Labels

ACO (3) AdaBoost (2) Ant Colony Optimization (2) Backpropagation (2) binary constraint graph (1) blockchain (2) brute force (1) brute force algorithm (1) Class Scheduling (12) conditional independence (1) conference cheduling (1) conference scheduling (2) constraint satisfaction problem (3) cryptocurrency (3) csp (3) cyclic group (1) data mining (3) decision trees (12) derive equations (1) DHKE (6) Diffie Hellman Problem (1) Diffie-Hellman Key Exchange (2) Digital Signature Algorithm (1) Discrete Logarithm Problem (1) double and add algorithm (1) download source code (1) DSA (1) ecc (1) ECDH (1) ECDSA (1) Elgamal (1) Elgamal Digital Signature (1) Elliptic Curve (1) Elliptic Curve Diffie–Hellman key exchange (1) Elliptic Curve Cryptography (1) Elliptic Curve Digital Signature Algorithm (1) Encryption (1) euler phi function (1) extended euclidean algorithm (1) generalized discrete logarithm problem (1) generate rules (3) Genetic Algorithm (5) Genetic Algorithms (19) gradient descent (2) group (1) group generator (1) grow xml tree (1) Handle Underflow (1) hashing (1) hill climbing (7) hopfield network (2) independence (1) info gain (1) information gain (2) java (84) javafx (1) k-nearest neighbors (2) Laplace Smoothing (2) linear algebra (3) Linear Regression (2) logical operators (1) logistic regression (4) map coloring (1) message authenticity (1) message confidentiality (1) message integrity (1) multi-party Diffie-Hellman Key Exchange (1) Naive Bayes (6) nearest neighbor (1) nearest neighbors (1) Neural Networks (10) node splitting (1) Normal Equation (2) numpy (1) P2P (10) Peer to Peer (5) peer-to-peer (2) point addition (1) point doubling (1) pow (3) probability (2) proof of work (3) proof-of-work (1) public key cryptography (9) Public Key Cryptography + DHKE w/ Encryption + JAVA (1) Python (18) random restart hill climbing (2) robotics (1) rsa (1) RSA Digital Signature (1) Scala (1) Sentiment Classification (4) Sequential Minimal Optimization (2) sha-256 (1) simulated annealing (2) SMO (2) sqlite (21) stochastic gradient descent (2) Support Vector Machines (2) SVM (2) Traveling Salesman Problem (1) TSP (13) underflow handling (1) use rules (3) workshops scheduling (2)

Sunday, March 21, 2021

Class Scheduling + Hill Climbing + instructor availability + interactive command line + SQLite + JAVA

 



Class Scheduling + Hill Climbing + instructor availability +
interactive command line + SQLite +JAVA

add database handling of instructor availability

add instructor availability code

add interactive command line functionality

test run application: initial data display

test run application: potential maxima reached

test run application: found schedule with 0 conflicts

change input data coming from sqlite database + re-test run application

-----------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for:
Class Scheduling + Hill Climbing + instructor availability + 
interactive command line + SQLite + JAVA
-----------------------------------------------------------------------------------------------------------






------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------

Thursday, March 11, 2021

Class Scheduling + Hill Climbing + SQLite DB + JAVA

 


Class Scheduling + Hill Climbing + SQLite DB + JAVA


00:12 create and populate SQLite database

00:42 demo the application 01:44 potential conflicts for this simple application

06:51 test data used in this application

07:56 code the application

13:50 test run the application

-----------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for:
Class Scheduling + Hill Climbing + SQLite DB + JAVA
-----------------------------------------------------------------------------------------------------------






------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------

Thursday, January 7, 2021

Multi-party Diffie-Hellman Key Exchange + Peer-to-peer + JAVA

 

00:07 demo prebuilt version of app. with 5 communicating and one eavesdropper peers

01:16 PassiveEve picking up messages from Alice, Bob, Carla , Dave, and Elena
01:32 Alice picking up messages from Elena
01:42 Bob picking up messages from Alice
01:52 Carla picking up messages from Bob
02:02 Dave picking up messages from Carla
02:14 Elena picking up messages from Dave

03:30 Alice, Bob, Carla, Dave, and Elena obtain shared key

05:20 PassiveEve can see p, alpha, alpha^a, alpha^b, alpha^c, alpha^d, alpha^e etc...
but cannot use any combination of those to efficiently reproduce alpha^abcde

11:40 source code available for download
12:00 members-version will include step by step coding + test running of application

-----------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for:
Multi-party Diffie-Hellman Key Exchange + Peer-to-peer + JAVA
-----------------------------------------------------------------------------------------------------------




test run w/ 2 communicating and 1 eavesdropping peers

test run w/ 3 communicating and 1 eavesdropping peers

test run w/ 4 communicating peers

------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------


Friday, December 25, 2020

3 parties Diffie-Hellman Key Exchange (DHKE) + Peer-to-peer + JAVA

 

00:07 demo prebuilt version of application

01:05 PassiveEve picking up messages from Alice, Bob, and Carla
01:22 Alice picking up messages from Carla
01:32 Bob picking up messages from Alice
01:42 Carla picking up messages from Bob

03:10 Alice, Bob, and Carla obtain shared key

08:56 only a, b, c, and the calculated shared key are kept private
09:20 PassiveEve can see p, alpha, alpha^a, alpha^b, alpha^c, alpha^ab, alpha^bc,
alpha^ca but cannot use any combination of those to efficiently reproduce alpha^abc

-----------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for:
3 parties Diffie-Hellman Key Exchange (DHKE) + Peer-to-peer + JAVA
-----------------------------------------------------------------------------------------------------------





------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------

Wednesday, December 23, 2020

Cryptocurrency Prototype Project 02 (short version)


00:09 demo prebuilt version of application

00:53 each one of the peers will pickup messages coming from all others

01:09 each peer starts mining

01:30 genesis block

02:24 peer successfully mines block. other two peers verify mined block

03:07 display blockchain

05:04 perform additional mining + display blockchain

08:30 source code available for download +
version that includes step by step coding and 
test running will be available for watching by channel members

-----------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for:
Cryptocurrency Prototype Project 02
-----------------------------------------------------------------------------------------------------------





------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------