Some important algorithms in computer programming

Source: Internet
Author: User
The following are some important algorithms. I have listed 32 in the original article, but I think many of them are in number theory and are irrelevant to computers, so they are not selected. Some of the following are often used, and some are basically not used. Some are very common, and some are very biased. But it is also a good thing to understand. You are also welcome to leave behind algorithms that make sense to you. (Note: This article is not translated. most of the algorithm descriptions are taken from Wikipedia, because Wikipedia is very professional)

The following are some important algorithms. I have listed 32 in the original article, but I think many of them are in number theory and are irrelevant to computers, so they are not selected. Some of the following are often used, and some are basically not used. Some are very common, and some are very biased. But it is also a good thing to understand. You are also welcome to leave behind algorithms that make sense to you. (Note: This article is not translated. most of the algorithm descriptions are taken from Wikipedia, because Wikipedia is very professional)

  1. A * search algorithm
  2. It is also known as the astar algorithm. This is an algorithm with multiple node paths on the graphic plane to find the lowest cost. It is often used in the mobile computing of the NPC in the game or the mobile computing of the BOT in the online game. Like Dijkstra, this algorithm can find a shortest path and perform heuristic search like BFS.

  3. Beam Search
  4. Beam search is a heuristic method to solve the optimization problem. it is developed on the basis of the branch and bound method. it uses heuristic methods to estimate k best paths, only search down from these k paths, that is, only satisfied nodes are retained for each layer, and other nodes are permanently discarded, thus greatly saving the running time by the score branch and demarcation method. Bundle search was first applied to the AI field in the middle of 1970s. in 1976, Lowerre used the bundle search method for the first time in its HARPY speech recognition system, his goal is to search several potential optimal decision paths in parallel to reduce backtracking and quickly obtain a solution.

  5. Binary search algorithm
  6. A search algorithm used to search for a specific element in an ordered array. The search process starts from the intermediate element of the array. if the intermediate element is the element to be searched, the search process ends. if a specific element is greater than or less than the intermediate element, search in the half where the array is greater than or less than the intermediate element, and compare it from the intermediate element as before. This search algorithm reduces the search range by half for each comparison.

  7. Branch and bound
  8. The branch and bound algorithm is a method used to search for a problem in the spatial tree of the problem. However, unlike the backtracking algorithm, the branch/boundary algorithm searches for a spatial tree by the breadth-first or minimum-consumption-first method. in the branch/boundary algorithm, each active node has only one chance to become an extension node.

  9. Data compression
  10. Data compression is a technology that reduces the redundancy of data stored in computers or transmitted through communication to increase the data density and ultimately reduce the storage space of data. Data compression is widely used in file storage and distributed systems. Data compression also represents the increase in size of media capacity and the expansion of network bandwidth.

  11. Diffie-Hellman key negotiation
  12. Diffie-Hellman key exchange (D-H) is a security protocol. It allows both parties to establish a key through insecure channels without any prior information from the other party. This key can be used as a symmetric key for subsequent communication to encrypt the communication content.

  13. Dijkstra's algorithm
  14. The Dickus algorithm (Dijkstra) was invented by the Dutch computer scientist Edsger Wybe Dijkstra. The algorithm solves the shortest path from a single source point to another vertex in the directed graph. For example, if the vertex in the figure represents the city, and the weight on the edge represents the distance between cities, the Dickus algorithm can be used to find the shortest path between two cities.

  15. Dynamic planning
  16. Dynamic programming is a method used in mathematics and computer science to solve optimization problems that contain overlapping subproblems. The basic idea is to break down the original problem into similar subproblems and find the solution of the original problem through the subproblem solution in the process of solving the problem. The idea of dynamic planning is the basis of multiple algorithms and is widely used in computer science and engineering. Well-known application examples include: solving shortest path problems, knapsack problems, project management, and network flow optimization. Here is also a detailed article.

  17. Euclidean algorithm
  18. In mathematics, the moving phase division, also known as Euclidean algorithm, is an algorithm for finding the maximum common number. The moving phase division first appeared in Euclidean's Ry original (Volume VII, proposition I and ii). in China, it can be traced back to the 9-chapter arithmetic in the Eastern Han Dynasty.

  19. Maximum expectation (EM) algorithm
  20. In statistical calculation, the maximum expectation (EM) algorithm is an algorithm used to find the maximum likelihood of parameters in the probability (probabilistic) model, the probability model depends on hidden variables that cannot be observed (Latent Variable ). The highest expectation is often used in the Data Clustering field of machine learning and computer vision. The maximum expectation algorithm is calculated in two steps. The first step is to calculate the expectation (E). The maximum likelihood estimation value of the hidden variable is calculated using the existing estimation value; the second step is to maximize (M) and maximize the maximum likelihood value obtained in Step E to calculate the parameter value. The parameter estimates found in step M are used in the next step E calculation, and the process continues to alternate.

  21. Fast Fourier transform (FFT)
  22. Fast Fourier Transform (FFT) is a Fast algorithm for discrete Fourier transformation. It can also be used to calculate the inverse transformation of discrete Fourier transformation. Fast Fourier transform is widely used, such as digital signal processing, big integer multiplication, and partial differential equations. This entry only describes various fast algorithms. for the nature and application of discrete Fourier transformation, see Discrete Fourier transformation.

  23. Hash functions
  24. HashFunction is a method for creating small numbers "fingerprints" from any type of data. This function breaks down the data and creates a new fingerprint called the hash value. Hash values are generally used to represent a string consisting of short random letters and numbers. Good hash functions rarely conflict with hash columns in the input domain. In the case of hash and data processing, conflicts are not allowed to distinguish data, which makes it more difficult to locate database records.

  25. Heap sorting
  26. Heapsort is a sort algorithm designed by using the data structure of the stacked tree (heap. A stacked tree is a structure that is similar to a complete binary tree and meets the accumulation attributes. that is, the key value or index of a subnode is always smaller than (or greater than) its parent node.

  27. Merge sorting
  28. Merge sort is an effective sorting algorithm based on the Merge operation. This algorithm is a very typical application of Divide and Conquer.

  29. RANSAC algorithm
  30. RANSAC is short for "RANdom SAmpleConsensus. This algorithm is an iterative method used to estimate mathematical model parameters from a group of observations. it is proposed by Fischler and Bolles in 1981. it is a non-deterministic algorithm, because it can only get reasonable results with a certain probability, this probability increases with the increase of the number of iterations. The basic assumption of this algorithm is that "inliers" (points that support model parameter estimation) and "outliers" exist in the observation data set ), in addition, this group of observed data is affected by noise. RANSAC assumes that given a set of "inliers" data, it can obtain the optimal model that conforms to this set of points.

  31. RSA encryption algorithm
  32. This is a public key encryption algorithm and the world's first algorithm suitable for signature. Today, RSA has expired its patents and is widely used in e-commerce encryption. we all believe that this algorithm will be secure as long as the key is long enough.

  33. Query Union-find
  34. The query set is a tree-type data structure used to deal with the merge and query problems of some Disjoint Sets. Forest is often used.

  35. Viterbi algorithm
  36. Find the most likely sequence of hidden states (Finding most probable sequence of hidden states ).

This article is available at http://www.nowamagic.net/librarys/veda/detail/236.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.