# Comparative Analysis Of Sorting Algorithm

Submitted By
Words 2578
Pages 11
COMPARATIVE ANALYSIS OF VARIOUS SORTING ALGORITHM
ABSTRACT: Sorting is a commonly used operation in computer science. In addition to its main job, sorting is often required to facilitate some other operation such as searching, merging and normalization. A sorting algorithm consists of comparison, swap, and assignment operations. There are several elementary and advanced sorting algorithms that are being used in practical life as well as in computation such as Quick sort, Bubble sort, Merge sort, Bucket sort, Heap sort, Radix sort etc. But the application of these algorithms depends on the problem statement. This paper introduces MQ sort which combines the advantages of quick sort and Merge sort. The comparative analysis of performance and complexity
It refers to the arranging of numerical or alphabetical or character data in statistical order (either in increasing order or decreasing order) or in lexicographical order (alphabetical value like addressee key) [1-3]. There are a number of solutions to this problem, known as sorting algorithms. There are several elementary and advanced sorting algorithms. Some sorting algorithms are simple and spontaneous, such as the bubble sort. Others, such as the quick sort are enormously complex, but produce super-fast results. Some sorting algorithm work on less number of elements, some are suitable for floating point numbers, some are good for specific range, some sorting algorithms are used for huge number of data, and some are used if the list has repeated values. Other factors to be considered in choosing a sorting algorithm include the programming effort, the number of words of main memory available, the size of disk or tape units and the extent to which the list is already ordered [4]. That means all sorting Algorithms are problem specific, meaning they work well on some specific problem and do not work well for all the problems. However, there is a direct correlation between the complexity of an algorithm and its relative effectiveness [5]. Many different sorting algorithms have been developed and improved to make sorting fast.
The formal definition of the sorting problem is as follows:
Input: A sequence having n numbers in some random order (a1, a2, a3, ….. an)
Output: A permutation (a’1, a’2, a’3, ….. a’n) of the input sequence such that a’1 ≤ a’2 ≤ a’3 ≤ ….. a’n
For instance, if the given input of numbers is (59, 41, 31, 41, 26, 58), then the output sequence returned by a sorting algorithm will be (26, 31, 41, 41, 58,

### Similar Documents

Free Essay

#### Sorting Algorithms

...REVIEW ON SORTING ALGORITHMS A comparative study on two sorting algorithms By Pooja Adhikari A Term Paper Submitted to the Faculty of Dr. Gene Boggess Mississippi State University In the Department of Computer Science & Engineering Mississippi State, Mississippi 04 20072 ABSTRACT Any number of practical applications in computing requires things to be in order. The performance of any computation depends upon the performance of sorting algorithms. Like all complicated problems, there are many solutions that can achieve the same results. One sort algorithm can do sorting of data faster than another. A lot of sorting algorithms has been developed to enhance the performance in terms of computational complexity, memory and other factors. This paper choose two of the sorting algorithms among them selection sort and shell sort and compares the various performance factor among them. 1. INTRODUCTION Sorting is the rearrangement of things in a list into their correct lexicographic order. A number of sorting algorithms have been developed like include heap sort , merge sort, quick sort, selection sort all of which are comparison based sort .There is another class of sorting algorithms which are non comparison based sort. This paper gives the brief introduction about sorting algorithms [2] where it discuss about the class of sorting algorithms and their running times. It mainly analyses the performance between two...

Words: 841 - Pages: 4

Free Essay

#### Syllabus

...SCHEME OF EXAMINATION FOR MASTER OF COMPUTER APPLICATIONS (MCA) (SIX-SEMESTER Programme) |Semester – I | |Paper |Title of the Paper |Duration |Maximum Marks |Total | |No. | |Of Exam | | | | | | |Theory |Sessional* | | |MCA-101 |Computer Fundamentals and Problem Solving Using C |3 Hours |80 |20 |100 | |MCA-102 |Computer Organisation |3 Hours |80 |20 |100 | |MCA-103 |Discrete Mathematical Structures |3 Hours |80 |20 |100 | |MCA-104 |Software Engineering |3 Hours |80 |20 |100 | |MCA-105 |Computer Oriented Numerical and Statistical Methods |3 Hours |80 |20 |100 | |MCA-106 |Software Laboratory - I |3 Hours | | |100 | | |C (Based on MCA-101) |...

Words: 13848 - Pages: 56

#### Aaaa

...International Journal of Software Engineering and Its Applications Vol. 7, No. 2, March, 2013 Integrating Knowledge Management with Business Intelligence Processes for Enhanced Organizational Learning Rizwan Shehzad and Muhammad Naeem Ahmed Khan Department of Computer Science Shaheed Zulfikar Ali Bhutto Institute of Science & Tech., Islamabad, Pakistan rizince@yahoo.com, mnak2010@gmail.com Abstract Knowledge Management (KM), either in a tacit or explicit form, plays an important role in decision making. Business Intelligence (BI) has acquired significant importance in the business world due to the recent technological advancements and availability of state-of-theart software tools. Presently, most of the organizations across the globe are adopting BI solutions to promote business, retain customers, earn maximum profits, reduce recurring expenditures, etc. KM, on the other hand, has not gained significant acknowledgement from an implementation perspective. Moreover, the effect of BI on KM and vice versa is rarely observed. In this paper, we propose a model where KM and BI can benefit from each other. Since both of the said fields have a wide range of features, the proposed model is based on specific features. For that purpose, we have identified a number of Critical Success Factors (CSFs) related to both BI and KM technologies reported in contemporary research. Afterwards, we have drawn a comparison pertinent to the effectiveness of these CSFs with......

Words: 4382 - Pages: 18

Free Essay

#### Information Mgt

...Souvorov1, Grigory Starchenko1, Tatiana A. Tatusova1, Lukas Wagner1, Yanli Wang1, W. John Wilbur1, Eugene Yaschenko1 and Jian Ye1 1 Downloaded from http://nar.oxfordjournals.org/ by guest on March 20, 2015 National Center for Biotechnology Information, National Library of Medicine, National Institutes of Health, Building 38A, 8600 Rockville Pike, Bethesda, MD 20894, USA and 2University Clinic of Blood Group Serology and Transfusion Medicine, Medical University of Graz, Auenbruggerplatz 3, A-8036 Graz, Austria Received September 16, 2010; Revised October 29, 2010; Accepted November 1, 2010 ABSTRACT In addition to maintaining the GenBank nucleic acid sequence database, the National Center for Biotechnology Information (NCBI) provides analysis and retrieval resources for the data in GenBank and other biological data made available through the NCBI Web site. NCBI resources include Entrez, the Entrez Programming Utilities, MyNCBI, PubMed, PubMed Central (PMC), Entrez Gene, the NCBI Taxonomy Browser, BLAST, BLAST Link (BLink), Primer-BLAST, COBALT, Electronic PCR, OrfFinder, Splign,...

Words: 11985 - Pages: 48

Free Essay

#### Empoyment

...THE FUTURE OF EMPLOYMENT: HOW SUSCEPTIBLE ARE JOBS TO COMPUTERISATION?∗ Carl Benedikt Frey† and Michael A. Osborne‡ September 17, 2013 . Abstract We examine how susceptible jobs are to computerisation. To assess this, we begin by implementing a novel methodology to estimate the probability of computerisation for 702 detailed occupations, using a Gaussian process classiﬁer. Based on these estimates, we examine expected impacts of future computerisation on US labour market outcomes, with the primary objective of analysing the number of jobs at risk and the relationship between an occupation’s probability of computerisation, wages and educational attainment. According to our estimates, about 47 percent of total US employment is at risk. We further provide evidence that wages and educational attainment exhibit a strong negative relationship with an occupation’s probability of computerisation. Keywords: Occupational Choice, Technological Change, Wage Inequality, Employment, Skill Demand JEL Classiﬁcation: E24, J24, J31, J62, O33. We thank the Oxford University Engineering Sciences Department and the Oxford Martin Programme on the Impacts of Future Technology for hosting the “Machines and Employment” Workshop. We are indebted to Stuart Armstrong, Nick Bostrom, Eris Chinellato, Mark Cummins, Daniel Dewey, David Dorn, Alex Flint, Claudia Goldin, John Muellbauer, Vincent Mueller, Paul Newman, Seán Ó hÉigeartaigh, Anders Sandberg, Murray Shanahan, and......

Words: 26582 - Pages: 107

...multi-objective multi-mode model for solving discrete time–cost–quality trade-off problems (DTCQTPs) with preemption and generalized precedence relations. The proposed model has three unique features: (1) preemption of activities (with some restrictions as a minimum time before the ﬁrst interruption, a maximum number of interruptions for each activity, and a maximum time between interruption and restarting); (2) simultaneous optimization of conﬂicting objectives (i.e., time, cost, and quality); and (3) generalized precedence relations between activities. These assumptions are often consistent with real-life projects. A customized, dynamic, and self-adaptive version of a multiobjective evolutionary algorithm is proposed to solve the scheduling problem. The proposed multi-objective evolutionary algorithm is...

Words: 11435 - Pages: 46

...multi-objective multi-mode model for solving discrete time–cost–quality trade-off problems (DTCQTPs) with preemption and generalized precedence relations. The proposed model has three unique features: (1) preemption of activities (with some restrictions as a minimum time before the ﬁrst interruption, a maximum number of interruptions for each activity, and a maximum time between interruption and restarting); (2) simultaneous optimization of conﬂicting objectives (i.e., time, cost, and quality); and (3) generalized precedence relations between activities. These assumptions are often consistent with real-life projects. A customized, dynamic, and self-adaptive version of a multiobjective evolutionary algorithm is proposed to solve the scheduling problem. The proposed multi-objective evolutionary algorithm is...

Words: 11435 - Pages: 46

Free Essay

#### Hostel Management

...------------------------------------------------- Data compression From Wikipedia, the free encyclopedia   (Redirected from Video compression) "Source coding" redirects here. For the term in computer programming, see Source code. In digital signal processing, data compression, source coding,[1] or bit-rate reduction involves encoding information using fewer bits than the original representation.[2]Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by identifying unnecessary information and removing it.[3] The process of reducing the size of a data file is referred to as data compression. In the context of data transmission, it is called source coding (encoding done at the source of the data before it is stored or transmitted) in opposition to channel coding.[4] Compression is useful because it helps reduce resource usage, such as data storage space or transmission capacity. Because compressed data must be decompressed to use, this extra processing imposes computational or other costs through decompression; this situation is far from being a free lunch. Data compression is subject to a space–time complexity trade-off. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed, and the option to decompress the......

Words: 12347 - Pages: 50

#### Approach to Building and Implementing Business Intelligence Systems

...Interdisciplinary Journal of Information, Knowledge, and Management Volume 2, 2007 Approach to Building and Implementing Business Intelligence Systems Celina M. Olszak and Ewa Ziemba University of Economics, Katowice, Poland olszak@ae.katowice.pl ewa.ziemba@ae.katowice.pl Abstract Abstract: The article aims at describing processes of building Business Intelligence (BI) systems. Taking the BI systems specifics into consideration, the authors present a suggested methodology of the systems creation and implementation in organisations. The considerations are focused on objectives and functional areas of the BI in organisations. Hence, in this context the approach to be used while building and implementing the BI involves two major stages that are of interactive nature, i.e. BI creation and BI “consumption”. A large part of the article is devoted to presenting objectives and tasks that are realised while building and implementing BI. Key words: Business Intelligence, methodology of BI construction, designing BI, business decision-making, knowledge management Introduction Socio-economic reality of contemporary organisations has made organisations face some necessity to look for instruments that would facilitate effective acquiring, processing and analysing vast amounts of data that come from different and dispersed sources and that would serve as some basis for discovering new knowledge. For long time management information systems (MIS) have been supporting organisations in......

Words: 6255 - Pages: 26

Free Essay

#### Nit-Silchar B.Tech Syllabus

...Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood Control Concrete Lab Structural Engineering Lab L 3 3 3 3 3 0 0 0 0 0 15 3 3 3 3 3 0 0 0 0 15 3 3 3 3 3 0 0 T 0 0 1 1 1 0 0 0 0 0 3 1 1 0 1 0 0 0 0 0 3 1 1 1 0 0 0 0 P 0 0 0 0 0 2 2 2 2 2 6 0 0 0 0 0 2 2 2 2 4 0 0 0 0 0 2 2 C 6 6 8 8 8 2 2 2 0 0 42 8 8 6 8 6 2 2 0 0 40 8 8 8 6 6 2 2 MA-1201 CE- 1201 CE -1202 CE -1203 CE-1204 CE-1211 Semester-3 Mathematics-III Building Materials and...

Words: 126345 - Pages: 506

#### Real-Time Fraud Detection

...Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classiﬁcation, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis Sammanfattning Privatbankerna har drabbats hårt av bedrägerier de senaste åren. Bedragare har lyckats kringgå forskning och tillgängliga system och lura bankerna och deras kunder. Därför vill vi införa en ny, polyvalent...

Words: 56858 - Pages: 228

#### Real-Time Fraud Detection: How Stream Computing Can Help the Retail Banking Industry

...Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classiﬁcation, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis Sammanfattning Privatbankerna har drabbats hårt av bedrägerier de senaste åren. Bedragare har lyckats kringgå forskning och tillgängliga system och lura bankerna och deras kunder. Därför vill vi införa en ny, polyvalent...

Words: 56858 - Pages: 228

Free Essay

#### Total Quality Management

...1 KHYBER PAKHTUNKHWA PUBLIC SERVICE COMMISSION SYLLABUS FOR PROVINCIAL MANAGEMENT SERVICE COMPETITIVE EXAMINATION The Syllabus and standard for the Competitive Examination for the Provincial Management Service shall be as under : 1. The Examination shall include compulsory and optional subjects, and every candidate shall take all the compulsory subjects and opt for three of the optional subjects carrying 600 marks in all but not more than 200 marks from a single group. 2. A candidate shall answer the language papers in the language concerned. The question paper in Islamiat is to be answered in Urdu or English. All other papers must be answered in English. Violation of this instruction shall incur cancellation of the concerned paper(s) and consequently award of Zero. 3. The compulsory and optional subjects and maximum marks fixed for each subject shall be as below: Sr. No. 1 2 3 COMPULSORY SUBJECTS Subjects English (Précis & Composition) English Essay General Knowledge (a) Current Affairs 100 (b) Every Day Science 100 (c) Pakistan Affairs 100 Islamiat Viva Voce Total Maximum Marks 100 100 300 100 300 900 600 120 4 5 Qualifying marks in the aggregate of written papers: Qualifying marks in the Viva Voce: The non-Muslim candidates will have the option to take Islamiat as a compulsory subject or otherwise Pakistan Affairs (General Knowledge PaperIII) will be treated of 200 marks and counted in lieu of Islamiat. A candidate who fails to appear in any of the......

Words: 10965 - Pages: 44