Algorithms Articles

Page 8 of 39

Selfish Round Robin CPU Scheduling

Pranavnath
Pranavnath
Updated on 18-Jul-2023 853 Views

Scheduling algorithms in the operating system execute the processes based on their arrival time or by their priority. Each algorithm chooses the processes that are in waiting to ready queue by preemption or non-preemption methods. Preemptive algorithms provide access to the CPU to the process which has higher priority and preempt any other process which is already running with lower priority. But in the case of non-preemptive scheduling, when processes start their execution, it cannot be preemptive even when higher priority processes are in the ready state. The traditional round-robin scheduling algorithm is a preemptive one where each process gets ...

Read More

Round Robin Scheduling with different arrival times

Pranavnath
Pranavnath
Updated on 17-Jul-2023 10K+ Views

Scheduling algorithms of the operating system are used for scheduling the input process to the respective processor. The process scheduler has the allocation rights to decide on which process to start its execution based on any one of the scheduling algorithms. Any process in the execution state that uses CPU resources can be preempted and other process in the ready queue is chosen for execution based on priority, in terms of priority-based algorithms. Preemptive algorithms provide access to the CPU to the process which has higher priority, and preempt if any other process which is already running with lower priority. ...

Read More

Raymond’s tree based algorithm

Pranavnath
Pranavnath
Updated on 17-Jul-2023 4K+ Views

Raymond’s tree-based algorithm is used to protect the distributed systems from the occurrence of sections by the lock method. Distributed systems are networks with numerous numbers of nodes that involves the message flow from one node to another. When the process is locked or in the critical section, then only one thread or process can be allowed inside and other threads will be in the waiting state. As there are many nodes involved in the distributed systems, it can be reduced by spanning trees.Raymond’s Tree Based Algorithm Definition The Algorithm follows the method that only the threads with tokens are ...

Read More

Unlocking the Secrets of Algorithmic Marketing

Anurag Gummadi
Anurag Gummadi
Updated on 14-Jul-2023 642 Views

Algorithmic marketing is becoming increasingly common as organizations recognize the potential to reach customers with more personalized experiences. But what, exactly, goes into an algorithmic marketing strategy? To understand this process, it helps first to break down the concept of algorithms and their basic purpose. At its core, an algorithm is simply a set of instructions used by software programs or systems to carry out specific tasks. Algorithms are used in many areas of digital marketing, from social media analysis and tracking website metrics to targeted email campaigns sent through automated services like MailChimp or Constant Contact. In order for ...

Read More

Properties of linear regression lines

Sohail Tabrez
Sohail Tabrez
Updated on 13-Jul-2023 929 Views

Introduction In many fields, linear regression is a popular statistical technique for modeling the relationship between two variables. We can use this potent instrument to make predictions based on previous observations. We will talk about the properties of linear regression lines, which are the lines that fit a set of data points the best in this article. Understanding Properties of linear regression lines The properties are listed as − Linearity − Linearity is the first quality of linear regression lines. This indicates that there is a linear relationship between the dependent variable, y, and the independent variable, x. To ...

Read More

What are GloVe embeddings?

Sohail Tabrez
Sohail Tabrez
Updated on 13-Jul-2023 545 Views

Introduction The Regular Language Handling (NLP) is a quickly developing field of study that spotlights on the connections among PCs and people utilizing normal language. In NLP, one of the fundamental tasks is to represent words in a way that computers can understand. This is where word embeddings possibly become the most important factor. Word embeddings are high-dimensional vector representations of words that convey their semantic and syntactic meanings. A group of researchers from Stanford University introduced the well-known word embedding method known as GloVe (Global Vectors for Word Representation) in 2014. GloVe embeddings have acquired far and wide prominence ...

Read More

Difference Between Table-driven and Cyclic Scheduling

Pradeep Kumar
Pradeep Kumar
Updated on 13-Jul-2023 1K+ Views

Scheduling algorithms play a crucial role in managing the execution of tasks in operating systems and real-time systems. Two common scheduling approaches are table-driven scheduling and cyclic scheduling. These approaches have distinct characteristics and are suitable for different types of systems and scheduling requirements. What is Table-driven Scheduling? Table-driven scheduling, also known as static scheduling, involves creating a predefined table that specifies the execution order and time requirements for each task or process. The table contains a schedule for the entire duration of the system's operation. The scheduler follows the table to determine which task should execute at a given ...

Read More

Difference Between SRJF and LRJF CPU Scheduling Algorithms

Pradeep Kumar
Pradeep Kumar
Updated on 13-Jul-2023 596 Views

CPU scheduling algorithms play a crucial role in determining the order in which processes or tasks are executed on a computer's central processing unit (CPU). Two commonly used algorithms for CPU scheduling are Shortest Remaining Job First (SRJF) and Longest Remaining Job First (LRJF). These algorithms prioritize tasks based on their remaining execution time. In this explanation, we will discuss the differences between SRJF and LRJF scheduling algorithms. Shortest Remaining Job First (SRJF) SRJF is a non-preemptive scheduling algorithm where the process with the shortest remaining execution time is selected for execution next. It aims to minimize the average waiting ...

Read More

Difference between Token-based and Non-Token-based Algorithms in Distributed Systems

Pradeep Kumar
Pradeep Kumar
Updated on 12-Jul-2023 3K+ Views

Distributed systems are computing systems composed of multiple interconnected nodes that work together to perform a unified task. In such systems, algorithms play a crucial role in coordinating and managing the distributed resources efficiently. One fundamental aspect of these algorithms is the method they employ to control access to shared resources, known as synchronization. Two commonly used approaches for synchronization in distributed systems are token-based and non-token-based algorithms. In this discussion, we will explore the key differences between these two types of algorithms and their implications in distributed systems. What are Token-based Algorithms? Token-based algorithms use a token as a ...

Read More

Feature selection using branch and bound algorithm

Priya Mishra
Priya Mishra
Updated on 11-Jul-2023 2K+ Views

Feature selection is critical in the domains of machine learning and data analysis since it assists in identifying the most essential and informative features in a dataset. It is a procedure that seeks to extract relevant features that will help with analysis and modeling jobs. The branch and bound method is an effective feature selection tool. − As the volume of data grows at an exponential rate, it is becoming increasingly vital to build efficient algorithms capable of quickly identifying the ideal subset of attributes. In this post, we will look at feature selection and how the branch and bound method ...

Read More
Showing 71–80 of 386 articles
« Prev 1 6 7 8 9 10 39 Next »
Advertisements