Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (2)
Encryption and re-encryption by Hill method
4.0
Method of Hill, This is an encryption method that uses square matrices. We believe this is an attractive way for students to learn matrix algebra, arithmetic modulo n and the concept of algorithm. '  
IskandarAlsoufi
2016-08-23
0
1
THE IMPLEMENTATION OF THE ALGORITHM OF LZW
5.0
Introduction: The LZW algorithm was patented by Unisys. It has been used in modems (standard V42 bis) and is still used in digital image formats GIF or TIFF files and audio MOD.L algorithm was designed to be fast to implement, but is most of the time not optimal because it performs a limited analysis of the data to compress. Description of the algorithm The compression algorithm builds a translation table string from text to compress. This table relates codes of fixed size to strings . The table is initialized with all characters ( 256 entries in the case of 8-bit characters ) . As the compressor examines the text, it adds each string 2 characters in the table as a concatenation of code and characters, with the first character of the string code. At the same time it saves these strings , the first character is output . Whenever a chain already encountered is read, the longest chain ever encountered is determined , and for this string concatenated with t
IskandarAlsoufi
2014-06-04
0
1
No more~