Found 510 Articles for Algorithms

Longest Job First (LJF) CPU Scheduling Algorithm

Diksha Patro
Updated on 04-May-2023 12:20:58

1K+ Views

Longest Job First (LJF) is a CPU scheduling algorithm that prioritizes processes based on their burst time. In LJF, the processes with the largest burst time are given priority over the shorter ones. This algorithm works on a non-preemptive basis, meaning once a process is started, it will continue to run until it completes, and no other process can preempt it. To implement the LJF algorithm, processes are sorted in the ready queue based on their burst times in descending order. The process with the largest burst time among all the processes that have arrived until that time is selected ... Read More

Linear Scheduling Method in Operating System

Diksha Patro
Updated on 03-May-2023 16:55:42

155 Views

Introduction Linear Scheduling Method is a scheduling algorithm designed for real-time systems in which tasks must be completed within specific time frames to ensure the system's proper operation. It is a straightforward algorithm that assigns tasks based on their deadlines and provides them with fixed time slices to complete their execution. In this article, we will learn about the Linear Scheduling Method its various elements, its advantages and disadvantages of usage in an Operating System What is Linear Scheduling Method in Operating System? The tasks in LSM are arranged in a linear order, and the scheduler moves through the list, ... Read More

Least Slack Time (LST) scheduling Algorithm in real-time systems

Diksha Patro
Updated on 03-May-2023 16:29:03

1K+ Views

The Least Slack Time (LST) scheduling algorithm is a real-time scheduling algorithm that prioritizes tasks based on the amount of time remaining before a task's deadline. The LST algorithm's basic idea is to schedule the task with the least slack time first because it has the least amount of time before its deadline. Real-time systems are intended to handle tasks or jobs with strict time constraints. These tasks are frequently carried out in a periodic or ad hoc fashion, with each task having a specific deadline by which it must be completed. Real-time scheduling algorithms aid in the completion of ... Read More

Lamportís Algorithm for Mutual Exclusion in Distributed System

Diksha Patro
Updated on 03-May-2023 16:00:32

4K+ Views

Multiple processes that are running on various machines or nodes and interacting with one another to accomplish a single objective makeup distributed systems. In these systems, it's crucial to make sure that only one process is able to utilize a shared resource at once to prevent conflicts and data inconsistencies. One way to make sure that only one function is using a shared resource at once is through the use of mutual exclusion and Lamport's Algorithm is one of many accessible mutual exclusion algorithms. Lamportís Algorithm A centralized mutual exclusion algorithm called Lamport's Algorithm employs timestamps to determine the sequence ... Read More

Encryption, its Algorithms and its Future

Pranavnath
Updated on 03-May-2023 11:34:11

267 Views

Encryption is a method to protect the incoming message by coding the plain text into an encoded one called the cipher text. The main ideology behind encryption is to protect the data transmitted to be secured from any type of attack. There are typically two types of encryptions namely symmetric and asymmetric encryption methods. In this, the encryption algorithm comes under the components of encryption. Decryption is a process of getting the plain text from the encoded text using an encryption key. Encryption Cryptography involves both encryption and decryption, to prevent the data from unauthorized access. The Components of Encryption ... Read More

Difference between AES and Twofish

Md. Sajid
Updated on 26-Apr-2023 14:57:32

805 Views

AES (Advanced Encryption Standard) and Twofish are both symmetric key block cyphers, which means they encrypt and decrypt data using the same secret key. While the two algorithms have certain similarities, they also have some significant variations. In terms of performance, AES exceeds Twofish in hardware implementations, although Twofish might exceed AES in software implementations. This is due to the fact that Twofish has a more complex key schedule and a greater number of rounds than AES. Read this article to find out more about AES and Twofish and how they are different from each other. What is AES? AES ... Read More

Three Stages of Building Hypotheses or Models

Jay Singh
Updated on 25-Apr-2023 15:05:02

1K+ Views

Creating models or hypotheses is a crucial component of scientific study. It entails a methodical approach to issue identification, hypothesis or model development, and experimentation. The exploratory stage, the confirmatory stage, and the descriptive stage are the three steps that make up the construction of hypotheses or models. The exploratory phase is where theories or models are first developed. It entails collecting data, examining the connections between variables, and creating preliminary hypotheses or models. This stage, which is marked by a high level of ambiguity, is frequently employed to come up with new theories or concepts. The exploratory phase is ... Read More

Improving Naive Bayes Algorithm for Spam Detection

Jay Singh
Updated on 25-Apr-2023 14:03:24

235 Views

With the expansion of digital communication, spam has grown to be a serious issue for people all over the world. Spam can not only waste the recipient's time but also pose a security concern since it occasionally contains harmful code or phishing links. To solve this issue, a number of machine-learning techniques are used to recognize spam transmissions. One of them, the Naive Bayes algorithm, has been demonstrated to be effective in identifying spam. In this blog post, we'll look at ways to make the Naive Bayes algorithm for identifying spam better. What is the Naive Bayes Algorithm? The Naive ... Read More

How to design an end-to-end recommendation engine

Jay Singh
Updated on 25-Apr-2023 13:09:13

105 Views

Recommendation engines are effective methods that employ machine learning algorithms to provide consumers with individualized suggestions based on their prior behavior, preferences, and other criteria. These engines are used in a variety of sectors, including e-commerce, healthcare, and entertainment, and they have demonstrated value for organizations by raising user engagement and revenue. There are various processes involved in designing an end-to-end recommendation engine, including data collection and preprocessing, feature engineering, model training and assessment, deployment, and monitoring. By using this procedure, companies can produce precise and pertinent suggestions that improve user experience and promote commercial success. In this blog article, ... Read More

Does label encoding affect tree-based algorithms?

Jay Singh
Updated on 25-Apr-2023 12:56:08

1K+ Views

Regression and classification are two common uses for tree-based algorithms, which are popular machine-learning techniques. Gradient boosting, decision trees, and random forests are a few examples of common tree-based techniques. These algorithms can handle data in both categories and numbers. Nonetheless, prior to feeding the algorithm, categorical data must be translated into a numerical form. One such strategy is label encoding. In this blog post, we'll examine how label encoding impacts tree-based algorithms. What is Label Encoding? Label encoding is a typical machine-learning approach for transforming categorical input into numerical data. It entails giving each category in the ... Read More

Advertisements