Algorithm and Design Techniques – A Survey

1
A. Sheik Abdullah
A. Sheik Abdullah
2
T.G.R Abiramie Shree
T.G.R Abiramie Shree
3
P Priyadharshini
P Priyadharshini
4
T Saranya
T Saranya

Send Message

To: Author

GJCST Volume 19 Issue C3

Article Fingerprint

ReserarchID

CSTSDE7G8GN

Algorithm and Design Techniques – A Survey Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Algorithm design plays a significant role in development of any application that is concerned with engineering and technology. Advancement in implementation levels of algorithms made a good impact with the model developed. Meanwhile, the time and space complexity of the execution of the algorithm varies with regard to the input to the algorithm upon fixation of various parametric levels. This paper summarizes a survey on various algorithm design techniques and its applications. The applicability of the algorithms varies with regard to the problem and the nature of computation levels.

40 Cites in Articles

References

  1. (2014). Maximum Independent Set Approximation Based on Bellman-Ford Algorithm.
  2. Juan Rivera,H Murat Afsar,Christian Prins (2015). Mathematical formulations and exact algorithm for the multitrip cumulative capacitated single-vehicle routing problem.
  3. Federico Busato,Nicola Bombieri (2016). An Efficient Implementation of the Bellman-Ford Algorithm for Kepler GPU Architectures.
  4. Ganesh Surve,Medha Shah (2017). Parallel implementation of Bellman-ford algorithm using CUDA architecture.
  5. (2017). Efficient Implementation of the Bellman-ford algorithm for GPU.
  6. (2017). Demonstration of Single Link Failure Recovery using Bellman Ford and Dijil (stra Algorithm in SDN.
  7. (2017). A bag of paths framework for network data analysis.
  8. (2018). Figure 1: Directed acyclic graph of the MR framework investigating the causal relationship between LTL and BD..
  9. Stasys Jukna,Georg Schnitger (2015). On the optimality of Bellman–Ford–Moore shortest path algorithm.
  10. (2014). Face Image Abstraction by Ford-Fulkerson Algorithm and Invariant Feature Descriptor for Human Identification.
  11. Aly-Joy Ulusoy,Ivan Stoianov,Aurelie Chazerain (2018). Hydraulically informed graph theoretic measure of link criticality for the resilience analysis of water distribution networks.
  12. Yuhong Sheng,Jinwu Gao (2014). Chance distribution of the maximum flow of uncertain random network.
  13. Janet Anderson,Hong-Jian Lai,Xiaomin Li,Xiaoxia Lin,Murong Xu (2018). Minimax properties of some density measures in graphs and digraphs.
  14. (2014). Using basis dependence distance vectors in the modified Floyd-Warshall algorithm.
  15. A Muholzoev,V Masyagin (2016). Probabilistic Calculation of Tolerances of the Dimension Chain Based on the Floyd-warshall Algorithm.
  16. (2009). Accelerating Boyer Moore searches on binary texts.
  17. Frantisek Franek,Christopher Jennings,W Smyth (2007). A simple fast hybrid pattern-matching algorithm.
  18. Ain Saleh,Nur Rozali,Alya Buja,Kamarularifin Jalil,Fakariah Ali,Teh Rahman (2015). A Method for Web Application Vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm.
  19. Phyela Mbewe,Sampson Asare (2017). Analysis and comparison of adaptive huffman coding and arithmetic coding algorithms.
  20. (2015). High performance parallelization of Boyer-Moore algorithm on many-core accelerators.
  21. (2017). Balancing decoding speed and memory usage for Huffman codes using quaternary tree.
  22. (1994). A variation on the Boyer-Moore algorithm.
  23. Yih-Kai Lin,Shu-Chien Huang,Cheng-Hsing Yang (2011). A fast algorithm for Huffman decoding based on a recursion Huffman tree.
  24. Bruce Watson,Richard Watson (2002). A Boyer–Moore-style algorithm for regular expression pattern matching.
  25. W-W Lu,M Gough (1998). A fast-adaptive Huffman coding algorithm.
  26. G Ong (2000). An algorithm for generating n Huffman codes with a worst case of (n log/sub 2/ n+n log/sub 2/ log/sub 2/ n) comparisons.
  27. S Pigeon,Y Bengio (1993). A memory-efficient adaptive Huffman coding algorithm for very large sets of symbols.
  28. Wang Zhe,Chen Jun,Yuan Gang,Zhao Zhou,Yan (2001). A Quick algorithm for planar fragmented objects stitching Base on KMP algorithm.
  29. (2017). Application of KMP Algorithm in Customized Flow Analysis.
  30. R Yavne (1968). An economical method for calculating the discrete Fourier transform.
  31. Daniel Bernstein (2007). The Tangent FFT.
  32. Dilla Ravilla (2015). Chandra sekara reddy putta "Enhancing the security of mannets using hash algorithm.
  33. Nabil Abdoun,E Safwan,Assad Secure hash algorithm based on efficient chaotic neural network.
  34. R Jain (2005). I Want My IPTV.
  35. H Schwarz,D Marpe,T Wiegand (2007). Overview of the Scalable Video Coding Extension of the H.264/AVC Standard.
  36. R Ahlswede,Ning Cai,S.-Y Li,R Yeung (2000). Network information flow.
  37. Alia Arshad,Dur-E-Shahwar Kundi,Arshad Aziz (2014). Compact implementation of SHA3-512 on FPGA.
  38. George Athanasiou,George-Paris Makkas,Georgiostheodoridis (2014). High throughput pipelined FPGA implementation of the new SHA-3cryptographic hash algorithm.
  39. Harris Lenosioannou,Artemios Michail,Voyiatzis (2015). High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm.
  40. Thomas Muzaffarrao,Ian Newe,Grout (2015). Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IOT Applications.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

A. Sheik Abdullah. 2019. \u201cAlgorithm and Design Techniques – A Survey\u201d. Global Journal of Computer Science and Technology - C: Software & Data Engineering GJCST-C Volume 19 (GJCST Volume 19 Issue C3): .

Download Citation

Issue Cover
GJCST Volume 19 Issue C3
Pg. 43- 52
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-C Classification: I.1.2
Version of record

v1.2

Issue date

December 9, 2019

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 4830
Total Downloads: 1299
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Algorithm design plays a significant role in development of any application that is concerned with engineering and technology. Advancement in implementation levels of algorithms made a good impact with the model developed. Meanwhile, the time and space complexity of the execution of the algorithm varies with regard to the input to the algorithm upon fixation of various parametric levels. This paper summarizes a survey on various algorithm design techniques and its applications. The applicability of the algorithms varies with regard to the problem and the nature of computation levels.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Algorithm and Design Techniques – A Survey

A. Sheik Abdullah
A. Sheik Abdullah
T.G.R Abiramie Shree
T.G.R Abiramie Shree
P Priyadharshini
P Priyadharshini
T Saranya
T Saranya

Research Journals