StudentShare
Search

## Essays on algorithms

The Algorithms is one of the most popular assignments among students' documents. If you are stuck with writing or missing ideas, scroll down and find inspiration in the best samples. Algorithms is quite a rare and popular topic for writing an essay, but it certainly is in our database.

Choose the best solution for you
Go through the list of samples
Order the paper

## Routing Algorithms

Free
Today, OSPF is most widely used while once popular RIP is undergoing extensive development. (Forouzan 2006)
OSPF is a complex…

## Genetic Algorithms

The N-Queens problem is a traditional AI problem. Its name is resulting from the allowable moves for the ruler part in chess. Queens are allowable to move flat, vertically, or diagonally, toward the back and forward, with the merely restriction being that they can go in only one course at a time…
Hire a pro to write
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Apply my DISCOUNT

## Compression Algorithms

Compression Algorithms: Name: Institution: Course: Tutor: Date: Introduction In information theory and computer technology, source coding, reduction in the bit rate or data compression involves encoding of information by the use of fewer bits compared to original representations…

## Discrete Mathematics(Mathematical Algorithms)

Discrete mathematics is a section or element of mathematics that is concerned with the objects which are capable of assuming just divided, distinctive values. The concept of discrete mathematics is thus applied in distinction with continuous mathematics, that is the subdivision…

## Breaker Failure Detection Algorithms

Name: Instructor's name: Course: Date: Breaker Failure Detection Algorithms Abstract In a power system world, breaker failure protection became a critical element to provide a back up protection for circuit breakers (CBs). Practically, every apparatus is equipped with primary protection to interrupt the current flow whenever a fault occurs…

## Hashing Algorithms Information Technology Research Paper

Running head: HASHING ALGORITHMS Hashing Algorithms Number Introduction Hashing algorithms are used for several purposes like encoding, decoding a particular text or a file, to provide key access to a database, to convert the specified value into another format…

## Machine Learning Algorithms and Tools

The paper "Machine Learning Algorithms and Tools" explores the functionality of the WEKA tool that consists of visualization tools and algorithms used for data analysis and predictive modeling, the experimenter application that allows comparison of the predictive performance of Weka’s machine learning algorithms on a collection of datasets, etc…

## Artificial Intelligence: Machine Learning Algorithms

The author answers the questions regarded the article about machine learning algorithms. The author describes the datasets used for experiments on the class prediction problem and the arguments for using a neighborhood analysis approach for AML-ALL class prediction…

## Data structures and algorithms for social media

Data structures are the registers and memories in a computer, whilst algorithms are the pieces of information stored in the structures (Wirth, 1984). Algorithms are very useful in selecting the most relevant information during a search. There are recommended algorithms that are…

## Data Structures and Algorithms

The data structure should be in a position to support every one of the operations listed above. The common schemes that ADT is expected to include are: the arrays, list of children, Child-Sibling representation.
Huffman Code is normally looked at as a prefix code…

## Cluster Analysis: Basic Concepts and Algorithms

This study "Cluster Analysis: Basic Concepts and Algorithms" discusses clustering which uses as a tool for forecasting future costs, expenses, sales, and net income. The study considers clustering customers according to income, location, sex, and others will help increase company sales…

## Data Compression Algorithms.Use of Compression Algorithms in Forensics

From the many years, numerous data compression algorithms have been developed to deal with specific data compression problem. From the developed data compression algorithms, there does not exist a single compression algorithm that compress all data types efficiently…

## Efficiency of Clustering Algorithms in Mining Biological databases

EFFICIENCY OF CLUSTERING ALGORITHMS IN MINING BIOLOGICAL DATABASES Name (s) Course Efficiency of clustering algorithms in mining biological databases Introduction Clustering analysis is increasingly being used in the mining of databases such as gene and protein sequences…

## Differentiate between the different types of cryptographic algorithms

Free
Encryption is the process of coding information inform of cipher text for protection of information. The cipher text requires a decoding key to read the text. In cryptography, a key refers to a…

## Efficiency of Clustering algorithms for mining large biological data bases

EFFICIENCY OF CLUSTERING ALGORITHMS FOR MINING LARGE BIOLOGICAL DATA BASES By Name Presented to Instructor Course Institution Date Abstract With the enormous amount, of gene sequences resulting from genome expression and uncontrolled data classification into functional families or classes, clustering of such large data sets has become a serious headache in functional and structural genomics…

## Efficiency of Data Mining Algorithms in Identifying Outliers/Noise in a Large Biological Data Base

Efficiency Of Data Mining Algorithms In Identifying Outliers/Noise In A Large Biological Data Base Name Institution Efficiency Of Data Mining Algorithms In Identifying Outliers/Noise In A Large Biological Data Base Introduction The protein sequences numbers in bioinformatics are approximated to be over a half a million…

## Design And Analysis Of Algorithms For Obtaining Super Resolution Satellite Images

This research begins with the context and background, problem statement and challenges, potential benefits. Then it investigates fundamentals of image processing particularly its definition, image perception, image sampling and quantization, image enhancement and image reconstruction from projections…
Hashing Algorithm
HASHING ALGORITHMS Hashing Algorithms Author Author’s Affiliation Date Introduction Hashing algorithms are used to translate the input of any size to a smaller output of fixed extent by making use of the hash function. In this scenario, this output value is known as the hash value…
Math and students
Free
Therefore it is necessary to know the understanding level and the approaches applied by individual students, however where possible groups…
Mechanism of Locating the Client's DaTa in the Clouds
Other name (s) Course Mechanism of locating the Client’s data in the Clouds Introduction Cloud computing is a service technology that enables clients to remotely store their data on servers found on the internet…

## Mutual Exclusion in Multiprocessor Systems

In any processing environment that runs more than one program or task at the same time has the problem of restricting resource access by multiple processes at the same time. In the course of a normal execution of any two programs on the same processor (uniprocessor systems)…
Truss Optimisation
Table of Contents Table of Contents 1 1.Introduction 2 1.1. Background 2 1.2.Literature Review 3 1.3. Objective 4 2. Theory 4 2.1. Structural optimization 4 2.2. The GA Principle 6 2.3. Truss Structures 7 3. Structural Optimization Using Genetic Algorithms 8 4…
Variables, Expressions, and Data Types
Free
Applying mathematics in the program can be done through use of mathematical functions and algorithms like sorting, searching, use of…
Asymmetric Key/Symmetric Key
Full Paper Title Name University Introduction Over the years, many cryptographic algorithms have been invented. These algorithms can be categorized into three types, i.e. encryption algorithms, hashing algorithms, and signature based algorithms. Encryption algorithms are utilized for encrypting data to ensure privacy and protection…

## Data Mining - Questions to answer

1. Is a Neural Network with one or more hidden layers more powerful than a single layer perceptron Explain (Hint: in terms of learning can a neural network with one or more hidden layers learn functions more complex than the perceptron)
An artificial neural network contains networked neurons working together to solve complex problems…

## PARALLEL ALGORITHM FOR MULTI-DIMENSIONAL MATRIX MULTIPLICATION OPERATIONS REPRESENTATION USING KARNAUGH MAP

Multi-dimensional arrays are widely used in a lot of scientific studies but still some issues have been encountered regarding efficient operations of these multi-dimensional arrays. In this paper, the extended Karnaugh Map representation (EKMR) scheme has been proposed as an…

## Data Mining for Auditing

The transition of the applied information technology from the primitive file processing systems to sophisticated database systems can be tracked to 1960s. The evolution of the relational database systems coupled with development of data modelling, indexing and organisational techniques have led to the massive utilisation of databases and data warehouses in virtually all business transactions…
Graph theory Applications in Computer programming
Free
In computing, programs are designed to successfully handle large graphs that are encountered in form of networks such as transportation networks, electrical networks, flow networks, and PERT among others…
Aerodynamics for Engineers
In the study “Aerodynamics for Engineers,” the author is focusing on generating best practices and investigating different strategies of employing the commercially available shape optimizer tool from ANSYS CFD solver Fluent. The shape optimizer is based on a polynomial mesh- morphing algorithm…

## Calculate a puzzle

Both pervasive directional graphs and data intensive algebraic operations require adaptive search functions in problem solving and reasoning with limited computing resources. Among search methods, algorithmic complexity, such as memory bound problems, error convergence issues…
Blowfish Encryption Algorithm
Introduction Information system security is becoming a dominant and challenging factor for organizations, as it leverages many risks that are constantly changing. Every now and then, there are new security breaches resulting in massive losses in terms of customer confidence, as well as revenue…
DATA MINING AND VISUALISATION
Data Mining And Visualization Name Institution Given the rapid development in the internet, the distributed databases have increasingly become commonly used environment in many areas (Givano, 2003). Evidently, it has become a critical task to the mine association rules in the distributed databases…
Public-key cryptography and information security
Free
Public Key Cryptography (PKC) uses a key with two elements, a "public key" and a "private key", for the implementation of an encryption algorithm that doesn't require two parties (sender and receiver) to first exchange a secret key in an attempt to carry out the process of communication…

## Coherent Diffraction Imaging

Nowadays coherent diffraction imaging (CDI) is a modern approach of reconstruction of an object’s image on the basis of its diffraction pattern, which is recorded as a…
Hand In Assignment
Free
Will it still be a work of art? Will it always be the result of ones experience? Or do you forecast more and more automatic ways (algorithms?) to accomplish these…
Data Structures and Algorithm Lesson Plan
The student will be expected to submit individual works from the individual assignments to enhance personal working skills. Grading will be done in accordance to the performance…
Security of Digital Signatures
Full Paper Title Name University Executive Summary Information security is an absolute essential for business and organizations. Organizations maintaining, storing processing customer data must comply with the laws and regulations of regulators in different regions…

## Proposal

In the current global environment, digital technology and the increase in volume of online transmissions requires the availability of considerable amounts of bandwidth, further exacerbated by the lack of availability of storage space on computers. Software optimization offers an…
Applications of Graph Theory
It is also referred to as the study of graphs. It is a mathematical branch that focuses on encoding networks and measurement of network properties (Mandal et al., 2012). A graph refers to a set…
Echo cancellation and applications
Cancelling the effect of echo is called echo cancellation.Echo is the delayed and distorted voice of the original sound.There are certain techniques for the echo cancellation called the echo canceller, corresponding to the field of adaptive filtering…
Take the Data out of Dating in the Internet System
7 pages (1863 words)
This essay "Take the Data out of Dating in the Internet System" describes love challenging in Internet social sites. The author’s main point is that online dating doesn’t guarantee a person to get the perfect match. People should be aware of the perversity that comes with algorithms. This work outlines the importance to be more attentive to user information in the Internet. …
The May 6, 2010 Flash Crash
6 MAY, 2010 FLASH CRASH.
The Flash Crash of 6 May, 2010 caused titillations even amongst economic scholars. It was characterized by sharp drop and recovery of the prices of securities. In less than half an hour, the asset value of several securities collapsed…
Data Mining
Data Mining Name: School: 1. (a). Using predictive analytics to comprehend customer behaviors: To remain competitive within the market, sellers need to comprehend present consumer behavior as well as predict those of the future. The accurate prediction of these behaviors and the full understanding of customer behaviors can help them in improving sales, retaining customers, and extending the relationships sustained with customers…
Week 4 Hand-in Assignment (Author’s name) (Institutional Affiliation) Router and IP Addresses Yes. Routers have IP address, one IP address per router interface. The number of IP address a router has depend on the number of interfaces connected to the router…
Neutral network and machine learning
1.0 Genetic Algorithm 1.1 Introduction Genetic algorithm refers to search techniques which are based on experience that are used for purposes of solving problems, discovery and even learning. These search techniques imitate natural evolution. They use simulated evolution (Weisman & Pollack, 1995)…
Internets increase in size and services has brought about a lot of many conveniences but in order for this to be achieved a lot of challenges are being faced. Some of these challenges are in differentiating between legitimate computer users and unauthorized computer bots. This…
Analyze code 3
Free
Choose one algorithm that was created and posted by another student to solve the same problem, and analyze the differences between the effectiveness of the two algorithms. Post the result of the analysis, and improvements.
1)      To verify if a number is divisible by…
Data Mining In Tracking Customer Behavior Patterns
The intention of the following essay is to justify the use of data mining aimed at gathering consumer behavior information in business. Furthermore, the essay "Data Mining In Tracking Customer Behavior Patterns" would discuss the principles of data mining and address some of the common issues…
Cryptology
Table of Contents Table of Contents 1 Introduction 2 MD5 Algorithm 2 Data filling 2 Add length 2 Initialing of variables 3 SHA-1 Algorithm 3 Principle of operation of the two algorithms 3 Collision Attacks 4 Cipher text Attack 4 Chosen Plaintext Attack 5 Known Plaintext Attack 5 Replay Attack 5 Thwarting Collisions 7 Streaming data 7 Message whitening and self interleaving 8 Security analysis 9 Summary and conclusion 10 References 12 Introduction In the recent years, information communication technologies have been on a steady growth thanks to the innovations in technology coupled with increasing needs of users to communicate…
Face Recognition Technology
The aim of the paper “Face Recognition Technology” is to analyze the Face Recognition technology in today’s world of network, which is getting increasing importance due to the growing security risks and industrialization of hackers…
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.