of filtered indexes. It includes capabilities for transparent encryption of data (TDE) as well as compression of backups.
- Genetic Algorithms in .NETDec 15, 2010. Genetic Algorithms (GAs) are adaptive methods that can be used to solve search and optimization problems.
- Strategy Design PatternOct 25, 2010. The Strategy pattern involves separating an algorithm from its host class and putting it in a separate class. When there are multiple strategies available for an algorithm, for a given problem it is always better to separate them in to different objects.
- Introduction about Strategy PatternSep 21, 2010. The Strategy pattern enables a client to choose which algorithm to use from a family of algorithms and gives it a simple way to access it.
- How we Decrypt the Text File using DES Method in ASP.Net: Part 2Aug 16, 2010. In this article we will learn how to decrypt a Encrypted text file.
- Encrypt a File using DES (Data Encryption standard) Algorithm in ASP.NETAug 16, 2010. In this article we will learn how we can encrypt a file using DES (Data Encryption standard) algorithm in ASP.NET.
- ASP.Net 4.0 ClientIdMay 12, 2010. ASP.Net 4.0 provides four algorithms to generate the ClientId for controls. In this article we will see each of them in detail.
- Compare two files with Hash AlgorithmApr 16, 2010. This article shows you how to compare two files using Hash Algorithm.
- Genetic CloudJan 24, 2010. Complex optimization tasks, like travelling salesman problem, can be solved by simple algorithms with random searching component. Genetic algorithm is one of such approaches. It gives better solution on the big population sizes, but the execution time grows non-linear with population size growth. Another way to increase accuracy is to have several parallel runs. The additional resources for parallel runs could be taken in a Cloud.
- An Algorithm for Grouping Data On One Or More Fields Using A DataReader in .NetJan 18, 2010. In this article you will learn how to use Algorithm for Grouping Data On One Or More Fields Using A DataReader in .Net
- Using PLINQ to Improve Learning AlgorithmsNov 30, 2009. PLINQ is a welcome addition to the .NET 4.0 framework, allowing us to operate on collection elements in parallel. This article examines the performance improvements of PLINQ over LINQ when doing heavy calculations on a large collection of genomes in a particular learning algorithm.
- Simple genetic algorithm on C#Oct 07, 2009. First steps on the exploration of genetic algorithms using C#
- Chess Knight Tour with C# and GDI+Aug 31, 2009. In this article you will learn how to wrap the Graphics object to create a Board class to render and maintain the state.
- .NET Best Practice No: 2:- Improve garbage collector performance using finalize/dispose patternAug 23, 2009. In this article we will first understand the concept of generations and then we will see the finalize dispose pattern. I am sure this article will change your thought process regarding destructor, dispose and finalize.
- Introduction to Microsoft Synchronization Framework: Part IIMay 04, 2009. This article explains about Microsoft synchronization algorithm and its internals.
- Working of Garbage Collector: Part ISep 01, 2008. This article gives you a brief introduction about the c# garbage collector algorithm.
- Using Symmetric Algorithms to Encrypt DataMay 20, 2008. In this article, I will propose a method of how to encrypt data and store it using symmetric algorithms whose are, in fact, four integrated classes within the .Net framework, namely DES,RC2,Rijndael and TripleDES but I will perform the task using the two last ones as they are the mostly used in real time cases.
- Functional Programming with C#: Dynamic List GenerationJan 27, 2008. This article covers how to use functions as the basis for generating lists given some initial seed values. This technique is useful for constructing different types of numeric series, calculating growth and decay, and also useful for searching algorithms.
- Functional Programming with C#: Lazy CalculationJan 20, 2008. I ran across Mike Gold’s nice algorithm for finding primes using LINQ syntax and thought I’d use his idea as a base from which to demonstrate one of the more subtle features in functional programming: lazy calculation.
- Using a Genetic Algorithm to Do Consultant Scheduling in C#Apr 09, 2007. This article describes a way to use a type of genetic algorithm called PBIL (Population Based Incremenetal Learning) to optimize the scheduling of consultants on a group of 5 project.
- Implementation of MD-5 Jan 22, 2007. Describing, how can we implement MD5 and how it works and what is purpose of Hash algorithm.
- How to use Genetic Algorithm for Traveling Salesman ProblemDec 20, 2006. TSP is a famous math problem: Given a number of cities and the costs of traveling from any city to any other city, what is the cheapest round-trip route that visits each city exactly once and then returns to the starting city? We use the Genetic Algorithm to solve the TSP problem as a C# programing example .
- Using Genetic Algorithms to Determine Calculus Derivative Functions in C# and.NETNov 28, 2006. This article describes how you can use genetic algorithms in .NET to determine derivatives of mathematical functions. The program uses an algorithm called Multiple Expression Programming (MEP) inside the genomes to exercise a function tree.
- Subtitles AlgorithmSep 06, 2006. This article explains a simple and useful algorithm that helps you to implement subtitles into your simple video player.
- Random isn't Really Random -- C# Random Number GenerationJul 18, 2006. This article covers overriding the System.Random object in order to produce better random numbers. The project file contains a library of eight commonly used random number generating algorithms, the best of which is the Mersenne Twister algorithm.
- Solving Polynomial Equations with Complex Roots using Genetic Algorithms in C#Apr 09, 2006. This article features a program in which the user can enter a polynomial equation and it will use GAs to determine the complex roots.
- AI: Using Genetic Algorithms and NetSpell to Solve AnagramsMar 27, 2006. Remember the puzzles where you are given a jumble of letters and you have to unscramble a word? This article shows you how to use a genetic algorithm and NetSpell, an open source spell checker, to solve these anagram puzzles.
- Garbage Collector AlgorithmDec 22, 2005. This article explains how garbage collector algorithm works in order to clean managed heap.
- Algorithm to Normalize and Sort FilesDec 20, 2005. A program which do all the sorting work for you. This program is just for Windows, I am working on a Mono Version for Linux.
- Sudoku generating and solving using C# in PocketPC SDKNov 20, 2005. The article is about a program writen in C# to create a simple game application - sudoku. The game can generate several diffculty level sudokus with one solution, solve previously entered puzzles etc.
- AI: Using the Compact Genetic Algorithm to Compute Square Roots in C#Oct 09, 2005. This article describes the Compact Genetic Algorithm (cGA) and how it can be used to calculate the square root of a floating point number.
- Using Genetic Algorithms to come up with Sudoku PuzzlesSep 23, 2005. Sudoku is a new type of puzzle from Japan that will keep you entertained for a time and may even get you hooked. This article demonstrates how to generate a fully populated Sudoku grid using genetic algorithms.
- Design Patterns (Strategy Pattern) Part - IIAug 31, 2005. Define a family of algorithms, encapsulate each one, and make them interchangeable. Strategy lets the algorithm vary independently from clients that use it.
- AI: Population based Incremental Learning in C# and .NETMay 22, 2005. In this article I would like to discuss another offshoot of the genetic algorithm called Population Based Incremental Learning (PBIL).
- Floating-Point in .NET Part I: Concepts and FormatsApr 18, 2005. The first in a three part series, this article introduces the basic concepts of floating-point arithmetic: number formats, accuracy and precision, and round-off error.
- Biology Inspired Computing Work in C#Mar 29, 2005. Biology teaches us a set of rules defined by nature that have evolved over millions of years. So, if you want to put intelligence into something simplifying the world around you into basic rules can give you a big head start.
- Public Key Token Generation AlgorithmJan 31, 2005. The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.
- How Count Sort worksJan 15, 2005. Count Sort is Linear Sorting algorithm which sorts elements in O(n) time , the other linear sorts include Bucket and Radix sorts.
- Formula Generator - A Regular Expression Generator Class in C# and .NETAug 17, 2004. The attached source code is a class - FormulaGenerator, which is a component that interprets and evaluate a string expression
- Cryptography in .NETJul 31, 2004. This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
- Evolving Numeric Series using Genetic Algorithms in C#Jul 27, 2004. If you ever browsed around the book store, you'll notice these puzzle books or IQ test books and some of the books contain questions asking you to complete a series of numbers.
- Evolving Register Network using Genetic Algorithms in C# Jun 23, 2004. Genetic Algorithms are powerful AI tools because they can evolve through trial and error and converge into a solution. In this article we will use genetic algorithms to come up with an analog solution.
- Normal Distribution Implementation in C#Apr 13, 2004. The attached source code is a C# normal distribution class. The probability density function (PDF) and cumulative distribution function (CDF) can be computed for a given x-value.
- Training and Simulating a Neutral DotNetwork in C# Jan 16, 2004. In this article we will explore a well-known AI algorithm for modeling the training of neural networks called back propagation.
- Virtual Oscilloscope using PIC Microcontroller Oct 23, 2003. An oscilloscope is probably the most important instrument for observing and measuring electronic circuits.
- Code Generator for Basic Stamp II MicrocontrollerOct 15, 2003. The Basic II Stamp is programmed by the language its named after, Basic. The language is a combination of Basic syntax and built in key words that control the Basic Stamp II chip.
- Using Genetic Algorithms to Generate Evolutionary Art in C# and .NETOct 10, 2003. In this article we will experiment a bit with genetic algorithms and creating fitness functions that produce art on a Windows Form.
- Trapezoidal Rule Implementation in C#Jul 23, 2003. The attached source code implements trapezoidal rule for numerical integration in C#.
- Developing Secure Web Site with ASP.NET and IIS: PartIIMay 07, 2003. Authentication is a very important element of developing secure sites. It is the starting point of a secure environment for the protected resources. I have discussed several authentication mechanisms available in ASP.NET and how they join with IIS to provide a secure platform to develop sites in Part I of this article. I will be looking at Form Authentication and how to implement it in several sample web applications.

## About Luhn-Algorithm

NA

File APIs for .NET

Aspose are the market leader of .NET APIs for file business formats – natively work with DOCX, XLSX, PPT, PDF, MSG, MPP, images formats and many more!