Share
Explore BrainMass

Algorithms

Whilst we lack a formal, universally accepted definition of an algorithm, it is understood to mean the sequence of steps prescribed to carry out a task. The word 'algorithm' therefore includes everything from Google's search results display algorithm to IKEA furniture assembly instructions. This flexibility in definition is an advantage as it allows it to be used as a catch-all familiar term for the steps for calculations, data processing and automated reasoning. Almost all code can be broken down into algorithmic components - often one per function/subroutine/method.

To be more specific, an algorithm can be described as follows:

  • requirements for an initial state from which the algorithm can begin executing
  • requirements for initial input
  • a finite series of well-defined instructions
  • an end state where the algorithm terminates, possibly with output

The above could be described as an abstracted algorithm for algorithms itself.

One informal definition of an algorithm is that it is a "set of rules which precisely defines a sequence of operations"1 which actually defines all computer programs, mathematical and otherwise. In this respect, algorithms can be said to be the way computers turn data into meaningful, useful actions.

There are many forms of notation and language that can express algorithms. Day-to-day instructions are transmitted between people in natural language, such as a parent teaching a child how to tie their shoes, or an adult following tech support instructions over the phone. In a more computer-orientated setting, algorithms meant to be implemented as code are most often expressed in pseudocode or flowcharts for improved clarity, while algorithms that have already been implemented are written in a programming language or control table.

This medical algorithm, expressed as a flowchart, is meant for a human to follow, but by breaking it into steps, one can see how one might begin to automate it.

 

References:

1. Stone 1973:4

Icon credit AlMare

Categories within Algorithms

Searching

Postings: 102

Search algorithms traverse a data set for an item with specific attributes.

Approximation Algorithm

Postings: 4

Approximation algorithms return estimates or close copies of what the strict version would, but are often less costly and therefore more useful in the real world.

Creating Visual Representations of Data

KENAI FJORDS NATIONAL PARK SKILLS  Save a workbook with a new name  Create a column chart  Move a chart to a new worksheet  Reorder worksheets  Apply a style to a chart  Insert a chart title  Format a chart title  Remove the legend from a chart  Insert a vertical axis title  Rotate

The guide gives detailed solutions for calculations of sequence number, source port number, and destination port number by three sending orders: host A to host B, host A before host B and host A after host B.

1. Hosts A and B are communicating over a TCP connection, and Host B has already received from Host A all bytes up through (and including) byte 248. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 40 and 60 bytes of data, respectively. In the first segment, the sequence number

Internet use

Assuming your daily routine stayed the same, speculate the problems you would have if the Internet didn't exist. Speculate the problems of a familiar organization given the same scenario.

Scope And Scope Creep

Scope is defined as "the sum of the products, services, and results to be provided as a project." Scope Creep is defined as "adding features and functionality (project scope) without addressing the effects on time, costs, and resources, or without customer approval." Considering these two definitions answer the following -

Report on Inventory Models

Mercury Corporation Inventory Decision: Mercury Corporation manufactures running shoes. The factory is open 250 days a year. Mercury currently buys the laces for its shoes from Ti-Rite Company, but is considering manufacturing the laces in-house. Mercury's contract with Ti-Rite specifies a base price per lace of $0.05. Ti-R

Which of the following is a critical path from milestone A to milestone K?

1. Which of the following is a critical path from milestone A to milestone K? 2. What is the slack time for the activity starting at milestone F? 3. What is the length of the critical path identified in question 1? 4. Which milestones are precursors to J? Please see attachment for complete question.

Suppose we have a number of cabinets containing skeletons and bones.

Suppose we have a number of cabinets containing skeletons and bones. The size, shape, and bones connection are different. The question is What are the structural relationships among these organisms? Give any idea how algorithm should work? This is not really a question. I just want some direction and ideas. I am okay even w

Query Questions and Results

Q4: Write a query to produce the result using the table website. Q4.a For URLs which start with HTTPS, return URL_NAME up to 1st slash Q4.b Count number of records for each location, but report location as 'home' and 'work' instead of 0 and 1 Q4.c Change '%3d' to equal sign (=) TABLE websites User ID Location URL_

Create a weighted scoring model to determine grades for a course.

Create a weighted scoring model to determine grades for a course. Final grades are based on three exams worth 20 percent, 15 percent, and 25 percent, respectively; homework is worth 15 percent; and a group project is worth 25 percent. Assume Student 1 earns 100 percent (or 100) on every item. Assume Student 2 earns 70 percent

Google's Working Environment & the Future

I was watching a TV program that talked about Google providing a fun working environment for their employees, the facility could be somewhere in the west coast. The program was showing inside the facility they have a gym to work out, a half-court basketball court, couple of pool tables, plenty of games consoles, dry clean / laun

Transactional Versus Transformational Leadership

A particular leadership theory strand views leadership behavior largely in terms of the extent to which the leader is able to maintain the status-quo and run the organization efficiently (Transactional leadership) versus the extent to which the leader is able to envision, instigate and manage successful change (Transformational

Modify the given implementation of pop function so that it uses recursion.

Modify the pop() function of Stack so that it uses recursion. /** * pop - pops the top node from the stack. Return -1 if the stack is * empty. */ int Stack::pop() { int pop = -1; // Create a temporary set of node to hold the new stack int *tmp_nodes = new int[size]; memset(tmp_nodes, 0, sizeof(int)

Write a shell script that prints the following menu (Unix)

Write a shell script that prints the following menu Welcome to My Simple Mathematica a) Choose 'a' for Fibonacci Series b) Choose 'b' for Prime Numbers Please make your choice [a or b]: Once the user enters 'a' or 'b' perform the appropriate calculation and print the series. Limit the series by requiring the u

Flow chart and program

1 chocolate delights candy company manufactures several types of candy. Design a flowchart for the following : A programm that accepts a candy name (for exmple, "chocolate-covered blueberries'), price per pound, and number of pounds sold in the average month, and display the item's data values only if it is best-selling item. B

Truth Tables

Using the Internet and other resources define and study Truth Tables. How are Truth Tables used in computer programming? Give a short example. Did you find other areas where Truth Tables are used? Explain.

Nyquist Bandwidth question

Please reference this figure for the question: 11. Considering only the Nyquist bandwidth limitation. Determine the bandwidth required of the media (at Point D) given the following: a. 20-analog voice signals digitized using standard G.711 PCM; a TDM multiplexer with an added output overhead of 15%; and a modem that empl

This answer provided by this solution is two fold. First, the solution provides the learner with an understanding of the factor that may be attributable or included in a model for the spread of an epidemic. Further this solution provides the learner with an understanding of a manufacturers accountability for the products that produce.

This answer provided by this solution is two fold. First, the solution provides the learner with an understanding of the factor that may be attributable or included in a model for the spread of an epidemic. Further this solution provides the learner with an understanding of a manufacturers accountability for the products that pr

Image histogram of an image defined by a matrix

A 4X4 input image is defined by a matrix with gray scale[0.9] 2 3 3 2 4 2 4 3 3 2 3 5 2 4 2 4 Draw the image histogram and show the new output image along with its histogram after histogram equalization.

Network, IP

1. Summarize the following address with the most specific mask (e.g 3.3.3.0 /24, 3.3.4.0 /24 3.3.5.0 /24 Summary address = 3.3.0.0 255.255.248.0 or 3.3.0.0/21) a) 172.16.60.0 /24 172.16.61.0 /24 172.16.62.0 /24 2. Given 192.164.10.33 255.255.255.224 determine the subnet and broadcast address. 3. For r

binary

Find the 8-bit two's complement representation of -24