Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Algorithms Articles - Page 11 of 51
350 Views
Discover the power of probabilistic shortest path routing algorithm for optical networks. Learn how this innovative approach could revolutionize network performance. Introduction In today's data-driven world, optical networks play a crucial role in ensuring fast and reliable communication. One key aspect of optimizing these networks is implementing effective routing algorithms to find the shortest paths between nodes. Enter the probabilistic shortest path routing algorithm for optical networks - an innovative solution designed to enhance network performance, latency and reliability. By leveraging cutting-edge techniques such as Dijkstra's algorithm, fuzzy logic, and graph theory, this approach offers promising results in improving throughput ... Read More
798 Views
The Minimum Bottleneck Spanning tree is an undirected graph whose highest weight is considered as minimum as possible. Let’s take an example to understand the Minimum Bottleneck Spanning tree. In Figure I, we observe that there are three possible ways of spanning trees that have the common edge 2 and it means there is no other tree having a bottleneck value less than 2. Therefore, all these trees verify as Minimum Bottleneck Spanning trees. How we can say that the MST is MBST? There are the following points to understand the MST to be MBST − MBST ... Read More
11K+ Views
The Backtracking technique is an algorithm used to solve the decision problem whereas the Branch-N-Bound technique is an algorithm used to solve the optimization problem. Both techniques follow the brute force method and are used to generate the State Space tree. A State Space tree is the tree that represents the nodes in all possible states of the problem from a root node to the terminal node.Let us learn both techniques one by one and understand the difference in detail. Backtracking Technique Backtracking is the modified process of the brute force approach where the technique efficiently searches for a solution ... Read More
490 Views
The program that trains the learning sequence of a machine is called the learning model of that machine. A machine learning model is a programmed pattern of training that makes conclusions from the dataset that is previously used in machine learning. There are different machine learning models which are divided into different factors, like the type of task given to the machine. Models in Machine Learning The process of algorithmic learning methods to find certain scenarios and give outputs is known as the machine learning model. A specific pattern or output is found from the dataset, while training is called ... Read More
16K+ Views
Block Cipher is an encryption algorithm that works with a symmetric key in a deterministic way. The plain text is divided into several blocks of equal size. If the length of the plain text does not allow block division of equal size, padding is done over the plain text. His type of encryption method can encrypt on blocks of 128 bits, the key can be 128, 192, or 256 bits. In block ciphers, the length of the plain text is equal to the length of the cipher text. This type of encryption process considered each block at a time and ... Read More
3K+ Views
The Longest Remaining Time First (LRTF) scheduling algorithm is a variant of the Longest Job First (LJF) algorithm and is used by the operating system to schedule incoming processes. In LRTF, the process with the highest remaining execution time is given the highest priority and scheduled to be executed first. At intervals of time, such as every unit of time, the system checks to see if another process with a higher burst time has arrived. If such a process exists, it is scheduled for execution before continuing with the current process. The algorithm is designed to maximize the processor's utilization ... Read More
3K+ Views
Longest Job First (LJF) is a CPU scheduling algorithm that prioritizes processes based on their burst time. In LJF, the processes with the largest burst time are given priority over the shorter ones. This algorithm works on a non-preemptive basis, meaning once a process is started, it will continue to run until it completes, and no other process can preempt it. To implement the LJF algorithm, processes are sorted in the ready queue based on their burst times in descending order. The process with the largest burst time among all the processes that have arrived until that time is selected ... Read More
322 Views
Introduction Linear Scheduling Method is a scheduling algorithm designed for real-time systems in which tasks must be completed within specific time frames to ensure the system's proper operation. It is a straightforward algorithm that assigns tasks based on their deadlines and provides them with fixed time slices to complete their execution. In this article, we will learn about the Linear Scheduling Method its various elements, its advantages and disadvantages of usage in an Operating System What is Linear Scheduling Method in Operating System? The tasks in LSM are arranged in a linear order, and the scheduler moves through the list, ... Read More
2K+ Views
The Least Slack Time (LST) scheduling algorithm is a real-time scheduling algorithm that prioritizes tasks based on the amount of time remaining before a task's deadline. The LST algorithm's basic idea is to schedule the task with the least slack time first because it has the least amount of time before its deadline. Real-time systems are intended to handle tasks or jobs with strict time constraints. These tasks are frequently carried out in a periodic or ad hoc fashion, with each task having a specific deadline by which it must be completed. Real-time scheduling algorithms aid in the completion of ... Read More
6K+ Views
Multiple processes that are running on various machines or nodes and interacting with one another to accomplish a single objective makeup distributed systems. In these systems, it's crucial to make sure that only one process is able to utilize a shared resource at once to prevent conflicts and data inconsistencies. One way to make sure that only one function is using a shared resource at once is through the use of mutual exclusion and Lamport's Algorithm is one of many accessible mutual exclusion algorithms. Lamportís Algorithm A centralized mutual exclusion algorithm called Lamport's Algorithm employs timestamps to determine the sequence ... Read More