## A primer on Memetic Automatons

- in Mansplainings
- Leave a comment on A primer on Memetic Automatons

Memetic automatons leverage knowledge gained from solving previous problems to solve new optimization problems faster and more effectively. …

Skip to content

## A primer on Memetic Automatons

- in Mansplainings
- Leave a comment on A primer on Memetic Automatons

Memetic automatons leverage knowledge gained from solving previous problems to solve new optimization problems faster and more effectively. …

## Data-driven meme selection

- in Mansplainings
- Leave a comment on Data-driven meme selection

This article discusses how we can use data to automatically select the best meme from a pool of memes, thereby negating the need for human intervention. …

## An introduction to memetic computation

- in Mansplainings
- 1 Comment on An introduction to memetic computation

Memetic computation is an extension of evolutionary computation that combines the use of memes and genes to produce better solutions. In this article, we discuss what memes are, and how they make evolutionary algorithms better,…

## An introduction to evolutionary algorithms for dummies

Evolutionary algorithms are heuristic search and optimization algorithms that imitate the natural evolutionary process. This article puts evolutionary algorithms into context and explains their basic functionality. Consequently, we first examine why we prefer heuristic algorithms…

## Running multiple containers within virtual hosts in Mininet

Mininet is a popular network emulator that allows us to create virtual networks using virtual hosts, switches, and controllers. Recently, I faced the need to run multiple Docker containers within virtual hosts in Mininet. This…

## The nuts and bolts of Service Function Chaining (SFC)

Service Function Chaining (SFC) leverages Network Function Virtualization (NFV) and Software Defined Networking (SDN) to create a programmable and dynamic network paradigm that allows networks to keep up with modern demands. This article briefly discusses…

## What is Network Function Virtualization (NFV)?

- in Mansplainings
- 1 Comment on What is Network Function Virtualization (NFV)?

Network Function Virtualization (NFV) is the latest chapter in computer networks that tries to solve some of the pressing concerns with traditional networks. What is NFV and why is it all the rage? How does…

## Tournament Selection in Genetic Algorithms

- in Mansplainings
- 1 Comment on Tournament Selection in Genetic Algorithms

Tournament selection is one of the many selection strategies we use in Genetic Algorithms (GAs) to select individuals for crossover. In this article, we will take a quick look at GAs, selection strategies, and finally…

## NSGA II: Non-Dominated Sorting Genetic Algorithm II

- in Mansplainings
- 1 Comment on NSGA II: Non-Dominated Sorting Genetic Algorithm II

Non-Dominated Sorting Genetic Algorithm II (NSGA II) is an evolutionary algorithm, which we use in multi-objective optimization scenarios. This article dwells on the nuts and bolts of the NSGA II algorithm while providing a brief…

## ChatGPT vs. Bard vs. Bing: Who aces the React test?

We make ChatGPT, Bard and Bing write a simple yet tricky React app and see who wins this battle of the chatbots.…

## The number of blocks to wait for before confirming transactions

In this article, let’s try to find how many blocks a recipient should wait for before accepting a transaction. …

## Probability of an attacker mining a certain number of blocks

In the previous article, we found the probability of double-spending. In this article, let’s look at the probability of an attacker mining a certain number of blocks with a hash rate of less than 50%.…

## 51% attack: Probability of double spending

- in Mansplainings
- Leave a comment on 51% attack: Probability of double spending

We tried to understand the 51% attack through the gambler’s ruin problem and the probability of a gambler winning T dollars in the last article. Let’s look at how we can apply the equation we…

## 51% attack: Gambler’s ruin problem

- in Mansplainings
- 1 Comment on 51% attack: Gambler’s ruin problem

This article discusses the solution to the gambler’s ruin problem as a precursor to understanding the probability of double spending. …

## 51% attack-the probability of mining the next block

So far, we have briefly touched upon the idea of the 51% attack and how it actually allows double spending to happen. In this article, we will start to look at the theoretical basis of the 51% attack.…

## Adding authentication to an ASP.NET Core app using Asgardeo

ASP.NET Core is a cross-platform, open-source web framework that allows you to develop MVC applications and Web APIs with ease. This article will explore how we can easily add authentication to an ASP.NET Core 7.0…