Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Algorithms Articles
Page 6 of 39
Look aside Buffer
What is a Look Aside Buffer? A Look-aside Buffer (LAB) is a type of cache memory that is used in computer systems to store frequently accessed data. The LAB is located between the CPU and the main memory, and it acts as a high-speed buffer to improve system performance. The LAB works by caching a portion of the data from the main memory that is frequently accessed by the CPU. When the CPU requests data from the main memory, the LAB first checks if the data is present in the buffer. If the data is found in the LAB, it ...
Read MoreRandom Forest vs Gradient Boosting Algorithm
Introduction Random forest and gradient boosting are two of the most popular and powerful machine learning algorithms for classification and regression tasks. Both algorithms belong to the family of ensemble learning methods and are used to improve model accuracy by combining the strengths of multiple weak learners. Despite their similarities, random forest and gradient boosting differ in their approach to model building, performance, and interpretability. When you're finished reading, you'll understand when to use each algorithm and how to select the one that's ideal for your unique problem. What is Random Forest? Random Forest, a ...
Read MoreWhat is Loss Function in Data Science
Introduction A loss function, often referred to as a cost function or an error function, is a metric used in data science to assess how well predictions made by a machine learning model match the actual values or goals in the training data. It quantifies the difference between real and predicted values and offers a single scalar number that exemplifies the model's effectiveness. Problems with Multi−Collinearity n is the number of data points in the dataset. y represents the true values of the target variable. ŷ represents the predicted values generated by the regression model. The choice of ...
Read MoreHow to Train MFCC Using Machine Learning Algorithms
Introduction Mel Frequency Cepstral Coefficients (MFCCs) is a widely used feature extraction technique for audio processing, particularly in speech recognition applications. A logarithmic compression, a filter bank, and the discrete Fourier transform (DFT) of audio signals in brief time intervals are used to create MFCCs. You will have a thorough understanding of how to train MFCC using machine learning algorithms by the end of this article. What is an MFCC MFCC stands for Mel−Frequency Cepstral Coefficients. It is a widely used feature extraction technique in audio signal processing and speech recognition. The MFCC algorithm is based on the human ...
Read MoreSpaceship Titanic Project using Machine Learning in Python
The original Titanic project in Machine learning is aimed at finding whether a person on the Titanic will survive or not. However, this project named the spaceship Titanic is a bit different. The problem statement here is that a spaceship has people going on a trip in space. But due to a collision, a few people need to be transported to some other dimension or planet. Now this can’t be done randomly. So, we will use a Machine Learning technique in Python to find out who will get transported and who will not. Algorithm Step 1 − ...
Read MoreLearn Machine Learning in 45 Days
Machine learning is a subset of artificial intelligence (AI) that enables machines to learn from data without being explicitly programmed. From predicting customer behavior to recognizing images and speech, it is a rapidly growing field. Adding machine learning to your toolkit can help you excel in many sectors such as finance, fraud detection, automobile, research, etc. Day 1-5: Basics of Machine Learning Before diving into its technical aspects, it is imperative to understand the fundamental concepts of machine learning. Learn about the types of machine learning, such as supervised, unsupervised, and reinforcement learning. Focus on key points, ...
Read MorePath Name in File Directory
In order to understand what a path name signifies, we need to delve deep into the basic working of a file directory. The path name in a file directory indicates where a file or directory resides in the directory tree. It is made up of a variety of directories, every single one which can be distinguished by a delimiter, usually an upward slash (/) in Unix-based systems or a backslash () in systems running on Windows. The path names start at the root directory, represented by a forward slash (/) in Unix-based systems or by a drive letter (like C:) ...
Read MorePartition Allocation in Memory Management
Operating systems must have memory management, which is responsible for allocating and controlling memory resources to active processes. Memory in a computer system is split up into several partitions, each of which is dedicated to a different process. Partition allocation is the name of this procedure. Several partition allocation techniques can be applied while managing memory. We shall examine the various partition allocation techniques in this post, as well as their benefits and drawbacks. Partition Allocation Methods Fixed and dynamic partition allocation techniques are the two primary categories of partition allocation methods used in memory management. The fixed partition allocation ...
Read MoreParrot Operating System
A free and open-source operating system called Parrot Operating System was created with security, privacy, and development in mind. It is based on Debian GNU/Linux and includes pre-installed tools for privacy protection, cryptography, computer forensics, and penetration testing. For various use cases, Parrot OS provides many versions including Home, Security, IoT, and Cloud. Moreover, it offers a virtual machine manager for managing virtualization platforms and a sandbox environment for testing programs. AnonSurf, a special utility available only in Parrot OS, enables users to anonymize their internet activity and conceal their identity. Moreover, the operating system is compatible with a ...
Read MoreParbegin / Parend Concurrent Statement
In hardware description languages like VHDL, a "parent" concurrent statement is used to establish a hierarchical design structure. It enables the creation and management of several processes within of a single organization. An illustration of a parent concurrent statement is as follows − entity my_entity is port ( clk: in std_logic; reset: in std_logic; data_in: in std_logic_vector(7 downto 0); data_out: out std_logic_vector(7 downto 0) ); end entity; architecture behavioral of my_entity is begin -- Parent Concurrent Statement parent_process: process(clk, reset) begin if reset = '1' then -- Reset condition data_out
Read More