
Use of Markov Chain Model for In-Patient Bed Assignment
Balagopal Ramdurai
Algorithms Research , 2023 6(1), pp. 1-8
Published Online: June 14, 2023
10.5923/j.algorithms.20230601.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2805 Views 1280 Downloads

A Stochastic Bicriteria Procedure for Creating System Options
Julian Scott Yeomans
Algorithms Research , 2019 5(1), pp. 11-18
10.5923/j.algorithms.20190501.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3827 Views 2754 Downloads

FFT Neural Network to Estimate Some Asymmetric Dynamical Maps
Salah H. Abid, Saad S. Mahmood, Yaseen A. Oraibi
Algorithms Research , 2019 5(1), pp. 1-10
10.5923/j.algorithms.20190501.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3347 Views 2040 Downloads

Nonstandard Discrete Models for Some Initial Value Problems Arising from Nonlinear Oscillator Equations
Obayomi Abraham Adesoji, Ogunrinde Roseline Bosede
Algorithms Research , 2015 4(1), pp. 8-13
10.5923/j.algorithms.20150401.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF4726 Views 3129 Downloads

Solution of P versus NP problem
Mustapha Hamidi
Algorithms Research , 2015 4(1), pp. 1-7
10.5923/j.algorithms.20150401.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11040 Views 5134 Downloads

T-Forward Method: A Closed-Form Solution and Polynomial Time Approach for Convex Nonlinear Programming
Gang Liu
Algorithms Research , 2014 3(1), pp. 1-25
10.5923/j.algorithms.20140301.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9992 Views 4590 Downloads

Solving Ill Conditioned Linear Systems Using the Extended Iterative Refinement Algorithm: The Forward Error Bound
Abdramane Sermé
Algorithms Research , 2013 2(2), pp. 50-57
10.5923/j.algorithms.20130202.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11484 Views 5479 Downloads

Constant Stress Partially Accelerated Life Test Design for Inverted Weibull Distribution with Type-I Censoring
Mustafa Kamal, Shazia Zarrin, Arif-Ul-Islam
Algorithms Research , 2013 2(2), pp. 43-49
10.5923/j.algorithms.20130202.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10638 Views 6129 Downloads

Solving Multi Criteria Decision Aiding (MCDA) Problems Using Spreadsheets
T. Ganesh, PRS Reddy
Algorithms Research , 2013 2(2), pp. 29-42
10.5923/j.algorithms.20130202.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10558 Views 6746 Downloads

Effective Utilization of Radio Channels Using Polyphase Filter Banks
Ch. R. Phani Kumar, P. Krishna Mohan, Ch. Satyavathi
Algorithms Research , 2013 2(1), pp. 24-28
10.5923/j.algorithms.20130201.04
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9597 Views 4693 Downloads

Prediction of Effective Mobile Wireless Network Data Profiling Using Data Mining Approaches
Ch. R. Phani Kumar, B. Uday Kumar, V. Malleswara Rao, Dsvgk Kaladhar
Algorithms Research , 2013 2(1), pp. 18-23
10.5923/j.algorithms.20130201.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11187 Views 8403 Downloads

The Elements of Statistical Learning in Colon Cancer Datasets: Data Mining, Inference and Prediction
D. S.V.G.K.Kaladhar, Bharath Kumar Pottumuthu, Padmanabhuni V. Nageswara Rao, Varahalarao Vadlamudi, A.Krishna Chaitanya, R. Harikrishna Reddy
Algorithms Research , 2013 2(1), pp. 8-17
10.5923/j.algorithms.20130201.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12774 Views 6571 Downloads

Implementation of Low Cost Ethernet Based Home Security Using Wireless Sensor Network
B. Udaya Kumar, D. S. Murty, Ch. R. Phani Kumar
Algorithms Research , 2013 2(1), pp. 1-7
10.5923/j.algorithms.20130201.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF16835 Views 10878 Downloads

Cryptography: A Comparison of Public Key Systems
Tzvetalin S. Vassilev, Andrew Twizell
Algorithms Research , 2012 1(5), pp. 31-42
10.5923/j.algorithms.20120105.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF16768 Views 5491 Downloads

Algorithms for Matchings in Graphs
Tzvetalin S. Vassilev, Laura Huntington
Algorithms Research , 2012 1(4), pp. 20-30
10.5923/j.algorithms.20120104.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12828 Views 4682 Downloads

A Novel Three-Phase Approach for Solving Multi-Depot Vehicle Routing Problem with Stochastic Demand
Syed Tauhid Zuhori, Zahrul Jannat Peya, Firoz Mahmud
Algorithms Research , 2012 1(4), pp. 15-19
10.5923/j.algorithms.20120104.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF12026 Views 5660 Downloads

Analyzing Singleton Sort Through Computer Experiments for Normal Inputs
Joy Dutta, Soubhik Chakraborty, Mita Pal
Algorithms Research , 2012 1(3), pp. 12-14
10.5923/j.algorithms.20120103.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8637 Views 4036 Downloads

Algorithm Re-Ordering: a Solution for Abating Internet Bypass
Atoyebi M. K, Abang I. S, Siyanbola W. O, Awoleye O. M
Algorithms Research , 2012 1(2), pp. 5-11
10.5923/j.algorithms.20120102.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF15708 Views 9485 Downloads

K Sort Revisited for Negative Binomial Inputs
Kiran Kumar Sundararajan, Mita Pal, Soubhik Chakraborty, Bijeeta Pal, N.C. Mahanti
Algorithms Research , 2012 1(1), pp. 1-4
10.5923/j.algorithms.20120101.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9444 Views 5758 Downloads