## Chain Code for 2D Line

Chain code is a lossless compression technique used for representing an object in images. The co-ordinates of any continuous boundary of an object can be… Read More »

Chain code is a lossless compression technique used for representing an object in images. The co-ordinates of any continuous boundary of an object can be… Read More »

Prerequisite : Basics of Tkinter Python offers multiple options for developing GUI (Graphical User Interface). Out of all the GUI methods, tkinter is most commonly… Read More »

Morse code is a method of transmitting text information as a series of on-off tones, lights, or clicks that can be directly understood by a… Read More »

A Polybius Square is a table that allows someone to convert letters into numbers. To make the encryption little harder, this table can be randomized… Read More »

Encryption, Encoding and Hashing are kind of similar terms and are often confused with each other. So let’s discuss each term and how they are… Read More »

Given a string s and a positive integer k. You need to encrypt the given string such that each substring of size k is represent… Read More »

Prerequisite:Move To Front Data Transform Algorithm The main idea behind inverse of MTF Transform: 1. To compute inverse of MTF Transform is to undo the… Read More »

What is the MTF transform? The MTF (Move to Front) is a data transformation algorithm that restructures data in such a way that the transformed… Read More »

Design a program to take a word as an input, and then encode it into a Pig Latin. A Pig Latin is an encrypted word… Read More »

We have discussed Huffman Encoding in a previous post. In this post decoding is discussed. Examples: Input Data : AAAAAABCCCCCCDDEEEEE Frequencies : A: 6, B:… Read More »

We recommend to read following post as a prerequisite for this. Greedy Algorithms | Set 3 (Huffman Coding) Time complexity of the algorithm discussed in… Read More »

Huffman coding is a lossless data compression algorithm. The idea is to assign variable-length codes to input characters, lengths of the assigned codes are based… Read More »