
Use of Markov Chain Model for In-Patient Bed Assignment
Balagopal Ramdurai
Algorithms Research , 2023 6(1), pp. 1-8
Published Online: June 14, 2023
10.5923/j.algorithms.20230601.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2836 Views 1293 Downloads

A Stochastic Bicriteria Procedure for Creating System Options
Julian Scott Yeomans
Algorithms Research , 2019 5(1), pp. 11-18
10.5923/j.algorithms.20190501.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3863 Views 2778 Downloads

FFT Neural Network to Estimate Some Asymmetric Dynamical Maps
Salah H. Abid, Saad S. Mahmood, Yaseen A. Oraibi
Algorithms Research , 2019 5(1), pp. 1-10
10.5923/j.algorithms.20190501.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3381 Views 2054 Downloads

Nonstandard Discrete Models for Some Initial Value Problems Arising from Nonlinear Oscillator Equations
Obayomi Abraham Adesoji, Ogunrinde Roseline Bosede
Algorithms Research , 2015 4(1), pp. 8-13
10.5923/j.algorithms.20150401.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF4755 Views 3144 Downloads

Solution of P versus NP problem
Mustapha Hamidi
Algorithms Research , 2015 4(1), pp. 1-7
10.5923/j.algorithms.20150401.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11076 Views 5154 Downloads

T-Forward Method: A Closed-Form Solution and Polynomial Time Approach for Convex Nonlinear Programming
Gang Liu
Algorithms Research , 2014 3(1), pp. 1-25
10.5923/j.algorithms.20140301.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10015 Views 4603 Downloads

Solving Ill Conditioned Linear Systems Using the Extended Iterative Refinement Algorithm: The Forward Error Bound
Abdramane Sermé
Algorithms Research , 2013 2(2), pp. 50-57
10.5923/j.algorithms.20130202.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11517 Views 5494 Downloads

Constant Stress Partially Accelerated Life Test Design for Inverted Weibull Distribution with Type-I Censoring
Mustafa Kamal, Shazia Zarrin, Arif-Ul-Islam
Algorithms Research , 2013 2(2), pp. 43-49
10.5923/j.algorithms.20130202.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10671 Views 6152 Downloads

Solving Multi Criteria Decision Aiding (MCDA) Problems Using Spreadsheets
T. Ganesh, PRS Reddy
Algorithms Research , 2013 2(2), pp. 29-42
10.5923/j.algorithms.20130202.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10601 Views 6769 Downloads

Effective Utilization of Radio Channels Using Polyphase Filter Banks
Ch. R. Phani Kumar, P. Krishna Mohan, Ch. Satyavathi
Algorithms Research , 2013 2(1), pp. 24-28
10.5923/j.algorithms.20130201.04
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9632 Views 4716 Downloads

Prediction of Effective Mobile Wireless Network Data Profiling Using Data Mining Approaches
Ch. R. Phani Kumar, B. Uday Kumar, V. Malleswara Rao, Dsvgk Kaladhar
Algorithms Research , 2013 2(1), pp. 18-23
10.5923/j.algorithms.20130201.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11218 Views 8422 Downloads

The Elements of Statistical Learning in Colon Cancer Datasets: Data Mining, Inference and Prediction
D. S.V.G.K.Kaladhar, Bharath Kumar Pottumuthu, Padmanabhuni V. Nageswara Rao, Varahalarao Vadlamudi, A.Krishna Chaitanya, R. Harikrishna Reddy
Algorithms Research , 2013 2(1), pp. 8-17
10.5923/j.algorithms.20130201.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12809 Views 6590 Downloads

Implementation of Low Cost Ethernet Based Home Security Using Wireless Sensor Network
B. Udaya Kumar, D. S. Murty, Ch. R. Phani Kumar
Algorithms Research , 2013 2(1), pp. 1-7
10.5923/j.algorithms.20130201.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF16867 Views 10902 Downloads

Cryptography: A Comparison of Public Key Systems
Tzvetalin S. Vassilev, Andrew Twizell
Algorithms Research , 2012 1(5), pp. 31-42
10.5923/j.algorithms.20120105.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF16809 Views 5508 Downloads

Algorithms for Matchings in Graphs
Tzvetalin S. Vassilev, Laura Huntington
Algorithms Research , 2012 1(4), pp. 20-30
10.5923/j.algorithms.20120104.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12872 Views 4702 Downloads

A Novel Three-Phase Approach for Solving Multi-Depot Vehicle Routing Problem with Stochastic Demand
Syed Tauhid Zuhori, Zahrul Jannat Peya, Firoz Mahmud
Algorithms Research , 2012 1(4), pp. 15-19
10.5923/j.algorithms.20120104.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12055 Views 5675 Downloads

Analyzing Singleton Sort Through Computer Experiments for Normal Inputs
Joy Dutta, Soubhik Chakraborty, Mita Pal
Algorithms Research , 2012 1(3), pp. 12-14
10.5923/j.algorithms.20120103.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8673 Views 4056 Downloads

Algorithm Re-Ordering: a Solution for Abating Internet Bypass
Atoyebi M. K, Abang I. S, Siyanbola W. O, Awoleye O. M
Algorithms Research , 2012 1(2), pp. 5-11
10.5923/j.algorithms.20120102.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF15732 Views 9503 Downloads

K Sort Revisited for Negative Binomial Inputs
Kiran Kumar Sundararajan, Mita Pal, Soubhik Chakraborty, Bijeeta Pal, N.C. Mahanti
Algorithms Research , 2012 1(1), pp. 1-4
10.5923/j.algorithms.20120101.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9473 Views 5775 Downloads