0% found this document useful (0 votes)
33 views2 pages

All Algo

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views2 pages

All Algo

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

Data Structures:

Array
Linked List
Stack
Queue
Tree (Binary Tree, Binary Search Tree, AVL Tree, Red-Black Tree, etc.)
Heap (Min Heap, Max Heap)
Hash Table (HashMap, Hash Set)
Graph (Directed Graph, Undirected Graph)
Trie (Prefix Tree)
Priority Queue
Disjoint Set (Union-Find)

Algorithms:
Searching Algorithms:
Linear Search
Binary Search
Depth-First Search (DFS)
Breadth-First Search (BFS)

Sorting Algorithms:
Bubble Sort
Selection Sort
Insertion Sort
Merge Sort
Quick Sort
Heap Sort
Radix Sort

Graph Algorithms:
Shortest Path Algorithms (Dijkstra's Algorithm, Bellman-Ford Algorithm)
Minimum Spanning Tree Algorithms (Prim's Algorithm, Kruskal's Algorithm)
Topological Sorting
Graph Traversal Algorithms (DFS, BFS)

Dynamic Programming:
Fibonacci Series
Knapsack Problem
Longest Common Subsequence
Matrix Chain Multiplication

Divide and Conquer:


Binary Search
Merge Sort
Quick Sort

Greedy Algorithms:
Fractional Knapsack Problem
Huffman Coding
Prim's Algorithm for Minimum Spanning Tree

Backtracking:
N-Queens Problem
Sudoku Solver
Hamiltonian Cycle

String Algorithms:
Pattern Searching (Naive, Rabin-Karp, Knuth-Morris-Pratt)
Longest Common Substring
String Matching Algorithms (KMP, Rabin-Karp, Boyer-Moore)

Numerical Algorithms:
Euclidean Algorithm (GCD)
Primality Testing (Sieve of Eratosthenes, Miller-Rabin)
Fast Fourier Transform (FFT)

Computational Geometry:
Convex Hull (Graham Scan, Jarvis March)
Line Intersection
Closest Pair of Points

These are just some of the fundamental data structures and algorithms. There are
many more advanced and specialized ones used in various fields such as machine
learning, cryptography, databases, etc. Additionally, there are different
implementations and variations of these algorithms tailored to specific needs and
constraints.

Machine Learning:
Neural Networks (Feedforward, Convolutional, Recurrent, etc.)
Support Vector Machines (SVM)
Decision Trees (Random Forests, Gradient Boosting Machines)
Clustering Algorithms (K-Means, Hierarchical Clustering)
Dimensionality Reduction Techniques (Principal Component Analysis, t-SNE)
Reinforcement Learning Algorithms (Q-Learning, Deep Q-Networks)
Natural Language Processing Algorithms (Word Embeddings, Named Entity Recognition)
Collaborative Filtering (Matrix Factorization, Singular Value Decomposition)
Genetic Algorithms
Bayesian Networks

Cryptography:
Encryption Algorithms (AES, RSA, DES, Blowfish)
Hashing Algorithms (MD5, SHA-1, SHA-256)
Digital Signature Algorithms (DSA, ECDSA)
Key Exchange Protocols (Diffie-Hellman, Elliptic Curve Cryptography)
Cryptographic Protocols (SSL/TLS, SSH)
Homomorphic Encryption
Zero-Knowledge Proofs
Secure Multi-Party Computation
Post-Quantum Cryptography Algorithms (Lattice-based, Code-based, Hash-based)
Cryptanalysis Techniques (Brute Force, Frequency Analysis, Differential
Cryptanalysis)

Databases:
Indexing Techniques (B-Trees, B+ Trees, Hash Indexing)
Query Optimization Algorithms
Transaction Management (ACID properties)
Database Replication and Sharding
NoSQL Databases (Document Stores, Key-Value Stores, Columnar Databases)
Distributed Database Algorithms (Consensus Algorithms, Distributed Query
Processing)
Data Warehousing Techniques
Database Security Measures
Big Data Processing Frameworks (Hadoop, Spark)
In-memory Databases (Redis, Memcached)

You might also like