Algorithm
Site
-
Computer
Algorithm : ÀüºÏ´ë ¹Ú¼øÃ¶
±³¼ö´Ô µ¿¿µ»ó (¡Ú¡Ú¡Ú)
ÁÁÀº
¼¼»ó°ú ¾Ë°í¸®Áò : ±èÈ«Á¾
- Euclidean
Algorithm
- Definition of the Euclidean algorithm.
- Visible
Euclidean Algorithm
- An interactive page which finds the greatest common divisor of two numbers
using the Euclidean algorithm...... Enter two positive integers, and click the button to have theEuclidean Algorithm
displayed in the lower frame, thereby computingthe greatest common divisor of
the two numbers.
- Euclid
- Biography of Euclid.
-
- Recursive
Procedures
- Definition of recursive procedures and functions.........
Recursion occurs when procedures call themselves (either directly or
indirectly). Any procedural call chain with a circular component exhibits
recursion. Even though recursion is a neat and succinct technique to express a
wide variety of problems. If used incorrectly it may incur certain efficiency
overheads.
-
- Tiling With
Trominos
: A right tromino is an L-shaped object formed by three squares in a grid. If we
remove one square from a square grid of side 2n we can tile the rest
of it using right trominos. This was proved by S. W. Golomb in 1954. Can you
figure out the proof? The applet below uses a recursive algorithm based on that
proof.
- Fibonacci
Numbers and the Golden Section
: The Fibonacci numbers are 0, 1, 1, 2, 3, 5,
8, 13, ... The golden section numbers are ±0·61803 39887... and ±1·61803 39887... The golden string is 1 0 1 1 0 1 0 1 1 0 1
1 0 1 0 1 1 0 1 ...
a sequence of 0s and 1s which is
closely related to the Fibonacci numbers and the golden section
- Fibonacci
-
- Order of
Growth of Functions
- Description of function growth (PDF document). Richard
Johnsonbaugh ÀÇ ¹®¼
-
- What is
public-key cryptography?
: In traditional cryptography, the sender and receiver of a message know and use
the same secret key; the sender uses the secret key to encrypt the message, and
the receiver uses the same secret key to decrypt the message. This method is
known as secret key or symmetric cryptography ......
-
- Introduction
to Public-Key Cryptography : Encryption is the process of transforming information so it is
unintelligible to anyone but the intended recipient. Decryption is the process
of transforming encrypted information so that it is intelligible again. A
cryptographic algorithm, also called a cipher, is a mathematical
function used for encryption or decryption. In most cases, two related functions
are employed, one for encryption and the other for decryption.
Complete
Collection of Algorithm Animation (CCAA) : ¾Ë°í¸®Áò ¾Ö´Ï¸ÞÀÌ¼Ç ¸ðÀ½
Java
and Web based Algorithm Animation (JAWAA) : ¿¹Á¦