## Fluid Dynamics

Navier-Stokes Equation [ ] : fluid density [ ] : dynamic viscosity [ ] : kinematic viscosity [ ] : velocity : volume

#### Conservation of mass

1. For a system: 2. For a C.V. (Reynolds transport theorem):\] Differential form (\delta x\delta y\delta z): ## RNN, LSTM & GRU

Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM) & Gated Recurrent Unit (GRU)

Is a type of artificial neural network where connections between nodes form a sequence. This allows temporal dynamic behavior for time sequence.
There are 3 types of vanilla recurrent neural network: the simple (RNN), gated recurrent unit (GRU) and long short term memory unit (LSTM).

## Convolutional Neural Network (CNN)

Convolutional neural network introduction and tutorial

### Introduction

Convolutional neural network (CNN or ConvNet) is a type of neural network used in artificial intelligence that is commonly applied to analyzing images.

They can be considered a pre-processing compared to image classification algorithms. They have applications in image and video recognition, recommender systems, image classification, natural language processing, etc.

### Notation : filter size. : padding. : stride. : input. : output. . : filter. : activation function. : bias.

## Elliptic Curve Algorithm (ECC)

ECC operations and performance

Elliptic curves (ECC) are a plane algebraic curve with the form:  ### General definition where and are elements such that does not have double root.

## RSA Algorithm

RSA encryption and decryption algorithm and implementation in C++

RSA is an algorithm used by modern computers to encrypt and decrypt messages. Modern encryption is mostly based on this algorithm.

It is an asymmetric cryptographic algorithm.

Asymmetric means that there are two different keys. This is also called public key cryptography because one of the keys can be given to anyone. The other key must be kept private, Elliptic curve algorithm uses asymmetric cryptography also.

The algorithm is based on the fact that finding the factors of a large composite number is difficult: when the integers are prime numbers, the problem is called prime factorization. It is also a key pair (public and private key) generator.