FMZ Quantfmzquant.hashnode.dev·2 hours agoDetailed Explanation of Futures Backhand Doubling Algorithm Strategy NotesThis strategy is a strategy that was applied to Digital Currency 796 Futures Exchange long time ago. Futures contracts are currency-based, that is, the margin is deducted by currency (for example, BTC contracts are deducted by BTC). The order quantit...DiscussStrategy
Asfak Ahmedasfakahmedsblog.hashnode.dev·May 19, 2024Basic DSA শিখি আমার মাতৃভাষায়Algorithms Big O Notation \> Big-O notation হচ্ছে আমাদের কোনো একটা function এর ইনপুট বাড়ার সাথে সাথে কতটা টাইম কমপ্লেক্সিটি ও কতটা স্পেস কমপ্লেক্সিটি হচ্ছে সেটা নির্ণয় করা। এটি একটি টুল যার সাহায্যে কোনো একটা অ্যালগরিদমের রানটাইমের উপর ভিত্তি করে টাই...Discussdsa with js
Sotiris KourouklisProsotergreco.com·May 18, 2024Understanding JWT: Basics of Authentication and AlgorithmsThis is a JWT token. It consists of a Header, a Payload, and a Signature. JWTs are considered the best modern way of authentication. eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKx...Discuss·1.5K readsauthentication
Akshima Sharmakeycomputereducation.hashnode.dev·May 18, 2024Geeks for Geeks — Questions and Solution (Practice/School) — 2Smaller and Larger Smaller and Larger | Practice | GeeksforGeeks Given a sorted array Arr of size N and a value X, find the number of array elements less than or equal to X and… www.geeksforgeeks.org class Solution{ public: vector<int> getMoreAndLe...DiscussData Science
Minkyusmkgenesis.hashnode.dev·May 17, 2024[Algorithms Week 1] Simulating Processes within a Grid StructureRole of dx and dy These, dx and dy, represent each horizontal and vertical movement. For example, if the contemporary position is at (x, y), the new position after the movement will be at (x + dx, y + dy). The movements are shown in the following tab...DiscussAlgorithms Week Coursealgorithms
Md Shamim Ahamedshamim36.hashnode.dev·May 12, 2024Demystifying AES Key Expansion: A Deep Dive into Secure CryptographyIn the world of cryptography, AES (Advanced Encryption Standard) stands tall as one of the most widely used encryption algorithms, trusted for its robust security features. At the heart of AES lies a critical process known as key expansion, which pla...Discuss·1 like#cybersecurity
Kali Baranwalkalibaranwal.hashnode.dev·May 11, 2024Key Data Structures and Algorithms Concepts for Placement AssessmentsDATA STRUCTURE Array: All the basics of array is to be covered within this ,like declaration of array, initialisation of array, traversal. String: Declaration of string using "string" keyword. Linked list: Single linked list, Double linked list, C...Discussdatastructure
__CPP__Try_Hard__niranjan2004.hashnode.dev·May 8, 2024Awesome Grid Problem - DSAQuestion Forked !! All possible locations where a Peculiar Knight can FORK King and Queen Problem statement Input and Output Time and Space Constrains Sample Input and Output Input 4 2 1 0 0 3 3 1 1 3 1 1 3 4 4 0 0 8 0 4 2 1 4 3 4 Output 2 1 2 0 ...DiscussDSA
Vidhi Yadavvidhi.hashnode.dev·May 8, 2024A Comprehensive Guide to Understanding AlgorithmsClustering algorithms are a collection of unsupervised machine learning methods of which a subset of those methodologies is aimed at grouping similar data points by their inherent attributes or characteristics. These algorithms are popular on the ris...DiscussClustering algorithms
Youssef Heshamyoussefhesham.hashnode.dev·May 7, 2024Cracking the Coding Interview [Ch.2: Linked Lists]Introduction In the previous chapter, we discussed arrays and ArrayLists, which insert elements at the end and access them in constant time, O(1). However, what if we encounter scenarios where we need to frequently add or remove elements at the begin...DiscussProblem Solving