Posts

Showing posts with the label Engineering notes

Understanding Data Encryption Standard (DES): A Symmetric-Key Encryption Algorithm

Image
To understand the Data Encryption Standard (DES) algorithm in more detail, it's important to first understand what symmetric-key encryption is. Symmetric-key encryption is a type of encryption where the same key is used to both encrypt and decrypt the data. This means that both the sender and receiver need to have access to the same key in order to communicate securely. The key is kept secret, and if it falls into the wrong hands, the encrypted data can be decrypted by anyone who has the key. DES is a symmetric-key encryption algorithm that uses a block cipher. This means that the data is divided into blocks of a fixed size (in the case of DES, 64 bits) before it is encrypted. The key used to encrypt and decrypt the data is also 64 bits long, although 8 of these bits are used for parity checking and are not actually used in the encryption process. This means that the effective key length for DES is 56 bits. The encryption process in DES involves a series of mathematical operations ...

Unleashing the Power of Big Data: A Comprehensive Guide to Data Analysis and Insights

Image
With the ever-increasing amount of data generated by individuals, organizations, and devices, the concept of big data has gained immense popularity in recent years. Big data refers to extremely large and complex data sets that cannot be effectively processed using traditional data processing methods. In order to effectively manage and analyze big data, new technologies and tools have been developed. These include distributed file systems like Hadoop and Spark, NoSQL databases, and machine learning algorithms. These technologies enable data scientists and analysts to process and analyze data from a variety of sources, including social media, sensors, and IoT devices. Data analysis is a crucial part of working with big data. It involves examining and interpreting data to identify patterns, trends, and insights that can inform decision-making. There are several steps involved in data analysis, including data cleaning, exploration, visualization, and modeling. Data cleaning involves id...

Graph Algorithms | Design and analysis of Algorithms

Image
Graph Algorithms: Graph algorithms deal with various problems on graphs, which are structures consisting of vertices or nodes connected by edges. Some common graph algorithms include: 1. Breadth-First Search (BFS):  This algorithm is used to traverse a graph in a breadth-first manner, visiting all the nodes at a given depth before moving on to the next depth level. 2. Depth-First Search (DFS):  This algorithm is used to traverse a graph in a depth-first manner, visiting all the nodes on a path as far as possible before backtracking. 3. Dijkstra's Algorithm: This algorithm is used to find the shortest path between two nodes in a weighted graph. 4. Prim's Algorithm:  This algorithm is used to find the minimum spanning tree of a weighted graph. 5. Kruskal's Algorithm:  This algorithm is used to find the minimum spanning tree of a weighted graph. 6. Topological Sorting:  This algorithm is used to order the vertices of a directed acyclic graph (DAG) in such a way tha...

What is Relational Data Model ?

Image
  Introduction Before 1970 most the database system were based on  two models  i.e. Hierarchical Model or Network Model Dr. Codd  (IBM Scientist) proposed a relational Data Model in 1970. A RDBMS is a Database  Management system which is based on relational model as introduced by Dr. Codd. It should satisfy Codd 12 rules but in practice there is no DBMS that satisfies all these rules.  Today, popular  RDBMS are: Microsoft Access MSSQL MYSQL Oracle Sybase DB2 Informix FoxBASE, FoxPro & Clipper etc. Overview  of CODD’s 12 rules Dr. E.F. Codd is an IBM researcher who first developed the relational data model in 1970.  In 1985 Dr. Codd published a list of 12 rules that define an ideal  relational database and has provided a guideline for the design of all relational database system Codd's Rules  Rule 1 : The information Rule  This  rule simply requires that all Information/ data should be presented in table form. ...