Skip to content

Commit 65d2a3d

Browse files
authored
Merge pull request prateekiiest#118 from yuzhoux/master
Issue prateekiiest#113 reorganize readme.md files
2 parents c142932 + dcb1a79 commit 65d2a3d

File tree

16 files changed

+106
-197
lines changed

16 files changed

+106
-197
lines changed
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
### Bird Migration
2+
3+
In this case study, we will continue taking a look at patterns of flight for each of the three birds in our dataset.Documentation of this project available - **[here](http://www.geeksforgeeks.org/tracking-bird-migration-using-python-3/)**
4+
5+
![](https://upload.wikimedia.org/wikipedia/commons/thumb/a/a3/BrantaLeucopsisMigration.jpg/300px-BrantaLeucopsisMigration.jpg)
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
2+
### Caesar-Cipher
3+
4+
![Caesar-Cipher](http://www.donatantonio.net/blog/wp-content/uploads/2010/10/cesare-570x355.png)
5+
6+
A cipher is a secret code for a language. In this study, we will explore a cipher that is reported by contemporary Greek historians to have been used by Julius Caesar to send secret messages to generals during times of war.
7+
8+
The Caesar cipher, also known as a shift cipher, is one of the simplest forms of encryption. It is a substitution cipher where each letter in the original message (called the plaintext) is replaced with a letter corresponding to a certain number of letters up or down in the alphabet.
9+
10+
11+
In this way, a message that initially was quite readable ends up in a form that can not be understood at a simple glance.
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
### Classification
2+
3+
In this case study, we will analyze a dataset consisting of an assortment of wines classified into "high quality" and "low quality", and will use k-Nearest Neighbors to predict whether or not other information about the wine helps us correctly guess whether a new wine will be of high quality.
4+
5+
![](http://homepages.inf.ed.ac.uk/rbf/HIPR2/classb.gif)
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
### Cricket Notification
2+
3+
A simple program to get the score and match status if India is playing. This information is obtained from the terminal.
4+
5+
![](https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcRgwxUvr7AfngMuzr4a8tc69jexGPoPeSdCTiDZhvlXqgZTH_wxgg)

Code-Sleep-Python/Encryption-Techniques/README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,11 @@
11
### Encryption Techniques
2+
3+
4+
Encryption is an interesting piece of technology that works by scrambling data so it is unreadable by unintended parties. The technology comes in many forms, with key size and strength generally being the biggest differences in one variety from the next. This repo has implementations of different encryption techniques. More [here](https://en.wikipedia.org/wiki/Encryption).
5+
6+
![](http://img.bityard.net/blog/aes.png)
7+
8+
29
* [Caesar Cipher](https://en.wikipedia.org/wiki/Caesar_cipher)
310
* [Code](Caesar-Cipher/)
411
* [Hill Cipher](https://en.wikipedia.org/wiki/Hill_cipher)
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
### Hangman
2+
3+
Hangman is a simple game where a player will guess a word letter by letter.
4+
5+
![](http://daramcq.github.io/img/hangman-game-5.png)
6+
7+
In this project, you will create a program that generates a random word that you must guess.
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
### Koch Curve
2+
3+
A Fractal is geometrical figure, each part of which has the same statistical character as the whole. Koch Curve (also known as the **Koch snowflake**) is a mathematical fractal curve constructed recursively using an equilateral triangle (See figure). The progression for the area of the snowflake converges to 1.6 times the area of the original triangle, while the progression for the snowflake's perimeter diverges to infinity. Consequently, the snowflake has a finite area bounded by an infinitely long line. **[more info](https://en.wikipedia.org/wiki/Koch_snowflake)**
4+
5+
This program traces out a 4 level Koch curve.
6+
7+
![](https://upload.wikimedia.org/wikipedia/commons/f/fd/Von_Koch_curve.gif)

Code-Sleep-Python/Prime/README.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
### Prime number finder
2+
3+
The implementation of Sieve of Eratosthenes is used to find prime numbers.
4+
5+
![](https://i.pinimg.com/564x/cc/c7/55/ccc7554b4ae9ee9781b752832224f3ef--sieve-of-eratosthenes-prime-factorization.jpg)
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
### Superellipse
2+
3+
A superellipse, also known as a Lamé curve after Gabriel Lamé, is a closed curve resembling the ellipse, retaining the geometric features of semi-major axis and semi-minor axis, and symmetry about them, but a different overall shape.
4+
5+
**[more info](https://en.wikipedia.org/wiki/Superellipse)**
6+
7+
![](https://upload.wikimedia.org/wikipedia/en/2/24/Superellipse_anim.gif)
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
### Floating Text
2+
3+
Floating Text is a simple program which displays a given String as a floating string on the terminal.
4+
5+
![demo](/floating_text.gif)

0 commit comments

Comments
 (0)