- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 510 Articles for Algorithms
![Diksha Patro](https://www.tutorialspoint.com/assets/profiles/586222/profile/60_1257779-1673957458.jpeg)
1K+ Views
Longest Job First (LJF) is a CPU scheduling algorithm that prioritizes processes based on their burst time. In LJF, the processes with the largest burst time are given priority over the shorter ones. This algorithm works on a non-preemptive basis, meaning once a process is started, it will continue to run until it completes, and no other process can preempt it. To implement the LJF algorithm, processes are sorted in the ready queue based on their burst times in descending order. The process with the largest burst time among all the processes that have arrived until that time is selected ... Read More
![Diksha Patro](https://www.tutorialspoint.com/assets/profiles/586222/profile/60_1257779-1673957458.jpeg)
155 Views
Introduction Linear Scheduling Method is a scheduling algorithm designed for real-time systems in which tasks must be completed within specific time frames to ensure the system's proper operation. It is a straightforward algorithm that assigns tasks based on their deadlines and provides them with fixed time slices to complete their execution. In this article, we will learn about the Linear Scheduling Method its various elements, its advantages and disadvantages of usage in an Operating System What is Linear Scheduling Method in Operating System? The tasks in LSM are arranged in a linear order, and the scheduler moves through the list, ... Read More
![Diksha Patro](https://www.tutorialspoint.com/assets/profiles/586222/profile/60_1257779-1673957458.jpeg)
1K+ Views
The Least Slack Time (LST) scheduling algorithm is a real-time scheduling algorithm that prioritizes tasks based on the amount of time remaining before a task's deadline. The LST algorithm's basic idea is to schedule the task with the least slack time first because it has the least amount of time before its deadline. Real-time systems are intended to handle tasks or jobs with strict time constraints. These tasks are frequently carried out in a periodic or ad hoc fashion, with each task having a specific deadline by which it must be completed. Real-time scheduling algorithms aid in the completion of ... Read More
![Diksha Patro](https://www.tutorialspoint.com/assets/profiles/586222/profile/60_1257779-1673957458.jpeg)
4K+ Views
Multiple processes that are running on various machines or nodes and interacting with one another to accomplish a single objective makeup distributed systems. In these systems, it's crucial to make sure that only one process is able to utilize a shared resource at once to prevent conflicts and data inconsistencies. One way to make sure that only one function is using a shared resource at once is through the use of mutual exclusion and Lamport's Algorithm is one of many accessible mutual exclusion algorithms. LamportÃs Algorithm A centralized mutual exclusion algorithm called Lamport's Algorithm employs timestamps to determine the sequence ... Read More
![Pranavnath](https://www.tutorialspoint.com/assets/profiles/629838/profile/60_1502721-1680003383.jpg)
275 Views
Encryption is a method to protect the incoming message by coding the plain text into an encoded one called the cipher text. The main ideology behind encryption is to protect the data transmitted to be secured from any type of attack. There are typically two types of encryptions namely symmetric and asymmetric encryption methods. In this, the encryption algorithm comes under the components of encryption. Decryption is a process of getting the plain text from the encoded text using an encryption key. Encryption Cryptography involves both encryption and decryption, to prevent the data from unauthorized access. The Components of Encryption ... Read More
![Md. Sajid](https://www.tutorialspoint.com/assets/profiles/585990/profile/60_1163426-1673934715.jpg)
808 Views
AES (Advanced Encryption Standard) and Twofish are both symmetric key block cyphers, which means they encrypt and decrypt data using the same secret key. While the two algorithms have certain similarities, they also have some significant variations. In terms of performance, AES exceeds Twofish in hardware implementations, although Twofish might exceed AES in software implementations. This is due to the fact that Twofish has a more complex key schedule and a greater number of rounds than AES. Read this article to find out more about AES and Twofish and how they are different from each other. What is AES? AES ... Read More
![Jay Singh](https://www.tutorialspoint.com/assets/profiles/543908/profile/60_4093803-1666948237.jpg)
1K+ Views
Creating models or hypotheses is a crucial component of scientific study. It entails a methodical approach to issue identification, hypothesis or model development, and experimentation. The exploratory stage, the confirmatory stage, and the descriptive stage are the three steps that make up the construction of hypotheses or models. The exploratory phase is where theories or models are first developed. It entails collecting data, examining the connections between variables, and creating preliminary hypotheses or models. This stage, which is marked by a high level of ambiguity, is frequently employed to come up with new theories or concepts. The exploratory phase is ... Read More
![Jay Singh](https://www.tutorialspoint.com/assets/profiles/543908/profile/60_4093803-1666948237.jpg)
235 Views
With the expansion of digital communication, spam has grown to be a serious issue for people all over the world. Spam can not only waste the recipient's time but also pose a security concern since it occasionally contains harmful code or phishing links. To solve this issue, a number of machine-learning techniques are used to recognize spam transmissions. One of them, the Naive Bayes algorithm, has been demonstrated to be effective in identifying spam. In this blog post, we'll look at ways to make the Naive Bayes algorithm for identifying spam better. What is the Naive Bayes Algorithm? The Naive ... Read More
![Jay Singh](https://www.tutorialspoint.com/assets/profiles/543908/profile/60_4093803-1666948237.jpg)
105 Views
Recommendation engines are effective methods that employ machine learning algorithms to provide consumers with individualized suggestions based on their prior behavior, preferences, and other criteria. These engines are used in a variety of sectors, including e-commerce, healthcare, and entertainment, and they have demonstrated value for organizations by raising user engagement and revenue. There are various processes involved in designing an end-to-end recommendation engine, including data collection and preprocessing, feature engineering, model training and assessment, deployment, and monitoring. By using this procedure, companies can produce precise and pertinent suggestions that improve user experience and promote commercial success. In this blog article, ... Read More
![Jay Singh](https://www.tutorialspoint.com/assets/profiles/543908/profile/60_4093803-1666948237.jpg)
1K+ Views
Regression and classification are two common uses for tree-based algorithms, which are popular machine-learning techniques. Gradient boosting, decision trees, and random forests are a few examples of common tree-based techniques. These algorithms can handle data in both categories and numbers. Nonetheless, prior to feeding the algorithm, categorical data must be translated into a numerical form. One such strategy is label encoding. In this blog post, we'll examine how label encoding impacts tree-based algorithms. What is Label Encoding? Label encoding is a typical machine-learning approach for transforming categorical input into numerical data. It entails giving each category in the ... Read More