Algorithms |
|
|
- Sorting
- Searching
- Date & Time
- Determine if a given year is a leap year
- Compute the weekday
- Compute the day of year
- Compute the week number of a year
- Compute the year of the ISO 8601 week date
- Compute the week of the ISO 8601 week date
- Calculate the number of days in a month
- Convert a time into a julian day number
- Convert a julian day number into a time
- Compute the easter date for a given year
- Compute seconds since the Unix Epoch
- Write a calendar
- String
- Replace tabs with the corresponding number of spaces
- Replace leading spaces with the corresponding number of tabs
- Replace spaces with the corresponding number of tabs
- Convert an Unicode UTF-32 string to UTF-8
- Convert an Unicode UTF-8 string to UTF-32
- Encode a string with the Base64 encoding
- Decode a Base64 encoded string
- Encode a string with the Quoted-printable encoding
- Decode a Quoted-printable encoded string
- Encode a string with uuencoding
- Decode an uuencoded string
- Encode a string with percent encoding
- Decode a percent encoded string
- Encode a string with the URL encoding
- Decode an URL encoded string
- Encode a string with the Ascii85 encoding
- Decode a Ascii85 encoded string
- Encode a string with the AsciiHex encoding
- Decode an AsciiHex encoded string
- Compress a string using the Lempel Ziv Welch (LZW) compression
- Decompress a Lempel Ziv Welch (LZW) compressed string
- Compress a string using the run length encoding of bzip2
- Decompress a string using the run length encoding of bzip2
- Compress a string using the run length encoding of PackBits
- Decompress a string using the run length encoding of PackBits
- Burrows-Wheeler transform (basic concept)
- Inverse Burrows-Wheeler transform (basic concept)
- Convert a character string to morse code
- Convert morse code to a character string
- Wildcard match used in command shells
- String compare function where digit sequences are compared numerically
- Float
- Mathematics
- Determine wether a given integer number is prime
- Sieve of Eratosthenes
- Verify Goldbach's conjecture up to 10000000
- Function to calculate the prime factors of a number
- Verify if a given Mersenne number is prime
- Miller-Rabin primality test
- Determine the greatest common divisor of two positive integer numbers
- Determine the least common multiple of two positive integer numbers
- Binary greatest common divisor algorithm for two positive integer numbers
- Binary greatest common divisor algorithm for two bigInteger numbers
- Return the modular multiplicative inverse of a modulo b
- Modular exponentiation with the binary method
- Compute PI with 1000 decimal digits using John Machin's formula
- Compute PI with 1000 decimal digits using the Bailey/Borwein/Plouffe formula
- Write PI with 1000 decimal digits using Newtons formula
- Write the decimal digits of PI with a spigot algorithm
- Determine the truncated square root of a big integer number
- Function to compute the nth root of a positive float number
- Exponentiation function for integers
- Exponentiation function for float base and integer exponent
- Multiply integers using the peasant multiplication
- Binomial coefficient
- Gamma function
- Matrix addition
- Matrix multiplication
- Matrix exponentiation with integer exponent
- Convert a matrix to row echelon form
- Convert a matrix to reduced row echelon form
- Dot product
- Random number generator
- Recursive fibonacci function
- Iterative fibonacci function
- Display 100 numbers of the fibonacci sequence
- The tak function
- The ackermann function
- The bigInteger ackermann function
- Message digest
- Compute a message digest with the MD4 message digest algorithm
- Compute a message digest with the MD5 message digest algorithm
- Compute a message digest with the RIPEMD-160 message digest algorithm
- Compute a secure hash value with the SHA-1 algorithm
- Compute a secure hash value with the SHA-224 algorithm
- Compute a secure hash value with the SHA-256 algorithm
- Compute a secure hash value with the SHA-384 algorithm
- Compute a secure hash value with the SHA-512 algorithm
- Graphics
- File
- Check if a file exists
- Check if a file is a directory
- Check if a file is a regular file
- Copy a directory and all its files to a new directory
- Move or rename a file
- Convert files from windows to unix format
- Convert files from unix to windows format
- Read a 16 bit little endian integer from a file
- Read a 32 bit little endian integer from a file
- Read a 16 bit big endian integer from a file
- Read a 32 bit big endian integer from a file
- Program that encodes and decodes with rot13
- Remove empty lines
- Puzzles
- Others
|
|