StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Essays on algorithms

The Algorithms is one of the most popular assignments among students' documents. If you are stuck with writing or missing ideas, scroll down and find inspiration in the best samples. Algorithms is quite a rare and popular topic for writing an essay, but it certainly is in our database.
Enter your email to get essay samples on your topic

Choose the best solution for you
Go through the list of samples
Go through the list of samples
SHOW SAMPLES
Order the paper
Order the paper
Writing Service

Routing Algorithms

2 pages (500 words) , Download 1
Free
Today, OSPF is most widely used while once popular RIP is undergoing extensive development. (Forouzan 2006)
OSPF is a complex…
Preview

Genetic Algorithms

4 pages (1000 words) , Download 2
The N-Queens problem is a traditional AI problem. Its name is resulting from the allowable moves for the ruler part in chess. Queens are allowable to move flat, vertically, or diagonally, toward the back and forward, with the merely restriction being that they can go in only one course at a time…
Preview
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT

Compression Algorithms

7 pages (1750 words) , Download 1
Compression Algorithms: Name: Institution: Course: Tutor: Date: Introduction In information theory and computer technology, source coding, reduction in the bit rate or data compression involves encoding of information by the use of fewer bits compared to original representations…
Preview

Discrete Mathematics(Mathematical Algorithms)

9 pages (2250 words) , Download 2
Discrete mathematics is a section or element of mathematics that is concerned with the objects which are capable of assuming just divided, distinctive values. The concept of discrete mathematics is thus applied in distinction with continuous mathematics, that is the subdivision…
Preview

Breaker Failure Detection Algorithms

7 pages (1750 words) , Download 1
Name: Instructor's name: Course: Date: Breaker Failure Detection Algorithms Abstract In a power system world, breaker failure protection became a critical element to provide a back up protection for circuit breakers (CBs). Practically, every apparatus is equipped with primary protection to interrupt the current flow whenever a fault occurs…
Preview

Hashing Algorithms Information Technology Research Paper

8 pages (2000 words) , Download 2
Running head: HASHING ALGORITHMS Hashing Algorithms Number Introduction Hashing algorithms are used for several purposes like encoding, decoding a particular text or a file, to provide key access to a database, to convert the specified value into another format…
Preview

Machine Learning Algorithms and Tools

8 pages (2112 words) , Download 1
The paper "Machine Learning Algorithms and Tools" explores the functionality of the WEKA tool that consists of visualization tools and algorithms used for data analysis and predictive modeling, the experimenter application that allows comparison of the predictive performance of Weka’s machine learning algorithms on a collection of datasets, etc…
Preview

Artificial Intelligence: Machine Learning Algorithms

8 pages (2000 words) , Download 2
The author answers the questions regarded the article about machine learning algorithms. The author describes the datasets used for experiments on the class prediction problem and the arguments for using a neighborhood analysis approach for AML-ALL class prediction…
Preview

Data structures and algorithms for social media

7 pages (1750 words) , Download 2
Data structures are the registers and memories in a computer, whilst algorithms are the pieces of information stored in the structures (Wirth, 1984). Algorithms are very useful in selecting the most relevant information during a search. There are recommended algorithms that are…
Preview

Data Structures and Algorithms

4 pages (1000 words) , Download 1
The data structure should be in a position to support every one of the operations listed above. The common schemes that ADT is expected to include are: the arrays, list of children, Child-Sibling representation.
Huffman Code is normally looked at as a prefix code…
Preview

Cluster Analysis: Basic Concepts and Algorithms

7 pages (2166 words) , Download 2
This study "Cluster Analysis: Basic Concepts and Algorithms" discusses clustering which uses as a tool for forecasting future costs, expenses, sales, and net income. The study considers clustering customers according to income, location, sex, and others will help increase company sales…
Preview

Data Compression Algorithms.Use of Compression Algorithms in Forensics

4 pages (1000 words) , Download 1
From the many years, numerous data compression algorithms have been developed to deal with specific data compression problem. From the developed data compression algorithms, there does not exist a single compression algorithm that compress all data types efficiently…
Preview

Efficiency of Clustering Algorithms in Mining Biological databases

5 pages (1250 words) , Download 1
EFFICIENCY OF CLUSTERING ALGORITHMS IN MINING BIOLOGICAL DATABASES Name (s) Course Efficiency of clustering algorithms in mining biological databases Introduction Clustering analysis is increasingly being used in the mining of databases such as gene and protein sequences…
Preview

Differentiate between the different types of cryptographic algorithms

1 pages (250 words) , Download 4
Free
Encryption is the process of coding information inform of cipher text for protection of information. The cipher text requires a decoding key to read the text. In cryptography, a key refers to a…
Preview

Efficiency of Clustering algorithms for mining large biological data bases

10 pages (2500 words) , Download 2
EFFICIENCY OF CLUSTERING ALGORITHMS FOR MINING LARGE BIOLOGICAL DATA BASES By Name Presented to Instructor Course Institution Date Abstract With the enormous amount, of gene sequences resulting from genome expression and uncontrolled data classification into functional families or classes, clustering of such large data sets has become a serious headache in functional and structural genomics…
Preview

Efficiency of Data Mining Algorithms in Identifying Outliers/Noise in a Large Biological Data Base

6 pages (1500 words) , Download 2
Efficiency Of Data Mining Algorithms In Identifying Outliers/Noise In A Large Biological Data Base Name Institution Efficiency Of Data Mining Algorithms In Identifying Outliers/Noise In A Large Biological Data Base Introduction The protein sequences numbers in bioinformatics are approximated to be over a half a million…
Preview

Design And Analysis Of Algorithms For Obtaining Super Resolution Satellite Images

18 pages (4500 words) , Download 3
This research begins with the context and background, problem statement and challenges, potential benefits. Then it investigates fundamentals of image processing particularly its definition, image perception, image sampling and quantization, image enhancement and image reconstruction from projections…
Preview
Hashing Algorithm
10 pages (2500 words) , Download 3
HASHING ALGORITHMS Hashing Algorithms Author Author’s Affiliation Date Introduction Hashing algorithms are used to translate the input of any size to a smaller output of fixed extent by making use of the hash function. In this scenario, this output value is known as the hash value…
Preview
Math and students
1 pages (250 words) , Download 1
Free
Therefore it is necessary to know the understanding level and the approaches applied by individual students, however where possible groups…
Preview
Mechanism of Locating the Client's DaTa in the Clouds
5 pages (1250 words) , Download 3
Other name (s) Course Mechanism of locating the Client’s data in the Clouds Introduction Cloud computing is a service technology that enables clients to remotely store their data on servers found on the internet…
Preview

Mutual Exclusion in Multiprocessor Systems

6 pages (1500 words) , Download 1
In any processing environment that runs more than one program or task at the same time has the problem of restricting resource access by multiple processes at the same time. In the course of a normal execution of any two programs on the same processor (uniprocessor systems)…
Preview
Truss Optimisation
10 pages (2500 words) , Download 1
Table of Contents Table of Contents 1 1.Introduction 2 1.1. Background 2 1.2.Literature Review 3 1.3. Objective 4 2. Theory 4 2.1. Structural optimization 4 2.2. The GA Principle 6 2.3. Truss Structures 7 3. Structural Optimization Using Genetic Algorithms 8 4…
Preview
Variables, Expressions, and Data Types
1 pages (250 words) , Download 1
Free
Applying mathematics in the program can be done through use of mathematical functions and algorithms like sorting, searching, use of…
Preview
Asymmetric Key/Symmetric Key
3 pages (750 words) , Download 1
Full Paper Title Name University Introduction Over the years, many cryptographic algorithms have been invented. These algorithms can be categorized into three types, i.e. encryption algorithms, hashing algorithms, and signature based algorithms. Encryption algorithms are utilized for encrypting data to ensure privacy and protection…
Preview

Data Mining - Questions to answer

4 pages (1000 words) , Download 1
1. Is a Neural Network with one or more hidden layers more powerful than a single layer perceptron Explain (Hint: in terms of learning can a neural network with one or more hidden layers learn functions more complex than the perceptron)
An artificial neural network contains networked neurons working together to solve complex problems…
Preview

PARALLEL ALGORITHM FOR MULTI-DIMENSIONAL MATRIX MULTIPLICATION OPERATIONS REPRESENTATION USING KARNAUGH MAP

10 pages (2500 words) , Download 1
Multi-dimensional arrays are widely used in a lot of scientific studies but still some issues have been encountered regarding efficient operations of these multi-dimensional arrays. In this paper, the extended Karnaugh Map representation (EKMR) scheme has been proposed as an…
Preview

Data Mining for Auditing

8 pages (2000 words) , Download 1
The transition of the applied information technology from the primitive file processing systems to sophisticated database systems can be tracked to 1960s. The evolution of the relational database systems coupled with development of data modelling, indexing and organisational techniques have led to the massive utilisation of databases and data warehouses in virtually all business transactions…
Preview
Graph theory Applications in Computer programming
3 pages (750 words) , Download 9
Free
In computing, programs are designed to successfully handle large graphs that are encountered in form of networks such as transportation networks, electrical networks, flow networks, and PERT among others…
Preview
Aerodynamics for Engineers
8 pages (2000 words) , Download 1
In the study “Aerodynamics for Engineers,” the author is focusing on generating best practices and investigating different strategies of employing the commercially available shape optimizer tool from ANSYS CFD solver Fluent. The shape optimizer is based on a polynomial mesh- morphing algorithm…
Preview

Calculate a puzzle

6 pages (1500 words) , Download 1
Both pervasive directional graphs and data intensive algebraic operations require adaptive search functions in problem solving and reasoning with limited computing resources. Among search methods, algorithmic complexity, such as memory bound problems, error convergence issues…
Preview
Blowfish Encryption Algorithm
8 pages (2000 words) , Download 1
Introduction Information system security is becoming a dominant and challenging factor for organizations, as it leverages many risks that are constantly changing. Every now and then, there are new security breaches resulting in massive losses in terms of customer confidence, as well as revenue…
Preview
DATA MINING AND VISUALISATION
5 pages (1250 words) , Download 1
Data Mining And Visualization Name Institution Given the rapid development in the internet, the distributed databases have increasingly become commonly used environment in many areas (Givano, 2003). Evidently, it has become a critical task to the mine association rules in the distributed databases…
Preview
Public-key cryptography and information security
2 pages (500 words) , Download 3
Free
Public Key Cryptography (PKC) uses a key with two elements, a "public key" and a "private key", for the implementation of an encryption algorithm that doesn't require two parties (sender and receiver) to first exchange a secret key in an attempt to carry out the process of communication…
Preview

Coherent Diffraction Imaging

20 pages (5000 words) , Download 1
Nowadays coherent diffraction imaging (CDI) is a modern approach of reconstruction of an object’s image on the basis of its diffraction pattern, which is recorded as a…
Preview
Hand In Assignment
2 pages (500 words) , Download 1
Free
Will it still be a work of art? Will it always be the result of ones experience? Or do you forecast more and more automatic ways (algorithms?) to accomplish these…
Preview
Data Structures and Algorithm Lesson Plan
6 pages (1500 words) , Download 1
The student will be expected to submit individual works from the individual assignments to enhance personal working skills. Grading will be done in accordance to the performance…
Preview
Security of Digital Signatures
15 pages (3750 words) , Download 3
Full Paper Title Name University Executive Summary Information security is an absolute essential for business and organizations. Organizations maintaining, storing processing customer data must comply with the laws and regulations of regulators in different regions…
Preview

Proposal

4 pages (1000 words) , Download 1
In the current global environment, digital technology and the increase in volume of online transmissions requires the availability of considerable amounts of bandwidth, further exacerbated by the lack of availability of storage space on computers. Software optimization offers an…
Preview
Applications of Graph Theory
4 pages (1000 words) , Download 2
It is also referred to as the study of graphs. It is a mathematical branch that focuses on encoding networks and measurement of network properties (Mandal et al., 2012). A graph refers to a set…
Preview
Echo cancellation and applications
7 pages (1750 words) , Download 1
Cancelling the effect of echo is called echo cancellation.Echo is the delayed and distorted voice of the original sound.There are certain techniques for the echo cancellation called the echo canceller, corresponding to the field of adaptive filtering…
Preview
Take the Data out of Dating in the Internet System
7 pages (1863 words)
Nobody downloaded yet
This essay "Take the Data out of Dating in the Internet System" describes love challenging in Internet social sites. The author’s main point is that online dating doesn’t guarantee a person to get the perfect match. People should be aware of the perversity that comes with algorithms. This work outlines the importance to be more attentive to user information in the Internet. …
Preview
The May 6, 2010 Flash Crash
5 pages (1250 words) , Download 1
6 MAY, 2010 FLASH CRASH.
The Flash Crash of 6 May, 2010 caused titillations even amongst economic scholars. It was characterized by sharp drop and recovery of the prices of securities. In less than half an hour, the asset value of several securities collapsed…
Preview
Data Mining
4 pages (1000 words) , Download 1
Data Mining Name: School: 1. (a). Using predictive analytics to comprehend customer behaviors: To remain competitive within the market, sellers need to comprehend present consumer behavior as well as predict those of the future. The accurate prediction of these behaviors and the full understanding of customer behaviors can help them in improving sales, retaining customers, and extending the relationships sustained with customers…
Preview
Router and IP Addresses
3 pages (750 words) , Download 1
Week 4 Hand-in Assignment (Author’s name) (Institutional Affiliation) Router and IP Addresses Yes. Routers have IP address, one IP address per router interface. The number of IP address a router has depend on the number of interfaces connected to the router…
Preview
Neutral network and machine learning
7 pages (1750 words) , Download 4
1.0 Genetic Algorithm 1.1 Introduction Genetic algorithm refers to search techniques which are based on experience that are used for purposes of solving problems, discovery and even learning. These search techniques imitate natural evolution. They use simulated evolution (Weisman & Pollack, 1995)…
Preview
CAPTCHA
5 pages (1250 words) , Download 1
Internets increase in size and services has brought about a lot of many conveniences but in order for this to be achieved a lot of challenges are being faced. Some of these challenges are in differentiating between legitimate computer users and unauthorized computer bots. This…
Preview
Analyze code 3
2 pages (500 words) , Download 1
Free
Choose one algorithm that was created and posted by another student to solve the same problem, and analyze the differences between the effectiveness of the two algorithms. Post the result of the analysis, and improvements.
1)      To verify if a number is divisible by…
Preview
Data Mining In Tracking Customer Behavior Patterns
6 pages (1500 words) , Download 1
The intention of the following essay is to justify the use of data mining aimed at gathering consumer behavior information in business. Furthermore, the essay "Data Mining In Tracking Customer Behavior Patterns" would discuss the principles of data mining and address some of the common issues…
Preview
Cryptology
10 pages (2500 words) , Download 1
Table of Contents Table of Contents 1 Introduction 2 MD5 Algorithm 2 Data filling 2 Add length 2 Initialing of variables 3 SHA-1 Algorithm 3 Principle of operation of the two algorithms 3 Collision Attacks 4 Cipher text Attack 4 Chosen Plaintext Attack 5 Known Plaintext Attack 5 Replay Attack 5 Thwarting Collisions 7 Streaming data 7 Message whitening and self interleaving 8 Security analysis 9 Summary and conclusion 10 References 12 Introduction In the recent years, information communication technologies have been on a steady growth thanks to the innovations in technology coupled with increasing needs of users to communicate…
Preview
Face Recognition Technology
5 pages (1250 words) , Download 3
The aim of the paper “Face Recognition Technology” is to analyze the Face Recognition technology in today’s world of network, which is getting increasing importance due to the growing security risks and industrialization of hackers…
Preview
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you essays on topic Algorithms for FREE!

Contact Us