
Use of Markov Chain Model for In-Patient Bed Assignment
Balagopal Ramdurai
Algorithms Research , 2023 6(1), pp. 1-8
Published Online: June 14, 2023
10.5923/j.algorithms.20230601.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2097 Views 856 Downloads

A Stochastic Bicriteria Procedure for Creating System Options
Julian Scott Yeomans
Algorithms Research , 2019 5(1), pp. 11-18
10.5923/j.algorithms.20190501.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3100 Views 2165 Downloads

FFT Neural Network to Estimate Some Asymmetric Dynamical Maps
Salah H. Abid, Saad S. Mahmood, Yaseen A. Oraibi
Algorithms Research , 2019 5(1), pp. 1-10
10.5923/j.algorithms.20190501.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2735 Views 1584 Downloads

Nonstandard Discrete Models for Some Initial Value Problems Arising from Nonlinear Oscillator Equations
Obayomi Abraham Adesoji, Ogunrinde Roseline Bosede
Algorithms Research , 2015 4(1), pp. 8-13
10.5923/j.algorithms.20150401.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF4174 Views 2707 Downloads

Solution of P versus NP problem
Mustapha Hamidi
Algorithms Research , 2015 4(1), pp. 1-7
10.5923/j.algorithms.20150401.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10515 Views 4807 Downloads

T-Forward Method: A Closed-Form Solution and Polynomial Time Approach for Convex Nonlinear Programming
Gang Liu
Algorithms Research , 2014 3(1), pp. 1-25
10.5923/j.algorithms.20140301.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9322 Views 4152 Downloads

Solving Ill Conditioned Linear Systems Using the Extended Iterative Refinement Algorithm: The Forward Error Bound
Abdramane Sermé
Algorithms Research , 2013 2(2), pp. 50-57
10.5923/j.algorithms.20130202.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10746 Views 4977 Downloads

Constant Stress Partially Accelerated Life Test Design for Inverted Weibull Distribution with Type-I Censoring
Mustafa Kamal, Shazia Zarrin, Arif-Ul-Islam
Algorithms Research , 2013 2(2), pp. 43-49
10.5923/j.algorithms.20130202.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9975 Views 5630 Downloads

Solving Multi Criteria Decision Aiding (MCDA) Problems Using Spreadsheets
T. Ganesh, PRS Reddy
Algorithms Research , 2013 2(2), pp. 29-42
10.5923/j.algorithms.20130202.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9933 Views 6259 Downloads

Effective Utilization of Radio Channels Using Polyphase Filter Banks
Ch. R. Phani Kumar, P. Krishna Mohan, Ch. Satyavathi
Algorithms Research , 2013 2(1), pp. 24-28
10.5923/j.algorithms.20130201.04
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8979 Views 4219 Downloads

Prediction of Effective Mobile Wireless Network Data Profiling Using Data Mining Approaches
Ch. R. Phani Kumar, B. Uday Kumar, V. Malleswara Rao, Dsvgk Kaladhar
Algorithms Research , 2013 2(1), pp. 18-23
10.5923/j.algorithms.20130201.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10571 Views 7899 Downloads

The Elements of Statistical Learning in Colon Cancer Datasets: Data Mining, Inference and Prediction
D. S.V.G.K.Kaladhar, Bharath Kumar Pottumuthu, Padmanabhuni V. Nageswara Rao, Varahalarao Vadlamudi, A.Krishna Chaitanya, R. Harikrishna Reddy
Algorithms Research , 2013 2(1), pp. 8-17
10.5923/j.algorithms.20130201.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12103 Views 6108 Downloads

Implementation of Low Cost Ethernet Based Home Security Using Wireless Sensor Network
B. Udaya Kumar, D. S. Murty, Ch. R. Phani Kumar
Algorithms Research , 2013 2(1), pp. 1-7
10.5923/j.algorithms.20130201.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF16213 Views 10400 Downloads

Cryptography: A Comparison of Public Key Systems
Tzvetalin S. Vassilev, Andrew Twizell
Algorithms Research , 2012 1(5), pp. 31-42
10.5923/j.algorithms.20120105.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF15933 Views 4904 Downloads

Algorithms for Matchings in Graphs
Tzvetalin S. Vassilev, Laura Huntington
Algorithms Research , 2012 1(4), pp. 20-30
10.5923/j.algorithms.20120104.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12079 Views 4173 Downloads

A Novel Three-Phase Approach for Solving Multi-Depot Vehicle Routing Problem with Stochastic Demand
Syed Tauhid Zuhori, Zahrul Jannat Peya, Firoz Mahmud
Algorithms Research , 2012 1(4), pp. 15-19
10.5923/j.algorithms.20120104.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11500 Views 5258 Downloads

Analyzing Singleton Sort Through Computer Experiments for Normal Inputs
Joy Dutta, Soubhik Chakraborty, Mita Pal
Algorithms Research , 2012 1(3), pp. 12-14
10.5923/j.algorithms.20120103.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8056 Views 3571 Downloads

Algorithm Re-Ordering: a Solution for Abating Internet Bypass
Atoyebi M. K, Abang I. S, Siyanbola W. O, Awoleye O. M
Algorithms Research , 2012 1(2), pp. 5-11
10.5923/j.algorithms.20120102.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF15063 Views 8970 Downloads

K Sort Revisited for Negative Binomial Inputs
Kiran Kumar Sundararajan, Mita Pal, Soubhik Chakraborty, Bijeeta Pal, N.C. Mahanti
Algorithms Research , 2012 1(1), pp. 1-4
10.5923/j.algorithms.20120101.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8802 Views 5226 Downloads