Algorithms and Data Structures implemented in Go for beginners, following best practices.
Alternatives To Go
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Coding Interview University271,903
13 days ago56cc-by-sa-4.0
A complete computer science study plan to become a software engineer.
Javascript Algorithms177,49945 days ago4June 02, 2018343mitJavaScript
📝 Algorithms and data structures implemented in JavaScript with explanations and links to further readings
Fucking Algorithm120,626
a month ago365Markdown
刷算法全靠套路,认准 labuladong 就够了!English version supported! Crack LeetCode, not only how, but also why.
4 months ago113mitJava
Everything you need to know to get the job.
16 hours ago225mitJava
All Algorithms implemented in Java
7 days ago9otherJavaScript
LeetCode Solutions: A Record of My Problem Solving Journey.( leetcode题解,记录自己的leetcode解题之路。)
Hello Algo50,561
11 hours ago18otherJava
《Hello 算法》:动画图解、一键运行的数据结构与算法教程,支持 Java, C++, Python, Go, JS, TS, C#, Swift, Rust, Dart, Zig 等语言。
Algorithm Visualizer45,235
10 days ago60mitJavaScript
:fireworks:Interactive Online Platform that Visualizes Algorithms from Code
2 days ago23otherC++
📚 C/C++ 技术面试基础知识总结,包括语言、程序库、数据结构、算法、系统、网络、链接装载库等知识及面试经验、招聘、内推等信息。This repository is a summary of the basic knowledge of recruiting job seekers and beginners in the direction of C/C++ technology, including language, program library, data structure, algorithm, system, network, link loading library, interview experience, recruitment, recommendation, etc.
19 hours ago83gpl-3.0JavaScript
Algorithms and Data Structures implemented in JavaScript for beginners, following best practices.
Alternatives To Go
Select To Compare

Alternative Project Comparisons

The Algorithms - Go

Gitpod Ready-to-Code  Continuous Integration godocmd   update_directory_md Discord chat 

Algorithms implemented in Go (for education)

The repository is a collection of open-source implementation of a variety of algorithms implemented in Go and licensed under MIT License.

Read our Contribution Guidelines before you contribute.

List of Algorithms


  1. Advanced: Advanced Function performing the Advanced Aho-Corasick algorithm. Finds and prints occurrences of each pattern.
  2. AhoCorasick: AhoCorasick Function performing the Basic Aho-Corasick algorithm. Finds and prints occurrences of each pattern.
  3. ArrayUnion: ArrayUnion Concats two arrays of int's into one.
  4. BoolArrayCapUp: BoolArrayCapUp Dynamically increases an array size of bool's by 1.
  5. BuildAc: Functions that builds Aho Corasick automaton.
  6. BuildExtendedAc: BuildExtendedAc Functions that builds extended Aho Corasick automaton.
  7. ComputeAlphabet: ComputeAlphabet Function that returns string of all the possible characters in given patterns.
  8. ConstructTrie: ConstructTrie Function that constructs Trie as an automaton for a set of reversed & trimmed strings.
  9. Contains: Contains Returns 'true' if array of int's 's' contains int 'e', 'false' otherwise.
  10. CreateNewState: CreateNewState Automaton function for creating a new state 'state'.
  11. CreateTransition: CreateTransition Creates a transition for function σ(state,letter) = end.
  12. GetParent: GetParent Function that finds the first previous state of a state and returns it. Used for trie where there is only one parent.
  13. GetTransition: GetTransition Returns ending state for transition σ(fromState,overChar), '-1' if there is none.
  14. GetWord: GetWord Function that returns word found in text 't' at position range 'begin' to 'end'.
  15. IntArrayCapUp: IntArrayCapUp Dynamically increases an array size of int's by 1.
  16. StateExists: StateExists Checks if state 'state' exists. Returns 'true' if it does, 'false' otherwise.

  1. Result: No description provided.

  1. IsArmstrong: No description provided.

Package binary describes algorithms that use binary operations for different calculations.

  1. Abs: Abs returns absolute value using binary operation Principle of operation: 1) Get the mask by right shift by the base 2) Base is the size of an integer variable in bits, for example, for int32 it will be 32, for int64 it will be 64 3) For negative numbers, above step sets mask as 1 1 1 1 1 1 1 1 and 0 0 0 0 0 0 0 0 for positive numbers. 4) Add the mask to the given number. 5) XOR of mask + n and mask gives the absolute value.
  2. BitCounter: BitCounter - The function returns the number of set bits for an unsigned integer number
  3. FastInverseSqrt: FastInverseSqrt assumes that argument is always positive, and it does not deal with negative numbers. The "magic" number 0x5f3759df is hex for 1597463007 in decimals. The math.Float32bits is alias to *(*uint32)(unsafe.Pointer(&f)) and math.Float32frombits is to *(*float32)(unsafe.Pointer(&b)).
  4. IsPowerOfTwo: IsPowerOfTwo This function uses the fact that powers of 2 are represented like 10...0 in binary, and numbers one less than the power of 2 are represented like 11...1. Therefore, using the and function: 10...0 & 01...1 00...0 -> 0 This is also true for 0, which is not a power of 2, for which we have to add and extra condition.
  5. IsPowerOfTwoLeftShift: IsPowerOfTwoLeftShift This function takes advantage of the fact that left shifting a number by 1 is equivalent to multiplying by 2. For example, binary 00000001 when shifted by 3 becomes 00001000, which in decimal system is 8 or = 2 * 2 * 2
  6. LogBase2: LogBase2 Finding the exponent of n = 2**x using bitwise operations (logarithm in base 2 of n) See more
  7. MeanUsingAndXor: MeanUsingAndXor This function finds arithmetic mean using "AND" and "XOR" operations
  8. MeanUsingRightShift: MeanUsingRightShift This function finds arithmetic mean using right shift
  9. ReverseBits: ReverseBits This function initialized the result by 0 (all bits 0) and process the given number starting from its least significant bit. If the current bit is 1, set the corresponding most significant bit in the result and finally move on to the next bit in the input number. Repeat this till all its bits are processed.
  10. SequenceGrayCode: SequenceGrayCode The function generates an "Gray code" sequence of length n
  11. Sqrt: No description provided.
  12. XorSearchMissingNumber: XorSearchMissingNumber This function finds a missing number in a sequence

  1. NewLRU: NewLRU represent initiate lru cache with capacity
  2. NewLFU: NewLFU represent initiate lfu cache with capacity
  3. Get: Get the value by key from LFU cache
  4. Put: Put the key and value in LFU cache

  1. LRU: Default the struct of lru cache algorithm.
  2. LFU: Default the struct of lfu cache algorithm.

Package caesar is the shift cipher ref: https://en.wikipedia.org/wiki/Caesar_cipher

  1. Decrypt: Decrypt decrypts by left shift of "key" each character of "input"
  2. Encrypt: Encrypt encrypts by right shift of "key" each character of "input"
  3. FuzzCaesar: No description provided.

  1. CatalanNumber: CatalanNumber This function returns the nth Catalan number

Package checksum describes algorithms for finding various checksums

  1. CRC8: CRC8 calculates CRC8 checksum of the given data.
  2. Luhn: Luhn validates the provided data using the Luhn algorithm.

  1. CRCModel: No description provided.

Package coloring provides implementation of different graph coloring algorithms, e.g. coloring using BFS, using Backtracking, using greedy approach. Author(s): Shivam

  1. BipartiteCheck: basically tries to color the graph in two colors if each edge connects 2 differently colored nodes the graph can be considered bipartite

  1. Graph: No description provided.

Package combination ...

  1. Start: Start ...

  1. Combinations: No description provided.

  1. HuffDecode: HuffDecode recursively decodes the binary code in, by traversing the Huffman compression tree pointed by root. current stores the current node of the traversing algorithm. out stores the current decoded string.
  2. HuffEncode: HuffEncode encodes the string in by applying the mapping defined by codes.
  3. HuffEncoding: HuffEncoding recursively traverses the Huffman tree pointed by node to obtain the map codes, that associates a rune with a slice of booleans. Each code is prefixed by prefix and left and right children are labelled with the booleans false and true, respectively.
  4. HuffTree: HuffTree returns the root Node of the Huffman tree by compressing listfreq. The compression produces the most optimal code lengths, provided listfreq is ordered, i.e.: listfreq[i] <= listfreq[j], whenever i < j.

  1. Node: No description provided.

  2. SymbolFreq: No description provided.

  1. SymbolCountOrd: SymbolCountOrd computes sorted symbol-frequency list of input message

Package conversion is a package of implementations which converts one data structure to another.

  1. Base64Decode: Base64Decode decodes the received input base64 string into a byte slice. The implementation follows the RFC4648 standard, which is documented at https://datatracker.ietf.org/doc/html/rfc4648#section-4
  2. Base64Encode: Base64Encode encodes the received input bytes slice into a base64 string. The implementation follows the RFC4648 standard, which is documented at https://datatracker.ietf.org/doc/html/rfc4648#section-4
  3. BinaryToDecimal: BinaryToDecimal() function that will take Binary number as string, and return it's Decimal equivalent as integer.
  4. DecimalToBinary: DecimalToBinary() function that will take Decimal number as int, and return it's Binary equivalent as string.
  5. FuzzBase64Encode: No description provided.
  6. HEXToRGB: HEXToRGB splits an RGB input (e.g. a color in hex format; 0x) into the individual components: red, green and blue
  7. IntToRoman: IntToRoman converts an integer value to a roman numeral string. An error is returned if the integer is not between 1 and 3999.
  8. RGBToHEX: RGBToHEX does exactly the opposite of HEXToRGB: it combines the three components red, green and blue to an RGB value, which can be converted to e.g. Hex
  9. Reverse: Reverse() function that will take string, and returns the reverse of that string.
  10. RomanToInt: RomanToInt converts a roman numeral string to an integer. Roman numerals for numbers outside the range 1 to 3,999 will return an error. Nil or empty string return 0 with no error thrown.

Package deque implements a Double Ended Queue data structure.

  1. New: New returns a new DoublyEndedQueue.

  1. DoublyEndedQueue: No description provided.

  1. QueryStructure: No description provided.

  2. TestCaseData: No description provided.

Package diffiehellman implements Diffie-Hellman Key Exchange Algorithm for more information watch : https://www.youtube.com/watch?v=NmM9HA2MQGI

  1. GenerateMutualKey: GenerateMutualKey : generates a mutual key that can be used by only alice and bob mutualKey = (shareKey^prvKey)%primeNumber
  2. GenerateShareKey: GenerateShareKey : generates a key using client private key , generator and primeNumber this key can be made public shareKey = (g^key)%primeNumber

Package dynamic is a package of certain implementations of dynamically run algorithms.

  1. Abbreviation: Returns true if it is possible to make a equals b (if b is an abbreviation of a), returns false otherwise
  2. Bin2: Bin2 function
  3. CoinChange: CoinChange finds the number of possible combinations of coins of different values which can get to the target amount.
  4. CutRodDp: CutRodDp solve the same problem using dynamic programming
  5. CutRodRec: CutRodRec solve the problem recursively: initial approach
  6. EditDistanceDP: EditDistanceDP is an optimised implementation which builds on the ideas of the recursive implementation. We use dynamic programming to compute the DP table where dp[i][j] denotes the edit distance value of first[0..i-1] and second[0..j-1]. Time complexity is O(m * n) where m and n are lengths of the strings, first and second respectively.
  7. EditDistanceRecursive: EditDistanceRecursive is a naive implementation with exponential time complexity.
  8. IsSubsetSum: No description provided.
  9. Knapsack: Knapsack solves knapsack problem return maxProfit
  10. LongestCommonSubsequence: LongestCommonSubsequence function
  11. LongestIncreasingSubsequence: LongestIncreasingSubsequence returns the longest increasing subsequence where all elements of the subsequence are sorted in increasing order
  12. LongestIncreasingSubsequenceGreedy: LongestIncreasingSubsequenceGreedy is a function to find the longest increasing subsequence in a given array using a greedy approach. The dynamic programming approach is implemented alongside this one. Worst Case Time Complexity: O(nlogn) Auxiliary Space: O(n), where n is the length of the array(slice). Reference: https://www.geeksforgeeks.org/construction-of-longest-monotonically-increasing-subsequence-n-log-n/
  13. LpsDp: LpsDp function
  14. LpsRec: LpsRec function
  15. MatrixChainDp: MatrixChainDp function
  16. MatrixChainRec: MatrixChainRec function
  17. Max: Max function - possible duplicate
  18. NthCatalanNumber: NthCatalan returns the n-th Catalan Number Complexity: O(n²)
  19. NthFibonacci: NthFibonacci returns the nth Fibonacci Number

Package dynamicarray A dynamic array is quite similar to a regular array, but its Size is modifiable during program runtime, very similar to how a slice in Go works. The implementation is for educational purposes and explains how one might go about implementing their own version of slices. For more details check out those links below here: GeeksForGeeks article : https://www.geeksforgeeks.org/how-do-dynamic-arrays-work/ Go blog: https://blog.golang.org/slices-intro Go blog: https://blog.golang.org/slices authors Wesllhey Holanda, Milad see dynamicarray.go, dynamicarray_test.go

  1. DynamicArray: No description provided.

Package factorial describes algorithms Factorials calculations.

  1. Iterative: Iterative returns the iteratively brute forced factorial of n
  2. Recursive: Recursive This function recursively computes the factorial of a number
  3. UsingTree: UsingTree This function finds the factorial of a number using a binary tree

  1. Formula: Formula This function calculates the n-th fibonacci number using the formula Attention! Tests for large values fall due to rounding error of floating point numbers, works well, only on small numbers
  2. Matrix: Matrix This function calculates the n-th fibonacci number using the matrix method. See
  3. Recursive: Recursive calculates the n-th fibonacci number recursively by adding the previous two Fibonacci numbers. This algorithm is extremely slow for bigger numbers, but provides a simpler implementation.

  1. Extended: Extended simple extended gcd
  2. ExtendedIterative: ExtendedIterative finds and returns gcd(a, b), x, y satisfying ax + by = gcd(a, b).
  3. ExtendedRecursive: ExtendedRecursive finds and returns gcd(a, b), x, y satisfying ax + by = gcd(a, b).
  4. Iterative: Iterative Faster iterative version of GcdRecursive without holding up too much of the stack
  5. Recursive: Recursive finds and returns the greatest common divisor of a given integer.
  6. TemplateBenchmarkExtendedGCD: No description provided.
  7. TemplateBenchmarkGCD: No description provided.
  8. TemplateTestExtendedGCD: No description provided.
  9. TemplateTestGCD: No description provided.

  1. GenerateParenthesis: No description provided.

Package genetic provides functions to work with strings using genetic algorithm. https://en.wikipedia.org/wiki/Genetic_algorithm Author: D4rkia

  1. GeneticString: GeneticString generates PopulationItem based on the imputed target string, and a set of possible runes to build a string with. In order to optimise string generation additional configurations can be provided with Conf instance. Empty instance of Conf (&Conf{}) can be provided, then default values would be set. Link to the same algorithm implemented in python: https://github.com/TheAlgorithms/Python/blob/master/genetic_algorithm/basic_string.py

  1. Conf: No description provided.

  2. PopulationItem: No description provided.

  3. Result: No description provided.

Package geometry contains geometric algorithms Package geometry contains geometric algorithms

  1. Distance: Distance calculates the shortest distance between two points.
  2. EuclideanDistance: EuclideanDistance returns the Euclidean distance between points in any n dimensional Euclidean space.
  3. IsParallel: IsParallel checks if two lines are parallel or not.
  4. IsPerpendicular: IsPerpendicular checks if two lines are perpendicular or not.
  5. PointDistance: PointDistance calculates the distance of a given Point from a given line. The slice should contain the coefficiet of x, the coefficient of y and the constant in the respective order.
  6. Section: Section calculates the Point that divides a line in specific ratio. DO NOT specify the ratio in the form m:n, specify it as r, where r = m / n.
  7. Slope: Slope calculates the slope (gradient) of a line.
  8. YIntercept: YIntercept calculates the Y-Intercept of a line from a specific Point.

  1. EuclideanPoint: No description provided.

  2. Line: No description provided.

  3. Point: No description provided.

Package graph demonstrates Graph search algorithms reference: https://en.wikipedia.org/wiki/Tree_traversal

  1. ArticulationPoint: ArticulationPoint is a function to identify articulation points in a graph. The function takes the graph as an argument and returns a boolean slice which indicates whether a vertex is an articulation point or not. Worst Case Time Complexity: O(|V| + |E|) Auxiliary Space: O(|V|) reference: https://en.wikipedia.org/wiki/Biconnected_component and https://cptalks.quora.com/Cut-Vertex-Articulation-point
  2. BreadthFirstSearch: BreadthFirstSearch is an algorithm for traversing and searching graph data structures. It starts at an arbitrary node of a graph, and explores all of the neighbor nodes at the present depth prior to moving on to the nodes at the next depth level. Worst-case performance O(|V|+|E|)=O(b^{d})}O(|V|+|E|)=O(b^{d}) Worst-case space complexity O(|V|)=O(b^{d})}O(|V|)=O(b^{d}) reference: https://en.wikipedia.org/wiki/Breadth-first_search
  3. DepthFirstSearch: No description provided.
  4. DepthFirstSearchHelper: No description provided.
  5. FloydWarshall: FloydWarshall Returns all pair's shortest path using Floyd Warshall algorithm
  6. GetIdx: No description provided.
  7. KruskalMST: No description provided.
  8. LowestCommonAncestor: For each node, we will precompute its ancestor above him, its ancestor two nodes above, its ancestor four nodes above, etc. Let's call jump[j][u] is the 2^j-th ancestor above the node u with u in range [0, numbersVertex), j in range [0,MAXLOG). These information allow us to jump from any node to any ancestor above it in O(MAXLOG) time.
  9. New: Constructor functions for graphs (undirected by default)
  10. NewTree: No description provided.
  11. NewUnionFind: Initialise a new union find data structure with s nodes
  12. NotExist: No description provided.
  13. Topological: Topological assumes that graph given is valid and that its possible to get a topological ordering. constraints are array of []int{a, b}, representing an edge going from a to b

  1. Edge: No description provided.

  2. Graph: No description provided.

  3. Item: No description provided.

  4. Query: No description provided.

  5. Tree: No description provided.

  6. TreeEdge: No description provided.

  7. UnionFind: No description provided.

  8. WeightedGraph: No description provided.

Package guid provides facilities for generating random globally unique identifiers.

  1. New: New returns a randomly generated global unique identifier.

  1. Make: Make creates a new HashMap instance with input size and capacity
  2. New: New return new HashMap instance

  1. HashMap: No description provided.

  1. New: New gives a new heap object.
  2. NewAny: NewAny gives a new heap object. element can be anything, but must provide less function.

  1. Heap: No description provided.

  1. testInt:


    1. Less: No description provided.
  2. testStudent:


    1. Less: No description provided.

  1. Horspool: No description provided.

  1. Kmp: Kmp Function kmp performing the Knuth-Morris-Pratt algorithm.

  1. args: No description provided.

  1. Lcm: Lcm returns the lcm of two numbers using the fact that lcm(a,b) * gcd(a,b) = | a * b |

  1. Distance: Distance Function that gives Levenshtein Distance

Package linkedlist demonstrates different implementations on linkedlists.

  1. JosephusProblem: https://en.wikipedia.org/wiki/Josephus_problem This is a struct-based solution for Josephus problem.
  2. NewCyclic: Create new list.
  3. NewDoubly: No description provided.
  4. NewNode: Create new node.
  5. NewSingly: NewSingly returns a new instance of a linked list

  1. Cyclic: No description provided.

  2. Doubly: No description provided.

  3. Node: No description provided.

  4. Singly: No description provided.

  5. testCase: No description provided.

  1. LongestPalindrome: No description provided.

Package math is a package that contains mathematical algorithms and its different implementations. filename : krishnamurthy.go description: A program which contains the function that returns true if a given number is Krishnamurthy number or not. details: A number is a Krishnamurthy number if the sum of all the factorials of the digits is equal to the number. Ex: 1! = 1, 145 = 1! + 4! + 5! author(s): GooMonk see krishnamurthy_test.go

  1. Abs: Abs returns absolute value
  2. AliquotSum: This function returns s(n) for given number
  3. Combinations: C is Binomial Coefficient function This function returns C(n, k) for given n and k
  4. Cos: Cos returns the cosine of the radian argument x. See more Based on the idea of Bhaskara approximation of cos(x)
  5. DefaultPolynomial: DefaultPolynomial is the commonly used polynomial g(x) = (x^2 + 1) mod n
  6. FindKthMax: FindKthMax returns the kth large element given an integer slice with nil error if found and returns -1 with error search.ErrNotFound if not found. NOTE: The nums slice gets mutated in the process.
  7. FindKthMin: FindKthMin returns kth small element given an integer slice with nil error if found and returns -1 with error search.ErrNotFound if not found. NOTE: The nums slice gets mutated in the process.
  8. IsAutomorphic: No description provided.
  9. IsKrishnamurthyNumber: IsKrishnamurthyNumber returns if the provided number n is a Krishnamurthy number or not.
  10. IsPerfectNumber: Checks if inNumber is a perfect number
  11. IsPowOfTwoUseLog: IsPowOfTwoUseLog This function checks if a number is a power of two using the logarithm. The limiting degree can be from 0 to 63. See alternatives in the binary package.
  12. Lerp: Lerp or Linear interpolation This function will return new value in 't' percentage between 'v0' and 'v1'
  13. LiouvilleLambda: Lambda is the liouville function This function returns λ(n) for given number
  14. Mean: No description provided.
  15. Median: No description provided.
  16. Mode: No description provided.
  17. Mu: Mu is the Mobius function This function returns μ(n) for given number
  18. Phi: Phi is the Euler totient function. This function computes the number of numbers less then n that are coprime with n.
  19. PollardsRhoFactorization: PollardsRhoFactorization is an implementation of Pollard's rho factorization algorithm using the default parameters x = y = 2
  20. PronicNumber: PronicNumber returns true if argument passed to the function is pronic and false otherwise.
  21. Sin: Sin returns the sine of the radian argument x. See more
  22. SumOfProperDivisors: Returns the sum of proper divisors of inNumber.

filename: strassenmatrixmultiply.go description: Implements matrix multiplication using the Strassen algorithm. details: This program takes two matrices as input and performs matrix multiplication using the Strassen algorithm, which is an optimized divide-and-conquer approach. It allows for efficient multiplication of large matrices. author(s): Mohit Raghav(https://github.com/mohit07raghav19) See strassenmatrixmultiply_test.go for test cases

  1. IsValid: IsValid checks if the input matrix has consistent row lengths.
  2. New: NewMatrix creates a new Matrix based on the provided arguments.
  3. NewFromElements: NewFromElements creates a new Matrix from the given elements.

  1. Matrix: No description provided.

  1. MakeRandomMatrix: No description provided.

  1. Bitwise: Bitwise computes using bitwise operator the maximum of all the integer input and returns it
  2. Int: Int is a function which returns the maximum of all the integers provided as arguments.

Package maxsubarraysum is a package containing a solution to a common problem of finding max contiguous sum within a array of ints.

  1. MaxSubarraySum: MaxSubarraySum returns the maximum subarray sum

  1. Bitwise: Bitwise This function returns the minimum integer using bit operations
  2. Int: Int is a function which returns the minimum of all the integers provided as arguments.

  1. Exponentiation: Exponentiation returns base^exponent % mod
  2. Inverse: Inverse Modular function
  3. Multiply64BitInt: Multiply64BitInt Checking if the integer multiplication overflows

  1. MoserDeBruijnSequence: No description provided.

Package nested provides functions for testing strings proper brackets nesting.

  1. IsBalanced: IsBalanced returns true if provided input string is properly nested. Input is a sequence of brackets: '(', ')', '[', ']', '{', '}'. A sequence of brackets s is considered properly nested if any of the following conditions are true: - s is empty; - s has the form (U) or [U] or {U} where U is a properly nested string; - s has the form VW where V and W are properly nested strings. For example, the string "()()[()]" is properly nested but "[(()]" is not. Note Providing characters other then brackets would return false, despite brackets sequence in the string. Make sure to filter input before usage.

  1. IsPalindrome: No description provided.
  2. IsPalindromeRecursive: No description provided.

  1. IsPangram: No description provided.

  1. Parenthesis: Parenthesis algorithm checks if every opened parenthesis is closed correctly. When parcounter is less than 0 when a closing parenthesis is detected without an opening parenthesis that surrounds it and parcounter will be 0 if all open parenthesis are closed correctly.

  1. GenerateTriangle: GenerateTriangle This function generates a Pascal's triangle of n lines

Package password contains functions to help generate random passwords

  1. Generate: Generate returns a newly generated password

  1. GenerateElementSet: No description provided.
  2. Heaps: Heap's Algorithm for generating all permutations of n objects

spigotpi_test.go description: Test for Spigot Algorithm for the Digits of Pi author(s) red_byte see spigotpi.go

  1. MonteCarloPi: No description provided.
  2. MonteCarloPiConcurrent: MonteCarloPiConcurrent approximates the value of pi using the Monte Carlo method. Unlike the MonteCarloPi function (first version), this implementation uses goroutines and channels to parallelize the computation. More details on the Monte Carlo method available at https://en.wikipedia.org/wiki/Monte_Carlo_method. More details on goroutines parallelization available at https://go.dev/doc/effective_go#parallel.
  3. Spigot: No description provided.

Package polybius is encrypting method with polybius square ref: https://en.wikipedia.org/wiki/Polybius_square#Hybrid_Polybius_Playfair_Cipher

  1. FuzzPolybius: No description provided.
  2. NewPolybius: NewPolybius returns a pointer to object of Polybius. If the size of "chars" is longer than "size", "chars" are truncated to "size".

  1. Polybius: No description provided.

  1. IterativePower: IterativePower is iterative O(logn) function for pow(x, y)
  2. RecursivePower: RecursivePower is recursive O(logn) function for pow(x, y)
  3. RecursivePower1: RecursivePower1 is recursive O(n) function for pow(x, y)
  4. UsingLog: No description provided.

  1. Factorize: Factorize is a function that computes the exponents of each prime in the prime factorization of n
  2. Generate: Generate returns a int slice of prime numbers up to the limit
  3. GenerateChannel: Generate generates the sequence of integers starting at 2 and sends it to the channel ch
  4. MillerRabinDeterministic: MillerRabinDeterministic is a Deterministic version of the Miller-Rabin test, which returns correct results for all valid int64 numbers.
  5. MillerRabinProbabilistic: MillerRabinProbabilistic is a probabilistic test for primality of an integer based of the algorithm devised by Miller and Rabin.
  6. MillerRandomTest: MillerRandomTest This is the intermediate step that repeats within the miller rabin primality test for better probabilitic chances of receiving the correct result with random witnesses.
  7. MillerTest: MillerTest tests whether num is a strong probable prime to a witness. Formally: a^d ≡ 1 (mod n) or a^(2^r * d) ≡ -1 (mod n), 0 <= r <= s
  8. MillerTestMultiple: MillerTestMultiple is like MillerTest but runs the test for multiple witnesses.
  9. OptimizedTrialDivision: OptimizedTrialDivision checks primality of an integer using an optimized trial division method. The optimizations include not checking divisibility by the even numbers and only checking up to the square root of the given number.
  10. Sieve: Sieve Sieving the numbers that are not prime from the channel - basically removing them from the channels
  11. TrialDivision: TrialDivision tests whether a number is prime by trying to divide it by the numbers less than it.
  12. Twin: This function returns twin prime for given number returns (n + 2) if both n and (n + 2) are prime -1 otherwise

  1. Distance: Distance calculates the distance between to vectors with the Pythagoras theorem

  1. Vector: No description provided.

  1. BackQueue: BackQueue return the Back value
  2. DeQueue: DeQueue it will be removed the first value that added into the list
  3. EnQueue: EnQueue it will be added new value into our list
  4. FrontQueue: FrontQueue return the Front value
  5. IsEmptyQueue: IsEmptyQueue check our list is empty or not
  6. LenQueue: LenQueue will return the length of the queue list

  1. LQueue: No description provided.

  2. Node: No description provided.

  3. Queue: No description provided.

Package rot13 is a simple letter substitution cipher that replaces a letter with the 13th letter after it in the alphabet. ref: https://en.wikipedia.org/wiki/ROT13

  1. FuzzRot13: No description provided.

Package rsa shows a simple implementation of RSA algorithm

  1. Decrypt: Decrypt decrypts encrypted rune slice based on the RSA algorithm
  2. Encrypt: Encrypt encrypts based on the RSA algorithm - uses modular exponentitation in math directory
  3. FuzzRsa: No description provided.

  1. BoyerMoore: Implementation of boyer moore string search O(l) where l=len(text)
  2. Naive: Implementation of naive string search O(n*m) where n=len(txt) and m=len(pattern)

  1. NewSegmentTree: No description provided.

  1. SegmentTree: No description provided.

package set implements a Set using a golang map. This implies that only the types that are accepted as valid map keys can be used as set elements. For instance, do not try to Add a slice, or the program will panic.

  1. New: New gives new set.

  1. Hash: Hash hashes the input message using the sha256 hashing function, and return a 32 byte array. The implementation follows the RGC6234 standard, which is documented at https://datatracker.ietf.org/doc/html/rfc6234

Package sort a package for demonstrating sorting algorithms in Go

  1. BinaryInsertion: No description provided.
  2. Bogo: No description provided.
  3. Bubble: Bubble is a simple generic definition of Bubble sort algorithm.
  4. Bucket: Bucket sorts a slice. It is mainly useful when input is uniformly distributed over a range.
  5. Cocktail: Cocktail sort is a variation of bubble sort, operating in two directions (beginning to end, end to beginning)
  6. Comb: Comb is a simple sorting algorithm which is an improvement of the bubble sorting algorithm.
  7. Count: No description provided.
  8. Cycle: Cycle sort is an in-place, unstable sorting algorithm that is particularly useful when sorting arrays containing elements with a small range of values. It is theoretically optimal in terms of the total number of writes to the original array.
  9. Exchange: No description provided.
  10. HeapSort: No description provided.
  11. ImprovedSimple: ImprovedSimple is a improve SimpleSort by skipping an unnecessary comparison of the first and last. This improved version is more similar to implementation of insertion sort
  12. Insertion: No description provided.
  13. Merge: Merge Perform merge sort on a slice
  14. MergeIter: No description provided.
  15. Pancake: Pancake sorts a slice using flip operations, where flip refers to the idea of reversing the slice from index 0 to i.
  16. ParallelMerge: ParallelMerge Perform merge sort on a slice using goroutines
  17. Partition: No description provided.
  18. Patience: No description provided.
  19. Pigeonhole: Pigeonhole sorts a slice using pigeonhole sorting algorithm. NOTE: To maintain time complexity O(n + N), this is the reason for having only Integer constraint instead of Ordered.
  20. Quicksort: Quicksort Sorts the entire array
  21. QuicksortRange: QuicksortRange Sorts the specified range within the array
  22. RadixSort: No description provided.
  23. Selection: No description provided.
  24. Shell: No description provided.
  25. Simple: No description provided.

  1. MaxHeap: No description provided.

Package sqrt contains algorithms and data structures that contains a √n in their complexity

  1. NewSqrtDecomposition: Create a new SqrtDecomposition instance with the parameters as specified by SqrtDecomposition comment Assumptions: - len(elements) > 0

  1. SqrtDecomposition: No description provided.

  1. NewStack: NewStack creates and returns a new stack.

  1. Array: No description provided.

  2. Node: No description provided.

  3. SList: No description provided.

  4. Stack: No description provided.

Package strings is a package that contains all algorithms that are used to analyse and manipulate strings.

  1. CountChars: CountChars counts the number of a times a character has occurred in the provided string argument and returns a map with rune as keys and the count as value.
  2. IsIsogram: No description provided.
  3. IsSubsequence: Returns true if s is subsequence of t, otherwise return false.

  1. Decrypt: No description provided.
  2. Encrypt: No description provided.
  3. FuzzTransposition: No description provided.

For more details check out those links below here: Wikipedia article: https://en.wikipedia.org/wiki/Binary_search_tree authors guuzaa

  1. NewAVL: NewAVL creates a novel AVL tree
  2. NewBinarySearch: NewBinarySearch creates a novel Binary-Search tree
  3. NewRB: NewRB creates a new Red-Black Tree

  1. AVL: No description provided.

  2. AVLNode: No description provided.

  3. BSNode: No description provided.

  4. BinarySearch: No description provided.

  5. RB: No description provided.

  6. RBNode: No description provided.

Package trie provides Trie data structures in golang. Wikipedia: https://en.wikipedia.org/wiki/Trie

  1. NewNode: NewNode creates a new Trie node with initialized children map.

  1. Node: No description provided.

Package xor is an encryption algorithm that operates the exclusive disjunction(XOR) ref: https://en.wikipedia.org/wiki/XOR_cipher

  1. Decrypt: Decrypt decrypts with Xor encryption
  2. Encrypt: Encrypt encrypts with Xor encryption after converting each character to byte The returned value might not be readable because there is no guarantee which is within the ASCII range If using other type such as string, []int, or some other types, add the statements for converting the type to []byte.
  3. FuzzXOR: No description provided.

Popular Algorithms Projects
Popular Data Structure Projects
Popular Computer Science Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Data Structures
Interview Preparation
Algorithms Implemented
Community Driven