© 2023 Hashnode
#math
When it comes to designing data structures, one often seeks optimal solutions that offer efficient operations. In this article, we will explore the approach to tackling this problem using JavaScript. …
This problem asks us to rotate an array of integers by a given number of steps. While seemingly straightforward, finding the most optimized solution can be a captivating puzzle for most of us. In this…
Overview Horner's method, also known as Horner's scheme or Horner's rule, is an algorithm used for efficiently evaluating polynomials. It allows for the calculation of polynomial values by reducing th…
Mathematics is an integral part of programming. It provides the foundation for solving problems, optimizing algorithms, and creating efficient code. Programmers use math concepts and formulas to develop applications, analyze data, and creat…
The approach used in this code is to calculate the sum of all the numbers in the input array nums, and then subtract it from the sum of all the numbers in the range [0, n]. The difference between thes…
Why am I writing about Math topics when I am supposed to write about Coding? That is a legitimate question. I'm a student at ULPGL Goma in Applied Sciences so Math is all that we study in each subject…
A brief Introduction This is the second part of my intervention with various organizations for Women's History Month using Oppia. I called it the Oppia X Yigakpoa project! You can read the first part …
This Blog Post assumes some familiarity with Hash Functions. If you want to brush up your knowledge on such you can check out my introduction to Hash Functions. A Message Authentication Code (abbreviated as MAC) is a cryptographic primitive…
Hash functions are Cryptography's workhorse. They're used in Digital Signature Algorithms, Merkle Trees, Zero Knowledge Proofs, Password Storage and many other Protocols and Cryptographic applications. A hash function is a primitive that pr…
There are many different definitions of Cryptography but if we break down the core idea behind it it's that of deriving procedures to protect protocols against malicious actors. Protocols in that context mean a set of steps that need to be …