
Use of Markov Chain Model for In-Patient Bed Assignment
Balagopal Ramdurai
Algorithms Research , 2023 6(1), pp. 1-8
Published Online: June 14, 2023
10.5923/j.algorithms.20230601.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2945 Views 1346 Downloads

A Stochastic Bicriteria Procedure for Creating System Options
Julian Scott Yeomans
Algorithms Research , 2019 5(1), pp. 11-18
10.5923/j.algorithms.20190501.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3922 Views 2827 Downloads

FFT Neural Network to Estimate Some Asymmetric Dynamical Maps
Salah H. Abid, Saad S. Mahmood, Yaseen A. Oraibi
Algorithms Research , 2019 5(1), pp. 1-10
10.5923/j.algorithms.20190501.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3440 Views 2103 Downloads

Nonstandard Discrete Models for Some Initial Value Problems Arising from Nonlinear Oscillator Equations
Obayomi Abraham Adesoji, Ogunrinde Roseline Bosede
Algorithms Research , 2015 4(1), pp. 8-13
10.5923/j.algorithms.20150401.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF4824 Views 3199 Downloads

Solution of P versus NP problem
Mustapha Hamidi
Algorithms Research , 2015 4(1), pp. 1-7
10.5923/j.algorithms.20150401.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11147 Views 5197 Downloads

T-Forward Method: A Closed-Form Solution and Polynomial Time Approach for Convex Nonlinear Programming
Gang Liu
Algorithms Research , 2014 3(1), pp. 1-25
10.5923/j.algorithms.20140301.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10081 Views 4653 Downloads

Solving Ill Conditioned Linear Systems Using the Extended Iterative Refinement Algorithm: The Forward Error Bound
Abdramane Sermé
Algorithms Research , 2013 2(2), pp. 50-57
10.5923/j.algorithms.20130202.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11602 Views 5547 Downloads

Constant Stress Partially Accelerated Life Test Design for Inverted Weibull Distribution with Type-I Censoring
Mustafa Kamal, Shazia Zarrin, Arif-Ul-Islam
Algorithms Research , 2013 2(2), pp. 43-49
10.5923/j.algorithms.20130202.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10733 Views 6200 Downloads

Solving Multi Criteria Decision Aiding (MCDA) Problems Using Spreadsheets
T. Ganesh, PRS Reddy
Algorithms Research , 2013 2(2), pp. 29-42
10.5923/j.algorithms.20130202.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10674 Views 6830 Downloads

Effective Utilization of Radio Channels Using Polyphase Filter Banks
Ch. R. Phani Kumar, P. Krishna Mohan, Ch. Satyavathi
Algorithms Research , 2013 2(1), pp. 24-28
10.5923/j.algorithms.20130201.04
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9686 Views 4760 Downloads

Prediction of Effective Mobile Wireless Network Data Profiling Using Data Mining Approaches
Ch. R. Phani Kumar, B. Uday Kumar, V. Malleswara Rao, Dsvgk Kaladhar
Algorithms Research , 2013 2(1), pp. 18-23
10.5923/j.algorithms.20130201.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11264 Views 8462 Downloads

The Elements of Statistical Learning in Colon Cancer Datasets: Data Mining, Inference and Prediction
D. S.V.G.K.Kaladhar, Bharath Kumar Pottumuthu, Padmanabhuni V. Nageswara Rao, Varahalarao Vadlamudi, A.Krishna Chaitanya, R. Harikrishna Reddy
Algorithms Research , 2013 2(1), pp. 8-17
10.5923/j.algorithms.20130201.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12889 Views 6656 Downloads

Implementation of Low Cost Ethernet Based Home Security Using Wireless Sensor Network
B. Udaya Kumar, D. S. Murty, Ch. R. Phani Kumar
Algorithms Research , 2013 2(1), pp. 1-7
10.5923/j.algorithms.20130201.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF16907 Views 10938 Downloads

Cryptography: A Comparison of Public Key Systems
Tzvetalin S. Vassilev, Andrew Twizell
Algorithms Research , 2012 1(5), pp. 31-42
10.5923/j.algorithms.20120105.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF16871 Views 5550 Downloads

Algorithms for Matchings in Graphs
Tzvetalin S. Vassilev, Laura Huntington
Algorithms Research , 2012 1(4), pp. 20-30
10.5923/j.algorithms.20120104.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF13004 Views 4754 Downloads

A Novel Three-Phase Approach for Solving Multi-Depot Vehicle Routing Problem with Stochastic Demand
Syed Tauhid Zuhori, Zahrul Jannat Peya, Firoz Mahmud
Algorithms Research , 2012 1(4), pp. 15-19
10.5923/j.algorithms.20120104.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12100 Views 5714 Downloads

Analyzing Singleton Sort Through Computer Experiments for Normal Inputs
Joy Dutta, Soubhik Chakraborty, Mita Pal
Algorithms Research , 2012 1(3), pp. 12-14
10.5923/j.algorithms.20120103.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8711 Views 4088 Downloads

Algorithm Re-Ordering: a Solution for Abating Internet Bypass
Atoyebi M. K, Abang I. S, Siyanbola W. O, Awoleye O. M
Algorithms Research , 2012 1(2), pp. 5-11
10.5923/j.algorithms.20120102.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF15784 Views 9547 Downloads

K Sort Revisited for Negative Binomial Inputs
Kiran Kumar Sundararajan, Mita Pal, Soubhik Chakraborty, Bijeeta Pal, N.C. Mahanti
Algorithms Research , 2012 1(1), pp. 1-4
10.5923/j.algorithms.20120101.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9547 Views 5837 Downloads