
Use of Markov Chain Model for In-Patient Bed Assignment
Balagopal Ramdurai
Algorithms Research , 2023 6(1), pp. 1-8
Published Online: June 14, 2023
10.5923/j.algorithms.20230601.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF296 Views 113 Downloads

A Stochastic Bicriteria Procedure for Creating System Options
Julian Scott Yeomans
Algorithms Research , 2019 5(1), pp. 11-18
10.5923/j.algorithms.20190501.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2046 Views 1327 Downloads

FFT Neural Network to Estimate Some Asymmetric Dynamical Maps
Salah H. Abid, Saad S. Mahmood, Yaseen A. Oraibi
Algorithms Research , 2019 5(1), pp. 1-10
10.5923/j.algorithms.20190501.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2077 Views 1194 Downloads

Nonstandard Discrete Models for Some Initial Value Problems Arising from Nonlinear Oscillator Equations
Obayomi Abraham Adesoji, Ogunrinde Roseline Bosede
Algorithms Research , 2015 4(1), pp. 8-13
10.5923/j.algorithms.20150401.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3546 Views 2303 Downloads

Solution of P versus NP problem
Mustapha Hamidi
Algorithms Research , 2015 4(1), pp. 1-7
10.5923/j.algorithms.20150401.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9219 Views 4323 Downloads

T-Forward Method: A Closed-Form Solution and Polynomial Time Approach for Convex Nonlinear Programming
Gang Liu
Algorithms Research , 2014 3(1), pp. 1-25
10.5923/j.algorithms.20140301.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8217 Views 3601 Downloads

Solving Ill Conditioned Linear Systems Using the Extended Iterative Refinement Algorithm: The Forward Error Bound
Abdramane Sermé
Algorithms Research , 2013 2(2), pp. 50-57
10.5923/j.algorithms.20130202.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8894 Views 3523 Downloads

Constant Stress Partially Accelerated Life Test Design for Inverted Weibull Distribution with Type-I Censoring
Mustafa Kamal, Shazia Zarrin, Arif-Ul-Islam
Algorithms Research , 2013 2(2), pp. 43-49
10.5923/j.algorithms.20130202.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9047 Views 5172 Downloads

Solving Multi Criteria Decision Aiding (MCDA) Problems Using Spreadsheets
T. Ganesh, PRS Reddy
Algorithms Research , 2013 2(2), pp. 29-42
10.5923/j.algorithms.20130202.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8980 Views 5688 Downloads

Effective Utilization of Radio Channels Using Polyphase Filter Banks
Ch. R. Phani Kumar, P. Krishna Mohan, Ch. Satyavathi
Algorithms Research , 2013 2(1), pp. 24-28
10.5923/j.algorithms.20130201.04
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8231 Views 3771 Downloads

Prediction of Effective Mobile Wireless Network Data Profiling Using Data Mining Approaches
Ch. R. Phani Kumar, B. Uday Kumar, V. Malleswara Rao, Dsvgk Kaladhar
Algorithms Research , 2013 2(1), pp. 18-23
10.5923/j.algorithms.20130201.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF9844 Views 7406 Downloads

The Elements of Statistical Learning in Colon Cancer Datasets: Data Mining, Inference and Prediction
D. S.V.G.K.Kaladhar, Bharath Kumar Pottumuthu, Padmanabhuni V. Nageswara Rao, Varahalarao Vadlamudi, A.Krishna Chaitanya, R. Harikrishna Reddy
Algorithms Research , 2013 2(1), pp. 8-17
10.5923/j.algorithms.20130201.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10818 Views 5357 Downloads

Implementation of Low Cost Ethernet Based Home Security Using Wireless Sensor Network
B. Udaya Kumar, D. S. Murty, Ch. R. Phani Kumar
Algorithms Research , 2013 2(1), pp. 1-7
10.5923/j.algorithms.20130201.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF15279 Views 9764 Downloads

Cryptography: A Comparison of Public Key Systems
Tzvetalin S. Vassilev, Andrew Twizell
Algorithms Research , 2012 1(5), pp. 31-42
10.5923/j.algorithms.20120105.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF14711 Views 4386 Downloads

Algorithms for Matchings in Graphs
Tzvetalin S. Vassilev, Laura Huntington
Algorithms Research , 2012 1(4), pp. 20-30
10.5923/j.algorithms.20120104.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF11041 Views 3705 Downloads

A Novel Three-Phase Approach for Solving Multi-Depot Vehicle Routing Problem with Stochastic Demand
Syed Tauhid Zuhori, Zahrul Jannat Peya, Firoz Mahmud
Algorithms Research , 2012 1(4), pp. 15-19
10.5923/j.algorithms.20120104.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF10421 Views 4569 Downloads

Analyzing Singleton Sort Through Computer Experiments for Normal Inputs
Joy Dutta, Soubhik Chakraborty, Mita Pal
Algorithms Research , 2012 1(3), pp. 12-14
10.5923/j.algorithms.20120103.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF7398 Views 3145 Downloads

Algorithm Re-Ordering: a Solution for Abating Internet Bypass
Atoyebi M. K, Abang I. S, Siyanbola W. O, Awoleye O. M
Algorithms Research , 2012 1(2), pp. 5-11
10.5923/j.algorithms.20120102.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF14359 Views 8466 Downloads

K Sort Revisited for Negative Binomial Inputs
Kiran Kumar Sundararajan, Mita Pal, Soubhik Chakraborty, Bijeeta Pal, N.C. Mahanti
Algorithms Research , 2012 1(1), pp. 1-4
10.5923/j.algorithms.20120101.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8162 Views 4770 Downloads